Vous êtes sur la page 1sur 133

List activists/protesters detained or disappeard, NDAA

http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]


NewsFollowUp.com
search Franklin Scandal Omaha pictorial index sitemap home
Registry / List of
Activists / Protesters
detained or
disappeared under
NDAA
NFU
Go to Alphabetic list
Academic Freedom
Conference
Obama Death List
Rothschild Timeline
Bush / Clinton Body Count
MOST ACTIVE PA
Registry / List of Activists
already detained or have
disappeared under NDAA
U.S. hiding 27,000 kidnapped people in hell-hole
ships and prisons
below
Sign anti NDAA petition and email your senators at: Demand
Progress.
Philip Marshall & children suicided?
Aaron Swartz) NaturalNews
Visionary internet activist Aaron Swartz found dead; was
this brilliant internet revolutionary 'taken out?'
Boots on the ground: Obamas
cybersecurity directive
Obama moves to keep kill list memos
secret forever
StopNDAA
Facebook 1 million against NDAA Indefinite Detention
...................................Refresh F5...archive
home

50th Anniversary of J FK assassination
"Event of a Lifetime" at the Fess
Parker Double Tree Inn.
J FKSantaBarbara.
News for the 99%
=go to NFU pages
False Flag Cyber Attack
Leah Plante, Church, Chase, Betterly
Dissent is NOT Terrorism!
Ben Zygier Israel's secret prisoner
Preemptive Prosecution Cleveland 5, RNC 8, Nato
3
The Fascism Effect of the 'War on Terror'
Advanced Research and Development Activity
Office TIA replacement.
Entersect, Certifion, LocatePlus, Multilateration
EZPass, toll road systems tracking, surveillance, yes
NIST and NSA integration
Northcom, Northern Command
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Administrativesubpoena p.2
Amdocs, Israel Telecom Immunity
American Telecommunications Co's
Apple, Iphone, Android Google
Appliance surveillance,
Army, spying on blogs
Automobile, Black Boxes, NTSB
Automatic License PlateRecognition,
Avatar Identity Program, DHS more
Behavior Recognition, DARPA
Blog Tracking
Biosurveillance, Biowatch, Biometrics
Biometric cataloging
Bioport, Anthrax Vaccine, Court-Martial.
CALEA Communications Assistance for Law
Enforcement Act
CAPPS, color coding airline passengers
Carnivore, DCS 1000, EtherPeek
Cell Phone wiretapping, mic remote activation
Cell-Site Tracking Warantless
Census Bureau more
Chertoff Watch 'Homeland Security'
CODIS, collect DNA every federal arrest
cofee1 Computer Online Forensic Evidence Extractor
Controlled Drug Users, DEA
Covert U.S. intelligence operation to steal personal
data, TIA wmr
Credit Card Information Databases
Cubic Corporation
DARPA Defense Advanced Research Project Agency
IPTO, BICA, LifeLog, Forester, Virat, RSTA
Deep Packet Inspection
Digital TV, Interactive
DNA Databases, insurance cherry picking
Drones, Balloons
Drug Testing
DSL Service
Echelon
Einstein cyber-security intrusion detection system
Electronic Passports
Email Surveillance, Google
FBI tracking devices
Facial Recognition Facebook, Israel, J ewish co.
FDIC Bank Transaction Surveillance
FEMA Townsend, Comey, Ashcroft
FEMA secret databases
FIRSTFRUITS media wiretap surveillance
Foreign Intelligence SurveillanceCourt (FISC) wmr
Fusion Centers, Entersect
Garden Plot antiwar group surveillance
Geographic Information Systems GIS
GPS, Location Technology
GROUNDBREAKER Eagle Alliance, outsourcing,
NSA
Google
Guantanamo
HART / HURT aerial surveillance
Health Information Systems
Operation Hylander NSA wiretaps on Americans
abroad.
Infragard Infrastructure security
Insurance Inspection, satellite
Israel, Pedophilia
Israel, Amdocs
Israel , ... Amdocs US Telephone Billing
Systems
ISP surveillance, profit
Liberty Alliance Project
MATRIX Multistate Anti-TerrorismInformation
Exchange
Microsoft, IE Explorer, cookies, surf tracking, SSL
Bots, Spies
Murdoch, Rupert phone hacking, Israel, Rebecca
Brooks
NAIS National Animal Identification System
Narus, ISP, Semantic Traffic Analysis
National Security Agency
National Security letter
NCTC National Counter TerrorismCenter
NSA Administrativesubpoena NSA
Narus / Amdocs links, ISP, Semantic Traffic Analysis
Negroponte watch
Neil Entwistle, 911, FAA, NORAD, Ptech
National Applications Organization
National ID Card, drivers license
Open BSD FBI backdoor, operating system
Police Departments tracking protesters, NSA
Precrimesurveillance, body language
Patriot Act, database compilation on 'terrorists' and
civilians
Perfect Citizen domestic surveillance, NSA
Printer Tracking dots and below
Prison Ships
Real ID Federal ID
Restroom taping
RFID Tech product tags, wireless transmissions
Road Sensors
Sarkozy, pedophile statement
Satellites, National Geospatial Intelligence Agency.
Search engines
Secret Prisons, Rendition
Sneak and Peak search warrant
Stellar Wind illegal NSA surveillance program
Stoplight Cameras
Streetlight cameras
Televison sets, cable tv
Trailblazer
SWIFT, Society for Worldwide Interbank Financial
Telecommunication
TALON
Terahertz Spectroscopy
TIDE, Terrorist Identities Datamart Environment" or
"TIDE" and "Railhead."
Trailblazer / NSA
TRAPWIRE
US-VISIT fingerprinting foreign visitors
Utah, Camp Williams data mining
Video Analysis and Content Extraction
Voice Grid Nation, VoiceGrid speech recognition
White House
Wifi, see through walls
Zawahiri, Negroponte hoax letter
X-ray, airports
Related topics: Internet 'War onTerrorism' Communications Fear Boycotts
related topics related topics related topics
BushWatch
Domestic Surveillance
Nonviolence
Poverty
Africa
Iraq
Iran
Religion
Deregulation
Military Privatization.
Tax Reduction
'War on Terror'
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Protest Zionism
Registry / List of Activists detained or disappeared under NDAA top
If you know of anyone who has disappeared under NDAA, we will record that information here.
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit calls the NDAA law a
catastrophic blow to civil liberties.
AlexanderHiggins As previously pointed out, during
the trial Obamas lawyers refused to define or clarify
the terms substantially supporting, terrorism or
who the associated forces where that the NDAA
allowed the United States government to indefinitely
detain. ... Worseis during the courseof trial Obamas
lawyers refused to assert to J udge Forrest that the
plaintiffs, which is a collection of journalists and
public advocacy activists, not be targeted for indefinite
detention simply for their participating in
constitutionally protected activities. and
AlexanderHiggins already detained
Amber Lyon Live How the NDAA Directly Threatens
Average Americans, and How You Can TakeAction
Now ... Obama lied to the public and said he would
veto the NDAAs indefinite detention clauses. Instead,
he surreptitiously signed the NDAA into law on Dec.
31, 2011 while most Americans were distracted
celebrating New Years Eve. Both Romney and Obama
have publicly stated their support for the new law.
Antiwar gg The NDAA will prevent some
whistleblowers from coming forward with information
and documents vital to the public good in fear the
corrupt will pressure authorities to use the NDAA to
detain the whistleblower indefinitely.
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
BusinessInsider 10/2012 NDAA Plaintiffs Say Obama
Flipped Out When A J udge Blocked The Act Because
He Was Already Detaining People
Epic Electronic Privacy Information Center
Mint Press Chris Hedges speaks to Occupy activists
after a march through the streets of Philadelphia, PA
J uly, 1, 2012. (Mannie Garcia/MintPress)
October2011 Occupy Washington DC .... NDAA
TerrorismCharges Used Against Three NATO
Protesters in Chicago
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
SparrowMedia Iceland Parlamentarian Birgitta
J onsdottir, Carl J . Mayer, Tangerine Bolen ...

StopNDAA
Cnet Tech News First
ArabAmerican News
Crooks and Liars / LawFare Key point rebutting the
contention that the indefinite detention provisions
apply to United States citizens:
DailyKos recall the backlash when Bush created "Free
Speech Zones" - those razor wire cordoned off places
where one could protest, well out of sight, of any
action by his administration.
Gothamist Video: Cops Arrest Activist For Yelling
About NDAA In Grand Central ... where
approximately 150 demonstrators formed a "flash
mob" to protest President Obama's signing of the
National Defense Authorization Act NDAA], In this
video, protester Lauren Digioiagets arrested around
the two minute mark: Digioia, who has been involved
with the Occupy Wall Street movement for some time
(and was sexually assaulted in Zuccotti Park in
October) ... activists had previously been threatened
with arrest for peacefully assembling, despite the space
being open to the public (as required by law)
AlexanderHiggins Obama May Be In Contempt For
Violating NDAA Detention Ruling A federal judge
warned the US government may be in contempt after
Obama attorneys refused to assure NDAA detention
isnt currently being used on citizens.
The NewAmerican On September 12 a federal district
court judge made permanent an earlier order
temporarily blocking enforcement of provisions of the
National Defense Authorization Act (NDAA)
purporting to empower the president to deploy the U.S.
military to apprehend and indefinitely detain people
suspected of "substantially supporting" al-Qaeda, the
Taliban, or "associated forces."
J urist 10/2012 This week, the US Court of Appeals for
the Second Circuit will consider whether to stay US
District J udge Katherine Forrest's decision in Hedges
v. Obama, granting a permanent injunction on First
Amendment grounds against the detention powers
Aljazeera Due process under duress: Detaining citizens
under NDAA
CBSNews Terror indictments for Chicago NATO
protesters Brian Church, J ared Chase, Brent Vincent
Betterly
CIA
FBI
FDIC
Forbes NDAA
House Armed Services Committee and factsheet Fact
Sheet: Former Attorneys General, National Security
Officials Support Detention Provisions of FY13
NDAA (HASC Fact Sheet - Reagan, Bush Admin
Officials Support FY13 NDAA.pdf - 328.6 KBs)
New York Times NSA executive order authorizing
data mining of phone calls and file.
SunTimes 3 protesters charged with conspiracy to
commit terrorism They were charged early Saturday
as dozens of dignitaries from around the globe are
heading to Chicago for the NATO Summit. ....The
men have been each charged with threefelony counts:
possession of an explosive or incendiary device,
conspiracy to commit terrorism, and providing
material support to terrorism, said Harrison District
Police Lt. Kenneth Stoppa. Brian Church, 20, of Ft.
Lauderdale, Fla.; J ared Chase, 24, of Keene, New
Hampshire; and Brent Vincent Betterly, 24, of
Oakland Park, Fl.
Supreme Court Criticism has also been voiced
regarding section 1033 of the bill which would state
that nothing in the Authorization for Use of Military
Force (Public Law 107-40) or the National Defense
Authorization Act for Fiscal Year 2012 (Public Law
112-81) shall be construed to deny the availability of
the writ of habeas corpus in a court ordained or
established by or under Article III of the Constitution
for any person who is detained in the United States
pursuant to the Authorization for Use of Military
Force (Public Law 107-40). 7]
Whitehouse Bush =Obama
Republicans opposed to Bush Warrantless wiretapping
are irrelevant and impotent.
Wikipedia The concern of millions of Americans
from every band in the political spectrumis that
Americans detained as belligerents under the terms
of the NDAA will not be tried in Article III courts, but
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
USDaysofRage Alexa O'Brien
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
enumerated in Section 1021(b)(2) of the FY2012
National Defense Authorization Act
LawFare NDAA FAQ: A Guide for the Perplexed
By Benjamin Wittes and Robert Chesney Monday,
December 19, 2011 at 3:31 PM The volumeof sheer,
unadulterated nonsense zipping around the internet
about the NDAA boggles the mind.
temporary restraining order (which they subsequently
converted to a motion for preliminary injunction in a
conference with the Court), seeking to enjoin
enforcement of 1021.
will be subject to military tribunals such as the one
currently considering the case of the so-called Gitmo
Five
U.S. hiding 27,000 kidnapped people in hell-hole ships and prisons
NEWS SEPTEMBER 4, 2009 BY: DEBORAH DUPRE Subscribe 0Email Top News newsletter
HumanitarianStafford CliveSmith
TheU.S. is holding 27,000 kidnapped peoplein secret prisons including thirty-two 'ghost ships' according to Reprieve Founding Director, Attorney CliveStafford Smithin an interview Wednesday by Amy Goodman of Democracy
Now! (CliveStafford Smith, Democracy Now! Amy Goodman Interview, September 2, 2009)
Reprieve is a London based non-profit organizationusing law to enforcehuman rights 'fromGuantanamo Bay to DeathRow.'
Theorganizationhas beendedicated to helpingpeoplekidnapped, tortured and used for experimentationin America's planet battlefield 'war onterror' system.
TheU.S. is transporting peopleto Iraqi jails among other places, to avoid media and legal scrutiny according to Smithin the Democracy Now! interview. (below)
Bush administration's programof kidnapping"suspects," a covert operation also known as "rendition," continues under the Obamaadministration.
Most peoplekidnapped and tortured are peopleof color, innocent of terrorism. They are used for non-consensual human experimentationaccording to recent reports. (SeeAFP, Doctors had central rolein CIA abuse: rights group,
Spet. 1, 2009and CIA doctors facehuman experimentationclaims, Sept. 3, 2009)
Human experimentationwithout consent has beenprohibited in any setting since1947, when the Nuremberg Code resultant of Nazi doctor prosecution.
"Every day, the U.S. picks up40- 60peopleconsidered 'suspects' fromaround the world and imprisons them," stated Smith.
Non-consensual human experimentationconducted onMiddleEasterndetainees has consisted of applyingtortureincluding physical threats, mock executions, choking to the point where detainees lost consciousness and even
using a stiff brush to scrub a detainees skin raw while health officials and psychologists monitored reactions. (AFP)
TheU.S.-based group, Physicians for Human Rights (PHR) medical advisor Scott Allen states onthe PHR websitethat "medical doctors and psychologists colluded with the CIA to keepobservational records about waterboarding,
which approaches unethical and unlawful human experimentation." (Press release: PHR Analysis: CIA Health Professionals Rolein TortureWorse Than Previously Known, August 31, 2009)
Earlier this year, Smithestimated that 60,000 peoplehad beenthrough the American "system." This systemis now internationally known to be a U.S. sponsored kidnap-torture-experiment program.

Statedonthe Reprieve websiteis: "Weinvestigate, welitigateand weeducate, working onthe frontline, providinglegal support to prisoners unableto pay for it themselves. Wepromote the ruleof law around the world, and
secureeach persons right to a fair trial. And in doing so, wesavelives."
CliveStafford Smithdedicated humanitarian
Smith, spent 25years working onbehalf of defendants facingU.S. death penalty. As Reprieve Director, Smithoversees Reprieves Casework Programmeplus the direct representation of prisoners in Guantnamo Bay and ondeath
row as a Louisiana licensed attorney-at-law.
After graduating fromColumbia Law School in New York, Smithspent nine years as a lawyer with the Southern Center for Human Rights working ondeath penalty cases and other civil rights issues. In 1993, Smithmoved to
New Orleans and launched the Louisiana Crisis AssistanceCenter, a non-profit law office specializing in representation of poor peoplein death penalty cases.
In 1999Smithfounded Reprieve. Thefollowingyear, he was awardedan OBE for humanitarian services. Since 2004, Smithhas focused onachievingdue process for prisoners being held by the US in Guantnamo Bay and
countless secret prisons around the world established in the wake of the World Trade Center crime. Healso continues his work ondeath penalty cases.
Smithwas madea RowntreeVisionary and Echoing Green Fellow in 2005and previously, was a Soros Senior Fellow.
For moreinformation about Reprieve, contact: info@reprieve.org.uk
BusinessInsider Karzai May Be Kicking ObamaOut Of AfghanistanSoon Glenn Greenwald, TheGuardian | Nov. 20, 2012, 7:53 AM | 994| For several decades, the US government - in annual "human rights" reports issuedby
the StateDepartment (reports mandatedby the US Congress) - has formally condemned nations around the globe for the practiceof indefinite detention: imprisoning peoplewithout charges or any fixed sentence. Thesereports,
said Secretary of StateHillary Clinton in her preface to last year's report, are grounded in the principlethat "respect for human rights is not a western construct or a uniquely American ideal; it is the foundation for peaceand
stability everywhere." That 2011report condemned numerous nations for indefinite detention, including Libya ("abuse and lack of review in detention"), Uzbekistan("arbitrary arrest and detention"), Syria("arbitrary arrest and
detention"), and Iran ("Authorities held detainees, at times incommunicado, often for weeks or months without chargeor trial"). In Afghanistanand Iraq, the US government is engaged in a fierceand protracted battle over the
fundamental right to be freeof indefinite detention. Specifically, the US is demanding that the governments of those two nations ceaseaccording this right to their citizens. As a Washington Post articlethis morningdetails, Afghan
President Hamid Karzai is insistingthat the US fulfill its commitment to turn over all prisons, including the notorious facility at Bagram, to Afghancontrol, but here is one major impediment emphasis added]: "Afghan and U.S.
officials havealso disagreed onthe issueof detention without trial. Washington wants the Afghangovernment to continue holding certain prisoners it views as dangerous, evenif thereis not enough evidenceto try them. "Aimal
Faizi, the chief spokesman for Karzai, told reporters Monday that detention without trial is illegal in Afghanistanand that morethan 50Afghans are still being held in U.S. custody at Bagram, 35miles northeast of Kabul, even
though they havebeenordered released by Afghancourts." TheUS has long beendemanding that the Afghangovernment continue the American practiceof indefinite detention without charges, and still presses this demand even
after the top Afghancourt in September ruled that such detentions violate Afghanlaw. Human rights workers in Afghanistanhavelong pointedout that America's practiceof imprisoning Afghans without charges is a major source
of anti-American sentiment in the country. In a 2009interview, J onathan Horowitz of the Open Society Institutetold me: "Themajority of the peoplewho I havespoken to cite the way that the US captures and detains peopleas
their maincomplaint against the US, second only to civiliancasualties." This US-Afghanbattle over basic due process has extended beyond detention policies. In 2009, the Obamaadministration's plan to assassinatecertain Afghan
citizens it suspectedof being "drug kingpins" - with no charges, trial or any other due process - sparked intense objections fromAfghanofficials. Those officials tried to teach Obamaofficials such precepts as: "There is a
constitutional problemhere. A person is innocent unless proven guilty," and: "if yougo off to kill or capture them, how do youprovethat they are really guilty in terms of legal process?", and: " TheAmericans] should respect
our law, our constitution and our legal codes. Wehavea commitment to arrest thesepeopleonour own." Read more: http://www.businessinsider.com/karzai -may-be-kicking-obama-out-of-afghanistan-soon-2012-
11#ixzz2DAgdbKfb
Huffington Post Republican state lawmakers in Texas submitted two bills this week seeking to counteract the federal government's controversial powers of indefinite detention and overzealous searches by the Transportation
Security Administration. GOP state Rep. Lyle Larson filed a measure that wouldnullify controversial aspects of the 2012National DefenseAuthorization Act, which has beencriticized for establishing vaguecriteria that gives the
federal government broad authority to indefinitely detain suspectedterrorists without charges or a trial. HB 149specifically calls out Section1021and 1022of the NDAA, which were recently subjects of a federal lawsuit filed by
plaintiffs concerned that the language within the passages could be used to indefinitely detain U.S. citizens. Thebill calls the sections "inimical to the liberty, security, and well-being of the citizens of the Stateof Texas," and
accuses themof violating numerous protections established by both the U.S. and state constitutions. Thelegislation states that it will reject "material support" of the measures' implementation, and goes onto claimthat any person
found to be exercising powers established in Sections 1021or 1022wouldrisk criminal penalties. GOP state Rep. David Simpson filed a second bill, HB 80, to address allegedoverreach by the TSA. Themeasure declares that any
"intentional" touchingof "the anus, breast, buttocks, or sexual organ of the other person, including touchingthrough clothing," without probablecause wouldbe considered a violation of the law. It wouldalso prohibit removing a
"child younger than 18years of agefromthe physical custody or control of a parent or guardianof the child," and establishes broader restrictions onharassment or inconveniencing those desiring to avoid such searches. If you
walk upto somebody and grab their crotchout onthe street, it will land youin jail. Blueuniforms and federal badges dont grant some goonthe power to sexually assault you, or at least they shouldnt," Tenth Amendment
Center communications director Mike Maharrey said in a statement. "A person doesnt forfeit her or his personal dignity or Fourth Amendment protections with the purchaseof an airlineticket."
RT Boston police accused of spying onprotesters and intimidatingdissidents ... TheBoston PoliceDepartment calls themcriminals, extremists and a reason to raisea red flag in regards to ensuring homeland security. Their
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
crime, though, is simply exercising their First Amendment rights. TheAmerican Civil Liberties Unionin Massachusetts has successfully requested and obtained a troveof files fromthe Boston PoliceDepartment that reveals that
officers of the law havefor several years conducted detailed surveillance onpeaceful protesters, in many cases filing extensivepaperwork to discuss the inner workings of non-violent organizations and how they exercisetheir
constitutionally-protected right to be securein their political beliefs. ... Thevictims, the ACLU reports, include well-known activist groups such as the Greater Boston chapter of the CodePink anti-war organizationand a local
branch of the Veterans for Peace movement. ... KateCrockford (ACLU) says that protesters were still filed in thesefusioncenters with reports plastered with labels such as Criminal Act, Extremists, Civil Disturbance and
HomeSec-Domestic. ... and RT DHS 'crap intelligence',
Gothamist Nov 2012 Thecity has settled a lawsuit brought by threeOccupy Wall Street protestors who accused the NYPD of arrestingthemwithout cause, detaining themfor almost 24hours, and forcingthemthrough a
humiliating strip search. On November 17th 2011, 20-year-old KiraMoyer-Sims was buying coffeeonthe Lower East Sidewhile threefriends waited in a nearby car. Suddenly 30police officers swooped in and arrested them,
and later drilled themontheir relationship with the movement while they were in custody. I felt likeI had beenarrested for a thought crime, Moyer-Sims said at the time. Taxpayers will now give her $15,000 to makeupfor it.
According to the settlement, the city will pay $50,000 total to Moyer-Sims, AngelaRichino, and Matthew Vrvilo. (It's unclear what happened to the fourth person arrested.) All the plaintiffs in the civil lawsuit had beencharged
with obstructinggovernmental administrationcharges that were later dropped by the DA's office.
October2011 Three Chicago NATO Summit Activists Charged With Conspiracy to Commit Terrorism, Providing Material Support for Terrorism Robert Lamoore (left) and
Daniel Murphy (right), the two activists released Friday night (Photo by Steve Horn) Two more antiwar activists, in from out of town to protest the NATO Summit, were
released from a police station on the south sideof Chicago late tonight at roughly 10:00 PM, making it a grand total of six activists released so far, of the nine detained without
charge by the Chicago Police Department (CPD) on Wednesday, previously covered on Antiwar.com. The other threeremaining werent so lucky. Theyve been charged with, as
Occupy Chicago has reported on its Twitter feed, possession of incendiary or explosive device, conspiracy to commit terrorism& providing material support for terrorism.
Material support of terrorism, under the National Defense Authorization Act of 2012 signed by President Barack Obama, is a crime that could call for indefinite detention without a
trial, begging the question: are these legitimatepolitical prisoners? One Occupy activist noted, Its NDAA in full effect. We are doomed. TheNational Lawyers Guild deplores
the charges against Occupy activists in the strongest degree, said Sarah Gelsomino with the NLG and the Peoples Law Office. Its outrageous for the city to apply terrorism
charges when its the police who have been terrorizing activists and threatening their right to protest. There will be a bond hearing at noon today. The threeactivists names,
according to the NLG, are Bryan Church, Jarred Chase, Brent Betterly. The lame excuse for arrest and terrorism charges and the subsequent police raid to
begin with? The activists were making molotov cocktails to use in their protests, or so reported the sycophantic local press in Chicago. As Kevin Gosztola of FireDogLake
explained in a previously written blog post well worth reading, Local news reported a police source had recovered Molotov cocktails. There is no evidence of the existence or
production of Molotov cocktails. The police did confiscate a home brew-making kit. more
Statig.am Meet J ournalist Alexa O'Brien: Targeted By #Obama Admin, #NDAA #Detention For Trying to Make Bribing #Politicians Illegal - www.PeopleOverPolitics.Org
TruthOut Co-plaintiff Alexa O'Brien, a journalist and co-founder of the protest movement US Days of Rage, cited a Truthout FOIA request in her testimony. O'Brien said that a
federal agent confidentially notified her about a document suggesting the Department of Homeland Security (DHS) planned to infiltrate US Days of Rage by linking it to the
hacktivist collective Anonymous. Included in her testimony is a memo unearthed by Truthout which states: "National Cybersecurity and Communications Integration Center Bulletin.
Details on 'Anonymous,' upcoming U.S. operations 17 September 2011 Occupy Wall Street, 'U.S. Day of Rage.'" O'Brien also testified that she learned from several sources,
including leaked documents on WikiLeaks, that a private security firm and former US StateDepartment officials had allegedly been asked to tieUS Days of Rage to terrorist web
sites.
RT Third anarchist jailed for refusing to testify before secret grand jury Get short URL email story to a friend print version Published: 11 October, 2012, 20:58 TAGS: Law,
USA, Court Leah Plante A third self-described anarchist from the Pacific Northwest has been jailed by federal officials for refusing to speak before a secretive grand jury that
the accused have called a politically-motivated modern-day witch-hunt. Leah-Lynn Plante, a mid-20s activist from Seattle, Washington, was ushered out of court by authorities on
Wednesday after refusing for a third time to answer questions forced on her by a grand jury a panel of prosecutors convened to determineif an indictment can be issued for a
federal crime. Plante was one of a handful of people targeted in a series of raids administered by the FBI and the J oint TerrorismTask Force on J uly 25 of this year which the feds say
were in conjunction with an investigation into acts of vandalism that occurred during May Day protests in Seattle nearly two months prior. As part of their probe, search warrants
were issued at multiple residences of activists in the area, including Plantes, demanding that dwellers provide agents with anti-government or anarchist literature in their homes
and any flags, flag-making material, cell phones, hard drives, address books, and black clothing. As if they had taken pointers from Orwells 1984, they took books, artwork and
other various literatureas evidence as well as many other personal belongings even though they seemed to know that nobody therewas even in Seattle on May Day, Plante recalls
in a post published this week to her Tumblr page. Only one week after the raid, Neil Fox of the National Lawyers Guild told Seattle Times that raids like this are create a chilling
effect by going after lawful, constitutionally-allowed private possessions. It concerns us any time thereare law-enforcement raids that target political literature, First Amendment-
protected materials, Fox said. This week Plante still maintains her innocence, now she has reason to believe that the raid that has left her suffering from post-traumatic stress
syndrome may have been more than an investigation into an activity, but an ideology. Plante says a Freedom of Information Act request she filed in the months after her apartment
door was broken down by armed officials reveals that the grand jury investigating her was first convened in March, two months before the vandalism she is being accused of even
occurred. They are trying to investigate anarchists and persecute themfor their beliefs. This is a fishing expedition. This is a witch hunt, she says this week. On the day of her third
meeting with the grand jury on Wednesday, Plante wrote on her blog that shed almost certainly be jailed on charges of contempt for refusing once again to testify about herself but
said she was willing to face the consequences for exercising her right to remain silent. I do not look forward to what inevitably awaits me today, but I accept it, she writes. My
convictions are unwavering and will not be shaken by their harassment. Today is October 10th, 2012 and I amready to go to prison. Hours later, her Tumblr was updated with a
note authored by one of her supporters confirming that Plante was thrown into prison for civil contempt after her court date. Plante is now the third anarchist to be imprisoned in
the last month for refusing to answer questions about their belief and behavior before a grand jury. Last month, Plante spoke openly about the grand jury before refusing their
questioning for only her second time. I believe that these hearings are politically motivated, she wrote in a September 16 statement. Thegovernment wants to use themto collect
information that it can use in a campaign of repression. I refuse to have any part of it, I will never answer their questions, I will never speak. While I hate the very idea of prison, I
amready to face it in order to stay true to my personal beliefs. I know that they want to kidnap me and isolateme from my friends and my loved ones in an effort to coerceme to
speak. It will not work. I know that if I amtaken away, I will not be alone. Katherine KteeO Olejnik, a fellow anarchist from the Seattle area, was taken into federal custody on
September 28 for refusing to cooperate with a grand jury, a decision she said was based on humanity and her First Amendment protections. I cannot and will not say something that
could greatly harma persons life, and providing information that could lead to long termincarceration would be doing that, Olejnik wrote before being booked. Icannot and will
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
not be a party to a McCarthyist policy that is asking individuals to condemn each other based on political beliefs. On the No Political Repression blog, a support of Olejnik writes
that she was prohibited from taking notes during her time on the stand, during which she says she resisted questioning. Days before her imprisonment began, Matt Duran was also
jailed for contempt. According to his attorneys, Duran was not only imprisoned by placed in solitary confinement, denied intimate contact with his lawyer, denied visitor requests
forms, personal dietary requirements and sunlight an fresh air.
LawFare Section 1022 purports not merely to authorize but to require military custody for a subset of those who are subject to detention under Section 1021. In particular, it
requires that the military hold a covered person pending disposition under the law of war if that person is a member of, or part of, al-Qaeda or an associated force that acts in
coordination with or pursuant to the direction of al-Qaeda and is participating in an attack against the United States or its coalition partners. The president is allowed to waive this
requirement for national security reasons. The provision exempts U.S. citizens entirely, and it applies to lawful permanent resident aliens for conduct within the United States to
whatever extent the Constitution permits. It requires the administration to promulgate procedures to make sure its requirements do not interfere with basic law enforcement functions
in counterterrorismcases. And it insists that Nothing in this section shall be construed to affect the existing criminal enforcement and national security authorities of the Federal
Bureau of Investigation or any other domestic law enforcement agency with regard to a covered person, regardless whether such covered person is held in military custody.
StopNDAAOn September 12, 2012 we had one of the biggest victories for civil liberties and against government overreach in a decade. J udge Forrest granted a permanent
injunction against Section 1021(b)(2), the government promptly filed an appeal, and then went further: they requested a stay of execution on the injunction from J udge Forrest, once
again providing no evidence and failing to answer all of her questions and concerns, while again claiming that the detention powers of the Authorization for Use of Military Force
(AUMF) of 2001, (the law that allows the president to detain those who were involved in the 9/11 attacks and/or are members of Al Qaeda or the Taliban) and the NDAA's Section
1021 powers are precisely the same. ... This is disingenuous. Section 1021 provides sweeping powers of detention through incredibly vague and undefined terms, that are missing in
the AUMF. The government is completely contradicting itself. J udge Forrest made it clear that her ruling did not touch the AUMF. And in their request for an emergency stay, the
government claimed "irreparable harm" would be incurred if they do not have the powers of Section 1021. ... On October 2, 2012, a stay against the permanent injunction was
granted by a threejudge motions panel of the Second District US Court of Appeals, pending appeal on the merits. Appeal briefs are due to the court on November 2, 2012 and
December 3, 2012. The government then has until December 13, 2012 to file their brief in reply. The schedule is ordered to be expedited, and arguments will be docketed for the first
availableweek following the filing of our opposition brief. That date is not yet set. Thank you for your interest in our case. Please continue to support us in any way you can!
More at StopNDAA
LawFare ... That claimof authority is based on the Authorization for Use of Military Force (AUMF) passed by Congress shortly after the September 11 attacks, as informed by the
law of war. The Bush Administration previously claimed very similar authority, albeit invoking not just the AUMF but also the inherent power of the President under Article II of the
Constitution. In any event, such claims have been subjected to judicial challenge repeatedly, most commonly in the context of the Guantanamo detainee habeas litigation. As we
explain below, the courts have had a decidedly mixed reaction in the pair of cases involving persons captured within the United States, but as for persons captured abroad, they have
largely endorsed the governments position. The D.C. Circuit, in fact, has tentatively adopted a definition of the class detainable under the AUMF that is, if anything, broader than
what the administration seeks. While the administrationand now Congresswould detain only on the basis of substantial support, the D.C. Circuit has articulated a standard which
would permit detention of those who purposefully and materially support the enemy, even if not substantially.
BusinessInsider 10/2012 NDAA Plaintiffs Say Obama Flipped Out When A J udge Blocked The Act Because He Was Already Detaining People The Obama administration might
be coming for you, no matter who you are, according to a group of people fighting President Barack Obama's indefinite detention act. Chris Hedges, Daniel Ellsberg, and a whole
host of others involved in the fight against the National Defense Authorization Act yesterday took to Reddit to answer questions about the act. A federal judge permanently blocked
the NDAA which allows the government to indefinitely detain anyone even remotely related to terrorism claiming it has a "chilling effect" on free speech. But the Obama
administration was quick to pounce, saying J udge Katherine B. Forrest overstepped her bounds in opposing the White House. "Anyone who dissents is in threat," Hedges wrote in
response to a question about who should fear the act. "The legislation, as the dumped emails by Wikileaks from the security firm Stafford illustrated, allows the state to tiea
legitimatedissident group to terrorismand strip themof their right of dissent." Another Redditor asked why Obama was so quick to fight Forrest's ruling. "If the Obama
administration simply appealed it, as we expected, it would have raised this red flag," Hedges wrote. "But since they were so aggressive it means that once J udge Forrest declared the
law invalid, if they were using it, as we expect, they could be held in contempt of court. This was quitedisturbing, for it means, I suspect, that U.S. citizens, probably dual nationals,
are being held in military detention facilities almost certainly overseas and maybe at home."
comment Ross Wolf: Americans deemed by President Obama as Belligerent are vulnerable to Arrest and Indefinite Detention under the passed NDAA, National Authorization
Defense Act. Recently the Obama Administration filed an appeal to stop a judges injunction that blocked enforcement of some NDAA provisions the Obama Administration stated
(were justified) that gives the President the authorization to lock belligerents up indefinitelybecause cases involving belligerents directly-aligned with militants against the good of
Americawarrants such punishment.) Obama can use those blocked provisions of NDAA to round up millions of Americans alleging they are belligerents or threat to National
Security. Hitler included similar provisions in his Discriminatory Decrees signed February 28, 1933 to arrest German Citizens without evidence by giving power to German Police
and other German authorities to arrest without evidence anyone Nazi authorities claimed attempted or incited public unrest: arrested among others were outspoken Germans, writers,
journalists, peaceful protestors and artists. ... The U.S. 2012 NDAA legislation Obama signed 12-31-11 is similar to Hitlers 1933 fascist laws the SS and Gestapo used to target
persons in Germany for arrest, imprisonment and execution without probable cause; confiscate millions of dollars of property. ... During the Obama Administration's recent appeal
to stop a Federal J udge blocking enforcement of some provisions in NDAAnever clarified what constitutes a (belligerent); or militant; or what belligerent activities (directly align
with a militant) to order a belligerents arrest or indefinite detention; or what is against the good of America. Under NDAA the U.S. Government or President could deem (directly
aligned with militants) e.g. any political or other association; charge any activity, statement, writing or communication with any individual or group government deemed militant is
(directly aligned) to arrest and detain Americans. Writers and journalists that disagree with or question U.S. Government or its alliesmay under NDAA be subject to arrest and
indefinite detention. 2012 / 2013 NDAA and Hitlers 1933 Decrees are similar; both laws allow forced government censorship; warrant-less searches of private property and property
forfeiture of property from persons not charged with crime. ... Provisions in 2013 NDAA keep the door open for corrupt U.S. police; government agents and provocateurs which
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
thereare many, to falsify reports and statements to target any American, group or organization for arrest, indefinite detention, complete disappearance; and civil asset forfeiture of
their property. ... You may have noted NDAA referred to the USA Patriot Act. Under the Patriot Act, lending itself to Government / police corruption, the Federal Government
may use secret witnesses and informants to cause civil asset forfeiture of Americans property. Witness(s) and informants may be paid up to 50% of assets forfeited. Federal
Government is only required to use a preponderance of civil evidence, little more than hearsay to Civilly Forfeit Private Property. Under the Patriot Act innocent property owners
may be barred from knowing or challenging evidence federal government uses to forfeit their property. ... Sections of 2013 NDAA are so broad, it appears U.S. Government or the
President could (retroactively) deem an Americans past 1st Amendment activities prior to passage of 2012 NDAAsupported hostilities, terrorismor (Belligerents) to order the
arrest and Indefinite Detention of any U.S. Citizen, writer, group or organization. ... Under NDAA It should be expected that indefinitely detained U.S. Citizens not involved in
terrorismor hostile activities, not given Miranda Warnings when interrogated, not allowed legal counsel or habeas corpus may be prosecuted for non-terrorist (ordinary crimes)
because of their (alleged admissions) while held in Indefinite Detention. ...
CenterforConstitutionalRights The National Defense Authorization Act (NDAA) of 2012 Information for Concerned Activists 1 What does Section
1021 of the NDAA say? Section 1021 of the 2012 National Defense Authorization Act affirms that the Authorization to Use Military Force (AUMF) allows the government to
detain certain people, defined below, under the law of war. The AUMF was passed by Congress days after 9/11 to authorize the president to use all necessary and appropriate force
against individuals and groups believed to be responsible for the 9/11 attacks. This section of the NDAA applies to (1) those who planned or were otherwise involved in 9/11, as well
as (2) any person who was a part of or substantially supported al-Qaeda, the Taliban, or associated forces that are engaged in hostilities against the United States or its coalition
partners, including any person who has committed a belligerent act or has directly supported such hostilities in aid of such enemy forces. Under the NDAA people who fit into either
of these two categories may be detained under the law of war, without trial, until the end of hostilities authorized by the AUMF. 2 What about Section 1022? Section 1022 of the
NDAA states that certain people captured in the courseof AUMF-authorized hostilities must be held in military custody. This provision applies to people who are members or a part
of Al Qaeda or an associated force that acts in coordination or under the direction of Al Qaeda, who have participated in planning or carrying out an attack or attempted attack
against the United States or its coalition partners. Section 1022 explicitly exempts U.S. citizens, and may also exempt some lawful resident aliens. 3 Do these provisions apply only
to Al Qaeda members, or could they be applied to U.S. activists? While the text of the act purports to be limited to those already subject to detention under the AUMF, that
authorization was explicitly linked to 9/11 and has been interpreted by the courts to apply only to those who are part of Al Qaeda. Section 1021 is more expansive, as it seems to
authorize detention of Al Qaeda members, as well as those who support Al Qaeda or associated forces. There is no limitation requiring knowledge or intent to support Al Qaeda,
and no limitation on what is meant by associated forces. The law could be interpreted to extend to someone who unwittingly donates money to a charity they believe supports
orphans but is really an Al Qaeda front, or to members of groups which did not exist at the time of 9/11 and have no actual connection to Al Qaeda, but who the government says are
inspired by (and thereby associated) with Al Qaeda. It is unlikely that the law could be read to apply to groups with no connection or shared ideology with Al Qaeda. But the military
doesnt have to prove the Al Qaeda connection before detaining the person Winter 2012 Center for Constitutional Rights email info@ccrjustice.org www.CCRjustice.org in
question, so theoretically, the category is extremely open to abuse by this or future administrations. Moreover, the NDAA should be very troubling to us all, as it reflects a trend on
the part of Congress and the president to increasingly militarize the fight against terrorism both here and abroad, and it significantly expands the role of the military in domestic law
enforcement operations, which in turn rolls back laws on the books since Reconstruction. 4 Does the law allow for the detention of American citizens captured in the U.S.? Possibly.
Section 1021(e) of the NDAA states that nothing in the act shall be construed to affect existing law or authorities relating to the detention of U.S. citizens, lawful resident aliens of
the United States, or any other persons who are captured or arrested in the United States. However, existing law is not settled with respect to whether U.S. citizens captured in the
United States may be indefinitely detained.1 The answer to that question turns on whether the AUMF applies to the detention of American citizens captured in the United States. The
Center for Constitutional Rights believes it does not; but the government now or in the futuremay argue it does. Moreover, an effort by Senator Diane Feinstein to include
languagein the NDAA clarifying that the AUMF only applies abroad was rejected by the Senate. The exemption of U.S. citizens under section 1022 does not change this analysis,
it simply means that military detention of qualifying U.S. citizens is discretionary rather than mandatory under the law. 5 For how long can someone be held under the NDAA? The
NDAA allows for detention until the end of hostilities, which in the context of a so-called global war on terror, could mean forever. And those held in indefinite detention are not
necessarily afforded the fundamental rights which many take for granted in the U.S., including the right to counsel, to a trial, to confront ones accusers, etc. These individuals would
retain their habeas corpus rights (the right to challenge their detention in federal court) if captured in the U.S. or sent to Guantnamo Bay, but not if captured abroad and, for
example, sent to Bagram Air Force Base. And even if they retained habeas rights, the Guantnamo detainee litigation has demonstrated such rights have been rendered largely
meaningless by D.C. Circuit case law. 6 What is the impact of President Obamas signing statement? When President Obama signed the NDAA into law, he accompanied it with a
signing statement promising that his administration would not authorize the indefinite military detention of American citizens, and would work with Congress to mitigate
concerns with the detainee provisions in the legislation, oppose attempts to expand those provisions in the future, and seek the repeal of those provisions. A signing statement is
nothing more than a presidential press release; it is not legally binding and has no impact or influence on the courts. It is worth noting that President Obama issued a similar signing
statement with the 2011 NDAA, promising to mitigate, oppose and seek the repeal of the detainee transfer restrictions included in that law, but did none of those things. Even
if President Obama follows through on promises in his signing statement, he will not be president forever, and the statement does not bind his successors. 1 This issuewas raised in
the Padilla casewhere the U.S. claimed authority to hold J ose Padilla, a U.S. citizen arrested in Chicago, in indefinite military detentionbut it was never resolved by the
Supreme Court because the government mooted the case by transferring Padilla back to the federal criminal courts to avoid Supreme Court review.
Guardian US detention of Imran Khan part of trend to harass anti-drone advocates The vindictivehumiliation of Pakistan's most popular politician shows the US government's
intolerance for dissent Share1097 Email Glenn Greenwald guardian.co.uk, Sunday 28 October 2012 10.06 EDT J ump to comments (809) Imran Khan, centre, chairman of Pakistan
Tehreek-e-Insaf, with party's supporters. He has led a high-profile campaign against US drone strikes. Photograph: A Majeed/AFP/Getty Images Imran Khan is, according
to numerous polls, the most popular politician inPakistan and may very well be that country's next Prime Minister. He is also a vehement critic of US drone attacks on his
country, vowing toorder themshot down if he is Prime Minister and leading an anti-drone protest march last month. On Saturday, Khan boarded a flight from Canadato New York
in order to appear at a fundraising lunch and other events. But before the flight could take off, US immigration officials removed him from the plane and detained him for two hours,
causing him to miss the flight. On Twitter, Khan reported that he was "interrogated on his] views on drones" and then added: "My stance is known. Drone attacks must stop." He
thendefiantly noted: "Missed flight and sad to miss the Fundraising lunch in NY but nothing will change my stance." The StateDepartment acknowledged Khan's detention and said:
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
"The issuewas resolved. Mr Khan is welcomein the United States." Customs and immigration officials refused to comment except to note that "our dual mission is to facilitate
travel in the United States while we secure our borders, our people, and our visitors from those that would do us harmlike terrorists and terrorist weapons, criminals, and
contraband," and added that the burden is on the visitor "to demonstrate that they are admissible" and "the applicant must overcome all grounds of inadmissibility." There are several
obvious points raised by this episode. Strictly on pragmatic grounds, it seems quiteill-advised to subject the most popular leader in Pakistan - the potential next Prime Minister - to
trivial, vindictivehumiliations of this sort. It is also a breach of the most basic diplomatic protocol: just imagine the outrageif a US politician were removed from a plane by Pakistani
officials in order to be questioned about their publicly expressed political views. And harassing prominent critics of US policy is hardly likely to dilute anti-US animosity; the exact
opposite is far more likely to occur. But the most important point here is that Khan's detention is part of a clear trend by the Obama administration to harass and intimidate critics of
its drone attacks. As Marcy Wheeler notes, "this is at least the third time this year that the US has delayed or denied entry to the US for Pakistani drone critics." Last May, I wrote
about the amazing case of Muhammad Danish Qasim, a Pakistani student who produced a short filmentitled "The Other Side", which "revolves around the idea of assessing social,
psychological and economical effects of drones on the people in tribal areas of Pakistan." As he put it, "the filmtakes the audience very close to the damage caused by drone attacks"
by humanizing the tragedy of civilian deaths and also documenting how those deaths are exploited by actual terrorists for recruitment purposes. Qasimand his co-producers were
chosen as the winner of the Audience Award for Best International Film at the 2012 National Film Festival For Talented Youth, held annually in Seattle, Washington. He intended to
travel to the US to accept his award and discuss his film, but was twice denied a visato enter the US, and thus was barred from making any appearances in the US. The month prior,
Shahzad Akbar - a Pakistani lawyer who represents drone victims in lawsuits against the US and the co-founder of the Pakistani human rights organization, Foundation for
Fundamental Rights - was scheduled to speak at a conference on drones in Washington. He, too, was denied a visa, and the Obama administration relented only once an international
outcry erupted. There are two clear dynamics driving this. First, the US is eager to impose a pricefor effectively challenging its policies and to prevent the public - the domestic
public, that is - from hearing critics with first-hand knowledge of the impact of those policies. As Wheeler asks, "Why is the government so afraid of Pakistanis explaining to
Americans what the drone attacks look like from a Pakistani perspective?" This form of intimidation is not confined to drone critics. Last April, Ireported on the serial harassment of
Laura Poitras, the Oscar-nominated documentarian who produced two films - one from Iraq and the other from Yemen - that showed the views and perspectives of America's
adversaries in those countries. For four years, she was detained every single time she reentered the US, often having her reporters' notebook and laptop copied and even seized.
Although this all stopped once that article was published - demonstrating that therewas never any legitimatepurpose to it - that intimidation campaign against her imposed real limits
on her work. That is what this serial harassment of drone critics is intended to achieve. That is why a refusal to grant visas to prominent critics of US foreign policy was also a
favorite tactic of the Bush administration. Second, and probably even more insidious, this reflects the Obama administration's view that critics of its drone policies are either terrorists
or, at best, sympathetic to terrorists. Recall how the New York Times earlier this year - in an article describing a new report from the Bureau of Investigative J ournalism
documenting the targeting of Pakistani rescuers and funerals with US drones - granted anonymity to a "senior American counterterrorismofficial" to smear the Bureau's journalists
and its sources as wanting to "help al-Qaida succeed". For years, Bush officials and their supporters equated opposition to their foreign policies with support for the terrorists and a
general hatred of and desire to harmthe US. During the Obama presidency, many Democratic partisans have adopted the same lowly tactic with vigor. That mindset is a major factor
in this series of harassment of drone critics: namely, those who oppose the Obama administration's use of drones are helping the terrorists and may even be terrorist sympathizers. It is
that logic which would lead US officials to view Khan as some sort of national security threat by virtue of his political beliefs and perceive a need to drag him off a plane in order to
detain and interrogate him about those views before allowing him entrance to the US. What makes this most ironic is that the US loves to sermonize to the world about the need for
open ideas and political debate. In April, Secretary of StateHillary Clinton lectured the planet on how "those societies that believe they can be closed to change, to ideas, cultures,
and beliefs that are different from theirs, will find quickly that in our internet world they will be left behind," That she is part of the same government that seeks to punish and
exclude filmmakers, students, lawyers, activists and politicians for the crime of opposing US policy is noticed and remarked upon everywhere in the world other than in the US. That
demonstrates the success of these efforts: they are designed, above all else, to ensurethat the American citizenry does not become exposed to effective critics of what the US is doing
in the world.
False Flag Cyber Attack
PROGRESSIVE REFERENCE CONSERVATIVE*
Amnesty International
Anthrax Vaccination Immunization ProgramArmy
cover-up, search court martial
Arms Sales Monitoring
Carlyle Group.net
Center for Constitutional Rights, watching the events
of Guantanamo, detainees, Supreme Court decisions.
Center for Defense Information weekly defense
monitor
Center for Peace and Liberty, The Independent
Institute
Center for Public Integrity midwife a terrorist
Conciliation Resources PTZ point tilt, zoom
Daily KOS
Summary,
Infowars Bankers and White HouseFalse Flag Cyber Attack
Victims
Activist Post "afalseflag cyber attack onWestern banking
institutions that they canpin onIran."
Daily Newscaster Martial Law Training,
Indianapolis --- J une, 2008
What is Tearerism?
Neil Entwistle, 911, FAA, NORAD, Ptech
American Service-Members' Protection Act
Anti TerrorismCoalition, Islamis taking over the
world
American Turkish Council
Battelle Memorial Institute develops new tech,
commercializes products
CISAC Stanford links
CNS News search, flushed Quran down toilet, US,
Guantanamo
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
DissidentVoice 13 myths about case for war against
Iraq
Ethical Spectacle Free speech, Bush fascism, what's
next.
Eurolegal Services International institutions, news,
comment, Middle East affairs, Iraq Body Count, Iraqi
resistance to occupation.
FAS search National Intelligence estimate
Findlaw, War on TerrorismSpecial coverage
Fired UP search terms: American Turkish Council,
Hastert, Sibel Edmonds,
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name of
special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
Glasgow Media Group promote new research
methodologies on the media
Global Policy Watching Guantanamo
Global Witness International
GlobalVision News Network news / info from the
inside out
Guardian "Israel accused of using deadly new weapon
in Gaza. death due to unseen injuries, severe burning,
deep internal wounds, 'dusting' on severely damaged
internal organs, bodies severely fragmented, melted,
Walsh Report, National
Archives search: Robert Gates, nominee for Secretary
of Defense and go to NFU 'War on Terrorism' pages
for more
Emp-zan) Iraq -- NFU visitor
American Immigration Lawyers Association search
Patriot Act
Center for Strategic and International Studies
Conflict Watch
IAEA International Atomic Energy Association
Institute for Defence and Strategic Studies, Singapore,
Thailand, links and thing tanks
Intel Daily, Sarkozy, "peopleare born pedophiles",
International Committee of the Red Cross, why did
they wait months to report Iraq prison abuse.
International Relations and Security Network, Swiss
Contribution to the Partnership for Peace
International TerrorismObservatory, Paris, France
Legislation related to 9/11
National CFIDS Foundation Chronic FatigueImmune
Dysfunction, ME, Myalgic Encephalopathy
National Security Archive in periodically releases
unclassified docs.
North American Freedom Foundation "Advocating for
U.S. and Canadian victims and survivors of mind
control, torture, slavery, and related terror through
education and remembrance."
Strategic Intelligence, from Loyola College
Department of Political Science
Times OnlineThe US is helping Morocco to build a
new interrogation and detention facility for Al-Qaeda
suspects near its capital, Rabat. search terms: Ain
Aouda, Direction de la Securit du Territoire (DST),
Temara, Moroccan secret police, rendition, CIA,
Rumsfeld
UN NewsCentre
Office of Managing Risk and Public Safety
Urban Institute
UCLA, Dept of Epidemiology, School of Public
Health
URUKnet Abu Ghraib
Web Index, 9/11, J ohns Hopkins
FEMA
Concentration Camp, Beech Grove,
Indiana YouTube
enlarge for full map
and FEMA Concentration Camps list and Liberty Post
Council on Foreign Relations corporate power to rural
poor Republicans
Danger Zone J obs.com
DARPA Defense Advanced Research Projects Agency
DefendAmerica
Dept of Homeland Security
Dept of State, International Info Prg Response to
Terror
FEMA fake news conference
YouTube and more below Fox news
FBI War on Terrorism, most wanted list,
Gyre.org tracking the next military & tech revolutions.
Iraq, Facing the Threat
International Policy Institute for Counter-Terrorism,
Terrorismdatabase
Institute for Science and International Security
International Committee of the Red Cross, why did
they wait months to report Iraq prison abuse.
Lt. Gen WilliamG. Boykin, Pentagon investigation has
concluded that he violated regulations by failing to
make clear he was not speaking in an official capacity,
when he made church speeches casting the "war on
terrorism" in religious terms. In most cases he was
wearing his uniform. Search CBS News for more
information.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
disfigured. DIME weapon: carbon fibre casing and
contains fine tungsten particles, limited blast radius,
Dense Inert Metal Explosive.
Human Rights Watch
Human Rights First, formerly Lawyers Committee for
Human Rights
IACenter Founded by Ramsey Clark
Indymedia.uk anthrax Bush, Bin Laden, search
Go to NewsFollowup.com
Intervention Magazine, "War, Politics, Culture",
Liberty Dogs, the Homeland Security Watchdogs
Military Corruption.comanthrax vaccine info, court
martial
Multinational Monitor column on corporate power
New American Bargain blog, politics: Oliver North
was central figure in Reagon Iran-Contra scandal, a
convicted felon for funneling arms and money to
Nicaraguan Contras in violation of 1984 Bolland
Amendment. Conviction overturned by Laurence
Silberman, the chairman of the Bush's WMD
committee.
News from Russia Pravda, Israel, search
Not in Our Name
NoWarIraq
Pacific Life Research Center Understanding the 'war
on terrorism'.pdf
ProgresoWeekly UN has learned of allegations of
terrorist prison ships, Indian Ocean, Diego Garcia
island
Refuse & Resist
RightWeb, American Turkish Council
Sibel Edmonds, J ust a Citizen, official
SourceWatch on Sibel Edmonds, search terms:
translator hired by FBI after 9/11, Washington D.C.
U.S. Court of Appeals, unable to open hearings,
whistleblower,
Stanton, Madsen
Talking Points Memo
Third World Traveler alternate view of democracy
The FireThis Time Weapons of Mass Deception
Transparency International
notes
Office of Special Plans? Mother J ones, on Pentagon
intelligence unit built case for Iraq war. more search
words: Kwiatkowski, NESA, Wolfowitz, Feith,
Committee for the Liberation of Iraq. Ignore
Palestinians, go for regime change in region. Harold
Rhode, American Enterprise Institute, Defense Policy
Board, David Wurmser. They all knew therewas no
noteworthy link between Al Qaeda and Iraq.
Pedophilia, White House,
1989, YouTube
topic map
NATIONAL SECURITY PRESIDENTIAL DIRECTIVE / NSPD 51
HOMELAND SECURITY PRESIDENTIAL DIRECTIVE / HSPD-20
notes Chad, War on Terror, oil, France, Sarkozy
Wikipedia Idriss Deby At the end of August 2006,
Dby made international news after calling for his
country to have a 60 per cent stake in its oil output
after receiving "crumbs" from foreign companies
running the industry. He said Chevron and Petronas
were refusing to pay taxes totalling $486.2 million.
Recently, Chad passed a World Bank-backed oil
revenues law that required most of its oil revenue to be
allocated to health, education and infrastructure
projects. The World Bank had previously frozen an oil
revenue account in a dispute over how Chad spent its
oil profits. 12] ...Corruption In October 2006, Chad
was placed at the top of the list of the world's most
corrupt nations by Forbes magazine for "what may turn
out to be the single most piggish use of philanthropic
funds". Proceeds from a project, funded in part by the
World Bank, to build an oil pipeline through Chad and
Cameroon were supposed to have been ring-fenced by
J ustice Dept Patriot Act
National Intelligence Council Iraq War estimate.
NBC Industry Group CB Defense systems
National Strategy to Secure Cyberspace Whitehouse,
Bush, Cheney, 'war on terrorism'
FEMA Concentration Camp, Beech
Grove, Indiana YouTube
New York Times force feeding detainees
NTI WMD411 preventing spread of wmd
PNNL, neural network, protein research, operated by
Battelle, with Agilent
Patterns of Global TerrorismUS StateDept
Harvard, Risk of death, bioterroism, 1 in 56 million
StateDept Counter TerrorismOffice, Counterterrorism
Office, codewords
Solutions North America,, Charles P. Sexton,
TerrorismQ&A
TerrorismResearch Center security analysis, terrorist
profiles, links,
TIP Terrorist Interdiction ProgramStateDept
War on TerrorismAmerican Enterprise Institute
War on Terrorism, Chicago Sun Times
Weldon: Atta papers destroyed on orders, letter
Weekly Defense Monitor
Wilmer Cutler & Pickering Chi
Winds of Change 'Covering the War on Terror'
Wisconson Project
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Who Dies for Bush Lies
World Peace Herald, on Pentagon stops Weldon /
Atta file destruction probe.
On J uly 11, 1990,
Gary Caradori was killed along with his 6-year old son
in the crash of his small plane, after a mid-air
explosion, the cause of which was never discovered.
He had told friends repeatedly in the weeks before his
death that he was afraid his plane would be sabotaged.
GeorgeWalkerBush, death list
Dby's government to assist and feed "the desperately
poor people of these nations. Instead, some $30 million
was diverted to buy arms to keep in power the
government of President Idriss Dby
Wikipedia MKUltra Project MKUltra, or MK-Ultra,
was a covert, illegal human research program into
behavioral modification run by the Central Intelligence
Agency's (CIA) Office of Scientific Intelligence. The
program began in the early 1950s, was officially
sanctioned in 1953, was reduced in scope in 1964,
further curtailed in 1967 and finally halted in 1973. 1]
The program used unwitting U.S. and Canadian
citizens as its test subjects, which led to controversy
regarding its legitimacy. 2] 3] 4] 5] MKUltra involved
the use of many methodologies to manipulate people's
individual mental states and alter brain functions,
including the surreptitious administration of drugs
(especially LSD) and other chemicals, hypnosis,
sensory deprivation, isolation, verbal and sexual abuse,
as well as various forms of torture. 6]
Korea, 1945, Cheju Massacre, American
Involvement
WMR is pleased to offer a new public service for former members of the US military, federal law enforcement, and intelligence community who refused to "cook the intelligence
books," engage in extra-constitutional and illegal activities, and brought to light fraudulent and other illegal activity by the military-intelligence-industrial complex. WMR offers a
resume service for individuals who are now seeking employment and offering their specialized training to potential employers. and from 2005: More on Firstfruits. The organization
partly involved in directing the National Security Agency program to collect intelligence on journalists -- Firstfruits -- is the Foreign Denial and Deception Committee (FDDC), a
component of the National Intelligence Council. The last reported chairman of the inter-intelligence agency group was Dr. Larry Gershwin, the CIA's adviser on science and
technology matters, a former national intelligence officer for strategic programs, and one of the primary promoters of the Iraqi disinformation con man and alcoholic who was code
named "Curveball." Gershwin was also in charge of the biological weapons portfolio at the National Intelligence Council where he worked closely with J ohn Bolton and the CIA's
Alan Foley -- director of the CIA's Office of Weapons Intelligence, Nonproliferation, and Arms Control (WINPAC) -- and Frederick Fleitz -- who Foley sent from WINPAC to work
in Bolton's StateDepartment office -- in helping to cook Iraqi WMD "intelligence" on behalf of Vice President Dick Cheney and Scooter Libby. In addition to surveilling journalists
who were writing about operations at NSA, Firstfruits particularly targeted StateDepartment and CIA insiders who were leaking information about the "cooking" of pre-war WMD
intelligence to particular journalists, including those at the New York Times, Washington Post, and CBS 60 Minutes. full story
New York Times, FEMA got caught in fake news conference, J ohn P. Philbin, fired two days before leaving FEMA as public relations chief, will now not work for Michael
McConnell, televised news conference on California fires, audience composed of agency staff, pretending to be reporters, easy questions, other search terms: R. David Paulison,
Admiral Harvey E. J ohnson, Russ Knocke, Katrina
Wikipedia: "Rex 84, short for Readiness Exercise 1984, was a plan by the United States federal government to test their ability to detain largenumbers of American citizens in
case of massive civil unrest or national emergency. Exercises similar to Rex 84 happen periodically. 1] Plans for roundups of persons in the United States in times of crisis are
constructed during periods of increased political repression such as the Palmer Raids and the McCarthy Era. For example, from 1967 to 1971 the FBI kept a list of persons to be
rounded up as subversive, dubbed the "ADEX" list. 2] According to scholar Diana Reynolds: The Rex-84 Alpha Explan (Readiness Exercise 1984, Exercise Plan), otherwise known
as a continuity of government plan], indicates that FEMA in association with 34 other federal civil departments and agencies conducted a civil readiness exercise during April 5-13,
1984. It was conducted in coordination and simultaneously with a J oint Chiefs exercise, Night Train 84, a worldwide military command post exercise (including Continental U.S.
Forces or CONUS) based on multi-emergency scenarios operating both abroad and at home. In the combined exercise, Rex-84 Bravo, FEMA and DOD led the other federal agencies
and departments, including the Central Intelligence Agency, the Secret Service, the Treasury, the Federal Bureau of Investigation, and the Veterans Administration through a gaming
exercise to test military assistancein civil defense. The exercise anticipated civil disturbances, major demonstrations and strikes that would affect continuity of government and/or
resource mobilization. To fight subversive activities, therewas authorization for the military to implement government ordered movements of civilian populations at state and regional
levels, the arrest of certain unidentified segments of the population, and the imposition of martial rule. 3] Existence of a master military contingency plan, "Garden Plot" and a similar
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
earlier exercise, "Lantern Spike" were originally revealed by alternative journalist Ron Ridenhour, who summarized his findings in "Garden Plot and the New Action Army." 4] Rex
84 was mentioned during the Iran-Contra Hearings in 1987, and subsequently reported on by the Miami Herald on J uly 5th, 1987. 5]A number of websites and alternative publications
that span the political spectrumhave hypothesized upon the basic material about Rex 84, and in many cases hyperbolized it into a form of urban legend or conspiracy theory.
Nonetheless, the basic facts about Rex 84 and other contingency planning readiness exercises--and the potential threat they pose to civil liberties if fully implemented in a real
operation--are taken seriously by scholars and civil liberties activists."
WMR March 20, 2008 -- Bush's secretive pal's airline connections to torture flight network ... The CIA's current network of CIA torture flight airlines and companies has its roots in
the shadowy past network created by the CIA under George H, W. Bush's tutelage to secretly arm Iran's mullahs, support the Nicaraguan contras, and fly cocaine from Colombia to
the United States during the 1980s. ... In the 1980s, much of the CIA's secret airline business centered around J ames R. Bath, George W. Bush's Texas Air National Guard friend who
later represented the interests of the Bin Laden family in the United States. ... Bath's core airline in the CIA proprietary airline business was Skyways Aircraft Leasing, which was
originally registered in 1980 in the Cayman Islands as Cotopax Investments. Skyways was linked to another Cayman firm, IC Inc., that was linked to Oliver North's illegal support
network for the Nicaraguan contras code-named the "Enterprise." full story
WMR Bin Laden: Body buried at sea, shoddy proof of death more
McClatchy Torture, 'War Council' ... "The framework under which detainees were imprisoned for years without charges at Guantanamo and in many cases abused in Afghanistan
wasn't the product of American military policy or the fault of a few rogue soldiers. ... It was largely the work of five White House, Pentagon and J ustice Department lawyers who,
following the orders of President Bush and Vice President Dick Cheney, reinterpreted or tossed out the U.S. and international laws that govern the treatment of prisoners in wartime,
according to former U.S. defense and Bush administration officials. ... The Supreme Court now has struck down many of their legal interpretations. It ruled last Thursday (J un 08)
that preventing detainees from challenging their detention in federal courts was unconstitutional. ... The quintet of lawyers, who called themselves the War Council," drafted legal
opinions that circumvented the military's code of justice, the federal court system and America's international treaties in order to prevent anyone from soldiers on the ground to the
president from being held accountable for activities that at other times have been considered war crimes." and search terms: Carl Levin, investigating origin of harsh interrogation
techniques, not a 'few bad apples', twisted law, international conventions, secret meetings, memorandums not public, J udge Advocate General, War Council members: David
Addington, Alberto Gonzales, J ohn Yoo, Timothy E. Flanigan, WilliamJ . Haynes II, .... "Treaties that were relevant to U. S. criminal code were not relevant. That was the trick",
circumvent the law, Geneva Conventions, Common Article Three forbidding humiliating and degrading treatment and torture didn't cover al Quida or Taliban, Military Commissions
Act, UniformCode of Military J ustice, kangaroo court, J AG, Office of Legal Council, outside the courts, Navy warships, Yoo wanted Indian wars laws, due process is mumbo jumbo,
presumed guilty if caught as a 'terrorist',
History Commons "Human rights groups claimthat the US is operating floating prisons as detention facilities for prisoners taken in the war on terror. The groups claimthat the
US is keeping prisoners aboard ships such as the USS Ashland, the USS Bataan, and the USS Peleliu (seeDecember 27, 2001), and say that the Americans refuse to admit to the
existence of such detainees. The human rights group Reprievehas asked that the US list the names and whereabouts of such ghost detainees held aboard US vessels. The existence
of the detainees has come to light from a number of sources, including statements from US military officials, information provided by the Council of Europe and other parliamentary
bodies, and prisoner testimonies (seeJ une 2, 2008). Details of Detentions - Reprievesays the US has used as many as 17 ships as floating prisons since 2001. While aboard, the
prisoners are interrogated, then rendered to undisclosed locations. Fifteen of those ships may have operated around the British territory of Diego Garcia, which hosts a largeBritish-
American military base (seeJ uly 27, 1971-May 26, 1973 and After February 7, 2002). According to information obtained by Reprieve, in early 2007, the Ashland was involved in the
detention and rendering of over 100 individuals abducted by Somali, Kenyan, and Ethiopian forces during an upsurge of fighting in Somalia, and then interrogated by FBI and CIA
agents. Those individuals have now disappeared, but many are believed to be held in prisons in Kenya, Somalia, Ethiopia, Djibouti and Guantanamo Bay, among other possible sites.
One prisoner released from Guantanamo has retold the account of a fellow inmates detention: H]e was in the cage next to me. He told me that therewere about 50 other people on
the ship. They were all closed off in the bottomof the ship. The prisoner commented to me that it was like something you see on TV. The people held on the ship were beaten even
more severely than in Guantanamo. Clive Stafford Smith, Reprieves legal director, says the US military choose ships to try to keep their misconduct as far as possible from the
prying eyes of the media and lawyers. We will eventually reunite these ghost prisoners with their legal rights. By its own admission, the US government is currently detaining at
least 26,000 people without trial in secret prisons, and information suggests up to 80,000 have been through the system since 2001 (seeNovember 17, 2005). The US government
must show a commitment to rights and basic humanity by immediately revealing who these people are, where they are, and what has been done to them. British Officials Ask for
Accountability - Andrew Tyrie, the Conservative MP who chairs the all-party parliamentary group on extraordinary rendition, says both the US and British governments must own up
to their practices of rendition and ghost detainees. Littleby little, the truth is coming out on extraordinary rendition, he says. Therest will come, in time. Better for governments
to be candid now, rather than later. Greater transparency will provide increased confidence that President Bushs departure from justiceand the rule of law in the aftermath of
September 11 is being reversed, and can help to win back the confidence of moderate Muslim communities, whose support is crucial in tackling dangerous extremism. Tyrie has
requested that an investigation into the use of Diego Garcia as a rendition refueling stop be undertaken (seeJ une 2, 2008). Liberal Democrat MP Edward Davey adds: If the Bush
administration is using British territories to aid and abet illegal state abduction, it would amount to a huge breach of trust with the British government. Ministers must make absolutely
clear that they would not support such illegal activity, either directly or indirectly. A US Naval spokesman says that none of its vessels have detention facilities, but admits that
some detainees had been put on ships for a few days during their initial days of detention. He refuses to comment on reports that US Naval vessels stationed in or near Diego Garcia
had been used as prison ships. Guardian, 6/2/2008] Entity Tags: Council of Europe, Andrew Tyrie, Central Intelligence Agency, Clive Stafford Smith, Federal Bureau of
Investigation, Edward Davey, ReprieveTimelineTags: Torturein Iraq, Afghanistan and elsewhere"


FEMA top Fran Townsend, Whitewash?
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
PROGRESSIVE REFERENCE CONSERVATIVE*
Katrina report: "compiled by Stephen Henthorne, a
former professor of the US Army's War College .....
and deputy-director in the Louisiana relief efforts....
the bulk of the Louisiana and Mississippi National
Guard was deployed in Iraq,... endemic corruption"
were major causes to Katrina failures. Common
Dreams
Democracy Now search Chertoff, Kissinger,
Argentina, 'dirty war'.
Talking Points Memo
Daily KOS
FOI, Missouri.edu Iran Contra
IslamOnline Otto J uan Reich, Oliver North, Nicaragua
The Nation search Reagan, North, Negroponte,
Poindexter, Abrams
Bush Whitehouse
FEMA
Global Security Guantanamo Bay,
Fran Townsend, to lead Katrinainvestigation
New York Times
WayneMadsenReport "Details emerge of electronic surveillance system opposed by Ashcroft and Comey ... On March 10, 2004, White House Chief of Staff Andrew Card and
then-White House Counsel Alberto Gonzales, over the objections of J anet Ashcroft and acting Attorney General J ames Comey, paid a bedside visit to Attorney General J ohn
Ashcroft while he was in the intensivecard unit at George Washington Hospital recovering from surgery. According to Comey's testimony before the Senate J udiciary Committee,
J anet Ashcroft received a phone call from a high White House official, likely President Bush himself, that Card and Gonzales were on the way to her husband's hospital room to get
him to approve and sign a surveillance plan. Mrs. Ashcroft quickly alerted Comey. ... FBI Director Robert Mueller instructed FBI agents not to evict Comey from Ashcroft's room
when he arrived to confront Card and Gonzales. Comey, with a full security motorcade, sirens wailing and lights a blazing, sped to George Washington hospital and told Card and
Gonzales that the surveillance program instituted by the White House had been ruled illegal by the J ustice Department. Card and Gonzales were adamant about continuing the
surveillance. Ashcroft, who was barely conscious, lifted his head from his pillow and told Card and Gonzales that he agreed with his acting Attorney General on the illegality of the
surveillance and that it did not really matter because Comey was the Attorney General. more search terms: Comey concerned with personal safety, Whitehouse, Solicitor General
Ted Olson, 'Wednesday Night Massacre', mass resignation, March 2004, FEMA, domestic intelligence files, 1980, Reagan, WilliamWebster, General Louis Giuffrida, American
citizens, opposition to U. S. policies in Central America, Oliver North, REX-84, Readiness Exercise 1984, martial law, Attorney General WilliamFrench Smith, Mount Pony in
Culpepper, Virginia, warrantless surveillance of American citizens, Main Core database, National Security Agency, Freedom of Information Act,
FEMA database, protesters, American citizens, NSA, Reagan era cronie California National Guard commander Gen. Louis Giuffrida created list, Webster demanded he return all
copies to FBI, but Oliver North had a copy and used it to develop a 'continuity of government' contingency plan, REX-84, Readiness Exercise 1984, martial law, round up citizens,
WilliamFrench Smith protested, all this tied to recent March 2004 confrontation of Andrew Card, Alberto Gonzales, Ashcroft and J ames Comey, in a hospital room, Bush wanted
subversive database. Madsen working on Texas Observer article, ADEX, Edwin Meese, McFarlane. WayneMadsenReport
Military Commissions Act of 2006 (Bush Torture Law) top
PROGRESSIVE REFERENCE CONSERVATIVE*
Democracy Now search Chertoff, Kissinger,
Argentina, 'dirty war'.
Feingold
MediaMonitors "The Act passed the House on
September 29th with 96% of Republicans supporting
and 83% of Democrats opposing legislation that
allows American citizens to be labeled enemy
combatants, incarcerated, and tortured. Senator Arlen
Specter warned before he inexplicably voted for the
bill that the Act would take our civilization back 900
years.
Zmag MCA 2006, Unchecked Powers
Balkin blog "Does Military Commissions Act apply to
citizens? Yes, and it's probably unconstitutional, and
some applications are deeply troubling.
FOI, Missouri.edu Iran Contra
From the Wilderness "U.S. Government Targeting of
American Dissidents" ... by Carolyn Baker, Ph. D.
history
J urist "The father of Australian Guantanamo Bay
J URIST news archive] detainee David Hicks J URIST
news archive] has said that Hicks' defense team will
challenge the Military Commissions Act of 2006"
Bush Whitehouse
Fox News "A threeofficer military panel will
determinea detainee's status. If the person is deemed
to be an "enemy combatant," he can be held
indefinitely."
Military Commissions Act of 2006
(searchable TEXT FILE) 240kb
New York Times "a dangerously broad definition of
"illegal enemy combatant..."
Republican Senatorial
Military Commissions Act of 2006 exerpt: LAWFUL ENEMY COMBATANT.-The termlawful enemy combatant means an individual determined by or under the authority
of the President or Secretary of Defense (whether on an individualized or collective basis) to be: (i) a member of the regular forces of a Stateparty engaged in hostilities against the
United States or its 4 co-belligerents; (ii) a member of a militia, volunteer corps, or organized resistance movement belonging to a Stateparty engaged in such hostilities, which are
under responsible command, wear a fixed distinctive sign recognizable at a distance, carry their arms openly, and abide by the law of war; or (iii) a member of a regular armed forces
who professes allegiance to a government engaged in such hostilities, but not recognized by the United States. SECRETARY.-The termSecretarymeans the Secretary of
Defense. " UNLAWFUL ENEMY COMBATANT.-The termunlawful enemy combatant means an individual determined by or under the authority of the President or the
Secretary of Defense (A) to be part of or affiliated with a force or organization-including but not limited to al Qaeda, the Taliban, any international terrorist organization, or
associated forces-engaged in hostilities against the United States or its co-belligerents in violation of the law of war; (B) to have committed a hostile act in aid of such a force or
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
organization so engaged; or (C) to have supported hostilities in aid of such a force or organization so engaged." COULD THIS BE
INTERPRETED TO INCLUDE ANTI-WAR PROTESTORS? YES
But Ali Saleh Kahlah al-Marri is a U.S. resident being held in a South Carolina military brig; he is the only enemy combatant held on U.S. soil. That makes his case very different.
... Authorities say he was an al-Qaida sleeper agent living in middle America, researching poisonous gasses and plotting a cyberattack. To justify holding him, the government
claimed a broad interpretation of the president's wartime powers, one that goes beyond warrantless wiretapping or monitoring banking transactions. Government lawyers told federal
judges that the president can send the military into any U.S. neighborhood, capture a citizen and hold him in prison without charge, indefinitely.
Negroponte Watch top
PROGRESSIVE REFERENCE CONSERVATIVE*
Democracy Now search Chertoff, Kissinger,
Argentina, 'dirty war'.
Global Exchange search Reagan, North, Negroponte,
Poindexter, Abrams
Third World Traveler International war crimes, Iran-
Contra.
Workers Bush packs government with criminals
FOI, Missouri.edu Iran Contra
IslamOnline Otto J uan Reich, Oliver North, Nicaragua
The Nation search Reagan, North, Negroponte,
Poindexter, Abrams

Anti TerrorismCoalition, Islamis taking over the
world
CNS News search, flushed Quran down toilet, US,
Guantanamo
DebkaFile search
Global Security Guantanamo Bay, Camp X-Ray.
Pics of Sadam clad only in underwear
NewsFollowUp: Iran Contra, Iraq War Connections pages index
Ledeen, Fascism
'War on Terrorism'
War
Israel
CIA, FBI
Corporate Fraud
Bush Watch
Nicaragua
Chertoff Watch Martial Law top
PROGRESSIVE REFERENCE CONSERVATIVE*
Democracy Now search Chertoff, Kissinger,
Argentina, 'dirty war'.
Investigative J ournalism.comsearch Chertoff, DOJ ,
Israel, Iran
Michigan Indymedia, Israel's foreign policy is U.S.
foreign policy, Chertoff, Likud, Sharon, Perle,
Wolfowitz,
Moldea, Bush II administration, search Chertoff,
Whitewater,
National Whistleblower Center advocates the right of
employees to blow the whistle on fraud, corruption,
govt waste, and violations of environmental laws.
New American Bargain blog
NucNews search
Rigorous Institution search Chertoff, BCCI, Bush,
banking scandal.
Scoop
Tampa Indymedia search: Kissinger, Chertoff.
Timnews, search Chertoff, BCCI, Bush, banking
scandal.
DOJ
Detroit News U.S. Attorney J effrey G. Collins ordered
to review docs and ensurenothing held back, by U.S.
District J udge Gerald E. Rosen.
FOI, Missouri.edu Iran Contra
search Chertoff, Kissinger, Nixon
Search web: Chertoff, BCCI, Bush, banking scandal
Free Republic
CIA, ghost detainees
Argentinabelieved it had U.S. approval for its assault
on leftists. 1976, Guzetti.
National Security Archive.
American Nationalist Union links include: Council
of Conservative Citizens, Heritage and Destiny, The
Propaganda Matrix. search Kissinger, Chertoff..
DOJ
Sen Charles Grassley "J ustice Dept has retaliated
against prosecutors in a Detroit terror trial because
they cooperated with Congress"
Chertoff, Michael search: Israel, Carlyle Group,
Iran Contra, Clinton impeachment, chief counsel
Whitewater, Zacarias Moussaoui, U.S. Patriot Act,
Vincent Foster,
Chertoff, Michael University Star more search terms:
ties to 9/11 financiers, Bergen County, New J ersey,
Chertoff defended accused terrorist financier Dr
Magdy Elamir. Elamir, Osama iin Laden, Operation
Diamondback, FBI/ATF, Operation Green Quest,
Title III, USA Patriot Act, Chertoff career path not
ordinary.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Spitfirelist
Village Voice Chertoff
What Really Happened Chertoff, search
Liberty-Antigone poster: "J ust who these enemies might be is one of the scariest things about Rep. Harmans singular focus on terror prevention. Much like predicting in advance
who will become a criminal, predicting who among us might become a terrorist is a difficult task. Harman has taken to it aggressively, sponsoring a bill which sailed through the
House last year called the Violent Radicalization & Homegrown TerrorismPrevention Act of 2007, ominously subtitled to prevent homegrown terrorism, and for other
purposes. The act establishes a commission to hold hearings around the country and a Center of Excellence to study the findings on what might make individuals born and
raised in the US tend towards violence in support of their ideological leanings, or to advance political, religious, or social change. The bill has earned the nickname TheThought
Crimes Bill because of its Orwellian languageand its focus on dissent as an indicator of potential violent radicalization. The RAND corporation, which has close ties to Rep.
Harman and is rumored to have written the bill, has long studied this issueand identifies environmentalists and anti-globalization activists as target groups to watch for
ideologically-based violence. ... J ane Harman is a Blue Dog Democrat who is reported to have once called herself Thebest Republican in the Democratic Party. She is a multi-
millionaire (Harman/Kardon electronics) and a pro-war hawk who voted twice for the PATRIOT Act. She was in line to become the chair of the House Permanent Select Committee
on Intelligence when the Democrats regained Congress in 2006 but was passed over by Speaker Nancy Pelosi when it was reported that Harman was under federal investigation for
allegedly improper dealings with AIPAC lobbyists."
AP Dept Homeland Security, Chertoff, Guards say HQ building unsafe: "For instance, when an envelopewith suspicious powder was opened last fall at Homeland Security
Department headquarters, guards said they watched in amazement as superiors carried it by the office of Secretary Michael Chertoff, took it outside and then shook it outside
Chertoff's window without evacuating people nearby."
and click on pic for full size
CIA Rendition flights, tail number list pic, largefile Valparaiso, Indymedia report on Amnesty International work
Anti-Imperialist "The SOA/WHINSEC is used by the U.S. government as a training ground for foreign military officers. Labeled by many as the "School of the Assassins," the school
has produced thousands of officers subsequently linked with assassinations, "death squads," drug-trafficking, and human rights abuses in Latin America. Tens of thousands of
military and police officials have trained at the school. Many of its graduating officers have become some of the most notorious leaders of death-squads and have been implicated in
numerous war crimes, human rights abuses, and drug-trafficking. The school's official training manuals openly condone torture, blackmail, and assassination. A 1996 report by a U.S.
government oversight board admitted that the school's "instruction materials.... condone practices such as executions of guerrillas, extortion, physical abuse, coercion and false
imprisonment."

WMR Bin Laden: Body buried at sea, shoddy proof of death -- another "Made in Hollywood"
performance from "Ari Gold" May 2-3, 2011 --
Years after Public Enemy Number One, Osama Bin Laden, was reportedly killed in the mountains of the Afghan-Pakistani border region or died from
kidney failure in his native Hadhramaut region of Yemen, President Obama pulled the Bin Laden rabbit out of his political hat during a Sunday late-
night television address, when many Americans were already watching the tube, thus increasing Obama's market share for his "surprise announcement."
After all, Obama, who has close links to Oprah Winfrey and Rahm Emanuel's super-Hollywood agent brother, Ari Emanuel, depicted as the vile "Ari
Gold" in fiction, is well-aware of TV Sunday prime time ratings.
So, in a few words, Obama announced that Bin Laden had been killed by a U.S. team that caught the wily Saudi Arabian terrorist mastermind by
surprise. Bin Laden was not caught in a cave or some other underground facility in Waziristan but in a $1 million walled-off estate in Abbottabad, a
military cantonment where a number of active and retired members of Pakistan's military and intelligence community lived. Abbottabad is also home to
Pakistan's version of West Point, the Kakul Military Academy, where the firefight between U.S. Navy SEALS and Bin Laden's security guards
allegedly took place a mere 800 meters away.
Up until the 1980s, the mountains around Abbottabad were dotted with small U.S. National Security Agency (NSA)/U.K. Government Communications
Headquarters (GCHQ) listening posts in places like Bada Bier and Parachinar were used to eavesdrop on signals from the Soviet Union and China. It
was a time period when Bin Laden was operating his mujaheddin forces in Afghanistan under the aegis of Pakistan's Inter-Services Intelligence (ISI)
agency and its CIA overseers.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Abbottabad is also very familiar to the CIA and U.S. Special Forces, which operated from the nearby Kalabagh air force base, which has reportedly
been used in the past by U.S. Special Operations forces, including U.S. Marines. Why Bin Laden would want to locate a massive safe house in the
heart of Pakistani and American counter-insurgency and intelligence activity is curious.
Bin Laden's body was reported by the Pentagon to have been buried somewhere in the north Arabian Sea from the aircraft carrier, USS Carl Vinson.
The Pentagon has assured the public that they confirmed Bin Laden's identity through DNA sampling and are "100 percent" certain that the body they
buried in the sea was that of Bin Laden. The question remains as to where Bin Laden's comparative DNA samples were obtained over the past several
years when the terrorist mastermind was supposedly a phantom-like fugitive.
However, the word from WMR sources at NSA is that no signals intercepts, from Pakistan or U.S. military sources, indicate that the man shot to death
in Abbottabad was Osama Bin Laden. After the so-called killing of Bin Laden, operators were deluged with intercepted chatter about Bin Laden having
been killed. However, not once did signals intercept operators, linguists and intelligence analysts based in Pakistan, Afghanistan, NSA headquarters at
Fort Meade, Maryland, or on ships offshore -- who would have been cleared for and involved with the top secret mission to kill Bin Laden -- pick up
any intelligence about Bin Laden prior to his reported assassination by the U.S. Special Forces "kill" team acting on the direct orders of President
Obama.
George W. Bush and other neo-con leaders, like Obama, have often pulled the Bin Laden rabbit out of their hat, years after reports of the Al Qaeda
leader's death in either thr Afghanistan-Pakistan border region or Yemen. On September 7, 2007, WMR reported: "'Osama bin Laden' supposedly
appears in a new videotape with a dyed and trimmed beard and talking about Democratic control of Congress and the coming to power of Nicolas
Sarkozy in France and Gordon Brown in Britain. 'Bin Laden' also refers to George W. Bush as the 'leader of Texas.' He also talks of the Democrats'
failure to 'stop the war.' "Bin Laden,' who once recommended William Blum' s book 'Rogue State,' is back in the Book-of-the-Month Club business in
plugging Noam Chomsky and ex-CIA 'Bin Laden Unit' chief Michael Scheuer. 'Bin Laden' also mentions 'neoconservatives' like Dick Cheney, Donald
Rumsfeld, and Richard Pearl sic], meaning Richard Perle. He also refers to Colin Powell and Richard Armitage and 'their blood history of murdering
humans.' Former British Prime Minister Tony Blair also gets honorable mention. 'Bin Laden' also states that President J ohn Kennedy was killed and
'corporations were the primary beneficiary of his killing.' Days before a huge anti-war march in Washington, on September 15, Bin Laden states that
carrying 'anti-war placards' in the streets is of no use. As if expecting that many people will view the tape as a fake, the neocon media and their usual
'sources' and 'experts' are already claiming that it is quite common for Arab mean to dye their beards to make themselves look younger."
On September 9, 2007, WMR reported on how "Al Qaeda" video and audiotapes are transmitted to the news media as authentic: "The so-called 'Osama
Bin Laden tape' was not only transmitted via the auspices of the Search for International Terrorist Entities (SITE) Institute, a Washington, DC-based
research institute with links to Israeli right-wing Likud elements, but U.S. intelligence officials are now claiming that large portions of the 'Bin Laden'
speech were written by Los Angeles native Adam Gadahn, born Adam Pearlman, (aka Azzam the American), the number three man in charge of Al
Qaeda, whose grandfather, Carl K. Pearlman, was a member of the board of the Anti Defamation League (ADL), an important component of the Israeli
Lobby in the United States. Carl Pearlman, a prominent California urologist, was the chairman of the Orange County Bonds for Israel campaign and the
United J ewish Welfare Fund. SITE and an Israeli intelligence front operation in Washington, MEMRI (the Middle East Media Research Institute), are
closely linked. MEMRI has been responsible for mis-translating several speeches made by Iranian President Mahmoud Ahmadinejad. SITE's director is
Rita Katz, an Iraq-born J ew who moved to Israel after her father was executed by Saddam Hussein's government for spying for the Mossad. She
emigrated to the United States from Israel in 1997. Katz worked for the U.S. Treasury Department in its pursuit of Muslim charity funds in the United
States in Operation Green Quest and as a consultant for the FBI. The main coordinator for Green Quest was the then-head of the J ustice Department's
Criminal Division, Michael Chertoff.
Not surprisingly, the Zawahiri tape ridiculing Obama was made available by the SITE Intelligence Group in Washington.
Our September 9, 2007 report continued: "The delivery of the latest 'Bin Laden' video was reported by the Associated Press as follows: 'the 30-minute
video was obtained by the SITE Institute, a Washington-based group that monitors terrorist messages, and provided to the Associated Press.' In the past,
Bin Laden videos were sent to Al J azeera and other Arab media sources directly. The first news of the video's release came on the al-Sahab web site,
where 'Al Qaeda' has previously posted messages. Last year, a leaked French intelligence report stated that Bin Laden died of typhoid fever in Pakistan.
There are other reports that after the US attack on Afghanistan, Bin Laden was spirited out of Afghanistan to his native Hadhramaut region of Yemen,
where he later died of kidney failure surrounded by his close and extended family members. Bin Laden's post-9/11 presence in Hadhramaut was hinted
to by reputable Israeli intelligence sources in discussions with this editor in 2002. The speed at which the corporate media accepted the obviously bogus
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
'Bin Laden makeover' tape is amazing. However, considering the links between the neocon disinformation machinery in Washington, DC and the
corporate media, it may not be so surprising when put into context."
After years of lies from the U.S. government about Saddam Hussein's non-existent weapons of mass destruction, including "intelligence" about mobile
biological weapons trailers from a known fraudster code named "Curveball"; bogus Niger documents on Iraq's possession of yellow cake uranium;
bogus Iraq Oil Ministry documents on Iraqi payoffs to Western political leaders under the UN's Oil-for-Food program; and, more recently, false
charges from Obama's ambassador to the UN that Muammar Qaddafi's troops in Libya were ingesting Viagra tablets before raping women, the public
should be wary of a president who shows every tendency to lie as much as his three immediate predecessors: Bush II, Clinton, and Bush I. The White
House is, perhaps, the greatest source of lies and disinformation in the world today, topping anything similar that may emanate from Pyongyang or
Tripoli. There is no reason for any sane person to believe that anything Mr. Obama says is true. But Obama's supporters wasted no time in proclaiming
that Bin Laden's killing ensures Obama's re-election next year.

Israel top
PROGRESSIVE REFERENCE CONSERVATIVE*
Alternet search, 9/11
Center for Defense Information arms trade, children
in war, missile defense info
Findlaw, War on TerrorismSpecial coverage
Global Policy Watching Zionism, 9/11
News from Russia Pravda, Israel, search
Non ViolenceUSA

International Relations and Security Network, Swiss
Contribution to the Partnership for Peace
Newstrove, Guantanamo Bay
Wikipedia, Israeli spies
World Court, International Court of J ustice
American Center for Law and J ustice search
American Conservative Union Action Alert lobbyists
Anti TerrorismCoalition, Islamis taking over the
world
BioPort anthrax vaccine manufacturer
KOLIsrael
Danger Zone J obs.com
DebkaFile search
National Review search on zionist, 9/11
National Strategy to Secure Cyberspace Whitehouse,
Bush, Cheney, 'war on terrorism'
Israeli spies: Rosen, Stev; Weissman, Keith; Kadish, Ben-ami; Pollard, J onathan; Israeli Art Students; Berger, Sandy;
Bioport, Vaccinations, Court Martial top
PROGRESSIVE REFERENCE CONSERVATIVE*
Anthrax Vaccination Immunization ProgramArmy
cover-up
Carlyle Group.net
Center for Defense Information arms trade, children
in war, missile defense info
Gulf War Vets Anthrax vaccine deaths info
News from Russia Pravda, Israel, search
News Insider search
New World Peace FBI incriminated in anthrax
mailings
NucNews you send articles, news, search BioPort
Palestinian Non-Governmental Organization's
Network rule of law, social justice, respect for
Human Rights, links
Vaccination Liberation hoax info, links
Vaccination News vaccines, autism, shaken baby
FDA search
Murat Kurmaz, tortured at Gitmo
UCLA dept of Epidemiology, Bioterrism
National CFIDS Foundation Chronic FatigueImmune
Dysfunction, ME, Myalgic Encephalopathy
Safety Alerts consumer product safety recall info, news
UCLA, Dept of Epidemiology, School of Public Health
Did Dick Cheney call
ABCnews A French terrorismtrial was thrown into
turmoil on Wednesday by a report French agents
secretly interviewed the six accused during their
detention at a U.S. military camp on Cuba's
Guantanamo Bay.
Agilent
gate16-norfolk.nmci.navy.mil (Nctc) New York -- nfu visitor
Anthrax Vaccine Immunization Program Official
U.S. site
Battelle Memorial Institute develops new tech,
commercializes products
Bayer, has Cipro patent, anthrax.
BioMed Central the-Scientist.com, news, BS,
Research
BioPort anthrax vaccine manufacturer
CIDRAP Center for Infectious Disease Research &
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
syndrome. links
What Really Happened anthrax hoax
Deborah J eane Palfrey, escort service?

guide
Policy
FDA search
FDA News Drug industry news, daily
Gulf War Medical Research Library
Harvard, Risk of death, bioterroism, 1 in 56 million
Hollister-Stier Labs in partnership with BioPort
National Acadamies Press articles on Agent Orange,
dioxins, TCDD
National Center for Biotechnology Information
National Library of Medicine, NIH
NTI Security News
PNNL, neural network, protein research, operated by
Battelle, with Agilent
TEVA Pharma, Cipro, patent, anthrax vaccine
Yoo, J ohn, Bush admin lawyer who provided legal
basis for torture, brutal interrogation methods, called
to testify, Conyers,
supporting details, Bioport court martial, refuse vaccine
Bioport, Carlyle, anthrax
Cipro
FDA gives BioPort ok to use quarantined anthrax
vaccine on public
BioPort timeline
Maj. Glenn MacDonald USAR, sold Sadam Hussein
anthrax warfare tech
Fuad El-Hibril, close to Bin Laden, was CEO of
BioPort
El-Hibril operated a vaccine manf co. in England in
90's. Porton Products International, UK.
U.S. attack anthrax named Porton strain??
Sept 98, BioPort gets $45 million contract for
vaccine.
Nov 98, Crowe & Bush sr. meet with Bin Laden
BioPort fails inspections, sterility tests, Bush jr oks
vaccine use.
Hollister-Stier Labs subcontract vaccine
Only forces not to get any Gulf War Syndrome were
French, who did not get Porton vaccine.
BioPort fired, used Enron bookeeping tactics.
all these links above
Aug 2001, Whitehouse gets Cipro
Battelle Memorial Institute, Operation J efferson,
develops anthrax strain. Hires WilliamC. Patrick III
to weaponize thru postal syst. Battelle involved with
BioPort
BioPort manuals found in caves in Afghanistan
Bush oks BioPort vaccine J an 2002
Institute of Medicine says vaccine ok.
Aug 2002, Timothy Read says anthrax from attack
can be differentiated, arrests Stephen Hatfill, but all
Anthrax Vaccination Immunization ProgramArmy
cover-up, search court martial
Canadian Military drops court martial
FAS search
Gulf War Vets Anthrax vaccine deaths info, court
martial
MajorBates.com refused anthrax vaccine. LINKS, last
updated 2002
Mercola search, soldiers illnesses
Military Corruption.comanthrax vaccine info, court
martial
Dr. Buck, 1st to be court martialled for refusing
vaccine.
Wikipedia MKUltra Project MKUltra, or MK-Ultra,
was a covert, illegal human research program into
behavioral modification run by the Central Intelligence
Agency's (CIA) Office of Scientific Intelligence. The
program began in the early 1950s, was officially
sanctioned in 1953, was reduced in scope in 1964,
further curtailed in 1967 and finally halted in 1973. 1]
The program used unwitting U.S. and Canadian
citizens as its test subjects, which led to controversy
regarding its legitimacy. 2] 3] 4] 5] MKUltra involved
the use of many methodologies to manipulate people's
individual mental states and alter brain functions,
including the surreptitious administration of drugs
(especially LSD) and other chemicals, hypnosis,
sensory deprivation, isolation, verbal and sexual abuse,
as well as various forms of torture. 6]
Acambis
Asa Hutchinson, Dept of Homeland Security, Israel
links, from Clinton impeachment demonizing efforts
by conservatives
BioPort anthrax vaccine manufacturer
National Guard, in Natural Disaster?..."The review
advocated more disaster-relief training and equipping
of the National Guard, who are part-time troops under
the command of state governors but can also be
mobilized by the Pentagon in times of emergency.
"In truly catastrophic events state and locals may be
incapacitated or overwhelmed or even worse,"
Townsend said. "It may be that our military is the
last and only resort. We need to plan and preparefor
the Department of Defense to play a significant
supporting role during future catastrophic events," she
said Townsend said the "bright lines" should be
preserved, referring to an 1878 law, The Posse
Comitatus Act, which restricts the government from
using the military in a law enforcement capacity
within the United States. But the president can waive
the law in an emergency. The National Guard can
support law enforcement functions in a way active
duty military do not, Townsend said. "So you can
preserve the bright lines and not seek additional
authorities." A change in law was not required for
deploying military forces to help in disasters, she
said. "We did not believe the president needed
additional authority."
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
fake out.
American Free Press, see anthrax article.

Guantanamo, Abu Ghraib, sexual torture top
PROGRESSIVE REFERENCE CONSERVATIVE*
Alternet search, Guantanamo
Amnesty International, UK Guantanamo Bay, latest
news, releases
On J uly 11, 1990, Gary
Caradori was killed along with his 6-year old son in
the crash of his small plane, after a mid-air explosion,
the cause of which was never discovered. He had told
friends repeatedly in the weeks before his death that
he was afraid his plane would be sabotaged.
GeorgeWalkerBush, death list
Center for Constitutional Rights, watching the events
of Guantanamo, detainees, Supreme Court decisions.
Center for Defense Information arms trade, children
in war, missile defense info
Cooperative Research, Stephen Cambone, ritualistic
sexual abuse
CounterPunch, "Secret World of Stephen Cambone ...
FAS search National Intelligence estimate
Global Policy Watching Guantanamo
GuantanamobileProject
Here-Now, Supreme Court decision on Guantanamo
and related stories. Boston NPR News Source
Human Rights Watch
Insider Magazine, Wayne Madsen article, Expose the
Christian Mafia
Karpinski, J anus,
Ladlass, search: Boykin, Cambone, Nebraska, BSCT,
sexual torture
News from Russia Pravda, Israel, search
New Yorker, Seymour Hersh, May 2004,
New Yorker, J ane Mayer, article: 'The Experiment',
techniques of sexual and religious humiliation of
prisoners, developed by military behavioral scientists
Palast, Greg, UK Guantanamo search.
Discourse.net CIA, Pentagon inquiry
EIR search terms: spoon-benders, rape, sodomy,
murder, deliberate systematic policy, first tried in
Guantanamo, links to Presidio and Offutt Franklin
Scandal, naked prisoners being forced into sexual acts
with one another, 'Darby photos', incite increased
terrorist recruitment, humiliate Muslims, young boys
sodomized, at Abu Ghraib, Maj. Gen. Geoffrey Miller,
Lt. Gen. William Boykin, Muslim-hating, Behavioral
Science Consultation Teams, BSCT, SERE, sexual
embarrassment, religious dilemma, desecration of the
Bible, Koran, Undersecretary of Intelligence Stephen
Cambone, Boykin is assistant, Task Force 20, Gitmo-
ize Iraq, J FK Special Warfare School,

Fay Report
Flocco, Cambone TopSecretNotes
Findlaw, War on TerrorismSpecial coverage
Griggs, Kay "Kay, a self-declared Christian, became
privy to the real workings of the United States military,
leadership training, drug-running and weapons sales,
and the secret worldwide camps that train professional
assassins."
Guantanamo.com from World News
International Relations and Security Network, Swiss
Contribution to the Partnership for Peace
Intellibriefs, Mindwars, Boykin, Somalia, intelligence
International Committee of the Red Cross, why did
they wait months to report Iraq prison abuse.
Newstrove, Guantanamo Bay
Human Rights First, formerly Lawyers Committee for
Human Rights
J ustice, Dept of press releases
J udicial Watch
American Center for Law and J ustice search
American Conservative Union
Anti TerrorismCoalition, Islamis taking over the
world Action Alert help ACU lobby Congress on
these issues
Boykin, William Lt. Gen. ... said
God put George Bush in the White House,
Cambone, Stephen, Clairemont Graduate School,
notes: undersecretary of defense for intelligence,
Rumsfeld's chief henchmen, neo-con, PNAC,
Wolfowitz, Germany, war crimes prosecution, Feith,
Douglas, Stephen Cambone, Office of Analysis and
Evaluation, threat to Generals, "Gray Fox",
assassinations, circumvent Geneva Conventions,
soften up Iraqi prisoners, interrogators, private
contractors, Camp Cropper, Baghdad, Delta Force,
abusive interrogations, Boykin, Christian warrior,
Oregon revival tour, "a war against Satan", Christian
God is mightier than Allah", Islamophobe, central
role in torture scandal, General Miller, Col, Pappas,
Israeli advice,
Council on Foreign Relations corporate power to
rural poor Republicans
Counter-Intelligence Field Activity, Stephen
Cambone,
CSIS, Center for Strategic and International Studies,
Stephen Cambone
Defense Security Service, controlled by Stephen
Cambone
DebkaFile search
Defense Intelligence Agency, controlled by Stephen
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Slate"Name: Mild, non-injurious physical contact,
e.g. grabbing, poking, or light pushing (aka "a little
bit of smacky face") Source: Decision Memorandum
from Defense Department General Counsel William
Haynes II to Secretary of Defense Donald Rumsfeld,
for commander, U.S. Southern Command, Dec. 2,
2002
SourceWatch (Center for Media and Democracy)
David S. Addington,"Rumsfeld to Cheney to-
Addington-to-TortureLawrence Wilkerson, former
chief of staff to Secretary of StateColin L. Powell,
told NPR November 3, 2005, that "he had uncovered
a 'visible audit trail' tracing the practice of prisoner
abuse by U.S. soldiers directly back to Vice President
Cheney's office
SourceWatch, Boykin
The7thfire, Zionism, Zionists support of torture, Abu
Ghraib "The most vitriolic systematic denigration of
Arabs and Muslims in the Middle East is found in the
writings an speeches of influential US-based Zionist
ideologues, like the Pipes (father and son), the
Kristols (senior and junior), the Kagans, Cohens,
Goldhagens, ..."
Truthout BSCT, Behavioral Science Consultation
Teams,
Veterans for Common Sense, Abu Ghraib, Rumsfeld
Yurica Report Guantanamo Bay
WSWS Lt. Gen. WilliamBoykin, prisoner sexual
abuse. MORE below WSWS
PBS "SCOTT HORTON: Well, I think thereis a direct
line that run from Secretary Rumsfeld to Abu Ghraib
and that runs through Maj. Gen. Miller. I think the
major unanswered questions have to do with what led
the secretary to decideto send Maj. Gen. Miller there.
What is the role of Lt. Gen. Boykin and Steve
Cambone in that process and why did that visit have the
consequences we saw, not just in Abu Ghraib but also
in other facilities in terms of violent treatment of
detainees and use of sexual humiliation and military
dogs?"

Taguba Report, SourceWatch
Tearerism, that concept of tearing down the phrase'
war on terror', it has started in Great Britain.
Wikipedia, Abu Ghraib, sexual abuse, search terms:
2004, torture, Iraq, Baghdad Correctional Facility,
372nd Military Police, TagubaReport, 90% of the
prisoners were innocent of any crime,
Wikipedia Stephen Cambone, Germany, war crimes
MORE
World Court, International Court of J ustice
Gannon,
Guckert, spent many nights in the White
House, ... visits when no news briefings,
many with no record of entry or exit
YouTube How does this relate to
Congress, Clergy, military sex scandals?
Insider Magazine, Wayne Madsen Gannongate
Cambone,
EthicsDaily "Controversial Christian General Named
in Prisoner-Abuse Scandal .. "
Global Security Guantanamo Bay, Camp X-Ray.
GospelGrace, Kay Griggs "Colonel's WifeNames
Names In Military Homosexual Pedophile
Underground ...Fags have a 3 point agenda: 1)
decriminalize sodomy, 2) add fags to the protected
classes as victims like blacks, and 3) criminalize
Gospel preaching against fags.
Guantanamo Bay Naval Station official site.
Israeli Minister of Foreign Affairs
Military Religious Freedom Foundation, Cambone,
Boykin
National Imagery and Mapping Agency, controlled by
Stephen Cambone
National ReconnaisanceOrganization, controlled by
Stephen Cambone,
National Review search on Guantanamo Bay, Rich
Lowry
National Security Agency, controlled by Stephen
Cambone,
National Security Agency, Stephen Cambone
Southern Baptist Convention, Bobby Welch, defends
Boykin EthicsDaily and sex offender registry
EthicsDaily
Townhall search
US Army Criminal Investigation Command, UCMJ ,
Washington Institute for Near East Policy US
Washington Post
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Washington Post "Interrogators at the U.S. detention facility at Guantanamo Bay, Cuba, forced a stubborn detainee to wear
women's underwear on his head ... The report shows that they were used on Qahtani several months before the United States invaded Iraq. The investigation also
supports the idea that soldiers believed that placing hoods on detainees, forcing themto appear nude in front of women and sexually humiliating themwere approved interrogation
techniques for use on detainees. "
SourceWatch,"'The idea was to get a handle on what worked in Cuba and to apply it to Iraq,"
WSWS "On September 16, J onathan Idema was convicted in Afghanistan on counts of torture and other crimes. Idema was arrested after Afghan police found eight men tied up or
hanging in his private prison in Kabul. Idema, a former member of the Special Forces, has claimed that he was acting at the behest of sections of the CIA and the Defense
Department, including Deputy Undersecretary of Defense for Intelligence William Boykin. Idema claims that he was left out to dry after his case became
politically problematic for the administration. The Afghan judge refused to consider evidence of high-level American support for the operation."
Hidden Mysterious Soon afterwards, Boykins Pentagon intelligence group was discovered to have been involved with the torture and sexual molestation of prisoners in Iraq,
Afghanistan, and Guantanamo Bay, Cuba. The sexual molestation of prisoners included male and female teens being held in Iraq. Also of note is the current head executive director
of the OCF. He is retired Lt. Gen. Bruce Fister, the former head of the U.S. Air Force Special Operations Command.
Center for Constitutional Rights "CCR TO FILE WAR CRIMES COMPLAINT AGAINST DONALD RUMSFELD Opinions and Documents Background Brief on the Case
Against Donald Rumsfeld (PDF) 177KB Synopsis: On November 14, 2006, CCR will file a criminal complaint against former Secretary of Defense Donald Rumsfeld in German
Court. The complaint requests the German Federal Prosecutor open an investigation and, ultimately, a criminal prosecution that will look into the responsibility of high-ranking U.S.
officials for authorizing war crimes in the context of the so-called "War on Terror." Former White House Counsel (and current Attorney General) Alberto Gonzalez, former Director
of Central Intelligence George Tenet, and other high-ranking U.S. officials are also charged in the complaint. The complaint is brought on behalf of 12 torture victims 11 Iraqi
citizens who were held at Abu Ghraib prison and one Guantnamo detainee and is being filed by the Center for Constitutional Rights (CCR), the International Federation for
Human Rights (FIDH), the Republican Attorneys' Association (RAV) and others, all represented by Berlin Attorney Wolfgang Kaleck. The complaint is related to a 2004 complaint
that was dismissed, but the new complaint is filed with substantial new evidence, new defendants and plaintiffs, a new German Federal Prosecutor and, most important, under new
circumstances that include the resignation of Donald Rumsfeld as Secretary of Defense and the passage of the Military Commissions Act of 2006 in the U.S. granting officials
retroactive immunity from prosecution for war crimes. For full background on the complaint, please see the attached briefing paper."
Wikipedia "On 10 November 2006, the German Federal Government announced that it had decided, within the legal framework of universal jurisdiction, to permit the war crimes
prosecution of Stephen A. Cambone for his alleged role in condoning the abuse of prisoners in Abu Ghraib prison during his tenure from 2001 to 2003 as U.S.
Undersecretary of Defense for Intelligence."
WayneMadsenReport "Blackwater was founded in 1997 by Erik Prince, a former US Navy SEAL and right-wing fundamentalist Christian from Michigan. Prince's father is Edgard
Prince, who founded the Family Research Council with Gary Bauer. Erik Prince's sister is Betty DeVos, who is married to Dick DeVos, the son of Amway co-founder and Mormon
bigwig Richard DeVos. The General Counsel for Erik Prince's Blackwater parent company, the Prince Group, is J oseph Schmitz, the Pentagon's former Inspector General. Schmitz's
brother, J ohn Schmitz, J r. deputy counsel to George H. W. Bush and who is married to the sister of Columba Bush, J eb Bush's wife. The father of J ohn and J oseph was extreme
right-wing Republican Congressman J ohn Schmitz, Sr. Their sister is Mary Kay Letourneau, a former Washington Stateschoolteacher jailed for having sex with a thirteen year old
American Samoan student who she later married."
MSNBC GUANTANAMO BAY, Cuba - The Defense Department's former chief prosecutor for terrorismcases appeared Monday at the controversial U.S. detention facility here to
argue on behalf of a terrorismsuspect that the military justicesystem has been corrupted by politics and inappropriate influence from senior Pentagon officials. Sitting just feet from
the courtroom table where he had once planned to make cases against military detainees, Air Force Col. Morris Davis instead took the witness stand to declare under
oath that he felt undue pressure to hurry cases along so that the Bush administration could claimbefore political elections that the system was working. His testimony in a small,
windowless room -- as a witness for Salim Ahmed Hamdan, an alleged driver for Osama bin Laden -- offered a harsh insider's critique of how senior political officials have
allegedly influenced the system created to try suspected terrorists outside existing military and civilian courts."
USA Today An Iraqi man who says he was tortured while detained at the Abu Ghraib prison is suing two U.S. military contractors. Emad al-J anabi claims in a federal lawsuit filed
Monday in Los Angeles that he was abused for 10 months beginning in September 2003 by employees of CACI International Inc. and L-3 Communications, formerly Titan Corp.
Al-J anabi says his jailers punched him, slammed him into walls, hung him from a bed frame and kept him naked and handcuffed in his cell. He claims contractors conspired to
cover up the torture by destroying documents and other information. Pictures of prisoner abuse by U.S. soldiers at Abu Ghraib ignited international outrage.
Secret Prisons for 'Terrorists', Rendition top
PROGRESSIVE REFERENCE CONSERVATIVE*
Amnesty International
Democracy Rising "Congressman Edward J . Markey
(D-MA) has taken the lead on working toward ending
torture by U.S. officials or by "rendition" of suspects
to foreign governments for torture there. He has
introduced, along with 48 colleauges, H.R. 952 the
Torture Outsourcing Prevention Act
Secret prisons, prison ships, planes, Italy, kidnapping.
CBS News Extraordinary Rendition..."the government
policy wherein terror suspects are transferred from U.S.
control into the control of foreign governments, so that
interrogation methods that are not permitted under U.S.
law may be applied to the suspects"
CBS The CIA ran secret prisons in Poland and
Andrews Air Force Base, rendition flights,
Braxton Management Services, purported CIA front
International Criminal Court Protection
New York Times : Bush: Iraq War prisoners not
entitled to Geneva Convention rules
Anti TerrorismCoalition, Islamis taking over the
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Eurolegal Services International institutions, news,
comment, Middle East affairs, Iraq Body Count, Iraqi
resistance to occupation.
FAS search National Intelligence estimate
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name
of special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
Glasgow Media Group promote new research
methodologies on the media
Global Policy Watching Guantanamo
Global Witness International
Notes: Shannon Airport, Ireland, rendition flights,
March 2008, also Norway Hungary, Iceland,
Gulfstream IV jet, N475LC, N478GS, see also Tel
Aviv, Bucharest, Stuttgart, Tbilisi Georgia, Glasgow,
see also N71PG, N54PA Lear jets,
Romaniafrom 2003 to 2005 to interrogate detainees in
its war on terror, Council of Europe investigator Dick
Marty said in a report released Friday.
Council of Europe see below
Findlaw, War on TerrorismSpecial coverage
Griggs, Kay "Kay, a self-declared Christian, became
privy to the real workings of the United States military,
leadership training, drug-running and weapons sales,
and the secret worldwide camps that train professional
assassins."
Guardian: "Al-Libi, the New York Times claims, had
been subjected to such rendition when he told his
interrogators that Iraq had trained al-Qaida in the use
of chemical and biological weapons. An assessment
from the US Defence Intelligence Agency cast doubt
on the claims because of the conditions of his captivity,
according to both Mr Wilkerson and the New York
Times's sources. Mr Wilkerson told the BBC the
assessment was made before Mr Powell made his now
discredited claims to the UN security council on
contacts between SaddamHussein and al-Qaida, but
neither the then secretary of state or his office were told
of it. Before the Iraq war, George Bush, Dick Cheney
and Mr Powell frequently cited Mr Libi's statement as
"credible evidence" that Iraq was training al-Qaida. If
correct, the claims would suggest that rendition and the
reliance on third country interrogations had played a
role in the unreliability of intelligence before the March
2003 invasion of Iraq by US-led coalition.
world Action Alert help ACU lobby Congress on
these issues
Council on Foreign Relations corporate power to
rural poor Republicans
DebkaFile search
Global Security Guantanamo Bay, Camp X-Ray.
Godman Army Air Field, Kentucky, rendition flights,
GospelGrace, Kay Griggs "Colonel's WifeNames
Names In Military Homosexual Pedophile
Underground ...Fags have a 3 point agenda: 1)
decriminalize sodomy, 2) add fags to the protected
classes as victims like blacks, and 3) criminalize
Gospel preaching against fags.
Guantanamo Bay Naval Station official site.
Israeli Minister of Foreign Affairs
National Review search on Guantanamo Bay, Rich
Lowry
Phoenix Air Group, Inc, Cartersville, Georgia,
VPC Planes, Wilmington, Delaware,

Council of Europe "Swiss Senator Dick Marty, Council of Europe Parliamentary Assembly rapporteur, will present his report on alleged secret detentions and unlawful inter-state
transfers involving Council of Europe member states to the Committee on Legal Affairs and Human Rights in Paris on Wednesday 7 J une. The report is scheduled for debateduring
the plenary session of the 630-members-strong Parliamentary Assembly in Strasbourg on Tuesday 27 J une 2006.
The Council of Europe's action follows allegations revealed by the Washington Post and the NGO Human Rights Watch in 2005 about the existence of secret CIA detention centres in
Council of Europe member states. On 1 November 2005, the Parliamentary Assembly launched an investigation for which Swiss Senator Dick Marty was appointed rapporteur. On
21 November 2005, the Secretary General, Mr Terry Davis, acting under Article 52 of the European Convention on Human Rights (seebox), sent a questionnaire to the 45 States
Parties to this convention (the 46th letter was sent to Monaco on 15 December following that country's ratification of the convention). On 15 December 2005, the Parliamentary
Assembly requested an opinion from the Venice Commission on the legality of secret detention in the light of the member states' international legal obligations, particularly under the
European Convention on Human Rights. On 1 March 2006, the Secretary General released his report based on the official replies from all 46 member states. Report of the Secretary
General Addendumto the report of the Secretary General Statement Speaking notes On 22 March 2006, the Venice Commission published its opinion on the international legal
obligations of Council of Europe member states in respect of secret detention facilities and inter-state transport of prisoners. Venice Commission opinion "
Age, The -- RAAF, The Royal Australian Air Force (RAAF) allegedly asked a woman to cover up the fact her children (aged eight and 12) were sexually assaulted by a senior
officer --- Wing Commander Terry Morgan.--- Fairfax newspaper. ... Morgan was convicted of four counts of indecent acts on a child under 16, and possession of child
pornography ... attempted cover-up didn't work.
WMR "The so-called "Australian Taliban," David Hicks, the Adelaide-born horse trader and kangaroo skinner imprisoned by the U.S. military for the past five years in Guantanamo
Bay, Cuba after being picked up by U.S. forces in Afghanistan, was flown to Australia from Guantanamo on a CIA rendition aircraft with an interesting history. The Gulfstream
Aerospace G550 that flew Hicks to Australia is registered to Time Works Leasing LLC, 223 Industrial Avenue, Teterboro, New J ersey. Time Works Leasing is being reported in
some Australian media as a CIA front company. The Gulfstream's current tail number is N90AM. Previously, the plane's U.S. tail number was N592GA and it was transferred from
Raven Acquisition Technologies of Washington state to Time Works on J anuary 31, 2001. The plane has also been registered as tail number VP-CI, a Cayman Islands registration.
However, FAA records indicate that the Gulfstream was transferred to the Caymans on April 5, 2006.
WMR "On May 22, WMR reported on the Gulfstream Aerospace G550 (Tail Number N90AM) that flew "Australian Taliban" David Hicks to Australia from incarceration in
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Guantanamo Bay, Cuba. The Gulfstream's travel itinerary over the past 7 years closely matches those of other CIA rendition aircraft. A Securities and Exchange Commission
EDGAR database search reveals that the actual owner of N90AM is ProFlite LLC, an air charter company that is a Delaware limited liability company. ProFlite's principal place of
business is 233 Industrial Avenue, Teterboro, New J ersey, the same address listed in FAA records for Time Works LLC. ProFlite's SEC filings also reveal that N90AM has been
leased to Monster Worldwide, Inc., a Delaware corporation having its principal place of business at 622 Third Avenue, New York, New York, 10017. A search of the New J ersey
StateBusiness Gateway Services reveals that Time Works LLC is a Foreign Limited Liability Corporation whose home jurisdiction is Delaware. Time Works' corporation filing
papers were submitted on December 21, 2000 and its last annual report was filed on December 16, 2005. The corporation's status is "Active." There are two other entities listed in
New J ersey's business registration database but they are spelled "Timeworks." Time Works LLC's President is listed as Christopher Cummings of 222 N.E. Monroe Street, 8th Floor,
Peoria, Illinois 61602. Listed under Officers/Directors/Members is J effrey Corron of the same Peoria address. Cummings and Corron are also listed as officers of the Marquette
Group, a marketing group with offices at 222 N.E. Monroe Street, 8th Floor, Peoria, IL 61602. Corron is listed as a contributor to the Bush-Cheney 2004 primary campaign under
CFO, "Market Group," 222 N.E. Monroe St., Peoria, IL 61602."
Israeli Spy List
Pollard is hardly the only Israeli spy operating in the United States. He just had the misfortune to get caught. Here are just a few examples of the Israeli spy operations that have been
detected.
1947. Information collected by the ADL in its spy operations on US citizens is used by the House Select Committee on Unamerican Activities. Subcommittee Chair Clare Hoffman
dismisses the ADLs reports on suspected communists as hearsay."
1950 J ohn Davitt, former chief of the J ustice Department's internal security section notes that the Israeli intelligence service is the second most active in the United States after the Soviets.
1954 A hidden microphone planted by the Israelis is discovered in the Office of the US Ambassador in Tel Aviv.
1956 Telephone taps are found connected to two telephones in the residence of the US military attach in Tel Aviv.
1954 "The Lavon Affair". Israeli agents recruit Egyptian citizens of J ewish descent to bomb Western targets in Egypt, and plant evidence to frame Arabs, in an apparent attempt to upset
US-Egyptian relations. Israeli defense minister Pinchas Lavon is eventually removed from office, though many think real responsibility lay with David Ben-Gurion.
1965 Israel apparently illegally obtains enriched uranium from NUMEC Corporation. (Washington Post, 6/5/86, Charles R. Babcock, "US an Intelligence Target of the Israelis, Officials
Say.")
1967 Israel attacks the USS Liberty, an intelligence gathering vessel flying a US flag, killing 34 crew members. See "Assault on the Liberty," by J ames M. Ennes, J r. (Random House). In
2004, Captain Ward Boston, Senior Legal Counsel for the Navys Court of Inquiry into the attack swears under oath that President Lyndon J ohnson ordered the investigation to conclude
accident, even though the evidence indicates the attack was deliberate. Given the use by Israel of unmarked boats and planes, and the machine-gunning of USS Libertys lifeboats, the most
likely explanation is that USS Liberty was to be sunk with all hands, with evidence left to frame Egypt for the sinking. This would have dragged the US into the war on Israels side.
1970 While working for Senator Henry Scoop J ackson, Richard Perle is caught by the FBI giving classified information to Israel. Nothing is done.
1978, Stephen Bryen, then a Senate Foreign Relations Committee staffer, is overheard in a DC hotel offering confidential documents to top Israeli military officials. Bryen obtains a lawyer,
Nathan Lewin, and the case heads for the grand jury, but is mysteriously dropped. Bryen later goes to work for Richard Perle.
1979 Shin Beth the Israeli internal security agency] tries to penetrate the US ConsulateGeneral in J erusalemthrough a Honey Trap, using a clerical employee who was having an affair
with a J erusalemgirl.
1985 The New York Times reports the FBI is aware of at least a dozen incidents in which American officials transferred classified information to the Israelis, quoting former Assistant
Director of the F.B.I.] Mr. Raymond] Wannal. The J ustice Department does not prosecute.
1985 Richard Smyth, the owner of MILCO, is indicted on charges of smuggling nuclear timing devices to Israel (Washington Post, 10/31/86).
1987 April 24 Wall Street J ournal headline: "Role of Israel in Iran-Contra Scandal Won't be Explored in Detail by Panels"
1992 The Wall Street J ournal reports that Israeli agents apparently tried to steal Recon Optical Inc's top-secret airborne spy-camera system.
1992 Stephen Bryen, caught offering confidential documents to Israel in 1978, is serving on board of the pro-Israeli J ewish Institute for National Security Affairs while continuing as a paid
consultant -- with security clearance -- on exports of sensitive US technology.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
1992 "The Samson Option," by Seymour M. Hersh reports, Illicitly obtained intelligence was flying so voluminously from LAKAM into Israeli intelligence that a special code name,
J UMBO, was added to the security markings already on the documents. There were strict orders, Ari Ben-Menasherecalled: "Anything marked J UMBO was not supposed to be discussed
with your American counterparts."
1993. The ADL is caught operating a massive spying operation on critics of Israel, Arab-Americans, the San Francisco Labor Council, ILWU Local 10, Oakland Educational Association,
NAACP, Irish Northern Aid, International Indian Treaty Council, the Asian Law Caucus and the San Francisco police. Data collected was sent to Israel and in some cases to South Africa.
Pressure from J ewish organizations forces the city to drop the criminal case, but the ADL settles a civil lawsuit for an undisclosed sumof cash.
1995 The Defense Investigative Servicecirculates a memo warning US military contractors that "Israel aggressively collects US] military and industrial technology." The report stated that
Israel obtains information using "ethnic targeting, financial aggrandizement, and identification and exploitation of individual frailties" of US citizens.
1996 A General Accounting Office report "Defense Industrial Security: Weaknesses in US Security Arrangements With Foreign-Owned Defense Contractors" found that according to
intelligence sources "Country A" (identified by intelligence sources as Israel, Washington Times, 2/22/96) "conducts the most aggressive espionageoperation against the United States of
any US ally." The J erusalemPost (8/30/96) quoted the report, "Classified military information and sensitive military technologies are high-priority targets for the intelligence agencies of
this country." The report described "An espionageoperation run by the intelligence organization responsible for collecting scientific and technologic information for Israel] paid a US
government employee to obtain US classified military intelligence documents." The Washington Report on Middle East Affairs (Shawn L. Twing, April 1996) noted that this was "a
reference to the 1985 arrest of J onathan Pollard, a civilian US naval intelligence analyst who provided Israel's LAKAM Office of Special Tasks] espionageagency an estimated 800,000
pages of classified US intelligence information."
The GAO report also noted that "Several citizens of Israel] were caught in the United States stealing sensitive technology used in manufacturing artillery gun tubes."
1996 An Office of Naval Intelligence document, "Worldwide Challenges to Naval Strike Warfare" reported that "US technology has been acquired by China] through Israel in the form of
the Lavi fighter and possibly SAM surface-to-air] missile technology." J ane's Defense Weekly (2/28/96) noted that "until now, the intelligence community has not openly confirmed the
transfer of US technology via Israel] to China." The report noted that this "represents a dramatic step forward for Chinese military aviation." (Flight International, 3/13/96)
1997 An Army mechanical engineer, David A. Tenenbaum, "inadvertently" gives classified military information on missile systems and armored vehicles to Israeli officials (New York
Times, 2/20/97).
1997 The Washington Post reports US intelligence has intercepted a conversation in which two Israeli officials had discussed the possibility of getting a confidential letter that then-
Secretary of StateWarren Christopher had written to Palestinian leader Yasir Arafat. One of the Israelis, identified only as Dov, had commented that they may get the letter from "Mega,
the code name for Israels top agent inside the United States.
1997 US ambassador to Israel, Martin Indyk, complains privately to the Israeli government about heavy-handed surveillance by Israeli intelligence agents.
1997 Israeli agents place a tap on Monica Lewinskys phone at the Watergate and record phone sex sessions between her and President Bill Clinton. The Ken Starr report confirms that
Clinton warned Lewinsky their conversations were being taped and ended the affair. At the same time, the FBIs hunt for Mega is called off.
2001 It is discovered that US drug agents communications have been penetrated. Suspicion falls on two companies, AMDOCS and Comverse Infosys, both owned by Israelis. AMDOCS
generates billing data for most US phone companies and is able to provide detailed logs of who is talking to whom. Comverse Infosys builds the tapping equipment used by law enforcement
to eavesdrop on all American telephone calls, but suspicion forms that Comverse, which gets half of its research and development budget from the Israeli government, has built a back door
into the system that is being exploited by Israeli intelligence and that the information gleaned on US drug interdiction efforts is finding its way to drug smugglers. The investigation by the
FBI leads to the exposureof the largest foreign spy ring ever uncovered inside the United States, operated by Israel. Half of the suspected spies have been arrested when 9-11 happens. On
9-11, 5 Israelis are arrested for dancing and cheering while the World Trade Towers collapse. Supposedly employed by Urban Moving Systems, the Israelis are caught with multiple
passports and a lot of cash. Two of themare later revealed to be Mossad. As witness reports track the activity of the Israelis, it emerges that they were seen at Liberty Park at the time of the
first impact, suggesting a foreknowledgeof what was to come. The Israelis are interrogated, and then eventually sent back to Israel. The owner of the moving company used as a cover by
the Mossad agents abandons his business and flees to Israel. The United States Government then classifies all of the evidence related to the Israeli agents and their connections to 9-11. All
of this is reported to the public via a four part story on Fox News by Carl Cameron. Pressure from J ewish groups, primarily AIPAC, forces Fox News to removethe story from their website.
Two hours prior to the 9-11 attacks, Odigo, an Israeli company with offices just a few blocks from the World Trade Towers, receives an advance warning via the internet. The manager of
the New York Office provides the FBI with the IP address of the sender of the message, but the FBI does not follow up.
2001 The FBI is investigating 5 Israeli moving companies as possible fronts for Israeli intelligence.
2001 J DLs Irv Rubin arrested for planning to bomb a US Congressman. He dies before he can be brought to trial.
2002 The DEA issues a report that Israeli spies, posing as art students, have been trying to penetrate US Government offices.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
2002 police near the Whidbey Island Naval Air Station in southern Washington Statestop a suspicious truck and detain two Israelis, one of whom is illegally in the United States. The two
men were driving at high speed in a Ryder rental truck, which they claimed had been used to "deliver furniture." The next day, police discovered traces of TNT and RDX military-grade
plastic explosives inside the passenger cabin and on the steering wheel of the vehicle. The FBI then announces that the tests that showed explosives were false positived by cigarette
smoke, a claimtest experts say is ridiculous. Based on an alibi provided by a woman, the case is closed and the Israelis are handed over to INS to be sent back to Israel. One week later, the
woman who provided the alibi vanishes.
2003 The Police Chief of Cloudcroft stops a truck speeding through a school zone. The drivers turn out to be Israelis with expired passports. Claiming to be movers, the truck contains junk
furniture and several boxes. The Israelis are handed over to immigration. The contents of the boxers are not revealed to the public.
2003 Israel deploys assassination squads into other countries, including the United States. The US Government does not protest.
2004 Police near the Nuclear Fuel Services plant in Tennessee stop a truck after a threemile chase, during which the driver throws a bottle containing a strange liquid from the cab. The
drivers turn out to be Israelis using fake Ids. The FBI refuses to investigate and the Israelis are released.
2004 Two Israelis try to enter Kings Bay Naval Submarine Base, home to eight Trident submarines. The truck tests positive for explosives.
This brings us to the present scandal. Two years into an investigation of AIPACs possible role as a spy front for Israel, Larry Franklin, a mid-level Pentagon Analyst is observed by the
FBI giving classified information to two officials of AIPAC suspected of being Israeli spies. AIPAC hires lawyer Nathan Lewin to handle their legal defense, the same lawyer who
defended suspected Israeli spy Stephen Bryen in 1978.
Larry Franklin worked in the Pentagon Office of Special Plans, run by Richard Perle, at the time Perle (who was caught giving classified information to Israel back in 1970) was insisting
that Iraq was crawling with weapons of mass destruction requiring the United States to invade and conquer Iraq. There were no WMDs, of course, and Perle has dumped the blame for the
bad intelligence on George Tenet. But what is known is that the Pentagon Office of Special Plans was coordinating with a similar group in Israel, in Ariel Sharons office.
With two suspected Israeli spies (at least) inside the office from which the lies that launched the war in Iraq originated, it appears that the people of the United States are the victims of a
deadly hoax, a hoax that started a war.
The leaking of the investigation of AIPAC to the media on August 28th, 2004 gave advance warning to other spies working with Franklin. The damage to the FBIs investigation was
completed when United States Attorney General J ohn Ashcroft ordered the FBI to stop all arrests in the case. Like the Stephen Bryen case and the hunt for Mega, this latest spy scandal
seems destined by officials who have their own secret allegiances to protect, barring a massive public outcry.
The organization at the heart of the latest spy investigation, AIPAC, wields tremendous influence over the US Congress. Through its members and affiliated PACs, AIPAC directs a huge
flow of campaign cash in favor of, and occasionally against, Senators and Representatives solely on the basis of their willingness to support Israel. As an example, in 2002, U.S. Rep. Artur
Davis, D-Birminghamreceived so much help from pro-Israeli pacs that 76% of his campaign budget came from OUTSIDE the state of Alabama, mostly from New York.
Let me repeat that. A Congressman AIPAC wanted elected received more money from pro-Israel groups outside his state than from his own constituents inside his state. Who is that
Congressman going to be thinking of when he votes in Congress?
So here is the mother of all scandals.
For two years, the FBI has suspected AIPAC of spying for a foreign country, and for those two years (and for decades before) that group suspected of spying for Israel has been reshaping
the US Congress for the benefit of a foreign government.


commonfranklingate terms: Ak Sar Ben, Albert foods Alberto Gonzalez Alisha Owen, Amato, Andersen, Harold, Michael Aquino, Army of the Night, Dennis Baack, Max Baer, Max Baird, holz zeilinger, bi-sexual, bobby Eberle,
Bonacci, Boystown bradford brian burzynski BSCT byrnnerandall call-boy carlton-ritz casseday catholic ciacitron, peter clatty commercial federal savings conagracoos bay Lehman coppleCornwall Craig SpenceCreager credit union
Crist David Ambrose, David Hinton Decamp Dick Roth discovery channel DukeCunninghamDwight Harris Ed Wwens Eisenstatt ErnieChambers Fbi Foggo Fort Bragg Foster carereview board Frank Figueroafranklin advisory board
gannon guckert gannongate gerry falwell gopusa hambright hitler youth hotmilitarystud iran-contrajames dobsonjames duffy james gannon james kelly john queenjohn stevens barry johnny sutton jubilation day carejuliewalters kay
griggs kimbroughking, lawrence labedz libby apprenticelonnielathamlustfull utterances lynch male prostitution mark grossman mcconnell methamphetaminemidnight tour mikejones murray state bank nambla nebraskanelson, rusty
northernnatural gas northwest bell offutt ogen, utah omahaomahanational bank orr case pagegatepedophigatepoindexter presidio probeensnares protestant ratzinger reagan, ronald rendition rick perry R-lynn robert kirchner robert spire
rove, karl samuel vanpelt sarkozy paedophiliasatanismschoedinger scott mcclellansecret service shawn vassel sodomy southern baptist convention stephen cambone stitt strategic air command talonnews tarpley temple of set texas youth
commission the colonel the fellowship thomas reynolds thompson, hunter tomdelay tongsun park trippschweer union pacific railroad urbom wadman, robert washington times weber state university west texas state school westin crown
center hotel williamboykin williams energy world heraldworld vision yorkshiretelevisionyosef sagiv franklin cover-upmcateer libby book apprenticehomoeroticism, bestiality and incestuous themes, with an unspeakably gross passage
where a ten-year-old girl is abused. Caged, and forced to havesex with bears, to become a prostitute, search terms: a scene of incest between two uncles and their niece; fukk a freshly killed deer, prepubescent girl's painted 'mound', lack
of vaginal odor ronald roskens kent state 1970cfr usaid chancellor uno board of regents caradori homosexual orgies ed mccateer leola Mcconnell roundtablefalwell bisexual lustfull utterances tennessee knoxvillevictor ashekitty kelly las
vegas mayor tang yalebulldog lips sodomitenevada governor .........................gopusagay porn sites mcclellanaustingay bars bypassed secret service security controls background check fleischer press credential mcclendoninr bureau of
intelligenceand research state department wilson plame endeavor media group llc houston theconservativeguy.comexposejessejackson militaryescorts bedrock corporation wilmington delaware j. daniels dividezero.net gkg.net collegestation
bushpresidential library lawrence king elizabeth doles liaison to the white house rovefundamentalist Christian politics operation rescuebiblereadingby guckert reverendrob schenk american center for law and justice pat robertson justice
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
roy moorepentacostal national community church giddings school Washington Ashcroft congregant Gannon Schenk friends park benchplan righttalk.comleadership institute's broadcast school of journalismarlington virginia morton
blackwell headof collegerepublicans south dakotapolitics thune ongannon's radio webcasts daschlefreespeech foundation probush.comjames abourezk mikemarino west point pennsylvaniatraitors list carter sarandon mortensen gore
stern kerry kennedy MLKingmckinney mooredixiechicks aei gannon articlemarch2004anti-gay rights ....Deborah J eane Palfrey, Pamela Martin & Associates, legal escort service, Tobias, Brandy Britton, 07-046-GK, Catherine
Connelly, racketeering, Ulman, Dick Morris, adult fantasy, Miz J ulia, prostitution, pimping, Montgomery Blair Sibley, ABC, Disney, AkinGumpStrauss Hauer Feld LLP, Eli Lilly, Quale, NASA, Kessler, Shirlington limousine, poker
parties, Watergate, Westin Grand, hookergate whoregate, D. C. madam, Duke-stir, Langley, .... Letterman about Cheney ""I can't believea good-looking guy likethat wouldever haveto pay for sex, youknow what I'msaying?" ....
Thomas DiBiagio, J onathan Luna, Ed Norris, Governor Ehrlich, Watergate, Westin Grand, J ames Comey, Ashcroft, ABC producers Rhonda Schwartz, J ustin Rood, defensecontractors, AIPAC, World Bank, IMF, Halliburton, smokinggun,
Wells Fargo Bank, Troy Burrus, J ohnStendrinni, Wilkes / Michael indictment. .... Barney Frank, Steve Gobie, Thomas Foley, Edwin Cassem, Massachusetts General Hospital, Paul Shanley, CreightonUniversity, Dobson, homophobia, Val
Peter, archdiocese, Boston, house ethics committee, WarrenBuffett, Cardinal law Senator Larry Craig, Idaho, plainclothes officer, lewd behavior, airport men's room, tapped foot, anti same-sex marriagevotes, homophobia, anti-gay rights,
Romney campaign, Offutt, Barney Frank
Neil Entwistle top
PROGRESSIVE REFERENCE CONSERVATIVE*
Global Research
CASMI
Dark Government
Deep J ournal
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name of
special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
Greg Palast privatization of FBI, see InQtel,
Choicepoint
IncogPress, Zakheim There is also evidence that a
possible headquarters for this remote control was
located at the Boston Airport, in the offices of a major
Military/Industrial complex player, the Mitre
Corporation: A company sharing offices with them
named Ptech. The reporter J oe Bergantino of WBZ-
TV, was following the story, but it was squelched by
Michael Chertoff, dual-citizen of Israel and Zionist.
PTECH INFO more
Islamic Intelligence Dov Zakheim has served more
than two decades at the highest level of the Dept. of
Defense, since the Reagan administration came to
power in 1981. Before that he was at the
Congressional Budget Office in the department
overseeing National Security and International Affairs
from 1975 until 1981. ... These Israeli enterprise
software products, like Ptech and Mitre, were key to
the execution of 9-11.
LookingGlassNews, Abramoff, Hillman ... Top 25
censored stories 2007
RumorMillNews IS DEFENSE CONTRACTOR
MITRE CORP. THE TROJ AN HORSE OF 9/11? By
Christopher Bollyn American Free Press American
Free Press Did a central controller with "super user"
privileges of the command and control systems of the
Department of Defense, NORAD, the Air Force, and
the FAA, control the aerial attacks of 9/11? There is
only one agency that has that capability a little-
known private company known as continued below
and file
WayneMadsenReport Entwistle's firm, Embedded
New Technologies (ENT), reportedly had connections
to the Braintree, Massachusetts-based firm P-Tech,
which was investigated subsequent to 911 by the FBI
Summary
A Massachusetts jury found British
computer specialist Neil Entwistle guilty of
murdering his wife and baby daughter on
J anuary 19, 2006. Entwistle fled the United
States for Britain after the double
homicide. notes
WBZTV Neil Entwistle's attorney says he
will raise constitutional issues in his appeal
of guilty verdict.
WayneMadsenReport "has recently learned
from knowledgeable U.S. Intelligence
Community sources that Entwistle's
contract for P-Tech involved "wiring
backdoors" into the computer systems of
the FAA, more below, NORAD, Pentagon,
and White House to bring about the
operational collapse of the computer
systems during the morning of 9/11. full
article
Wikipedia, PTech
Wikipedia, Operation Green Quest more
below
Cooperative Research PTech
RumorMillNews Mitre Corporation, 911,
Trojan Horse, file
J udith Miller,
Foreign Affairs, The Challenge of Radical Islamby
J udith Miller, Muslim Brotherhood
Embedded New Technologies Company Overview"
Embedded New Technologies (ENT) offers
Intellectual Property cores for Xillinx, Altera and
Actel FPGAs. DSP systems and system-on-chip, SoC,
embedded systems can be provided using our floating-
point, fp, fast fourier transform, fft, fir filter and digital
down converter cores
NPR J oe Bergantino, a CBS journalist who will be
the first to report on Ptech, will say of Ptech in 2002,
Theworst-case scenario is that this is a situation
where this was planned for a very long time to
establish a company in this country and in the
computer software business that would target federal
agencies and gain access to key government data to
AP Entwistle linked to escort services, smear
campaign? pornography, set-up. Google search on
murder.
video Ron Paul names neo-cons video
Boston Globe ... he will be transferred to the
maximum-security Souza-Baranowski Correctional
Center in Shirley. There he will undergo medical and
physical tests, which include obtaining a sample of his
DNA, as is the case for all inmates, said Diane Wiffin,
a spokeswoman for the state Department of Correction.
Boston Herald A juror who carefully watched a
curiously grinning Neil Entwistle over 12 days of
testimony by 46 witnesses said the perfectly coiffed
wife-and-baby killer is nothing but a narcissist.
CBSNews Entwistle
CIA
FBI
Ember Ember Corporations wireless semiconductor
solutions help automate homes, lower buildings
energy consumption, reduce manufacturing plants
breakdowns, and keep the countrys borders and
infrastructure safeand secure. With more than 120
customers, Headquartered in Boston, Massachusetts,
with offices and distributors worldwide, the company
is a lead promoter of the ZigBee Alliance; its platform
is the National Technical Systems (NTS) Golden
Suite
FoxNews We know that our son Neil is innocent, and
we are devastated to learn that the evidence points to
Rachel murdering our grandchild and then committing
suicide. I knew Rachel was depressed. Our son will
now go to jail for loving, honoring, and protecting his
wife's memory.
In-Q-tel, CIA company
Mitre Corporation
Norquist, Grover
P-Tech
WBZTV, laptop, Google search J udge Diane
Kottmyer agreed to allow prosecutors to present
evidence suggesting Neil Entwistle trolled the internet
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
for ties to Muslim Brotherhood financiers linked to Al
Qaeda. P-Tech also had software contracts for the
FAA, NORAD, Pentagon, and White House during the
9-11 terrorist attacks. According to Entwistle's
mother-in-law, he also told his wife that he had large
amounts of money held in 'offshore' accounts.
What Really Happened
notes: poster: '. Ember, founded by MIT alumni Robert
Poor and Andrew Wheeler, Ember Corporation began
operations in 2001. In-Q-Tel initially invested in
Ember in September 2005. . ENT stand for
Embedded Technical Networking - ENT (which we
All think is short for ENTtwistlethanks to court TV )
this is what his job was - not looking for escorts, but
encoding these sites for the FBI .
Global Report The Center for Public Integrity and the
Fund for Independence in J ournalism determined,
through a collective study and breakdown of Bush
administration speeches, press briefings and
interviews, that Bush and other top officials "led the
nation to war on the basis of erroneous information."
and OpEdNews
Neil Entwistle, and 911 'inside job' ...
follow the trail: P-Tech, command and
control, terrorist financing, Bush /
Clinton, Afghanistan, Mujahideen,
Kosovo, oil, 911, Iraq War. more
essentially help terrorists launch another attack.
National Public Radio, 12/8/2002]
International Extradition Blog
Trials & Tribulations
TrueCrimeWeblog
Wikipedia, Neil Entwistle On J une 25, 2008, Neil
Entwistle was found guilty on two counts of first
degree murder and sentenced to life imprisonment
without the option of parole. J urors at Middlesex
County Superior Court in Woburn, Massachusetts, had
deliberated for 13 hours before finding Entwistle
guilty. As well as being found guilty of the murders,
he was convicted of two other charges - illegal
possession of a firearm and illegal possession of
ammunition - and sentenced to probation which
forbids him from gaining profit from the sale of his
story to the media. ... Entwhistle is serving his life
sentences at Massachusetts Correctional Institution -
Cedar J unction supermax prison.
WebSlueths
Wikio Neil Entwistle
for sex in the days before the murders and logged into
his account at Adult Friend Finder after the murders.
notes: BMI / PTech Yassin al-Qadi, a Saudi
multimillionaire. He will invest $5 million of Ptechs
start-up money. The US will declare him an al-Qaeda
financier shortly after 9/11 (seeOctober 12, 2001). In
1998, al-Qadi will come under investigation by FBI
agent Robert Wright (seeOctober 1998) for potential
ties to the 1998 US embassy bombings (seeAugust 7,
1998). Al-Qadi is also a major investor in BMI Inc., an
investment firm with connections to a remarkable
number of suspected terrorist financiers (see1986-
October 1999). Al-Qadi later will claims that he sold
his investment in Ptech in 1999, but therewill be
evidence he may continue to hold a financial stake
after that year, and even after the US will officially
declare him a terrorismfinancier (see1999-After
October 12, 2001).
J ewish Virtual Library, Dov Zakheim, mastermind of
911
WayneMadsenReport Entwistle's firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated
subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House
during the 9-11 terrorist attacks. According to Entwistle's mother-in-law, he also told his wife that he had largeamounts of money held in 'offshore' accounts. ...... WMR has
recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer systems of the FAA,
NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11. more search terms: Gatwick Airport, Hanscom Air
Force Base, Gulfstream rendition aircraft, full article
notes: Neil Entwistle (born 18 September 1978) is an English-born man accused of murdering his wife, Rachel Entwistle, and their infant daughter Lillian on J anuary 20, 2006 in the
United States. ... The bodies of 27-year-old Rachel and 9-month-old Lillian were found on J anuary 22, in the master bedroom of the couple's rented Hopkinton, Massachusetts home
where the Entwistles had been living for only ten days. Autopsy results showed that Rachel died of a gunshot wound to the head, and the baby died of a gunshot wound to the
stomach
Wikipedia Ptech Inc. was a Quincy, Massachusetts-based provider of business process modelling software that was closed down in the wake of a December 5, 2002 raid by federal
authorities under the auspices of Operation Green Quest. ... Business domain Describing itself as a "provider of enterprise architecture, business modeling, analysis and integration
software solutions, "the privately-held corporation was founded in 1994, and known for its technology, which was based on a unique implementation of neural net and semantic
technologies. Ptech was recognized as one New England Technology's "Fast 50" by Deloitte ToucheTohmatsu in 2001. For four years in row (from2000 to 2003), Ptech was also
recognized, for their velocity of innovation in the knowledge economy, as one of the hundred companies that matters in the world of IT and Business with the major names in
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Technology companies such as Microsoft, IBM, HP and Oracle Corporation.. The CEO of Ptech Oussama Ziade appeared on different television shows in the USA and has been
featured on the cover of several magazines. . The company was once part of UML Partners, the consortium that was convened to develop standards for UML, the Unified Modeling
Language. ... Federal investigation Ptech was brought to the front of the spotlight following the visit of law enforcement officials to its Headquarters in the middle of the night of
December 5th 2002, under the operation of Operation Green Quest, a U.S. Customs Services unit charged with the investigation of alleged terrorist funding networks. The December
raid brought a rush of media sources to Ptech's Boston headquarters 7] amid allegations of Ptech's involvement in terrorist financing, which the White House and the Federal Attorney
General of Massachusetts later rebuffed ... Notable clientele Ptech's roster of clients included several governmental agencies, including the
United States Armed Forces, NATO, Congress, the Department of Energy, the Department of J ustice, the Federal Bureau of
Investigation, Customs, the FAA, the IRS, the Secret Service, and the White House. Despite the media allegation that the company's was connected
to terrorism, an allegation that both the US government and the company's official denied, as of May 2004 they were still contracted by several federal agencies, including the White
House. ... Ptech had a security clearance to work on sensitive military projects dating to 1997. ... edit] Notable personnel Yaqub Mirza, angel investor, board member. Hussein
Ibrahim, VP, Chief Scientist ..........Ymette St guillen murder and her father's ties to Venezuela via the infamous "School of the Americas"
Wikipedia "Operation Green Quest was a United States Customs Service-sponsored interagency investigative unit formed in October of 2001, and concerned with the surveillance
and interdiction of terrorist financing sources. The FBI refused to participate in the raid and to date, no charges have ever been filed. ... SAAR ... Synopsis Led by the U.S.
Customs Service, and included agents and analysts from the Internal Revenue Service(IRS), the Secret Service, the Bureau of Alcohol, Tobacco and Firearms (ATF), the Federal
Bureau of Investigation (FBI), the Office of Foreign Assets Control (OFAC), the Financial Crimes Enforcement Network (FinCEN), the U.S. Postal Inspection Service, and the Naval
Criminal Investigative Service. Federal prosecutors from the U.S. J ustice Department's Criminal Division also formed an integral part of Operation Green Quest. The director of
Operation Green Quest was a senior special agent from U.S. Customs and the deputy director is a senior special agent from the IRS. .... According to Customs, by its fourth month
of operation Operation Green Quest had initiated more than 300 probes into terrorist finances, seizing about $10.3m in smuggled US currency and $4.3min other assets. Its work
resulted in 21 searches, 12 arrests and four indictments. SAAR network raid: Its most spectacular operation of was March 20, 2002 raid ... 19 interrelated business and non-profit
entities in Herndon, VA associated with an umbrella corporation known as the SAAR Foundation, looking for ties to the Al Taqwa Bank and the Muslim Brotherhood. No arrests
were made and no organizations were shut down, but over 500 boxes of files and computer files were confiscated, filling seven trucks. Finding no incriminating evidence, much of
the confiscated material has been returned. The raid would raise concerns of unfair persecution within the American Muslim community, 2] leading to an April 4, 2002 meeting
(arranged by Grover Norquist) in which several notable Muslim figures, including Palestinian-American financier and Republican organizer Talat M. Othman and Islamic
Institute head Khaled Saffuri were received by Treasury Secretary Paul O'Neill as representatives of the Muslim-American community, and to voice complaints about the raid
Cooperative Research On December 3, 2001, New York Times reporter J udith Miller telephones officials with the Holy Land Foundation charity in Texas and asks themto comment
about what she says is a government raid on the charity planned for the next day. Then in a December 4, 2001, New York Times article, Miller writes that President Bush is about to
announce that the US is freezing the assets of Holy Land and two other financial groups, all for supporting Hamas. US officials will later argue that Millers phone call and article
increased the likelihood that the foundation destroyed or hid records before a hastily organized raid by agents that day. Later in the month, a similar incident occurs. On December
13, New York Times reporter Philip Shenon telephones officials at the Global Relief Foundation in Illinois and asks themto comment about an imminent government crackdown on
that charity. The FBI learns that some Global Relief employees may be destroying documents. US attorney Patrick Fitzgerald had been investigating the charities. He had been
wiretapping Global Relief and another charity in hopes of learning evidence of criminal activity, but after the leak he changes plans and carries out a hastily arranged raid on the
charity the next day (seeDecember 14, 2001). Fitzgerald later seeks records from the New York Times to find out who in the Bush administration leaked information about the
upcoming raids to Miller and Shenon. However, in 2005 Fitzgerald will losethe case. It is still not known who leaked the information to the New York Times nor what their motives
were. Ironically, Fitzgerald will succeed in forcing Miller to reveal information about her sources in another extremely similar legal case in 2005 involving the leaking of the name of
CIA agent Valerie Plame. New York Times, 12/4/2001; New York Times, 12/15/2001; Washington Post, 9/10/2004; Washington Post, 2/25/2005] The 9/11 Commission will later
concludethat in addition to the above cases, press leaks plagued almost every raid on Muslim charities] that took place in the United States after 9/11. Washington Post, 9/10/2004
full research
Cooperative Research Investigators tried to prove Alamoudi was a terror middleman but could not find smoking gun evidence. That allowed Alamoudi to became a politically
connected Muslim activist and co-founder of the American Muslim Armed Forces and Veteran Affairs Council, which helps the US military select Muslim chaplains. New York
Post, 10/1/2003] This same year, Alamoudi will be one of the founders of Ptech, a US computer company with suspected terrorism
ties (see 1994). It will later be alleged that he was able to operate with impunity for years due to his close ties to Grover
Norquist, a powerful Republican lobbyist (seeMarch 20, 2002). In 2004, the US will sentence him to 23 years in prison for illegal dealings with Libya (seeOctober 15, 2004).
RumorMillNews continue: MITRE Corp. ... There are basically two versions of events surrounding the terror attacks of September 11, 2001. There is the government version,
propagated by the controlled media, which claims that 19 Arab terrorists, organized by Osama Bin Laden in Afghanistan, hijacked 4 passenger aircraft and used themto attack the
World Trade Center and the Pentagon. This version, used to launch the "war on terror" and two invasions in the Middle East, is challenged by a lack of evidence. On the other hand, a
host of unofficial explanations, based on availableevidence, make up what can be called the "inside job" or anti-government version. This version basically claims that agents
embedded within the U.S. military and intelligence organizations conspired to carry out the terror attacks.
IncogPress Ptech was financed by the GuardiumCorporation of Israel, a hi-tech investment company with ties to the Mossad through the front groups Cedar Firm, Veritas Venture
Partners and StageOne, all located in Herzelia, the same as Mossads headquarters. Also, these companies are tied to AMDOCS and COMVERSE INFOSYS, who builds the digital-
switching telecomm equipment, used all over the US and in the government and thought to have a back door for intelligence gathering. ... This was the subject to Carl Camerons
banned FOX report, from December, 2001, that showed phone information of LA undercover Drug agents and DEA were given to an Israeli Ecstasy Drug ring. Abe Foxman of the
ADL forced FOX to discontinuethe reports and to removethemfrom their website. These reports may be seen here (for now): FOX REPORTS ... Ptech was owned by Lebanese
and Arab front men; but appears that one Michael Goff, the son of a member of Commonwealth lodge 600 of the Bnai Brith Worcester, Massachussets and who strangely left his job
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
as a lawyer to go run a Hi-Tech start-up company. Was he a Sayan (J ew Mossad collaborator)? More on Ptech coming up in another Blog posting.
PTECH & 9-11 source: z13.invision forum
The subject of computer sabotage in relation to the aerial attacks of 9-11 was brought to the foreby Indira Singh, who spoke at early 9-11 truth events organized by Kyle Hence.
During these early 9-11 "truth" events, a small Massachusetts-based software company called Ptech was brought up by Singh, who sought to link it to Arab terrorists. Ptech was
said to be a start-up company from Quincy, Mass. whose software was loaded onto the most sensitive computer systems across the U.S. government, including those of the Federal
Aviation Administration (FAA) and the U.S. Air Force, two agencies whose systems failed miserably on 9-11. Singh, a senior consultant with J P Morgan Chase on 9-11, is
described as a "whistle-blower" because of her revelations about Ptech's involvement with the critical computer systems that failed on 9-11. "Ptech was with MITRE Corporation
in the basement of the FAA for two years prior to 9/11," Singh said. "Their specific job is to look at interoperability issues the FAA had with NORAD and the Air Force in the
case of an emergency. If anyone was in a position to know that the FAA -- that therewas a window of opportunity or to insert software or to change anything -- it would have been
Ptech along with MITRE." Singh has spoken extensively about Ptech's alleged connections with Saudi Arabia, for example with Pacifica Radio in 2005:
"Maybe those organizations dont fully know who their masters are. And Ptech is the one thread, the one golden thread you pull on and all of this is unraveled, because it goes into
the corporations, it goes into these government entities, it goes into the terrorismfinancing entities that were, that none of which have been, by the way, taken to task. There are just
so many questions about what does this all mean. And as we investigated, as I investigated further, we found that the origins of Ptech were very interesting where did this
company come from obviously is the first question. And how did they get to be so powerful, who were the people, who were the organizations that brought themin, who knew,
who gave themthe power?" Ptech software "is utilized at the highest levels of almost every government and military and defense organization in this country," Singh said,
"including the Secret Service, the FBI, the Department of Defense, the House of Representatives, the Treasury Department, the IRS, the U.S. Navy, the U.S. Air Force, and, last but
not least, the Federal Aviation Administration." I found it hard to believe that the most sensitive government and military computers would run enterprise software from a
Lebanese-owned start-up company called Ptech from Quincy, Mass. All the talk about the Saudi-financier behind Ptech being linked to Osama bin Laden smelled like a "cut out"
to me. It simply did not make sense that the most secure computer systems of the U.S. government would be running software written by a Lebanese Muslim financed by a Saudi
who happened to be on the most-wanted list of global terrorists. When I turned my attention to Ptech, I soon discovered that the real key person involved in the development of the
company was a Zionist J ewish lawyer named Michael Goff from Worcester, Mass. Goff also worked for an Israeli-run computer security company called Guardium. This
confirmed my suspicion that Ptech was probably an Arab "cut out" controlled by the Mossad, and that Goff was their point man in Ptech. Goff's father and grandfather had been
high-level Masons in the Worcester lodge of B'nai B'rith, a secret J ewish Masonic group formed in New York City in 1843. Goff obviously lied to me about how he had gotten
involved with Ptech in 1994 when he said that he had wound up becoming the manager of the company through a temporary agency. It seemed to me that the Ptech cut-out had
been exposed. My revelations about Ptech's Zionist roots were published in a newspaper based in Washington, D.C. Singh, however, ignored the evidence of Israeli involvement
with the creation of Ptech and continued to accuse the company of being linked to Saudi sponsors of terror. Meanwhile, Ptech software is still running on U.S. government and
military computers. Singh and I were asking the same questions: How did Ptech get to be so powerful? Who were the people, who were the organizations that brought themin?
Who knew? Who gave themthe power? After 9-11, the crucial question was how did Ptech's software get loaded onto the critical U.S. government networks particulary those of
the FAA, the U.S. Air Force, and NORAD. Who, in their right mind, would have allowed Ptech personnel and software anywhere near the FAA's core air traffic control system
computers in Herndon, Virginia? During my research about the military exercises that were on-going when 9-11 occurred, I read documents about how the FAA and NEADS
computer systems failed. The FAA, in particular, was extremely slow to contact the military about the rogue aircraft of 9-11. In one case, one of the rogue aircraft had been allowed
to fly without communication for nearly 30 minutes before the military was notified. "THE HEART OF THE MATTER" The flawed and delayed FAA procedures and
communications with the military are at "the heart of the matter," as 9-11 relativeKristen Breitweiser said:"You know, it is very upsetting that the 9/11 Commission had to
subpoena the Federal Aviation Administration FAA]. According to news reports, thereare 150,000 documents that were left out of what the FAA sent to the commission. Those
documents went toward the time line of when the FAA notified the North American Aerospace Defense Command NORAD], when the fighter jets were scrambled and the
communications between air-traffic control and the pilots. These are threshold issues that go to the heart of the matter. How did the FAA overlook 150,000 documents pertaining to
these issues? It is more than mildly upsetting that they would leave out these documents." MONTE BELGER FAA DEPUTY ADMINISTRATOR In the documents about the
FAA failures on 9-11, I came across the name of a MonteR. Belger, acting deputy administrator of the FAA at the time. A long-termFAA official who began his career with the
FAA in Chicago, MonteBelger was the senior official who oversaw the upgrading of the FAA air traffic computer systems that began in the late 1990s and which was on-going in
2001. Belger, as the Acting Deputy Administrator for Air Traffic Services and System Operations, was the key man at the FAA making the executive decisions about these
upgrades. As the New York Times of J une 7, 2001, reported:"The aviation agency is installing a computer system that controllers can use to determinewhether airplanes can depart
from established traffic lanes and fly long distances, and whether they will conflict with other airplanes by doing so." Belger was the key decision maker at the Federal Aviation
Administration, responsible for the software and computer upgrades that involved Ptech, the suspicious upgrades which were being done during the years prior to 9-11. Documents
and reports from the MITRE Center for Advanced Aviation System Development in McLean, Virginia, show that Ptech was working with MITRE on FAA computer systems. As
his on-line biography says, Belger, a 30-year veteran of the FAA, was Acting Deputy Administrator for the FAA for five years, from 1997-2002, leading the 49,000-person team
and in charge of operating the world's safest aviation system. During his tenure with the FAA, Belger was the Associate Administrator for Air Traffic Services, responsible for day-
to-day operations of the nation's airspace system, and supervised the FAA's modernization plan aimed at improving aviation capacity, safety and service to airlines. Belger played a
pivotal role in assisting in the transition of aviation security responsibilities from the FAA to the new Transportation Security Administration, and he co-chaired the FAA's
successful efforts to adopt acquisition and personnel reform. Belger retired from the FAA in September 2002.
U.S. AVIATION TECHNOLOGY LLC After he left the FAA, Belger became the "Vice President, Government Connection" of a small Israeli-run company based in the Fort
Lauderdale area called U.S. Aviation Technology. The company was founded by Ehud "Udi" Mendelson, who described himself as "a captain in the prestigious Army Intelligence
Unit of the Israel Defense Force." "Ehud received his BS Degree in Business and Economics from the Bar-Elan sic] University in Tel-Aviv, Israel. He holds a computer Network
Engineer certification from Microsoft and Novel," according to his webpage. Company documents and information from the Israel Venture Capital Research Center website
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
specifically name MonteBelger of Centreville, Virginia, as a Vice President and Government Connection of U.S. Aviation Technology LLC.
Federal Whistleblower Mary Schneider www.maryschneider.us gets bogus mocking email from a 9-11 connected p-tech software company (Mitre) that was used to over ride the
Pentagon computers on 9-11-2005
It was then Asst. Attorney General Michael Chertoff, now head of US Dept. of Homeland Security, that helped lobby for P-Tech Softwarepre-9-11.
Note: P-Tech Softwareis now linked to the destabilization of the US Radar and Defense Shield on 9-11 in which US Dept of J ustice War games were used to masquerade and turn
a mock drill into the real Black Op aka the 9-11 Attack on America. Reference: Both Vanity Fair and Lou Dobbs of CNN have now fingered the 9-11 Treason and Norad in
disarray
911review THE PTECH CUTOUT Ptech, a mysterious software company has been tied with the events of 9/11. The Quincy, Massachusetts-based company was supposedly
connected to "the Muslim Brotherhood" and Arab financiers of terrorism. The firm's suspected links with terrorismresulted in a consensual examination by the FBI in December
2002, which was immediately leaked to the media. The media reports of the FBI "raid" on Ptech soon led to the demise of the company. Ptech "produced software that derived from
PROMIS, had an artificial intelligence core, and was installed on virtually every computer system of the U.S. government and its military agencies on September 11, 2001,"
according to Michael Ruppert's From the Wilderness (FTW) website. "This included the White House, Treasury Dept. (Secret Service), Air Force, FAA, CIA, FBI, both houses of
Congress, Navy, Dept. of Energy, IRS, Booz Allen Hamilton, IBM, Enron and more," FTW reported. "Whoever plotted 9/11 definitely viewed the FAA as the enemy that morning.
Overriding FAA systems would be the most effective way to ensurethe attacks were successful," FTW reported. "To do this, the FAA needed an evolution of PROMIS software
installed on their systems and Ptech was just that; the White House and Secret Servicehad the same software on their systems - likely a superior modified version capable of
'surveillance and intervention' systems." But did the U.S. government unwittingly load software capable of "surveillance and intervention" operations and produced by a company
linked to terrorismonto its most sensitive computer networks, or was Ptech simply a Mossad "cutout" company? Oussama Ziade, a Lebanese Muslim immigrant who came to the
U.S. in 1985, founded Ptech in 1994. But the company's original manager of marketing and information systems was Michael S. Goff, whose PR firm, Goff Communications,
currently represents Guardium, a Mossad-linked software company. And Goff comes from a well-to-do line of J ewish Masons who have belonged to Worcester's Commonwealth
Lodge 600 of B'nai Brith for decades. So, why would a recently graduated J uris Doctor in Law leave a promising law career to join forces with a Lebanese Muslim's upstart
company sponsored with dodgy funders in Saudi Arabia? "As information systems manager for Ptech], Michael handled design, deployment and management of its Windows and
Macintosh, data, and voice networks," Goff's website says. "Michael also performed employee training and handled all procurement for software, systems and peripherals." AFP
asked Goff, who left the Worcester law firm of Seder & Chandler in 1994, how he wound up working at Ptech. "Through a temp agency," Goff said. Asked for the name of the
agency, Goff said he could not remember. Could it be Mossad Temps, or maybe Sayan Placement Agency? Goff, the original marketing manager for Ptech software, said he did
not know who had written the code that Ptech sold to many government agencies. Is this believable? Goff leaves a legal practice in his home town to take a job, through a temp
agency, with a Lebanese Muslim immigrant who is selling software, and he doesn't know who even wrote the code? AFP contacted the government agencies that reportedly have
Ptech software on their computers, and IBM, to ask if they could identify who had written the sourcecode of the Ptech software. By press time, only Lt. Commander Ron Steiner of
the U.S. Navy's Naval Network Warfare Command had responded. Steiner said he had checked with an analyst and been told that none of the Ptech software has been approved for
the Navy's enterprise networks. http://911review.org/companies/Odigo/Mossa...Odigo_9-11.html
Sites.Google When compared to the media circus that surrounded the pretrial investigation and ultimate trial and conviction of Scott Peterson in 2005 for the murder of his wife
Laci and unborn child Conner, the just concluded Neil Entwistle murder case doesnt even register a whisper. This is very curious. The Neil Entwistle case had all the elements
necessary for a media circusa wife shot to death in her home along with her 9-month old daughter, plus an international angle where the suspect husband flees back home to
England.
One would think that programs such as Nancy Grace, Anderson Cooper 360, Verdict with Dan Abrams and Larry King Live would have milked the tragedy for all it was worth as
they had the Scott Peterson case or the still unsolved 2005 disappearance of Natalee Holloway in Aruba incident, but therewas no coverage. This silence is a story in itself.
Except for periodic coverageof the trial on Court TV, the only mention in the media of Neil Entwistle after wife Rachel and daughter Lillian were found dead were two curt
dispatches announcing Neils arrival back in the United States in February 2006 to stand trial, and his conviction on J une 25, 2008. Thats it! What caused this self-imposed media
blackout costing valuable advertising dollars? Before we get to that story, lets first examine the many oddities that swirl around the Neil Entwistle case.
The first sign that something was amiss was Neil Entwistles extradition flight back to the United States. Instead of flying coach on a commercial airliner as is usual in extradition
cases, Neil, in the custody of United States marshals, was "returning to the U.S. on a private flight" according to British police.1 Hold on, though. The flight back to the United
States gets even more interesting. It would seemnot only were authorities in Massachusettes interested in getting Neil Entwistle back to the United States, and in a comfortable
fashion no less, but so was the Central Intelligence Agency, because the "private flight" Neil flew back on was, according to former NSA officer Wayne Madsen, a "CIA
Gulfstreampreviously used to fly "renditioned" Al Qaeda suspects around the world."2 Madsen reports "After questions were raised from reporters] about the use of the
Gulfstream, Massachusetts authorities claimed it had merely "rented" the U.S. governments aircraft for the solepurpose of transporting Entwistle."3 This explanation is, of course,
ludicrous. Agency aircraft are not lent out. Such an action would constitute a serious security breach even if the temporary passengers were Americans.
The story gets even odder! After initially landing at "Bangor, Maine, to pass customs, Neil Entwistle] then flew toHanscom Air Force Base in Bedford, Mass."4 So instead of
flying directly to Boston Logan Airport, first the CIA Gulfstream lands at Bangor, Maine to pass customs then proceeds to HamscomAir Force Base. Of course, this round about
process could have been handled more expeditiously by landing at Boston Logan Airport in the first place. Then again if Neil Entwistle had landed at Boston Logan Airport,
reporters therewould not have been so restrained in their coverageof his return as they would be on a military base. Madsen notes one aspect of the medias restraint at Hamscom
as "TV footageof the aircraft CIA Gulfstream] studiously avoided showing the planes tail number."5
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Youre probably thinking to yourself this is one strange story, and it couldnt get any stranger. Wrong. Like a good thriller (or a bad thriller), the odyssey of Neil Entwistle goes
seriously serpentine.
Madsen reports, "Entwistles firm, Embedded New Technologies (ENT), reportedly had connections to the Braintree, Massachusetts-based firm P-Tech, which was investigated
subsequent to 911 by the FBI for ties to Muslim Brotherhood financiers linked to Al Qaeda. P-Tech also had software contracts for the FAA, NORAD, Pentagon, and White House
during the 9-11 terrorist attacks."6 Well, well, well, that would certainly explain the keen interest the CIA had in Neil Entwistle.
If you remember, during the 9/11 attacks FAA radar was continuing to pick up false contacts after the NORAD war games going on that morning were called off, confusing Air
Traffic Controls response to the attacks.7 Was this the work of P-Tech who we learn had a software contract with the FAA during the 9/11 attacks? Before we answer that
question, we need to know who was behind P-Tech - where did P-Tech get its financing - and how did P-Tech become such an influential provider of software to departments and
agencies of the United States government?
A senior consultant to J PMorganChase and Risk, Indira Singh was tasked in April 2002 with developing a next-generation, operational, risk blueprint that "would proactively
identify exposures, including money laundering, rogue trading, and illicit financing patterns."8 Indira reached out to the top people in her profession for recommendations on
software companies that could assist her on the project. The responses Indira got were unanimous. P-Tech, a software company based in Quincy, Massachusetts, would fit the job
Indira was told.
Indira invited representatives from P-Tech to pay a visit to her firm for a demonstration of the companys software. When they arrived alarmbells immediately started to go off in
Indiras head. P-Tech hadnt brought the software to the demonstration, but assured Indira that they could develop the software on the laptop they had brought with them. All they
needed to do was hook onto the Internet at the workstation Indira had prepared for the demonstration. This is a serious breach of standard operating procedurein the software
business, for at the end of the day, according to Indira, "hes walking out the door and I dont have anything and hes walking away with pretty much enough of how were thinking
about doing operational risk. Operational Risk is about how to spot bad things that are going on in a financial institution, things like rogue trading, money laundering, and so on and
so forth."9
With the P-Tech representatives still on site, Indira excused herself and called several colleagues who had initially recommended P-Tech to her. When she informed one individual
that P-Tech was on site, the individual asked why she brought themto her work place. The individual advised Indira to watch themclosely. These responses were not what Indira
expected, especially from individuals who had recommended P-Tech to her. And so started an eight month odyssey where Indira learned from P-Tech employees and FBI agents
that P-Tech was a "cutout", "a fronta regular CIA front"10 Indira also learned that P-Techs main financing came from Yassin Al-Kadi, a Saudi businessman, according to
J eff Goins, Vice President of Sales for P-Tech. With this information, Indira went online and discovered that Yassin Kadi had been placed on the FBI terror list in October, 2001.11
On J une 28, 2002 Indira Singh was fired from J PMorganChase because she refused to stop investigating P-Tech and warning other businesses and clients of P-Techs terrorist
linked financing. On December 5, 2002 U.S. Customs, FBI, IRS, Secret Service, INS and the Massachusetts StatePolice raided the Ouincy, Massachusetts offices of P-Tech.12 The
raid, however, was a fraud. The only reason P-Tech was raided was due to the incessant and embarrassing questions Indira was asking about the company and its terrorist linked
financing. After the raid P-Tech changed its name to Go Agile, and the FBI investigation fizzled out.
One can now begin to appreciate the reason for the media blackout on the Entwistle case. P-Tech was a "protected" company used by elements within the United States intelligence
community. P-Techs software allowed the United States intelligence community to manipulate computer networks, such as placing phantom radar contacts on FAA radar monitors
during the 9/11 attacks. J ust the type of work Entwistle was involved with according to the latest from Wayne Madsen:
" Madsen] has recently learned from knowledgeable U.S. Intelligence Community sources that Entwistle's contract for P-Tech involved "wiring backdoors" into the computer
systems of the FAA, NORAD, Pentagon, and White House to bring about the operational collapse of the computer systems during the morning of 9/11."13
So did Neil Entwistle kill his wife? The forensic evidence supports what Neil Entwistle and defense council maintained at the trial, that Rachel Entwistle murdered her nine-month
old child and then killed herself. The police found no gunshot residue in Neils car,15 but did find gunshot residue on Rachels hands.16
So why did Neil Entwistle flee to England? If he was innocent, certainly fleeing the country is a good indicator that he was guilty, one might conclude. Fleeing the scene of a crime,
or the country where the crime was committed, is not proof of guilt. For instance, an innocent individual who witnessed a murder but didnt know the murder victim, or an innocent
individual that witnessed a murder and did know the victim, but knows that the authorities would have no reason to believe he/she witnessed the murder, flee such crime scenes all
the time, and usually do so because the witness doesnt want to be wrongly implicated in the crime. Running in this instance, however, would present more problems for Neil
Entwistle than remaining to face the authorities questions. Since Neil Entwistle was the husband and father of the victims, thereis every reason for the authorities to suspect that he
was the murderer, and thereforetherewould be no good reason for him to run if he didnt want to compound the authorities suspicions.
Unless.
Unless you worked for a terrorist funded software company that sabotaged the United States defense computer network on September 11, 2001, thereby resulting in the deaths of
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
3,000 individuals. With such knowledge, and now with the spotlight thrown on you thanks to your wifes suicide and the murder of your baby, you might get the feeling that
someone out theremay try to silence you, not necessarily because they think you will give something away, but because you might give something away. One can understand how
Neil Entwistle would feel safer in England.
Ironically enough the dearth of media attention in the Neil Entwistle case may afford him better prospects in a new trial. If Neil Entwistle does get a new trial, let it not take place
in Middlesex. Emotions thereare just too high to afford Neil Entwistle a fair and impartial hearing.
One final note. What of the adult websites Neil Entwistle visited days before the deaths of Rachel and Lillian?17 Well, before you jump to conclusions, could Neil Entwistle have
been encoding those sites for the FBI ? You find that difficult to believe? Then why didnt the prosecution present the witnesses that Neil Entwistle had extramarital relationships
with? Those witnesses would have been quiteeasy to find. The reason no such witnesses were presented by the prosecution is because Neil Entwistle wasnt trolling those websites
for personnel reasons. He was literally on the job when he was in those adult websites!


Zawahiri_Negroponte Letter top
PROGRESSIVE REFERENCE CONSERVATIVE*
Dailykos "Zawahiri Letter to Zarqawi: A Shiite
Forgery? The Arabic text of the recently released
letter alleged to be by Zawahiri (al-Qaeda's number
two man) to Abu Musab al-Zarqawi in Iraq raises
questions for me as to its authenticity. The very first
element of the letter is the blessing on the Prophet. It
says: al-salah wa al-salam `ala rasuli'llahi wa a-lihi
wa suhubihi . . . (peaceand blessings be upon the
Messenger of God and his family and his companions .
. .) the phrase"salla Allahu `alayhi wa alihi wa
sallam" (the blessings and peace of God be upon him
and his family) is a Shiite form of the salutation,
because of the emphasis of the Shiites on the House or
descendants of the Prophet. Because of the cultural
influence of Shiism in South Asia, one does find that
form of the salutation in Pakistan and India among
Sunni Muslims."
J uan Cole search Zawahiri hoax letter, Negroponte
Washington Post "The 6,000-word letter from Osama
bin Laden's chief lieutenant, Ayman Zawahiri, to Iraqi
insurgent leader Abu Musab Zarqawi amounts to a
detailed portrait of al Qaeda's long-termgoals in Iraq
and the Middle East, and includes a striking critique of
how Zarqawi has gone about waging his war against
not only U.S. troops but also Iraqi civilians. The letter
was posted yesterday on the Web site of Director of
National Intelligence J ohn D. Negroponte --
http://www.dni.gov/ -- after senior intelligence
officials released excerpts of it last week."
CNN Zarqawi says the letter is a fake
GOPUSA Zawhiri Letter Draws Increasing Skepticism
Office of the Director of National Intelligence,
Negroponte Zawahiri, Zarqawi hoax letter, copy
"Among the letter's highlights are discussions
indicating: & The centrality of the war in Iraq for the
global jihad. & From al Qa'ida's point of view, the
war does not end with an American departure. & An
acknowledgment of the appeal of democracy to the
Iraqis. & The strategic vision of inevitable conflict,
with a tacit recognition of current political dynamics in
Iraq; with a call by al-Zawahiri for political action
equal to military action. & The need to maintain
popular support at least until jihadist rule has been
established. & Admission that more than half the
struggle is taking place "in the battlefield of the
media."

....
Al-CIA-duh
Al-CIA-duh: Is Patrick Fitzgerald a Zealous "Independent" Prosecutor or Experienced Cover-up Artist? Tuesday, October 25, 2005 - 03:22 AM, - Posted by valis (7751 Reads) SOURCE
W/LINKS: http://valis.cjb.cc/index.php?name=News&file=article&sid=100
"Coincidentally, the U.S. Attorney for Chicago, Patrick Fitzgerald, on the job for only a couple of weeks, had extensive experience as a terrorismprosecutor and immediately became
involved in the investigation of BIF Benevolence International Foundation] and GRF Global Relief Foundation]"
#National Commission on Terrorist Attacks Upon the United States Terrorist Financing Staff Monograph Chapter 6 - The Illinois Charities Case Study PDF | HTML]
And "Fitzgerald immersed himself in the case and took a major role"? Well, this was quitea "coincidence." In this post Re: FRANK RICH: It's Bush-Cheney, Not Rove-Libby!!!!, I
explained that Fitzgerald also was part of the prosecution team in the Omar Abdel Rahman case. J ust to recap this, the prosecutors in the Rahman case didn't want their case thrown out on
"national security" grounds, so they were careful to totally leave the CIA out of the picture. The leading prosecutor even claimed that when they discovered this "mujahideen" paramilitary
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
training by Rahman's followers, "the FBIs concern was that the group could be violating federal 'neutrality' laws." Of course, everybody knows that the US was not "neutral" in the Afghan
war, and US officials publicly eulogized the "mujahideen" as "freedomfighters." I think that Fitzgerald's role in the Rahman case indicates that the Valerie Plame case will remain as matter
of "Rove-Libby," and not "Bush-Cheney."
After examining Fitzgerald's role in the GRF & BIF cases, I ameven more convinced that this Valerie Plame case will not reach the "Bush-Cheney" level. J ust look at the outcome of the
BIF & GRF cases. As soon as the investigations reached those close to higherups in Washington, the prosecutors seemed to spend more time on a coverup, than on pursuing a bona fide
investigation. Then attorney general Ashcroft kept a tight rein on the BIF-Arnaout case. "The case fell apart and Arnaout was convicted only of fraud." The terrorismcharges were dropped
and the DOJ reached this plea deal with Arnaout. It doesn't look like the feds ever even intended to bring a criminal case against the Haddad or the GRF. The plan seemed to be to lock him
up until they got him out of the country.
"The decision to deport him rather than continue the criminal investigation was made in Washington, without consultation with the Detroit case agent who had investigated Haddad"? I think
that the feds opted to skip a public trial and to get Haddad deported because Haddad had worked directly with the Bin Laden, Azzam, & MAK. With Arnaout, he did work for MAK, but
therewas more distance between him & the hierarchy of the MAK. GRF co-founder "Rabih Haddad had worked for years for bin Ladens and Azzam's] Makhtab al-Khidamat, which
supported the tens of thousands of Arabs who rushed to Afghanistan to join the anti-Soviet resistance in the 1980s." A GRF attorney said "The United States also supported that organization
Makhtab al-Khidamat] then." This is true. A BIF attorney also correctly stated that "Mr. Arnaout's activities in war-torn regions like Afghanistan in the 1980's and Bosnia in the 1990's came
on behalf of many of the same rebel fighters the United States was backing then." I think this is the main reason why Fitzgerald came to have such a "major role" in these cases. He had
already proved himself in the Rahman case, as someone who knew when to limit the scope of these inquiries. Quite frankly, if he didn't have this reputation, I think that the Bush
administration would have found a way to get him off the Valerie Plame case.
It came out in the Kifah Waed J ayyousi case that Rahman's followers had "a network across North America to fund-raise for and recruit mujahedeen to train and fight in various areas
including but not limited to Bosnia, Kosovo, Chechnya, and Somalia." J ayyousi "was transferring money intended for Chechen militants through the Global Relief Foundation." Fitzgerald
would have been well aware of a connection between the GRF and the followers of Sheikh Omar Abdel Rahman through Alkifah and Wadih El Hage:
"At the beginning of the Afghan war against the Soviet Union, El Hage left Louisiana and traveled to Pakistan to enroll in mujahedeen war training programs. Thousands of young Arab men
from around the world flocked to Pakistan to help the Afghans expel the Soviets. Sources told FRONTLINE that El Hage was a follower of Sheik Abdullah Azzam, one of the most
important spiritual leaders of the Arab mujahedeen forces. Azzampreached that the war in Afghanistan was a jihad, or holy war, and that those who participated would have a special place
in heaven...
In early 1991, according to El Hage's grand jury testimony, he was called to New York to help direct the Alkifah Refugee Center, a Brooklyn-based group that raised money to support
veterans of the Afghan war. According to documents from the World Trade Center case, Alkifah had a Tucson office and contacts with the main mosque in Arlington, Texas, and family
members confirmed that El Hage had been in contact with the group." "
Azzamwas also involved with Brooklyn's Alkifah group. During the CIAs J ihad, to the US intelligence community, "Azzam was considered a prime asset because of his close
connections to the Muslim Brotherhood, Saudi intelligence, and the Muslim World League." Note that Rahman himself had received four visas from "CIA agents acting as consular officers
at American embassies in Khartoumand Cairo." Alkifah in Brooklyn became the de facto headquarters of Rahman. This was the springboard for building up this "string of jihad offices
that had been set up across America with the help of Saudi and American intelligence. This network didn't dry up after the Cold War ended. It came out in Rahman's trial that his followers
were receiving funds from the Saudi embassy in Washington to recruit for Bosnia. See: Al Qaeda Recruited U.S. Servicemen: Testimony Links Plot To Saudi Gov't. Alkifah followed suit:
ARAB VETERANS OF AFGHANISTAN WAR LEAD NEW ISLAMIC HOLY WAR
Oct. 1994] "The Al-Kifah, or Struggle, Refugee Center in New York, which used to recruit and raise funds for Mujahedeen headed for Afghanistan, last year announced it was switching its
operations to Bosnia. It was established in the mid-1980s by Egyptian Mustafa Rahman as a joint venturewith Sheikh Omar Abdel-Rahman, spiritual leader of Gamaat al-Islamiya."
If the FBI wanted to know what the GRF & BIF were doing and where the money was going, they didn't have to rely on what they found in trash bins. The GRF & BIF didn't exactly keep
their agenda a secret. It was known for years that these "charities" did a lot more just than feed starving kids. This List of Muslim Relief Organizations was published by the Muslim Students
Association of the USA and Canadain the 1990's. The BIF & GRF are listed:
Benevolence International Foundation PO Box 548, Worth, IL 60482 USA Tel. 708-233-0062 Fax. 708-233-0069 Email: bif@benevolence.org URL: www.benevolence.org Focus:
Benevolence International Foundation (BIF) is a humanitarian organization dedicated to helping those afflicted by wars. BIF first provides short-termrelief such as emergency food
distribution, and then moves on to long termprojects providing education and self-sufficiency to the children, widowed, refugees, injured and staff of vital governmental institutions. Current
list of projects include running refugeecamps, hospitals and clinics, sponsoring orphans, operating vocational and computer centers, and conducting seasonal projects. Established in 1987,
BIF is currently conducting projects in five countries including Azerbaijan, Bosnia, Chechnya, Daghestan, and Tajikistan. BIF is incorporated in the state of Illinois, USA as a non-profit,
humanitarian organization and coordinates its efforts through an office in Chicago. BIF is solely supported by private donations and does not receive any governmental assistance. Entry
updated: Apr 1999. .......
Global Relief Foundation PO Box 1406, Bridgeview, IL 60455 Phone: 1-888-256-2532 (1-888-ALNAJ DA) Phone: 708-233-1473 Fax: 708-233-1474 Email: talk2grf@aol.comEmail:
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
info@grf.org URL: www.grf.org US Tax ID#: 36-3804626 Focus: Chechnya, Kosova (Kosovo) and other places. You can ask for a documentary illustrating the genocidein Kosovo. You
can use this documentary to create awareness and raise funding for Kosvo. You can order English/Arabic. Entry updated: Dec 1999."
In 1992, the GHW Bush administration decided that Izetbegovic was their man to lead the Bosnia "jihad." Warren Zimmerman, U.S. Ambassador in Belgrade"persuade d] Izetbegovic to
renege on the Lisbon peace] agreement, promising him all political, diplomatic and military aid if he agreed to do so." The GHW Bush & Clinton administrations "pulled the strings from the
background, encouraging the world-wide Moslemagitation in favor of Izetbegovic." Many of these "strings" were in the Bin Laden network. As to Kosovo, Kosovo Liberation Army (KLA)
training camps in Albania were "run by Osama bin Laden, and various other foreign mujahedeen" and also by the "CIA and British intelligence." And "the CIA seems to have provided
monetary support." There was a civil war in Kosovo with atrocities on all sides, but therewas no "genocide." Kosovo - the site of a genocidethat never was. In other words, after the Cold
War, the CIA & the Pentagon continued to use this same network of "charities," like the BIF & GRF, to serve US strategic aims.
Batterjeewas "affiliated with a group of wealthy donors from the Persian Gulf region known as the 'Golden Chain'"? This Golden Chain was a huge Pandora's box, which shows that the
BCCI never was really shut down. J ust some of the names of the fronts changed. After Fitzgerald took on a leading role in the BIF investigation, the feds made a plea deal with Arnaout,
dropping the terrorismcharges and ending any further investigation of the case. Now the last time I looked, Bin Laden's Al Qaeda was officially called a "terrorist organization." So therewas
no lack of evidence. The evidence just led to directions where the higherups in Washington didn't want to go. How many references do you see to the Muslim World League MWL], the
Binladens, Bin Mahfouz, & Abdullah TahaBakhish on this Golden Chain? According to the DOJ 's own documents in the Arnaout case, this is "a list of people referred to within Al Qaida as
the 'Golden Chain,' wealthy donors to mujahideen efforts." This was found in a file called "Osama's history" in the BIF office in Bosnia. The CIA had used the BCCI to channel the funds "to
CIA client Osama bin Laden, part of the $2 billion Washington sent to the Afghani mujahideen." Bill Clinton's old pal in Arkansas, J ackson Stephens, arranged a BCCI "bailout" for George
W. Bush's Harken. "A board seat was given to Harken shareholder Sheikh Abdullah TahaBakhsh, whose chief banker was BCCI shareholder Bin Mahfouz." You may also remember
J ackson Stephens and the Riadys from the Clinton "China-gate" scandal. In 1984, Mochtar Riady bought "a stake in the Worthen holding company whose assets include the Stephens-
controlled Worthen Bank....Other Worthen co-owners will eventually include BCCI investor Abdullah TahaBakhish." J ackson Stephen had bankrolled both Republican and Democratic
campaigns.
It is also clear from this 9-11 Commission's staff report account that the CIA was working with the FBI on both the BIF & GRF cases prior to 9-11 and the Patriot Act. Apologists for the
Patriot Act claimthat this was needed to authorize communications and "intelligencesharing" between the FBI and CIA or other intelligence agencies. Of course, since the BIF & GRF
involved the protection of former and current CIA "assets," the "CIA held back some information" in dealing with the FBI. Also one way to kill an investigation is to make inflated claims,
which if disproved, can bring down the entire case. I think that the WMD in these "charity" cases was really a stretch, and I think that when the investigation was diverted into this direction,
that it was headed for a deadend. Also this could have served as a rationale for Haddad's deportation. Unproven weapons claimled to Islamic charity raid in '01
"This plan went awry when word of the impending action apparently leaked to GRF. FBI personnel learned that some of the targets of the investigations may be destroying documents"?
There is some question as to J udith Miller's involvement in "alerting" the GRF of action to freeze their assets. We do know that J udith Miller had connections to the Pentagon & other top
Bush officials and that she did play a role in the disinformation about Saddam's WMD. Last year, Chicago U.S. Attorney Patrick J . Fitzgerald "informed the New York] Times by letter...that
his office has subpoenaed telephone company records" of reporters Philip Shenon and J udith Miller. "The move is part of an effort to determinewhether anyone in the government told
Times reporters of planned federal asset seizures in December 2001" at the GRF's office. "The FBI believes that a call from a reporter to a representativeof the charity, the Illinois-based
Global Relief Foundation, may have led to the destruction of documents therethe night before the government's raid, according to findings by the Sept. 11 commission." It is possible that
Shenon & Miller were the channel for this "alert" to the GRF. However, this "alert" could have come from a number of sources through channels in the US "intelligencecommunity," in ways
that could not be traced back to the source. There is also a question of exactly how much damage that this destruction of evidence may have done to the prosecutors' case. It is very unlikely
that therewas ever any serious intent to prosecute Haddad or anyone else in the GRF. The Bush administration certainly seemed in a rush to get him out of the country, and this plan was
brought to fruition after "Fitzgerald immersed himself in the case and took a major role."
By BlackJ ade

Zawahiri 'Letter' Draws Increasing Skepticism By Sherrie Gossett CNSNews.com Staff Writer http://www.gopusa.com/news/2005/october/1018_zawahiri_letter2.shtml October 18, 2005
file
(CNSNews.com) -- A letter purportedly written by a senior al Qaeda leader -- and said to be authentic by U.S. intelligence officials who released it last week -- may be a forgery, according
to Washington analysts who cite numerous anomalies in the text. Some analysts have gone so far as to label the letter a likely U.S. government "influence operation," which, if exposed,
threatens American credibility in the Middle East. "If this is a forgery, then either it was designed to blow up in the face of the American government; or someone in the 'coalition of the
willing' has been caught with their pants down," said one analyst, who spoke with Cybercast News Serviceon the condition of anonymity. The 6,000-word letter was dated J uly 9 and
released Oct. 11 by the U.S. Office of the Director of National Intelligence. Intelligence officials said the letter, purportedly penned by Osama bin Laden's chief deputy Ayman al-Zawahiri
and addressed to Iraqi terror mastermind Abu Musab al-Zarqawi, was intercepted in a counter-terrorismoperation in Iraq. Stephen Ulph, from the foreign policy think tank, The J amestown
Foundation, noted that despite the confidence U.S. officials expressed in the letter's authenticity -- namely that it had been verified by "multiple sources over an extended period of time" --
therewas little in the way of independent corroboration offered. The anonymous sourceremarked that the U.S. "apparently found the original letter, suggesting we 'closed the loop' and have
been reading mail of senior al Qaeda for months, yet we appear to not know where al Qaeda leaders] are at." Christopher Brown, research associateat the Hudson Institute's Transitions to
Democracy program, doubts that Zarqawi was even in Iraq at the time the letter was purportedly written to him, an opinion shared by a retired U.S. intelligence operative who spoke recently
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
with Cybercast News Service. In email communications with Cybercast News Servicelast week, Brown also pointed out that Zawahiri uses both Muslim and Christian dates in his letter. The
use of Western dual dates is customarily done only for material designed for western consumption, not for internal communications, he said. The letter, dated J uly 9, also makes no
reference to the J uly 7 London bombings, Brown noted. Zawahiri purportedly mentions in the letter that he has a daughter named "Nawwar," which he explains "means the timid female
gazelle and the woman who is free from suspicion ..." But Brown questioned why Zawahiri would feel the need to explain the meaning of an Arab word to another Arab. Furthermore,
Zawahiri's alleged definition of "Nawwar" as "timid female gazelle" is incorrect, according to translators with Transperfect Translations, a global translation firm. "Nawwar means: blossom,
flower, bright as in illuminated. It also could be a nice female's name, and by extension could be the beginning of the spring season," said the translators. >>Continued -- Page 1 2
Page 2 of 2
The letter notes the effectiveness of Pakistani military operations, yet thereis little evidence to support that idea, Brown said, except for a three- to four-week period in May when Pakistani
anti-terrorist operations were conducted with U.S. assistance. The Zawahiri letter, if genuine, makes no mention of al Qaeda working "within Iranian strategy" in Iraq, Brown said. That
strategy and the accompanying tactics, he added, are serving the terror network's own goals in Iraq as well as those of Iran. " B]y declaring all-out war on the Shi'a, al Qaeda is] driving the
Shi'a population further into the hands of the Iranians, who can provide themwith security through both their own organizations and what I would ventureto say is their either formal or
informal control over al Qaeda," Brown said. "Therefore, the areas that cooperate with the U.S. get hit and the areas that cooperate with Iran become safehavens. This is in addition to their
increasing control over the social services, security organizations and most importantly, the political institutions on both the national and local levels," he added. Aegis Defense Services, a
London-based consultancy, has argued that the letter, addressed to Zarqawi, was actually sent to Abu Musab al-Suri, a Syrian who acted as an intermediary for al Qaeda in Europe during the
1990s and whose whereabout are unknown, according to the Financial Times of London. A Washington Post editorial by David Ignatius cited skepticismvoiced by J uan Cole, professor of
history at the University of Michigan. Cole had contended on his website that the salutation of the letter was Shiite, not Sunni and may have been the work of Iranian operatives. There is
speculation about the potential political fallout, especially for J ohn Negroponte, U.S. director of national intelligence, if the letter is discovered to be propaganda generated by the U.S. The
cabinet-level position that Negroponte holds coordinates all 15 components of the American intelligence community. It was created in response to one of the recommendations of the 9/11
commission. Negroponte serves as the principal intelligence adviser to the president and the statutory intelligence advisor to the National Security Council. "If and when this breaks, the
blowback of this kind of American hand-in-the-cookie jar could severely hurt us in the Middle East, Europe and with an already skeptical American media that would likely declare all-out
war on the administration over this," the Cybercast News Servicesourcerequiring anonymity said. Ulph added that "pending further confirmation of origin, it would be wise to treat the
letter with skepticism." Copyright 1998-2005 CNSNews.com - Cybercast News Service
fair use

Guantanamo, retraction, from APFN email May 16, 2005 - Bill Moyers' speech to the National Conferencefor Media Reform
Call it preventive capitulation. FREEPRESS.NET, Tue May 17 17:57
ATTN: STAFF OF NEWSWEEK: About your retraction.... Eric A. Smith, Tue May 17
http://disc.server.com/Indices/149495.html
Eric A. Smith
ATTN: STAFF OF NEWSWEEK: About your retraction....
Tue May 17, 2005 18:13
http://disc.server.com/discussion.cgi?disc=149495;article=83899;title=APFN
-------- Original Message --------
Subject: About your retraction....
Date: Wed, 18 May 2005 04:38:56 +0900
From: Eric Smith snowdog@juno.ocn.ne.jp
To: constitution@ajc.com
CC: apfn@apfn.org, "t r u t h o u t" messenger@truthout.org,
To Mark Whitaker and the staff of Newsweek:
If you back down from the truth, you'll send a very clear message to the billions worldwide who are really paying attention to what this "Administration" is doing. Incidents
of guards flushing copies of the Quran have been documented on multiple previous occasions by people who were released -- because they were innocent. For example:
(ABC Radio Australia, August 5, 2004) Guantanamo Bay freed ex-prisoners David Hicks and Mamdouh Habib are quoted as saying that "guards would throw detainees'
Korans down the toilet and shave them, to try to get themto abandon their Muslim faith."
(ABC News's J ohn Berman, August 3, 2004) Another British citizen also released from Guantanamo Bay is quoted: "Asif Iqbal says guards would 'kick the Koran, throw it in
the toilet, and generally disrespect it.'"
(Lawsuit, October, 2004) Four Britons wrongly detained by the U.S. repeated the charge in court proceedings.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
(Houston Chronicle, March 2003) 18 released Afghanis said "American soldiers insulted Islamby sitting on the Koran or dumping their sacred text into a toilet."
(Washington Post, March, 2003) "Ehsannullah, 29, said American soldiers who initially questioned him in Kandahar before shipping him to Guantanamo hit him and taunted
him by dumping the Koran in a toilet. 'It was a very bad situation for us,' said Ehsannullah, who comes from the home region of the Taliban leader, Mohammad Omar. 'We
cried so much and shouted,
"Please do not do that to the Holy Koran."
(Seattle Times, J anuary 9, 2005) Captain J ames Yee, quoting Guantanamo Bay former superintendent Command Sgt. Maj. J ohn VanNatta: "Oneof their biggest complaints
was of guards kicking their Qurans, flushing themdown the toilets and disrespecting their religion."
It is very, very frightening to see a major force of journalismso patently buckle under pressure,,, this nudges us one step closer to the precipice of fascism.
sincerely,
Eric A. Smith
Tokyo
=====================
Newsweek must do more about Koran case: White House
ABC News - 4 hours ago
May 17, 2005 WASHINGTON (Reuters) - The White House called on Newsweek magazine on Tuesday to help repair damage to the US image in the Muslim world by
its ...
Newsweek retracts story that killed 16 Australian
StateDept. Tries to Undo Newsweek Damage San Francisco Chronicle
Newsweek Retraction Has Hollow Ring for Some Pakistanis Washington Post
NPR (audio) - Arizona Republic -
'Newsweek' article a traitorous act
Arizona Republic, AZ - 14 hours ago
I amupset and dismayed at the report that Newsweek published an article about the desecration of the Koran by US interrogators. ...
http://www.azcentral.com/arizonarepublic/opinions/articles/0517tuelets172.html
White House: Newsweek Story Did Great Harm
Guardian Unlimited, UK - 21 minutes ago
By TERENCE HUNT. WASHINGTON (AP) - The White House said Tuesday the United States' image abroad had suffered irreparable damage from ...
http://www.guardian.co.uk/worldlatest/story/0,1280,-5012689,00.html
Free Press is a nonpartisan organization working to involvethe public in media policymaking and to craft policies for more democratic media. Learn more
http://www.freepress.net/

Democracy Rising "Congressman Edward J . Markey (D-MA) has taken the lead onworking toward ending tortureby U.S. officials or by "rendition" of suspects to foreigngovernments for torturethere. Hehas introduced, along with 48
colleauges, H.R. 952the TortureOutsourcing Prevention Act FAS Italy kidnappings, torture, U.S. Secret prisons, prisonships, planes, Italy, kidnapping. CBS News Extraordinary Rendition..."the government policy wherein terror suspects
are transferred fromU.S. control into the control of foreigngovernments, so that interrogation methods that are not permitted under U.S. law may be applied to the suspects" International Criminal Court Protection New York Times : Bush:
Iraq War prisoners not entitledto GenevaConvention rules Alternet search, 9/11 Center for DefenseInformation arms trade, children in war, missile defenseinfo Findlaw, War onTerrorismSpecial coverage Global Policy Watching
Zionism, 9/11 News fromRussia Pravda, Israel, search Non Violence USA International Relations and Security Network, Swiss Contribution to the Partnership for Peace Newstrove, Guantanamo Bay World Court, International Court of
J ustice American Center for Law and J ustice search American ConservativeUnionAction Alert lobbyists Anti TerrorismCoalition, Islamis takingover the orld BioPort anthrax vaccinemanufacturer KOLIsrael Danger ZoneJ obs.com
Debka Filesearch National Review search onzionist, 9/11 National Strategy to Secure CyberspaceWhitehouse, Bush, Cheney, 'war onterrorism' Alternet search, Guantanamo Amnesty International, UK Guantanamo Bay, latest news,
releases Center for Constitutional Rights, watching the events of Guantanamo, detainees, SupremeCourt decisions. Center for DefenseInformation arms trade, children in war, missile defenseinfo FAS search National Intelligence estimate
Global Policy WatchingGuantanamo Here-Now, SupremeCourt decision onGuantanamo and related stories. Boston NPR News Source Human Rights Watch News fromRussia Pravda, Israel, search Palast, Greg, UK Guantanamo
search. Discourse.net CIA, Pentagon inquiry Findlaw, War onTerrorismSpecial coverage Guantanamo.comfromWorld News International Relations and Security Network, Swiss Contribution to the Partnership for Peace International
Committee of the Red Cross, why did they wait months to report Iraq prisonabuse. Newstrove, Guantanamo Bay Human Rights First, formerly Lawyers Committee for Human Rights J ustice, Dept of press releases J udicial Watch
World Court, International Court of J ustice American Center for Law and J ustice search American ConservativeUnion Anti TerrorismCoalition, Islamis takingover the world Action Alert help ACU lobby Congress ontheseissues
Council onForeign Relations corporatepower to rural poor Republicans Debka Filesearch Global Security Guantanamo Bay, CampX-Ray. Guantanamo Bay Naval Station official site. Israeli Minister of Foreign Affairs National Review
search onGuantanamo Bay, RichLowry Townhall search Washington Institutefor Near East Policy US Anthrax Vaccination Immunization ProgramArmy cover-up Carlyle Group.net Center for Defense
Information arms trade, children in war, missile defense info Gulf War Vets Anthrax vaccine deaths info IACenter Founded by Ramsey Clark News from Russia Pravda, Israel, search
News Insider search New World Peace FBI incriminated in anthrax mailings NucNews you send articles, news, search BioPort Palestinian Non-Governmental Organization's Network rule
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
of law, social justice, respect for Human Rights, links Vaccination Liberation hoax info, links Vaccination News vaccines, autism, shaken baby syndrome. links What Really Happened
anthrax hoax FDA search UCLA dept of Epidemiology, BioterrismNational CFIDS Foundation Chronic FatigueImmune Dysfunction, ME, Myalgic Encephalopathy Safety Alerts
consumer product safety recall info, news UCLA, Dept of Epidemiology, School of Public Health Agilent Anthrax Vaccine Immunization Program Official U.S. site Battelle Memorial
Institute develops new tech, commercializes products Bayer, has Cipro patent, anthrax. BioMed Central the-Scientist.com, news, BS, Research BioPort anthrax vaccine manufacturer
CIDRAP Center for Infectious Disease Research & Policy FDA search FDA News Drug industry news, daily Gulf War Medical Research Library Harvard, Risk of death, bioterroism, 1 in
56 million Hollister-Stier Labs in partnership with BioPort National Acadamies Press articles on Agent Orange, dioxins, TCDD National Center for Biotechnology Information National
Library of Medicine, NIH NTI Security News PNNL, neural network, protein research, operated by Battelle, with Agilent TEVA Pharma, Cipro, patent, anthrax vaccine
NFU visitors: altaec233.nbcuni.com (Nbc Universal) New York, New York, sc215019.robins.af.mil (78 Cs/scsc), dma-cs-proxy.dm.af.mil (355th Communications
Squadron,pomproxy.monterey.army.mil (Presidio Of Monterey, wdcsun17.usdoj.gov (Us Dept Of J ustice), gao-ng.gao.gov (U.s. General Accounting Office) Maryland, Upper Marlboro, Maryland, Potomac,
cheetah.usafa.hpc.mil (Dod Network Information Center)Ohio, Columbus, wdcsun24.usdoj.gov (Us Dept Of J ustice) Maryland, Potomac, TheWashington Post- KaplanInc) ip68-13-155-193.om.om.cox.net (Cox
Communications Inc) Nebraska, Boys Town pc24-27.apg.army.mil (Headquarters Usaaisc) Maryland, Aberdeen hqvf.centcom.mil (U.s. Central Command (uscentcom)) athena.afrc.af.mil (Hq Afrc/sco) Georgia,
Warner Robins intziabcizn01.iraq.centcom.mil (Dod Network Information Center --NewsFollowUp.com visitor, blv-proxy-05.boeing.com(TheBoeingCompany) Washington, Seattle proxya.scott.af.mil (Air Mobility
Command Comp/systems Squadron) Illinois, Scott
commonfranklingate terms: ak sar ben albert foods alberto gonzalez alisha owen amato andersen, harold aquino, michael army of the night baack dennis baer, max baer, max baird holz zeilinger bi-sexual bobby eberle bonacci
boystownbradford brian burzynski BSCT byrnnerandall call-boy carlton-ritz casseday catholic ciacitron, peter clatty commercial federal savings conagracoos bay lehman copplecornwall craigspence creager credit union crist
david ambrosedavid hinton decamp dick roth discovery channel duke cunninghamdwight harris ed owens eisenstatt erniechambers fbi foggo foley fort bragg foster carereview board frank figueroa franklin advisory board
gannon guckert gannongate gerry falwell gopusa hambright hitler youth hotmilitarystud iran-contrajames dobsonjames duffy james gannon james kelly john queenjohn stevens barry johnny sutton jubilation day carejuliewalters
kay griggs kimbroughking, lawrence labedz libby apprenticelonnielathamlustfull utterances lynch male prostitution mark grossman mcconnell methamphetaminemidnight tour mikejones murray state bank nambla nebraska
nelson, rusty northernnatural gas northwest bell offutt ogen, utah omahaomahanational bank orr case pagegatepedophigatepoindexter presidio probeensnares protestant ratzinger reagon, ronald rendition rick perry R-lynn robert
kirchner robert spire rove, karl samuel vanpelt sarkozy paedophiliasatanismschoedinger scott mcclellansecret service shawn vassel sodomy southern baptist convention stephen cambone stitt strategic air command talonnews
tarpley temple of set texas youth commission the colonel the fellowship thomas reynolds thompson, hunter tomdelay tongsun park trippschweer union pacific railroad urbom wadman, robert washington times weber state
university west texas state school westin crowncenter hotel williamboykin williams energy world heraldworld vision yorkshiretelevisionyosef sagiv franklin cover-upmcateer libby book apprenticehomoeroticism, bestiality and
incestuous themes, with an unspeakably gross passage where a ten-year-old girl is abused. Caged, and forced to havesex with bears, to become a prostitute, search terms: a scene of incest between two uncles and their niece;
fukk a freshly killed deer, prepubescent girl's painted 'mound', lack of vaginal odor ronald roskens kent state 1970cfr usaid chancellor uno board of regents caradori homosexual orgies ed mccateer leola mcconnell roundtable
falwell bisexual lustfull utterances tennessee knoxvillevictor ashekitty kelly las vegas mayor tang yalebulldog lips sodomitenevada governor ...DeborahJ eane Palfrey, Pamela Martin & Associates, legal escort service, Tobias,
Brandy Britton, 07-046-GK, CatherineConnelly, racketeering, Ulman, Dick Morris, adult fantasy, Miz J ulia, prostitution, pimping, Montgomery Blair Sibley, ABC, Disney, AkinGumpStrauss Hauer Feld LLP, Eli Lilly, Quale,
NASA, Kessler, Shirlington limousine, poker parties, Watergate, Westin Grand, hookergate whoregate, D. C. madam, Duke-stir, Langley, Letterman about Cheney ""I can't believea good-looking guy likethat wouldever haveto
pay for sex, youknow what I'msaying?" .... Thomas DiBiagio, J onathan Luna, Ed Norris, Governor Ehrlich, Watergate, Westin Grand, J ames Comey, Ashcroft, ABC producers Rhonda Schwartz, J ustin Rood, defense
contractors, AIPAC, World Bank, IMF, Halliburton, smokinggun, Wells Fargo Bank, Troy Burrus, J ohnStendrinni, Wilkes / Michael indictment. WarrenBuffett, Cardinal law, Senator Larry Craig, Idaho, plainclothes officer, lewd
behavior, airport men's room, tapped foot, anti same-sex marriagevotes, homophobia, anti-gay rights, Romney campaign, Offutt, Barney Frank
follow up, the act of followingup. 2. an action or thing that serves to increasethe effectiveness of a previous one, as a second or subsequent letter, phone call, or visit. 3. Also calledfollow. J ournalism. a. a news story providing
additional information ona story or articlepreviously published. b. Also calledsidebar, supplementary story. a minor news story used to supplement a related story of major importance. Comparefeaturestory (def. 1), human-interest story,
shirttail. adjective 4. designed or serving to follow up, esp. to increasethe effectiveness of a previous action: a follow-upinterview; a follow-upoffer. 5. of or pertaining to action that follows an initial treatment, course of study, etc.:
follow-upcarefor mental patients; a follow-upsurvey. follow verb (used with object) 1. to comeafter in sequence, order of time, etc.: Thespeech follows the dinner. 2. to go or comeafter; move behind in the samedirection: Drive
ahead, and I'll follow you. 3. to accept as a guide or leader; accept the authority of or give allegianceto: Many Germans followed Hitler. 4. to conformto, comply with, or act in accordancewith; obey: to follow orders; to follow advice. 5.
to imitateor copy; use as an exemplar: They follow the latest fads. 6. to move forward along (aroad, path, etc.): Follow this road for a mile. 7. to comeafter as a result or consequence; result from: Reprisals often follow victory. 8. to go
after or along with (aperson) as companion. 9. to go in pursuit of: to follow an enemy. 10. to try for or attain to: to follow an ideal. 11. to engage in or be concerned with as a pursuit: Hefollowed the seaas his truecalling. 12. to watch
the movements, progress, or course of: to follow a bird in flight. 13. to watchthe development of or keepupwith: to follow the news. 14. to keepupwith and understand(an argument, story, etc.): Do youfollow me? verb (used without
object) 15. to comenext after something elsein sequence, order of time, etc. 16. to happenor occur after something else; comenext as an event: After the defeat great disorder followed. 17. to attend or serve. 18. to go or comeafter a
person or thing in motion. 19. to result as an effect; occur as a consequence: It follows then that he must be innocent. noun20. the act of following. 21. Billiards, Pool. follow shot (def. 2). 22. follow-up(def. 3). Verbphrases23. follow
out, to carry to a conclusion; execute: They followed out their orders to the letter. 24. follow through, a. to carry out fully, as a stroke of a club in golf, a racket in tennis, etc. b. to continue an effort, plan, proposal, policy, etc., to its
completion. 25. follow up, a. to pursueclosely and tenaciously. b. to increasethe effectiveness of by further action or repetition. c. to pursueto a solution or conclusion. Idiom26. follow suit. suit (def. 13). followable, adjective
Synonyms 3. obey. 4. heed, observe. 8. accompany, attend. 9. pursue, chase; trail, track, trace. 19. arise, proceed. Follow, ensue, result, succeed imply comingafter something else, in a natural sequence. Follow is the general word: We
must wait to seewhat follows. A detailed account follows. Ensue implies a logical sequence, what might be expected normally to comeafter a given act, cause, etc.: Whenthe power lines were cut, a paralysis of transportation ensued.
Result emphasizes the connectionbetween a cause or event and its effect, consequence, or outcome: Theaccident resulted in injuries to those involved. Succeed implies comingafter in time, particularly cominginto a title, office, etc.:
Formerly the oldest sonsucceeded to his father's title. Antonyms 1. precede. 2, 3. lead. 4. disregard. 9. flee. news follow up

List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]

PROGRESSIVE REFERENCE
CONSERVATIVE 1%*
ACLU safe and free
Senator Daniel Akaka(D-Hawaii). Choicepoint and
Acxiomcompanies are data aggregators. Nuala
O'Connor Kelly is head of privacy for Dept of
Homeland Security.
Alternet, Patriot II, details, search, government
surveillance, spying
Center for Democracy and Technology, domestic
spying watch
Center for a Legitimate Government
Commercial Alert, protecting children from corporate
predation
Cryptorights.org human rights for security workers.
SF
Disinfo New SurveillanceCamera Can Search 36
Million Faces For Matches Per Second
Dissenter / FireDogLake Federal J udges Injunction
Finds NDAA Is WorseThan Material Support Law
Echelon Watch discuss civil liberty threats
Electronic Privacy Information Center lawsuits, FBI,
FOI
Electronic Frontier Foundation working to protect
civil and free speech
EFF Is Your Printer Spying on YOu
EFF List of Printers Which Do or Do Not Display
Tracking Dots, search terms: yellow tracking dots,
printer models, output, Machine Identification Code
Technology Project, forensic watermarking, dithering
technique, blue light, microscope, Brother, Canon,
Dell, Epson, Hewlett-Packard, Fuji, Xerox, IBM,
Konica / Minolta, Kyocera, Lanier, Lexmark,
Okidata, Panasonic, Ricoh, Savin, Samsung,
Tektronix, Toshiba, color laser printers.
Buy Wayne Madsen's book
Overthrow a Fascist Regime on $15 a Day.
Epic Electronic Privacy Information Center
F-Secure, info on CD rootkits
Eyeballing TIA
Freedom Scorecard, ACLU
Futureof Freedom First Amendment Rights
3-eye imagery consultants, info
BBC George W Bush personally stopped an inquiry
into a controversial programmeto monitor the phone
calls and e-mails of Americans, a top official has said.
Attorney General Alberto Gonzales said internal
investigators wanted to look at the role justice
department lawyers had played in drafting the
programme
Thought Crime legislation: hr1955.info
CERT Coordination Center net security, info, response
Cnet Tech News First, search Carnivore
CICenter Counterintelligence, NGO, UK
CNN, Technology
Earthdata sea
Earthdata International satellite images company
FAS Project on Government Security
Freedom of Information Act
Global Security Foundation Intelligence Resource
History of the Internet
J urist University of Pittsburg, School of Law, Primary
sources. Global perspective
LawFare
Legal News Search search
LexisNexis online legal, news and business info
services
LexisOne The Resource for Small Law Firms.
Mountbatten Centre for International Studies
National Clearinghouse for Alcohol and Drug
Information NCADI, info on alcohol, tobacco, and
illicit drugs
National Cyber Security Alliance se
National Security Archive George Washington U. govt
security research, FOI
Newsbits technews
Open Society Institute Internet policy, independent
media, human rights
OS News Operating system news
PrivacyDigest privacy news
Privacy Marketing News UK, into privacy and
relationship marketing.
Privacy & Security Law Report BNA
Project on Government Oversight exposing corruption,
exploring solutions
Salaam.co.uk Big Brother in Britain,
national id cards, high cost and hype.
SearchSecurity news, consulting
Security Focus News Microsoft
Scientific Working Group on Friction Ridge Analysis
fingerprinting, forensic id.
video
Ron Paul names neocons video
----------------------
Albright College, Patriot Act
Arlington Institute, J ohn Peterson, Dave Snowden,
ASP Solutions, internet monitoring and surveillance,
Basis Technology, Asian, Middle East, EU
intelligence gathering from unstructured text,
Booz Allen Hamilton, major intelligence contractor,
first fruit, monitor journalists,
BrightPlanet, search Sioux Falls, data mining, works
with Lockheed Martin, Factiva,
Carnivore, Cato also known as DCS1000, Etherpeek
Chartered Institute of Marketing, UK, info resource
for marketing / sales. Service, News.
FEMA
Concentration Camp, Beech Grove,
Indiana YouTube
enlarge for full map or
go to Google map and enter: Emerson Ave,
Beech Grove, Indiana
CAMERA AP Israeli spying story an Urban Myth
according to J ustice Department
CIA Central Intelligence Agency
Cognitive Edge, Singapore, RAHS, data mining,
medical info, raw surveillance data mining.
Convera, video, image, audio search, multiple
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Global Issues.org
Google-Watch Google search engine is spyware
High Tech Billboards domestic surveillance
Human Rights Watch briefing paper on MCIS
Internet Democracy Project enhance open
participation, public accountability and hr of internet
KeepAmericaFree Yes, Pres. Obama, The NDAA
DOES AuthorizeWarrantless, No Due Process,
Indefinite Military Detention by the Military of
American Civilians
MediaFilter covert action quarterly
MediaRoots the Clark County Republican Party
Central Committee of Nevada unanimously called for
its appeal while legislators in Michigan are currently
considering a bill that could virtually revoke the
federal law in that state.
NoNAIS.comProtect Traditional Rights to Farm, stop
RFID privicacy intrusion by Bush corporate America.
OpManning Free Bradley Manning
Privacy International Human rights group, watchdog
on surveillance by govt/biz
Privacy
PrivacyToday news
Refuse & Resist the deviceformerly known as
Carnivore,
Salon Israeli art students, DEA, Amdocs searchable
file
Smirking Chimp Suspicious Activities Involving
Israeli Art Students at DEA Facilities by DEA
Southwest Research and Information Center Energy,
Environment research analysis.
Total Information Awareness Resource Center
VeritasVirtualVengeance Righteous Negative
Publicity and Black PR: Exposing the terrible truths
to take down corrupt corporations. Surveillance
White Dot find out how to free yourself from
television.
notes: Wayne Madsen Report ... cell phone "The
"echoing" is not limited to particular cell phone
service providers or cell phone types. Customers of
AT&T, Verizon, and T-Mobile are reporting the same
problem with phones from Nokia, Samsung, Nokia,
Motorola, and Ericsson. ... Technicians report that
echos occur when thereis not a complete connection
or if thereis a third party connection on the call.
While echoing has been a minor problem in the past,
the frequency of complaints is increasing and
affecting journalists and political activists from
Washington, DC to New York City and California to
Texas. ... Government agencies are already able to
remotely activate a cell phone and use the microphone
to listen in on conversations. The only way to prevent
this surveillance is to agree to "batteries out"
Slashdot
TechLawJ ournal news, analysis of legislation, litigation,
regulation IT
Vera Institute of J ustice prisoner rights, justicesystem
innovation, links
Wikipedia NSA National Security Agency, warrantless
wiretapping, administrative subpoena, National Security
letter.
Wired Magazine, search Poindexter, TIA, Total
Information Awareness, IAO,
WMR Army spying on soldiers' blogs
according to leaked Army regulation During a time
when the morale of US Army personnel is at an all-
time low from a protracted war in Iraq and a de facto
draft in the guise of a stop-loss program that keeps
soldiers on active duty after their commitments expire,
the Army is also spying on the personal blogs of its
personnel. This surveillance program has been revealed
in a leaked Army Regulation on Operations Security
(AR-580-1). ... The regulation was issued almost a year
ago, on April 19, 2007. It prohibits the publication of
"critical or sensitive" information, a wide-open caveat
that could include anything not deemed to be
"classified" national security information. The
regulation also covers information that has already been
disclosed, or "compromised" as stated in the regulation.
Yahoo, Spyware new
ZDNet, UK news
languages,
Cybersecurity Enhancement Act
DARPA Defense Advanced Research Projects
Agency
Dept of Homeland Security domestic spying
EZPass, E-Z Pass, E-ZPass, E-Z Pass, who really has
access to this information?
Factiva, Dow J ones company, gathers open source
news,
ECHELON, US, Australia, New Zealand, UK, see
Israel,
Federal Bureau Of Investigation
FBI, Carnivore, Diagnostic Tool FBI
FreeRepublic.comNews by keyword
Global Security.org
CBS News FB
Government Executive, Poindexter... Whitehouse
support.
Klinx, deep web content,
Infragard FBI
Institute for Intergovernmental Research serving law
enforcement, justicecommunity
Lockheed Martin US personal database, defense
contractor, Bush
Microsoft, Security Bulletins: Microsoft
Microsoft
National Intelligence Council CIA
National Communications System, US Threat
Advisory
National Consumers Coalition info on 'big brother',
national ID card, govt spycams, supports global
warming.org
National Infrastructure Protection Center net threat
assessment, warning, response, US
National Strategy to Secure Cyberspace Whitehouse,
Bush, Cheney, 'war on terrorism'
New York Times NSA executive order authorizing
data mining of phone calls and file.
Office of Total Information Awareness
Patriot Act compliancesoftware, Attus Tech
Phoenix Global Intelligence Systems, globalization
technologists, unrestrained by nationality,
Presearch, Inc. mass data surveillance
PrivacyExchangeprivacy protection resource,
sponsored by Equifax, AE, Guardent, systran etc...
Risk Assessment and Horizon Scanning (RAHS)
Saffron Technology, Inc. mass data surveillance,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
conversations, something that is employed more and
more among journalists while talking to sources as
well as others concerned about high-tech snooping
from "roving bugs." Similarly, removing the battery
from a cell phone also disables the Global Positioning
System and cell tower triangulation capabilities used
by law enforcement and intelligence agencies to track
the location of the user, according to U.S. intelligence
sources."

Securius.com defending cyberspace security
Seisint Inc MATRIX database, controlling company.
SYNTEC, Inc, Poindexter, Senior Vice President,
mass data surveillance,
Technology Transfer Information Center TTIC
Terrorists Threat Integration Center, TTIC
U.S. Departmant of State, Consular Affairs US-
VISIT, info
Virage Inc Video analysis and contact extraction. Part
of the Autonomy Group
Wikipedia The Disruptive Technology Office (DTO) is a funding agency within theUnited States Intelligence Community. It was until recently known as Advanced Research
and Development Activity (ARDA). ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by theDirector of Central
Intelligence and the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in
the fields of data mining, video processing, and quantum computing. There has been speculation that the DTO is continuing research efforts started under theTotal Information
Awareness program (TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with
public and congressional disapproval. Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former
government official saying the agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004. Headquartered at Fort
George G. Meade in Maryland, site of the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence
community. In December 2007, DTO was folded into the newly created IARPA 1] . A move to a research park near the University of Maryland, College Park was announced at
about the same time 2] .
Wikipedia Real ID The REAL ID Act of 2005, Pub.L. 109-13, 119 Stat. 302, enacted May 11, 2005, was an Act of Congress that modified U.S. federal law pertaining to security,
authentication, and issuance procedures standards for the state driver's licenses and identification (ID) cards, as well as various immigration issues pertaining to terrorism. The law
set forth certain requirements for state driver's licenses and ID cards to be accepted by the federal government for "official purposes", as defined by the Secretary of Homeland
Security. The Secretary of Homeland Security has currently defined "official purposes" as presenting state driver's licenses and identification cards for boarding commercially
operated airline flights and entering federal buildings and nuclear power plants. The REAL ID Act implements the following: Title II of the act establishes new federal standards for
state-issued driver licenses and non-driver identification cards. Changing visalimits for temporary workers, nurses, and Australian citizens. Funding some reports and pilot projects
related to border security. Introducing rules covering "delivery bonds" (similar to bail bonds but for aliens who have been released pending hearings). Updating and tightening the
laws on application for asylum and deportation of aliens for terrorist activity. Waiving laws that interfere with construction of physical barriers at the borders. As of April 2, 2008, all
50 states have either applied for extensions of the original May 11, 2008 compliancedeadline or received unsolicited extensions. 4] As of October 2009, 25 states have approved
either resolutions or binding legislation not to participate in the program, and with President Obama's selection of J anet Napolitano (a prominent critic of the program) to head the
Department of Homeland Security, the future of the law remains uncertain, 5] and bills have been introduced into Congress to amend or repeal it. 6] The most recent of these, dubbed
PASS ID, would eliminate many of the more burdensome technological requirements but still require states to meet federal standards in order to have their ID cards accepted by
federal agencies.
Wired Random numbers are critical for cryptography: for encryption keys, randomauthentication challenges, initialization vectors, nonces, key-agreement schemes, generating
prime numbers and so on. Break the random-number generator, and most of the time you break the entire security system. Which is why you should worry about a new random-
number standard that includes an algorithm that is slow, badly designed and just might contain a backdoor for the National Security Agency.
Wikipedia NAIS The National Animal Identification System, (NAIS) is a government-run program in the United States intended to extend government animal health surveillance by
identifying and tracking specific animals. Administered at the federal level by the Animal and Plant Health Inspection Service, a branch of the United States Department of
Agriculture, NAIS will also be overseen by state animal health boards. While the federal program is voluntary, money received by some states, 2] tribes, and non-profit entities from
the USDA through cooperative agreements has been used to make parts or all of the program mandatory. Critics claimthe system will put small farmers out of business, by requiring
that farmers pay the cost of registration devices of between $1 and $20 for each animal. Large, corporate factory farms which are connected to vertically integrated, birth-to-death
factory systems ID and pay by the herd (and not the individual animal), while small farmers must pay it for each animal. Finally, fears persist about plans to make NAIS mandatory
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
on the federal level, which would threaten the religious freedom of those who believe that making a mark is sinful, such as the Amish. The Amish also object to the use of
electronic devices such as microchips. 24] If microchip implants were required, as has been proposed in a 2004 report by the United States Animal Health Associations Committee
on Livestock Identification, it would also violate the rights of those who believe that this practice is morally wrong.
PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and
mobile phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack
down on communications as protests erupt throughout the country. ...
Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as
Deep Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS
The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to performmass surveillance and
monitoring of public and corporate Internet communications in real time. Common Dreams ...
Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge
much of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network
managers to inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes
through (an Internet protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their
e-mails along with attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls. ... Earlier this week, Secretary of StateHillary
Clinton urged Egypt's government "not to prevent peaceful protests or block communications, including on social media. Huffington Post .... FACTS & FIGURES Narus, now
owned by Boeing, was founded in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and largecorporate clients. ... In addition to Narus,
thereare a number of companies, including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant
(USA), Procera Networks (USA), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the
privacy of Internet users is compromised. But in government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is
cut off as the government battles to contain the street protests that threaten to topple President Hosni Mubarak. Telegraph HJ /KA/DB... more search terms: Egypt, Elbaradai, Tunisia,
Algeria, Tunisia, protest, regime change,
WMR "J anuary 30-February 1, 2009 -- Stellar Wind blows Democratic governors out of office WMR has previously reported on the malfeasance of the U.S.
Attorney for Northern Illinois, Patrick Fitzgerald, in his investigation of the 1993 World Trade Center bombing and the outing of CIA covert agent Valerie Plame Wilson. In the case
of the 1993 attack, Fitzgerald sat on critical signals intelligence (SIGINT) evidence that would have tied the bombing to Osama bin Laden in exile in Sudan. Bin Laden remained a
U.S. intelligence asset at the time of the World Trade Center bombing so Fitzgerald, following orders from Langley, simply failed to enter into evidence wiretaps communications
between the Sudanese Mission to the United Nations in New York and the Sudanese Foreign Ministry in Khartoumthat contained references to Bin Laden. In the outing of Plame,
Fitzgerald refused to enter as evidence tapped phone calls of Vice President Dick Cheney's Chief of Staff I. Lewis "Scooter" Libby and others that would have proven the severe
damage of Libby's actions to the covert counter-proliferation operation involving Plame and her Brewster J ennings & Associates cover firm. Fitzgerald's actions in covering up the
World Trade Center link to Sudan and Bin Laden was so significant that Libby's New York Times interlocutor, J udith Miller, once asked this editor for my sources on the Sudanese
wiretap story. I told her that one was well known, the late ABC News reporter J ohn McWethy had reported on the Sudan UN mission wiretaps by the National Security Agency
(NSA) in 1993. The other, a confidential sourcein Khartoum, remains confidential. McWethy died in a February 2008 skiing accident in Colorado. full story
Wikipedia Stellar Wind Stellar Wind is the open secret code name for certain information collection activities performed by the United States' National Security Agency
and revealed by Thomas M. Tammto New York Times reporters J ames Risen and Eric Lichtblau. 1] The operation was approved by President George W. Bush shortly after the
September 11 attacks in 2001. 2] The program's activities involvedata mining of a largedatabase of the communications of American citizens, including e-mail communications,
phone conversations, financial transactions, and Internet activity. 1] There were internal disputes within the J ustice Department about the legality of the program, because data are
collected for largenumbers of people, not just the subjects of Foreign Intelligence SurveillanceAct (FISA) warrants. 3] In March 2004, the J ustice Department under Attorney
General J ohn Ashcroft ruled that the program was illegal. The day after the ruling, Ashcroft became critically ill with acute pancreatitis. President Bush sent White House counsel
Alberto Gonzales and Chief of Staff Andrew Card, J r. to Ashcroft's hospital bed, where Ashcroft lay semiconscious, to request that he sign a document reversing the J ustice
Department's ruling. However, Ashcroft was incapable of signing the document. Bush then reauthorized the operation, over formal J ustice Department objections. Federal Bureau of
Investigation (FBI) director Robert Mueller, Acting Attorney General J ames Comey, and many prominent members of the J ustice Department were prepared to resign over the
matter. Valerie Caproni the FBI general counsel, said, "From my perspective, therewas a very real likelihood of a collapse of government." Bush subsequently reversed the
authorization. 2] During the Bush Administration, the Stellar Wind cases were referred to by FBI agents as "pizza cases" because many seemingly suspicious cases turned out to be
food takeout orders. Approximately 99 percent of the cases led nowhere, but 1 percent bore fruit. 2] One of the known uses of these data were the creation of suspicious activity
reports, or "SARS", about people suspected of terrorist activities. It was one of these reports that revealed former New York governor Elliot Spitzer's use of prostitutes, even though
he was not suspected of terrorist activities. 1] In March 2012 Wired Magazine published "The NSA Is Building the Countrys Biggest Spy Center (Watch What You Say)" talking
about a new NSA facility and says "For the first time, a former NSA official has gone on the record to describe the program, codenamed Stellar Wind, in detail." Naming the official
WilliamBinney a former NSA code breaker. Binney goes on to say that the NSA has highly secured rooms that tap into major switches, and satellite communications at AT&T and
Verizon both. 4] The article suggests that the otherwise dispatched Stellar Wind is actually an active program.
WMR Bush / Clinton complicity in NSA illegal wiretapping. A problem for Hillary? ... 1999 docs show NSA and Clinton White House hiding information about Foreign
Intelligence SurveillanceAct (FISA) compliance. Illegal request for NSA wiretapping made in February 27, 2001 meeting ... Nacchio refused, then indicted for insider stock
trading... 10th Circuit Court of Appeals, (they're all crooks?). search terms: AT&T switching center, Folsom Street, San Francisco, 4ESS equipment, Mark Klein (whistleblower),
see HPSCI, Porter Goss, attorney client privilege, ExecutiveOrder 12333, all concerning hiding documents referring to legality of NSA activities, ... and Wilma A. Lewis, Mark
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Nagle, Marina Utgoff Braswell, Electronic Privacy Information Center, (Civil No. 99-3197 PLF), information withheld from FOIA, domestic wiretapping full
story
Economist "Security experts reckon the latest technology can detect hostile intentions before something bad happens. Unless it is perfect, though, that may be bad in itself ...
MONITORING surveillance cameras is tedious work. Even if you are concentrating, identifying suspicious behaviour is hard. Suppose a nondescript man descends to a subway
platformseveral times over the courseof a few days without getting on a train. Is that suspicious? Possibly. Is the average security guard going to notice? Probably not. A good
example, thenif a fictional oneof why many people would like to develop intelligent computerised surveillance systems. ... The perceived need for such systems is stimulating
the development of devices that can both recognise people and objects and also detect suspicious behaviour. Much of this technology remains, for the moment, in laboratories. But
Charles Cohen, the boss of Cybernet Systems, a firm based in Ann Arbor, Michigan, which is working for Americas Army Research Laboratory, says behaviour-recognition
systems are getting good, and are already deployed at some security checkpoints"
According to Associated Press, the director of CIA's Open Source Intelligence, Doug Naquin, admitted the existence of a secret facility and a team
of operatives for exclusive monitoring of social networks such as Facebook and Twitter. But I've found evidence pointing out that these online
communities might actually have been created by CIA for data mining and COINTELPRO operations on the internet. Hosted
FEMA Concentration Camp, Beech Grove, Indiana YouTube & Google Map: Emerson Ave, BeechGrove, Indianaand lists Domestic Spying, FBI, AT&T page
Prodigal email, im, text scanning Darpa
Domestic Spying News top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
9/11 Citizens Watch challenging the official story of
9/11
911Dosier.co.uk last update 2004.
ACLU
AfroCubaWeb Israeli actions in the Americas
The Agonist
American Free Press The Truth about 9/11, Israel...
American Friends ServiceCommittee search
Anti-Imperialist News Serviceand archives, books
Big Class Action New class actions, search, info
Center for Science in the Public Interest
Center for CooperativeResearch
Civil Liberties Digest, Pacific News News, Pacific
News
CounterPunch Ashcroft turned down request to search
Moussaoui computer
Center for Democracy and Technology, domestic
spying watch
Center for Democratic Communications National
Lawyers Guild
CICenter Counterintelligence, NGO, UK
ClassActionAmerica
Guardian.UK weblogs
Global News Headlines, GreenPeace mail list
Global Witness Corruption watchdog
Internet Democracy Project ACLU, EPIC, CPSR
NSAWatch formerly EchelonWatch, resources,
surveillance networks, documents.
Pacific News, Pacific Pulse,
Project Censored undercovered news
Rocky Mountain News World news
People for the American Way
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Salon Israeli art students, DEA, Amdocs searchable
file
Total Information Awareness Resource Center
World Socialist Web Site search
ZDNet, UK news
..
.Reference
CBS down
C/Net downloads, spyware
ABC News Disney
American Zionist Information Network
CDI Center for Defense Information headlines
DARPA Defense Advanced Research Projects Agency
Defence-data.com
Defence-Aerospace
Dept of Defense News transcripts, search Muqtada al-
Sadr. Chalabi, Najaf,
Defense Tech Telcos Deny NSA Ties - and Allowed to
Lie?
Family.org, Dobson
Homeland Security NCS Threat Advisory
IT Security Encyclopedia of Computer Security
J ihad Unspun war on terrorism, Bush
Institute for Advanced Strategic & Political Studies and
Hebrew site
National Communications System, US Threat Advisory
NewsMax
Mathaba search content based billing, VOIP blocking
New York Times NSA executive order authorizing data
mining of phone calls and file Dec 16, 2005
North Carolina Consortium of Internet Service
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Coalition for Global Solidarity News links
Common Cause Soft Money issues, govt watchdog
Consortium News watchdog
Consumer Action covering banking, credit, privacy,
insurance, HMO's. in English, Chinese, and Spanish.
Consumers Union consumer advocate, watchdog,
news
CorpWatch, news, Holding corporations accountable
Cryptorights.org human rights for security workers.
SF
Earthrights International the power of law, people in
defense of human rights
Electronic Frontier Foundation working to protect
civil and free speech
Enduring Freedoms, pressroom, Reporters Without
Borders
FAS Secrecy News
FattyBoomBatty, news, Echelon, Big Brother
FindLaw News
Freedom of Information Center Univ of Missouri,
news
Free Expression Network
Government Accountability Project News,
Green Party News circulator
Freedom of Information Center Univ of Missouri,
news
Findlaw, Dean
Info / Law, Harvard Blog filtering, modes of internet
regulation: code, law, markets, and social norms
LINKS
IT-Analysis internet news analysis, research
Legal News Search search
LexisNexis online legal, news and business info
services
MSNBC VOIP Blocking
OpenNet Initiative, search Narus
Privacy Digest, news
PrivacyToday news
Rumormill News
Science Daily news
Silicon Valley blog news, Good Morning Silicon
Valley
USA Today NSA has massive database of Americans'
phone calls
Wired News,
Providers legislation page
Online Republican Activist
Political USA Chicago sun-times
PR Newswire business news distribution
Regulatory News Converge Digest
Senate Republican Conference
Washington Times
U.S. Department of J ustice Civil Rights Division
U.S. Commission on Civil Rights Chairperson of the
Commission on Civil Rights
Washington Institute for Near East Policy US
ZOA press releases
Advanced Research and Development Activity Office top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU objects to CAPPS, no
due process, easily
circumvented.
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
FreePeoplesFifthEstate
CIA/Mossad/SIS hit in
Pakistan, also responsible for
deaths of J ournalist Daniel
Pearl, Nick Berg: Al-Qaida is
the code name of special
covert operations of the U.S.
CIA, Israeli Mossad, British
SIS, Indian RAW
CDC Center for Disease Control and Prevention.
Dept of Health and Human Services.
PrivacyDigest privacy news
Softswitch.org to develop universal communications solutions over packet-based voice, data and video.
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.

Biowatch, detect
biological warfare
threats. fear Bush.
Dept of Health and
Human Services.
Dept of Homeland
Security domestic
spying
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Virage Inc Video
analysis and contact
extraction. Part of
the Autonomy
Group
Wikipedia IARPA Intelligence Advanced Research Projects Activity From Wikipedia, the free encyclopedia (Redirected from IARPA) The Intelligence Advanced Research Projects
Activity (IARPA) is a United States research agency under the Director of National Intelligence's responsibility. In J anuary 2008, Lisa Porter, an administrator at NASA with
experience at DARPA, was appointed director 1] of the activity formed in 2006 from the National Security Agency's Disruptive Technology Office (DTO), the National Geospatial-
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Intelligence Agencys National Technology Alliance and the Central Intelligence Agencys Intelligence Technology Innovation Center. 2] Contents hide] 1 Goals 2 Programoffices 3
The Metaphor Program4 See also 5 References 6 Further reading 7 External links edit]Goals ... "IARPA's mission is] to invest in high-risk/high-payoff research programs that have
the potential to provide the United States with an overwhelming intelligence advantage over future adversaries." FBI National Press Release, 2009 3] The Director of National
Intelligence in a September 2006 speech stated that the goal of the agency 4] is to conduct research that Cuts across multiple IC agencies; Targets new opportunities that liein the white
spaces between agencies; Provides innovations that agencies avoid because of current business models; and Generates revolutionary capabilities that will surprise our adversaries and
help us avoid being surprised. Programoffices ... IARPA is divided into threeprogram offices, Smart Collection, Incisive Analysis, and Safe & Secure Operations. The goal of the
Office of Smart Collection is to "dramatically improve the value of collected data from all sources." The Office of Incisive Analysis exists to "maximize insight from the information
we collect, in a timely fashion." IARPA's third division, the Office of Safe & Secure Operations, exists to "counter new capabilities implemented by our adversaries that would threaten
our ability to operate freely and effectively in a networked world." edit]The Metaphor Program ... The Metaphor Programis a two-phase project designed to first develop automated
techniques for recognizing, defining and categorizing linguistic metaphors and then use that information to characterize differing cultural perspectives. The Programis headed by
Heather McCallum-Bayliss. On May 2011, IARPA issued an open solicitation for private sector parties to participate in the Program
Wikipedia The Disruptive Technology Office (DTO) is a funding agency within the United States Intelligence Community. It was until recently known as Advanced Research and
Development Activity (ARDA). ARDA was created in 1998 after the model of the Defense Advanced Research Projects Agency (DARPA) by the Director of Central Intelligence and
the Department of Defense, and took responsibility for funding some of DARPA's projects. ARDA evaluates proposals and funds speculative research, particularly in the fields of data
mining, video processing, and quantum computing. There has been speculation that the DTO is continuing research efforts started under the Total Information Awareness program
(TIA) in DARPA's Information Awareness Office (IAO). Data-mining activities within the US Department of Defense are controversial and have met with public and congressional
disapproval. Although ARDA's budget is presumably classified as part of the intelligence budget, the New York Times quoted an unnamed former government official saying the
agency spent about $100 million a year in 2003. The Associated Press reports that ARDA had a staff of only eight in 2004. Headquartered at Fort George G. Meade in Maryland, site of
the headquarters of the National Security Agency, ARDA/DTO has kept a low profile, quietly funding research of interest to the intelligence community. In December 2007, DTO was
folded into the newly created IARPA A move to a research park near the University of Maryland, College Park was announced at about the same time 2].

Amdocs, Israel Telecom Immunity top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Cryptomesearch Narus spy
DailyKOS EFF lawsuit, nationwide class
action, AT&T Technician stepped forward
to disclose installation of NSA equipment
(Narus ST-6400) in San Francisco trunk
facility, NarusInsight
EFF StateSecrets Act invoked on
wiretapping lawsuit. National Security
Agency
Cryptomesearch Narus spy
DailyKOS EFF lawsuit, nationwide class
action, AT&T Technician stepped forward
to disclose installation of NSA equipment
(Narus ST-6400) in San Francisco trunk
facility, NarusInsight
Moon of Alabama search terms: CDR, call
detail records, usage behavior, mortgate
data, credit card data, addresses, names,
NSA took over Total Information
Awareness Project, if you'reagainst Bush
are you a terrorist? Datamining, small
groups, false tips,
NoGW CIA
Scoop ISP, black box, NARUS, Model ST-
6400,
Notes, search terms: internet protocol Detail
Record, analyzes data 'meaning' impeach
bush
C/Net downloads
Findlaw NSA
Eric Umansky
Findlaw, Dean
Hoover's Narus
Liquid Matrix China asks Narus for tech to
block VOIP calls.
EFF StateSecrets Act invoked on
wiretapping lawsuit. National Security
Agency
Wired search Narus, Amdocs
Notes, search terms, EFF lawsuit against
AT&T over their secret work with NSA,
ST-6400, content triggers, Narus Insight,
Ori Cohen, VDONet, J P Morgan Partners,
Mayfied, NeoCarta, Presidio Venture
Partners, Walden International, Intel, NTT
Software, Sumisho Electronics, WilliamP.
Crowell,
Schema-Root AIPAC, Weisman, search
Rosen Franklin,
Schneier search terms: Operation Shamrock,
FISA, FISC, and:legal links
New York Times NSA executive order
authorizing data mining of phone calls and
file Dec 16, 2005
Wired stepped forward to disclose
installation of NSA equipment (Narus ST-
Amdocs search Narus
American National Union Should Hayden be confirmed or court-martialed
Comverse and Information Clearing House Carl Cameron report and see
CALEA
Comverse CEO resigns amid options probe, MORE below
Center for Strategic and International
Defense Tech Telcos Deny NSA Ties - and Allowed to Lie?
FCC, won't investigate warrantless wiretapping because Bush effectively
used the StateSecrets defense to shut themdown.
Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza Systems.
Narus Partners see Pen-Link, Man-tech, Verisign, Datacraft, Giza
Systems...more
Republicans who are against Bush spying are an irrelevant impotent and
small group.
New York Times NSA executive order authorizing data mining of phone
calls and file Dec 16, 2005
Narus Board of Directors Notes on Narus: Narus is a private company
founded in 1997 by Ori Cohen, was in charge of tech development for
VDONet, media streaming pioneer. It has venturefunding from investors
including J P Morgan Partners, Mayfield, NeoCarta, Presidio Venture
Partners, Walden International, Intel, NTT Softwareand Sumisho
Electronics
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Serendipity: Timelineof CIA atrocities,
School of the Americas,
6400) in San Francisco trunk facility,
NarusInsight
Notes, search terms: internet protocol Detail
Record, analyzes data 'meaning', voice
recognition, business cards, social
network analysis,
WMR At first blush, the recent adoption by the House of Representatives of the Foreign Intelligence SurveillanceAct Amendments Act, which gives telecommunications companies
that illegally eavesdropped on the telephone conversations, faxes, text messages, and emails of Americans retroactive immunity from lawsuits from privacy-violated and aggrieved
customers, would see to have little to do with the powerful American Israel Public Affairs Committee (AIPAC). ... However, the support for the bill by AIPAC's
biggest boosters, including House Majority Leader Steny Hoyer of Maryland, whose sister, Bernice Manocherian, was an
executive president of AIPAC, and J ane Harman, who was slated to become chair of the House Permanent Select Committee on
Intelligence (HPSCI) but whose nomination was nixed by Speaker Nancy Pelosi after a J ustice Department investigation of Harman's contacts with AIPAC .... To ensurea
lock on the no retroactive lawsuit provisions, the man who became HPSCI chair, Sylvestre Reyes, supported the measure. He was joined by other AIPAC sure bets, including Brad
Sherman (D-CA), Gary Ackerman (D-NY), Ellen Tauscher (D-CA), J ohn Yarmuth (KY), Rahm Emanuel (D-IL), J ason Altmire (D-PA), and, for added measure Pelosi. full article
Auto Black Box top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU objects to CAPPS, no
due process, easily
circumvented.
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
CDC Center for Disease Control and Prevention.
ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data
elements constantly being collected by the car's black box as you drive?

Biowatch, detect
biological warfare
threats. fear Bush.
Dept of Health and
Human Services.
Dept of Homeland
Security domestic
spying
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Virage Inc Video
analysis and contact
extraction. Part of
the Autonomy
Group
ComputerWorld When you are car shopping, how many times has a salesman pitched the 15 to 30 specific data elements constantly being collected by the car's black box as you drive?
Probably never, but there's electronic data everywhere and that includes your car collecting digital evidence which might turn into the star witness to testify against you. You may not
think about or be aware of your vehicle's event data recorder (EDR), yet it is constantly recording evidence like a plane's "black box" and is being used after a crash to explain why it
happened. Way back in 2006, the National Highway Traffic Safety Administration (NHTSA) mandated that all new vehicles be equipped with EDR "black boxes" by the 2013 model
year PDF]. 85% of U.S. vehicles now have EDR devices that "must capture and preserve at least 15 types of crash data, including pre-crash speed, engine throttle, changes in forward
velocity and airbag deployment times." Some capture 30 types of data. What cars are equipped to narc on you? According to Crash Forensics, "As of 2011, GM vehicles as old as 1994
have accessible data, Ford vehicles as old as 2001 have accessible data, Chrysler vehicles as old as 2005 have accessible data, Toyota and Lexis vehicles as old as 2006 have accessible
data, as well as some Isuzu, Fiat, Mitsubishi, Scion, Sterling, and Suzuki vehicles." You can also check this list PDF] or this list PDF] for vehicles with accessible EDRs. Does that data
about your driving belong to you or to insurance companies? It really depends where you have an accident since some courts have ruled the info belongs to the insurance companies and
others have ruled the data belongs to drivers. As IEEE pointed out, "In the 37 states without EDR laws, thereare no ground rules preventing insurance companies from obtaining the
data-sometimes without the vehicle owner ever knowing that the data existed." J ohn Tomaszewski, general counsel at TRUSTe, said "People should not relinquish their Fourth
Amendment rights merely because of the location of their information." What about your right to plead the Fifth Amendment and not witness against yourself?
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Automatic License Plate Recognition top MORE
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Salon Israeli art students,
DEA, Amdocs searchable file
DeathandTaxes
J urist University of Pittsburg, School of Law, Primary sources. Global perspective
Wikipedia Automatic number plate recognition (ANPR;
AP
Dept of Homeland
Security domestic
spying
Microsoft Seattle
Times COFEE
Motorola
Wikipedia Automatic number plate recognition (ANPR; see also other names below) is a mass surveillance method that uses optical character recognition on images to read vehicle
registration plates. They can use existing closed-circuit television or road-rule enforcement cameras, or ones specifically designed for the task. They are used by various police forces
and as a method of electronic toll collection on pay-per-use roads and cataloging the movements of traffic or individuals. ANPR can be used to store the images captured by the cameras
as well as the text from the license plate, with some configurable to store a photograph of the driver. Systems commonly use infrared lighting to allow the camera to take the picture at
any time of the day. 1] 2] ANPR technology tends to be region-specific, owing to plate variation from place to place. Concerns about these systems have centered on privacy fears of
government tracking citizens' movements, misidentification, high error rates, and increased government spending.
DeathandTaxes NEWS License plate readers enhance Big Brothers intrusive gaze By DJ Pangburn 51 days ago This month the ACLU has launched a nationwide effort to demand
information from police departments and other authorities about automatic license plate readers (ALPRs), arguing that they violate privacy. Are ALPRs yet another eye of Big Brother
or is the ACLUs freedom of information request much ado about nothing? ALPRs are cameras mounted on stationary objects (telephone poles, the underside of bridges, etc.) or on
patrol cars, writes the ACLU. Thecameras snap a photograph of every license plate that passes themby capturing information on up to thousands of cars per minute. The devices
convert each license plate number into machine-readable text and check themagainst agency-selected databases or manually-entered license plate numbers, providing an alert to a
patrol officer whenever a match or hit appears. As with drone technology, no longer do the watchmen have to try to be everywhere at oncethey are everywhere at once. According
to the ACLU, When the ALPR system captures an image of a car, it also meta-tags each file with the GPS location and the time and date showing where and when the photograph was
snapped. The ACLU notes that often And often, the photograph of the license plate is also stored in a database. Thesystem gathers this information on every car it comes in contact
with, not simply those to which some flag or hit was attached.

American Telecommunications Companies top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
FreePeoplesFifthEstate
CIA/Mossad/SIS hit in
Pakistan, also responsible for
deaths of J ournalist Daniel
Pearl, Nick Berg: Al-Qaida is
the code name of special
covert operations of the U.S.
CIA, Israeli Mossad, British
SIS, Indian RAW
Salon Israeli art students,
DEA, Amdocs searchable file
J urist University of Pittsburg, School of Law, Primary sources. Global perspective
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.
AP NSA U.S.
domestic wiretaps,
using unnamed
American
telecommunications
companies..file
AT&T lawsuit
$200 billion
CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Dept of Homeland
Security domestic
spying
Microsoft Seattle
Times COFEE
Narus More
New York Times
NSA executive
order authorizing
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
data mining of
phone calls and
file.
EFF NSA Spying The U.S. government with assistancefrom major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of
domestic communications and communications records of millions of ordinary Americans since at least 2001. ... News reports in December 2005 first revealed that the National
Security Agency (NSA) has been intercepting Americans phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of
several members of Congress revealed that the NSA is also receiving wholesalecopies of their telephone and other communications records. All of these surveillance activities are in
violation of the privacy safeguards established by Congress and the U.S. Constitution. ... The evidence also shows that the government did not act alone. EFF has obtained
whistleblower evidence PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T
installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers
and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed this isnt a wiretap its a
country-tap.
Apple, Iphone, Google Android top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Salon Israeli art students,
DEA, Amdocs searchable file
J urist University of Pittsburg, School of Law, Primary sources. Global perspective
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.
AP NSA U.S.
domestic wiretaps,
using unnamed
American
telecommunications
companies..file
AT&T lawsuit
$200 billion
CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Dept of Homeland
Security domestic
spying
Microsoft Seattle
Times COFEE
WMR April 22-24, 2011 -- I-Phone, Android back doors are courtesy of the NSA. ... News
reports that Apple's I -Phone and I -Pads, as well as Google's Android operating system-enabled phones can track a user's location, as well as Internet activities, is nothing new,
according to a well-placed intelligence source. In fact, the Apple and Google "spy ware" is courtesy of a deal struck with the U.S. National Security Agency (NSA), which is the
ultimate recipient of the location and web data being collected by Apple and Google. ... NSA's aggressive insistence that it have "back door" access to state-of-the-art commercial
communications products was on display in the 1990s when Britain's Ministry of Defense discovered eight different back doors installed in Windows 98 and subsequent releases of the
operating system. Microsoft is a long-time partner of the NSA in ensuring that its products are accessible by the American eavesdropping agency. ... Although Britain's Government
Communications Headquarters is a signals intelligence (SIGINT) partner of the NSA, a "rainbow team" representing computer security experts, drawn from multiple British
government agencies. discovered the NSA back doors while conducting a security evaluation of Britain's latest tank battlefield system. While back engineering the Microsoft source
code at their research facility at Farnborough, the team discovered the eight NSA back doors. ... Microsoft threatened legal action against the British government for what the firm
considered to be the illegal examination of its sourcecode. However, after the British government claimed Crown immunity and threatened to leak the information about the NSA back
doors to the media, Microsoft backed down. Britain removed the eight back doors and was able to secure its tank and other battlefield systems from the NSA. ... Apple and Google,
like Microsoft, have remained quiet about the surveillance capabilities of their products. WMR's intelligence sourcestresses that the silence from Apple and google is being directed by
the actual developer of the surveillance back doors, the NSA.
CNN 2012 Under Apple's patent, a traveler's phone would automatically send electronic identification to a TSA agent as soon as the traveler gets in line. While each traveler waits in
line, TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler's phone would confirm to security agents that the traveler's ID
had already been checked. Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
process. (See details on Apple's proposal in the photo gallery above.) The patent documents offer a surprising number of details which open doors to key questions about the system, but
Apple declined to discuss the patent. The TSA wouldn't comment either on the viability of Apple's plan. But other government officials, aviation authorities and longtime industry
experts say Apple faces at least threehigh hurdles if they want to see this idea to fruition. Verification Several experts say a key question that must be answered is: How would you
prove that the phone is yours? In other words, how would you prove that the e-passport is actually you? To get around this problem, future phones or electronic ID may require some
form of biometric security function -- like fingerprint matching. In general, passports must be designed to be difficult to copy. Recent security changes to U.S. passports have included
a hidden radio frequency identification chip to hinder counterfeiters. The chip includes the same data as the paper passport, a unique chip ID number, a digital version of the passport
holder's photo "which will facilitate the use of face recognition technology at ports-of-entry," according to the StateDepartment website.
EFF NSA Spying The U.S. government with assistancefrom major telecommunications carriers including AT&T has engaged in a massive program of illegal dragnet surveillance of
domestic communications and communications records of millions of ordinary Americans since at least 2001. ... News reports in December 2005 first revealed that the National
Security Agency (NSA) has been intercepting Americans phone calls and Internet communications. Those news reports plus a USA Today story in May 2006 and the statements of
several members of Congress revealed that the NSA is also receiving wholesalecopies of their telephone and other communications records. All of these surveillance activities are in
violation of the privacy safeguards established by Congress and the U.S. Constitution. ... The evidence also shows that the government did not act alone. EFF has obtained
whistleblower evidence PDF] from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T
installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers
and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed this isnt a wiretap its a
country-tap.
Biosurveillance, Biowatch top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU objects to CAPPS, no
due process, easily
circumvented.
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
CDC Center for Disease Control and Prevention.
Dept of Health and Human Services.
PrivacyDigest privacy news

Biowatch, detect
biological warfare
threats. fear Bush.
Dept of Health and
Human Services.
Dept of Homeland
Security domestic
spying
National
Consumers
Coalition info on
'big brother',
national ID card,
govt spycams,
supports global
warming.org
CALEA Communications Assistance for Law Enforcement Act top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
Salon Israeli art students,
DEA, Amdocs searchable file
Smirking Chimp Suspicious
Activities Involving Israeli
Art Students at DEA
Facilities by DEA
J urist University of Pittsburg, School of Law, Primary sources. Global perspective
ZD Net search: Communications Assistance for Law Enforcement Act.
VOIP wiretapping
Wired Fed step up push to tap internet phone calls
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.

CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Dept of Homeland
Security domestic
suveillance
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
CAPPS color coding airline passengers top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
ACLU objects to CAPPS, no
due process, easily
circumvented.
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
Cnet Tech News First, search Carnivore
PrivacyDigest privacy news
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.

Center for Strategic
and International
Studies
Critical
Infrastructure
Assurance Office
internet,
infrastructure,
surveillance, code
words.
Dept of Homeland
Security domestic
spying
Carnivore, DCS 1000, EtherPeek top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
CyberArmy chat, forums
Carta de Cuba Internet in
USA
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
Googlewatch watch how
Google undermines net
Privacy Watch, Cotse.net
Internet Privacy Website,
Civil liberty watchdog
Salon Israeli art students,
DEA, Amdocs searchable file
Smirking Chimp Suspicious
Activities Involving Israeli
Art Students at DEA
Facilities by DEA
Stop CarnivoreFBI, What
Carnivorecan do
ZDNet, UK news
Cnet Tech News First, search Carnivore
PrivacyDigest privacy news
J urist University of Pittsburg, School of Law, Primary sources. Global perspective
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.

CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Center for Strategic
and International
Studies
CIA Central
Intelligence
Agency
Critical
Infrastructure
Assurance Office
CIAO.gov, info
Cybersecurity
Enhancement Act
DARPA Defense
Advanced Research
Projects Agency
FBI, Carnivore,
Diagnostic Tool
FBI
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Seisint Inc
MATRIX database,
controlling
company.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Cell Site Tracking top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
CyberArmy chat, forums
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
Googlewatch watch how
Google undermines net
Privacy Watch, Cotse.net
Internet Privacy Website,
Civil liberty watchdog
ZDNet, UK news
Cnet Tech News First, search Carnivore
PrivacyDigest privacy news
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.
Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A
federal appeals court said Tuesday the government may obtain cell-site information that mobile phone carriers retain
on their customers without a probable-cause warrant under the Fourth Amendment. ...
CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Center for Strategic
and International
Studies
CIA Central
Intelligence
Agency
Critical
Infrastructure
Assurance Office
CIAO.gov, info
Cybersecurity
Enhancement Act
DARPA Defense
Advanced Research
Projects Agency
FBI, Carnivore,
Diagnostic Tool
FBI
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Seisint Inc
MATRIX database,
controlling
company.
Wired Court OKs Warrantless Cell-Site Tracking BY DAVID KRAVETS EMAIL AUTHOR 09.07.10 6:33 PM A federal appeals court said Tuesday the government may obtain cell-
site information that mobile phone carriers retain on their customers without a probable-cause warrant under the Fourth Amendment. ... The decision by the 3rd U.S. Circuit Court of
Appeals (.pdf) was not, however, an outright Obama administration victory. Lower courts, the three-judge panel wrote, could demand the government show probable cause the
warrant standard before requiring carriers to release such data to the feds. ... The opinion does leaves the privacy issuein a legal limbo of sorts. The standard by which the
government can access such records which can be used in criminal prosecutions is left to the whims of district court judges. Historical cell-site location information, which
carriers usually retain for about 18 months, identifies the cell tower to which the customer was connected at the beginning of a call and at the end of the call. ... Lower courts across
the country have issued conflicting rulings on the topic and will continue to do so without appellateguidanceor congressional action. The Philadelphia-based court was the first appeals
court to address the issue. ... The Obama administration argued a judge could force a carrier to produce cell-site data on a showing that the information was relevant and material to
an investigation. ... But the appeals court, ruling in a narcotics case, said the Stored Communications Act, the law in question, was vague as to what standard was required. ... The
court left open the possibility that it would revisit the case again and decidewhether the constitution requires a warrant for the cell site data. The court said the statuteitself could be
interpreted as not requiring one. ... The judges did not directly address the constitutionality of the statute, said Kevin Bankston, a privacy lawyer with the Electronic Frontier
Foundation, which weighed in on the case with a friend-of-the-court brief.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Census Bureau top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
CyberArmy chat, forums
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
Googlewatch watch how
Google undermines net
Privacy Watch, Cotse.net
Internet Privacy Website,
Civil liberty watchdog
ZDNet, UK news
Cnet Tech News First, search Carnivore
PrivacyDigest privacy news
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.
CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Center for Strategic
and International
Studies
CIA Central
Intelligence
Agency
Critical
Infrastructure
Assurance Office
CIAO.gov, info
Cybersecurity
Enhancement Act
DARPA Defense
Advanced Research
Projects Agency
FBI, Carnivore,
Diagnostic Tool
FBI
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Seisint Inc
MATRIX database,
controlling
company.
WMR By Wayne Madsen According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS).
Of particular interest to DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a
senior systems analyst with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data
requests we have received about the Arab population." The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and
Oversight Branch responds to the Census Bureau concern by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both
cargo and passenger operations." The Branch Chief continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs
regulations to report currency brought into the US upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claimit on a currency entry
declaration . . . My reason for asking for U.S. demographic data is to aid the Outbound Passenger ProgramOfficer in identifying which languageof signage, based on U.S. ethnic
nationality population, would be best to post at the major International airports. Some cases this would identify multiple copies needed of a specific languagesign versus other cities
only one copy." more
CODIS Collect DNA from every arrest top
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry
of Homeland Security
CyberArmy chat, forums
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
FreePeoplesFifthEstate
CIA/Mossad/SIS hit in
Pakistan, also responsible for
deaths of J ournalist Daniel
Pearl, Nick Berg: Al-Qaida is
the code name of special
covert operations of the U.S.
CIA, Israeli Mossad, British
SIS, Indian RAW
Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States
Federal Bureau of Investigation (FBI). It is a computer system that stores DNA profiles created by federal, state, and
local crime laboratories in the United States, with the ability to search the database to assist in the identification of
suspects in crimes
DARPA Defense
Advanced Research
Projects Agency
FBI, Carnivore,
Diagnostic Tool
FBI
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Wikipedia CODIS The Combined DNA Index System (CODIS) is a DNA database funded by the United States Federal Bureau of Investigation (FBI). It is a computer system that
stores DNA profiles created by federal, state, and local crime laboratories in the United States, with the ability to search the database to assist in the identification of suspects in crimes.
CODIS was an outgrowth of the Technical Working Group on DNA Analysis Methods (TWGDAM, now SWGDAM) which developed guidelines for standards of practice in the
United States and Canadian crime laboratories as they began DNA testing in the late 1980s. TWGDAM was sponsored by the FBI Laboratory which hosted several scientific meetings a
year at Quantico, Virginia, to acceleratedevelopment of laboratory guidelines and peer-reviewed papers to support forensic DNA testing which was, to some, an unproven forensic tool.
TWGDAM completed a white paper in October 1989 which provided conceptual and operational concepts for a Combined DNA Index System to share DNA profiles among crime
laboratories similarly to automated fingerprint identification which had become commonplacein law enforcement during the 1980s. The FBI Laboratory began a pilot project with six
state and local crime laboratories to develop software to support each laboratory's DNA testing and allow sharing of DNA profiles with other crime laboratories. The DNA
Identification Act of 1994 formally authorized the FBI to operate CODIS and set national standards for forensic DNA testing. The TWGDAM guidelines served as interim standards
until recommendations were provided by a DNA Advisory Board required under the Act. Although the Act was passed in 1994, CODIS did not become fully operational until 1998.
The CODIS database originally was primarily used to collect DNA of convicted sex offenders. Over time, this has expanded. Currently all fifty states have mandatory DNA collection
from certain felony offenses such as sexual assault and homicide, and 47 states collect DNA from all convicted felons. Other states have gone further in collecting DNA samples from
juveniles and all suspects arrested. In California, as a result of Proposition 69 in 2004, all suspects arrested for a felony, as well as some individuals convicted of misdemeanors, will
have their DNA collected starting in 2009. In addition to this, all members of the US Armed Services who are convicted at a Special court martial and above are ordered to provide
DNA samples, even if their crime has no civilian equivalent (for example adultery). Currently, the ACLU is concerned with the increased use of collecting DNA from arrested suspects
rather than DNA testing for convicted felons. Along with the ACLU, civil libertarians oppose the use of a DNA database for privacy concerns as well as possible institutionalized
discrimination policies in collection.
COFEE Computer Online Forensic Evidence Extractor top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry
of Homeland Security
CyberArmy chat, forums
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
FreePeoplesFifthEstate CIA/Mossad/SIS hit in Pakistan, also responsible for deaths of J ournalist Daniel Pearl, Nick
Berg: Al-Qaida is the code name of special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian
RAW
DARPA Defense
Advanced Research
Projects Agency
FBI, Carnivore,
Diagnostic Tool
FBI
New York Times
NSA executive
order authorizing
data mining of
phone calls and
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
file.
Microsoft has developed a small plug-in devicethat investigators can use to quickly extract forensic data from computers that may have been used in crimes. The COFEE, which
stands for Computer Online Forensic Evidence Extractor, is a USB "thumb drive Seattle Times The devicecontains 150 commands that can dramatically cut the time it takes to gather
digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer's Internet activity, as well as data
stored in the computer.
Controlled Drug Users top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry
of Homeland Security
CyberArmy chat, forums
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
WMR The Drug Enforcement Agency says it does track prescriptions of so-called controlled substances including
some mood-altering medications but not all prescriptions made in the United States." The issueis to what extent
does the DEA track prescription drug users and what prompted the government to check on records pertaining to Cho
Seung-hui, who was reported to have been treated for mental problems in the past? The Psychotropic Substances Act
of 1978 added mind-altering drugs to the list of official Controlled Substances. Prescriptions for these controlled
substances have a "DEA Number" used for tracking controlled substances. The Cho incident and the comments and
quick retractions by "senior federal officials" indicate that thereis a secret federal government capability to track
controlled drug users.
Advanced Research
and Development

DARPA, IPTO, BICA, LifeLog, Forester, Virat, RSTA top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry
of Homeland Security
CyberArmy chat, forums
Electronic Frontier
Foundation working to
protect civil and free speech
& lawsuit
Epic Electronic Privacy
Information Center
Googlewatch watch how
Google undermines net
Homeland Security Law
threatens privacy
Smirking Chimp Suspicious
Activities Involving Israeli
Art Students at DEA
Facilities by DEA
Cnet Tech News First
History of the Internet DARPA
ISP Planet news
J urist University of Pittsburg, School of Law, Primary sources. Global perspective
Netsys the Intelligent Hackers Choice
Senate Commerce, Science and Transportation Committee

Advanced Research
and Development
Activity Office
ARDA, data
mining alive and
well
CAMERA AP
Israeli spying
story an Urban
Myth according to
J ustice Department
Center for Strategic
and International
Studies
Critical
Infrastructure
Assurance Office
ciao.gov
Cybersecurity
Enhancement Act
DARPA Defense
Advanced Research
Projects Agency
Dept of Defense
DIOR contract
awards
Dept of Homeland
Security domestic
spying
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
New York Times
NSA executive
order authorizing
data mining of
phone calls and
file.
Pentagon
Virage Inc Video
analysis and contact
extraction. Part of
the Autonomy
Group
Wikipedia Information Innovation Office) Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived. 3] 4] 25] Legislators included a
classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA projects
continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies only be used for military or
foreign intelligence purposes against foreigners. 26] TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd
buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the Disruptive Technology Office (run by to the Director of
National Intelligence). They are funded by National Foreign Intelligence Programfor foreign counterterrorismintelligence purposes. One technology, codenamed "Basketball" is the
Information Awareness Prototype System, the core architecture to integrate all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by
SAIC through its former Hicks & Associates consulting arm run by former Defense and military officials and which had originally been awarded US$19 million IAO contract to build
the prototype system in late 2002. 27] The other project has been re-designated "TopSail" (formerly GenoaII) and would provide IT tools to help anticipate and preempt terrorist
attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005. edit]Media coverageand criticism .... The first mention of the IAO in the
mainstreammedia came from The New York Times reporter J ohn Markoff on February 13, 2002. 28] Initial reports contained few details about the program. In the following months,
as more information emerged about the scope of the TIA project, civil libertarians became concerned over what they saw as the potential for the development of an Orwellian mass
surveillance system. On November 14, 2002, The New York Times published a column by WilliamSafire in which he claimed " TIA] has been given a $200 million budget to create
computer dossiers on 300 million Americans." 29] Safire has been credited with triggering the anti-TIA movement. 30]
BICA: project to create "Biologically Inspired Cognitive Architectures"
Bootstrapped Learning: a project to bring about "instructablecomputing" by driving the creation of machine learning algorithms that are responsive to models of human-to-human
instruction
LifeLog, an IPTO project "to trace the 'threads' of an individual's life in terms of events, states, and relationships" by creating "an ontology-based (sub)systemthat captures, stores,
and makes accessible the flow of one persons experience in and interactions with the world in order to support a broad spectrumof associates/assistants and other system
capabilities."
FORESTER: a program to develop a helicopter-borne radar system that can detect soldiers and vehicles moving underneath folliage cover
VIRAT: analysis and storage of video surveillance data
Deep Green: U.S. Army battlefield decision-making support system
Heterogeneous Urban RSTA Team: aerial surveillance program designed to monitor cities with self-directed UAVs
High Productivity Computing Systems: project for developing a new generation of economically viable high productivity computing systems for national security and industry in
the 2007 to 2010 timeframe
Digital TV top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier
Foundation working to
Cnet Tech News First
ISP Planet news
PrivacyDigest privacy news
Ad-ID
Ad-ID.org
Advertising Digital
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
protect civil and free speech
& lawsuit
Electronic Privacy
Information Center lawsuits,
FBI, FOI
White Dot find out how to
free yourself from television.
Spy TV, Interactive TV, .
Googlewatch watch how
Google undermines net
Homeland Security Law
threatens privacy
Privacy International Human
rights group, watchdog on
surveillance by govt/biz
ZDNet, UK news
Wikipedia NSA National Security Agency, warrantless wiretapping, administrative subpoena, National Security
letter.
Wikipedia MKUltra Project MKUltra, or MK-Ultra, was a covert, illegal human research program into behavioral
modification run by the Central Intelligence Agency's (CIA) Office of Scientific Intelligence. The program began in
the early 1950s, was officially sanctioned in 1953, was reduced in scope in 1964, further curtailed in 1967 and finally
halted in 1973. 1] The program used unwitting U.S. and Canadian citizens as its test subjects, which led to
controversy regarding its legitimacy.

Identification, LLC
American
Advertising
Federation
legislative news,
J udy Hu, of
General Electric on
Board of Directors,
Secretary.
Association of
National
Advertisers help
develop Ad-ID,
Self Regulation
Guidance,
American
Association of
Advertising
Agencies
Management
oriented trade
organization reps
advertising agency
biz in U.S. likely
to endorse Bush.
Chartered Institute
of Marketing, UK,
info resource for
marketing / sales.
Service, News.
Worlds largest
marketing body

There is a connection between NSA phone records database , Amdocs and 9/11.
The pic on left
is a composite
of Government
photos
(download) of
Pentagon 9/11.
Where's the airliner
wreckage?
The collapse of the
building section did
not occur until 30
minutes after the
impact
The lawn was not
touched by the
attack aircraft.
almost no 2nd floor
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
damage.
Generator trailer
(fire) holds
significant clues.
See National Fire
Protection
Association
analysis.
See event summary
See alphabetic
index of terms
DNA databases top
PROGRESSIVE REFERENCE
CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry of Homeland Security
CDI Center for Defense Information
Center for Democracy and Technology, domestic
spying watch
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
Electronic Privacy Information Center lawsuits, FBI,
FOI
Epic Electronic Privacy Information Center
Privacy International Human rights group, watchdog
on surveillance by govt/biz
World Watch Daily Christian perspective on
Cnet Tech News First
ISP Planet news
J urist University of Pittsburg, School of Law,
Primary sources. Global perspective
PrivacyDigest privacy news

Center for Strategic and International Studies
CIA Central Intelligence Agency
Engelhart Institute of Molecular Biology sear
Rutherford Institute in defense of civil liberties and
human rights

Drones & Balloons, HART/HURT top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
drones, unmanned, Armed Services Committee
Big Brother and the ministry of Homeland Security
CyberArmy chat, forums
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name
of special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
PrivacyToday news
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
ISP Planet news
Senate Commerce, Science and Transportation
Committee
Senate Committee on Commerce, Science and
Transportation
AUVSI Assc. for Unmanned Vehicle Systems
Intenational
GovExec: Surveillancedrones protect pipelines,
monitor traffic on highways, and 'aid in other
homeland security missions'. 12/02. Transportation
Department Research and Special Programs
Administration

CIA Central Intelligence Agency
FCC, Powell
House Armed Services Committee News
Lockheed Martin US personal database, defense
contractor, Bush
J anes Headlines Defense news
Pentagon
Securius.com defending cyberspace security
Whitehouse.gov Bush war on the internet
Wikipedia The Heterogeneous Aerial Reconnaissance Team(HART) -- formerly known as the "Heterogeneous Urban RSTA Team(HURT)" -- program was an aerial surveillance
project funded by the Information Processing Technology Office (which was merged into the Wikipedia Information Innovation Office) of
the Defense Advanced Research Projects Agency with program managers J ohn Bay and Michael Pagels. The purpose of the program was to develop systems that could provide
continuous, real-time, three-dimensional surveillance of largeurbanized areas, using unmanned aerial vehicles. The project team was led by Northrop Grumman corporation, and
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
involved several other academic and corporate researchers.Theunique features of the HART program are that it developed systems to "decouple soldiers from flight control" -- that
is, the UAVs automatically pilot themselvestaking care of flight control, collision prevention, and camera/sensor control automatically. When the drones notice suspicious activity,
they notify the person with the HART control panel so that they can monitor the situation. Another feature of HART was to design handheld devices, to display surveillance video to
small unit leaders in the field (as opposed to only being availableto officers/agents in a control room). A third significant feature is that troops can request surveillance in an area,
and a set of drones will automatically come over and take care of it themselvesall the soldiers have to do is ask for it, and then they can forget about it.
and also see Totse Suspicious Activities
Involving Israeli Art Students at DEA
Facilities by DEA
Remember FBI
wiretaps of Martin Luther King,
What are connections between Amdocs, Narus
(Semantic Traffic Analysis) and NSA phone
records database? Tony Snow, Carl Cameron,
FoxNews report on Israeli art students
removed? Why?
Drug Testing top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
ISP Planet news
National Clearinghouse for Alcohol and Drug
Information NCADI, info on alcohol, tobacco, and
illicit drugs
Substance Abuse and Mental Health Services
Administration U.S. Dept of Health and Human
Services
Government Executive, Poindexter... Whitehouse
support.
National Clearinghouse for Alcohol and Drug
Information NCADI, info on alcohol, tobacco, and
illicit drugs
Prevention.org supports No Child Left Behind, Bush
Whitehouse.gov Bush war on the internet
DSL Internet Service top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
ISP Planet news
DSL Reports news
FCC, Powell
New York Times NSA executive order authorizing data
mining of phone calls and file.
Whitehouse
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Echelon top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry of Homeland Security
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
Epic Electronic Privacy Information Center
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name
of special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
Austrian Research Center, European Union, Echelon,
encryption, to develop unbreakable code that Echelon
cant' break.
History of the Internet DARPA
J urist University of Pittsburg, School of Law,
Primary sources. Global perspective
Center for Strategic and International Studies
Cybersecurity Enhancement Act
Critical Infrastructure Assurance Office ciao.gov
New York Times NSA executive order authorizing data
mining of phone calls and file.
Einstein, Network Infrastructure Security, Deep Packet Inspection
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry of Homeland Security
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
RipoffReport Certifion Certifion Corporation -
Locate America ripoff company made additional
charges of $60+to my credit card without my
permission Internet *Editor's Suggestions on how to
get your money back into your bank account!
notes: Accurint, ChoicePoint's Autotrack or
LexisNexis
GlobalResearch Under the rubric of cybersecurity,
the Obama administration is moving forward with a
Bush regime program to screen state computer traffic
on private-sector networks, including those
connecting people to the Internet, The Washington
Post revealed J uly 3.
Certifion
Entersect a subsidiary of Certifion,
LocatePlus claims it maintains 12 billion records about
98 percent of Americans.
Washington Post
notes Despite protests to the contrary by securocrats,
like other Bush and Obama cybersecurity initiatives
the Einstein program is a backdoor for pervasive state
surveillance. Government Computer News reported in
December 2008 that Marc Rotenberg, the executive
director of the Electronic Privacy Information Center
(EPIC) said that the misuse or exposureof sensitive
data from such a program Einstein] could undermine
the security arguments for surveillance.
WMR "... WMR has learned from government sources that the Bush administration has authorized massive surveillance of the Internet using as cover a cyber-security multi-billion
dollar project called the "Einstein" program. ... Billed as a cyber-security intrusion detection system for federal computer systems and networks, WMR has been told that the
actual intent of Einstein is to initially monitor the email and web surfing activities of federal employees and contractors and not in protecting government computer systems from
intrusion by outsiders. ... In February 2008, President Bush signed a directive that designated the National Security Agency (NSA) as the central administrator for the federal
government's computer and network security. ... Although Einstein is primarily a program under the aegis of the Computer Emergency Readiness Team(US-CERT) of the
National Cyber Security Division of the Homeland Security Department, WMR has learned that it has the personal support of Director of National Intelligence (DNI) Mike
McConnell, a former NSA director. Einstein is advertised as merely conducting traffic analysis within the dot (.) gov and dot (.) mil domains, including data packet lengths,
protocols, sourceand destination IP addresses, sourceand destination ports, time stamp information, and autonomous system numbers. However, WMR has learned that Einstein
will also bore down into the text of email and analyze message content. In fact, most of the classified budget allotted to Einstein is being used for collecting information from the
text of messages and not the header data." full story ... more search terms: PINWHEEL, PINWALE, GCSB, New Zealand, private sector surveillance, black projects, .com, .edu,
.int, .gov, .mil, FCC, black budgets, Vodaphone, cellular phone eavesdropping, Greece, locked field, trap door, sub system,
GlobalResearch Called the flagship system in the national security states cyber defense arsenal, The Wall Street J ournal reports that Einstein is designed to protect the U.S.
governments computer networks from cyberspies. In addition to cost overruns and mismanagement by outsourced contractors, the system is being stymied by technical
limitations and privacy concerns. According to the J ournal, Einstein is being developed in threestages: Einstein 1: Monitors Internet traffic flowing in and out of federal civilian
networks. Detects abnormalities that might be cyber attacks. Is unable to block attacks. Einstein 2: In addition to looking for abnormalities, detects viruses and other indicators of
attacks based on signatures of known incidents, and alerts analysts immediately. Also cant block attacks. Einstein 3: Under development. Based on technology developed for a
National Security Agency program called Tutelage, it detects and deflects security breaches. Its filtering technology can read the content of email and other communications.
(Siobhan Gorman, Troubles Plague Cyberspy Defense, The Wall Street J ournal, J uly 3, 2009)
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Electronic Passport, top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry of Homeland Security
Center for Democracy and Technology Elect
Epic Electronic Privacy Information Center
The Nation History and structure of global telegraphic
surveillance
Cnet Tech News First
Notes: search terms, carrier-grade networks,
NetDiscovery, IP-based, intelligent infrastructure
services, IP security and compliancemanagement,
NarusSecure, monitoring, VOIP, IMS, IPTV, real-
time traffic insight, NarusInsight,
Center for Strategic and International Studies
Cybersecurity Enhancement Act
FCC, won't investigate warrantless wiretapping
because Bush effectively used the StateSecrets
defense to shut probe down.
New York Times NSA executive order authorizing
data mining of phone calls and file.
Email Surveillance, top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry of Homeland Security
Center for Democracy and Technology Elect
Epic Electronic Privacy Information Center
The Nation History and structure of global telegraphic
surveillance
Salon Israeli art students, DEA, Amdocs searchable
file
Cnet Tech News First
Notes: search terms, carrier-grade networks,
NetDiscovery, IP-based, intelligent infrastructure
services, IP security and compliancemanagement,
NarusSecure, monitoring, VOIP, IMS, IPTV, real-
time traffic insight, NarusInsight,
Are Republicans opposed to Bush's warrantless
wiretapping irrelevant and impotent?
Center for Strategic and International Studies
Cybersecurity Enhancement Act
FCC, won't investigate warrantless wiretapping
because Bush effectively used the StateSecrets
defense to shut probe down.
New York Times NSA executive order authorizing
data mining of phone calls and file.
Entersect top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Big Brother and the ministry of Homeland Security
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
RipoffReport Certifion Certifion Corporation -
Locate America ripoff company made additional
charges of $60+to my credit card without my
permission Internet *Editor's Suggestions on how to
get your money back into your bank account!
notes: Accurint, ChoicePoint's Autotrack or
LexisNexis
Certifion
Entersect a subsidiary of Certifion,
LocatePlus claims it maintains 12 billion records about
98 percent of Americans.
Washington Post

WayneMadsenReport An April 2, 2008 article in The Washington Post by Robert O'Harrow that reported on the expansion of intelligence "fusion centers" around the country that are
compiling personal information on Americans from a CIA database called "Proton," the FBI, police departments, and private data mining firms referred to a little-known private data
company called Entersect, which is routinely tapped by Maryland law enforcement and homeland security entities. ... The Post article stated that Entersect has 12 billion files on 98
percent of Americans. Entersect is headquartered in Santa Ana, California and is a subsidiary of Certifion Corporation, which is, in turn, a wholly-owned subsidiary of LocatePlus
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Holdings Corporation. LocatePlus' other subsidiaries are LocatePlus Corp., Dataphant, Inc. (which acquired Voice Power Technology, Inc.), and Metrigenics, Inc., a biometrics firm.
WMR NSA / Trailblazer More high-level fraud at NSA uncovered J anuary 18-19, 2012 -- WMR's sources at the National Security Agency (NSA) have
reported more high-level fraud at the agency that now combines signals intelligence and cyber-warfare functions under one officer, Army General Keith Alexander, the NSA
director and commander of the U.S. Cyber Command. ... When Alexander's predecessor at NSA, Air Force General Michael Hayden, was shopping for his own replacement,
Alexander was the Deputy Chief of Staff for G-2 for the U.S. Army. Alexander would only take the job, according to our sources who were embedded in the Director of NSA's
office, if Dr. J ames Heath became the senior science adviser to Alexander at NSA. ... There was only one problem. Heath had his own company, Object Sciences Corporation, a
firm which was intimately involved with tracking "Al Qaeda" operatives prior to the 9/11 attacks. Object Sciences provided deep data mining services to the Army's Land
Information Warfare Agency's and Defense Intelligence Agency's ABLE DANGER and its affiliated DORHAWK GALLEY data mining programs. ... At the same time, Hayden
had shown favoritism to Science Applications International Corporation (SAIC) in awarding the firm, as prime contractor, the over one billion dollar signals intelligence overhaul
program known as TRAILBLAZER. Hayden hired WilliamBlack, a former NSA official who had retired and went to work for SAIC, as his Deputy Director at NSA. The issue
with Heath was solved when SAIC purchased Object Sciences, providing a handsome profit to Heath prior to his taking the science adviser position under his friend Alexander.
Black eventually returned to SAIC from his stint as NSA deputy director. ... The following press release was issued on May 12, 2005: "Science Applications International Corp.
has completed its acquisition of Object Sciences Corp., the company announced today. Terms of the deal were not disclosed . . . OSC's involvement in reshaping how intelligence
surveillance and reconnaissance information is processed and analyzed has provided critical assistanceto combat forces in specific theaters, such as Iraq and Korea, as well as the
war on global terrorismin general, SAIC said." ... Alexander took over as NSA director on August 1, 2005, a few months after the SAIC-OSC deal. Heath then became
Alexander's chief science adviser. ... Another former SAIC principal who, like Black, transitioned from SAIC to NSA and back again to SAIC was Sam Visner. After joining
NSA from SAIC, Visner was the senior acquisition manager for NSA and was key to the award of the TRAILBLAZERcontract to SAIC. A less expensivesignals intelligence re-
engineering solution code-named THIN THREAD, was rejected by NSA in favor of the TRAILBLAZER, which was later canceled after SAIC pocketed hundreds of millions of
dollars. ... Hayden went on to become the first deputy Director of National Intelligence and, ultimately, the CIA director. He now works with former Homeland Security Secretary
Michael Chertoff at Chertoff Group. His pet project, TRAILBLAZER, was canceled due to cost overruns and failed deliveries and was replaced by another reported contractor
boondoggle called TURBULENCE. A number of senior NSA, J ustice Department, and congressional officials were harassed and one, Thomas Drake, prosecuted for revealing the
corruption. Those coming under NSA and FBI scrutiny, all subjected to harassment and threat of prosecution, included, in addition to Drake, J ustice Department prosecutor Thomas
Tamm, House Intelligence Committee budget specialist Diane Roark, NSA officials WilliamBinney, Kirk Wiebe, and Ed Loomis, and others, never mentioned in press accounts,
who were interviewed by WMR. ... One former NSA official who was terminated and then placed under NSA Security and FBI surveillance after reporting through proper
channels fraud, waste, and abuse with TRAILBLAZER and associated contracts, told WMR, "we are not whistleblowers but witnesses to major crimes committed by NSA and
contractors." ... Among the spin-offs of TRAILBLAZERwas the unconstitutional STELLAR WIND program that permitted NSA to engage in wholesalewarrantless wiretapping
of phone calls, emails, and faxes, particularly journalists and elected political leaders. ... Hayden, who has become a national security adviser to Mitt Romney and would be
assured a top-level job in a Romney administration, perhaps National Security Adviser, is also involved with a subscription web service called LIGNet, or "Langley Intelligence
Group Network" as a "LIGNet adviser." WMR has been told by intelligence community insiders that LIGNet is an operational security (OPSEC) problem because a wealth of
borderline classified information appears on the web site. ... Some of the LIGNet information makes what was released in the WikiLeaks Department of Statecable release pale in
comparison. As for charges that Private First Class Bradley Manning was responsible for downloading over a quarter million classified cables from the Secret Internet Protocol
Router Network (SIPRNet), a former senior NSA official told WMR: "That is impossible. All SIPRNet drives are non-writable for CDs and as far as thumb drives are concerned,
install one and security alarms are immediately set off."
EZPass top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
Cnet Tech News First
J urist University of Pittsburg, School of Law,
Primary sources. Global perspective
AP Yahoo story below
MotorAuthority Kapsch has a ten-year agreement in
place to provide transponders for 22 electronic toll
systems across the United States. Kapschs latest
patent filing is for a transponder equipped with a
multi-function camera system, for the purpose of
verifying the number of occupants within a vehicle. In
other words, future Kapsch transponders may have the
ability to monitor the inside of your car.
FBI
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
MotorAuthority Automated toll transponder systems, like EZ Pass used in the Northeast, make life easier for those who commute on toll roads, across bridges and through tunnels.
Despite initial paranoia over the devices ability to track your speed from one point to another, no tickets have ever been issued to motorists who arrived at a toll plaza early,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
courtesy of a heavy right foot. With that in mind, thereare two ways to look at the latest advance in transponder systems: its either no big deal, or its the stuff of an Oliver-Stone-
film-induced nightmare. Kapsch TrafficCom AG is an Austrian company that manufactures transponders for programs such as EZ Pass. In fact, Kapsch has a ten-year agreement in
place to provide transponders for 22 electronic toll systems across the United States. Kapschs latest patent filing is for a transponder equipped with a multi-function camera system,
for the purpose of verifying the number of occupants within a vehicle. In other words, future Kapsch transponders may have the ability to monitor the inside of your car.
Facial Recognition top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
Cnet Tech News First
J urist University of Pittsburg, School of Law,
Primary sources. Global perspective
AP Yahoo story below
FBI
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
FBI Tracking Devices top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
Cnet Tech News First
Ifixit We partnered with Wired to bring you a peek
inside an FBI car-tracking device. The deviceis
similar to the one Yasir Afifi found underneath his car.
J urist University of Pittsburg, School of Law, Primary
sources. Global perspective
AP Yahoo story below
FBI
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
Ifixit We partnered with Wired to bring you a peek inside an FBI car-tracking device. The deviceis similar to the one Yasir Afifi found underneath his car. If you'recurious where
this one came from, Wired has posted a writeup about Kathy Thomas, the woman who found this tracker under her car. They've also posted a video of Kyle doing the teardown. ...
The devicecomprises of a GPS unit for receiving the car's position, an RF transmitter for relaying your location to the interested authority (aka the FBI), and a set of sweet D-cell
batteries that power the whole enchilada. But we didn't stop there, of course. Read on to find out exactly what components make this secretive devicetick. ... Disclaimer: We love
the FBI. We've worked with themon several occasions to fight crime and locate criminals. We've helped themwith instructions on gaining entry into certain devices. We have
nothing against them, and we hope they don't come after us for publishing this teardown.
FBI Surveillance top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
Cnet Tech News First
J urist University of Pittsburg, School of Law, Primary
sources. Global perspective
AP Yahoo story below
FBI
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
FEMA secret databases top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
Cnet Tech News First FBI
FDIC
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that
depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliancewith the BSA and the implementing regulations 31 CFR 103.
The FDIC monitors compliancewith the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA complianceis a safety
and soundness issuedue to the reputational, regulatory, legal, and financial risk exposureto the bank for being involved in money laundering schemes or willfully violating the BSA
statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings.
Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance.
Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States
to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable
instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify
money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be
withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including
provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML")
or jointly as BSA/AML. 1]
FDIC Bank Transaction Surveillance top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
WayneMadsenReport on Entersect, Certifion,
LocatePlus, Bush data mining
Cnet Tech News First FBI
FDIC
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
FDIC The FDIC has prescribed in its regulations, Section 326, Subpart B- Procedures for Monitoring Bank Secrecy Act Compliance (12 CFR Part 326.8) a requirement that
depository institutions establish and maintain procedures reasonably designed to assure and monitor the compliancewith the BSA and the implementing regulations 31 CFR 103.
The FDIC monitors compliancewith the BSA-related regulations by conducting on-site examinations of every FDIC-supervised depository institutions. BSA complianceis a safety
and soundness issuedue to the reputational, regulatory, legal, and financial risk exposureto the bank for being involved in money laundering schemes or willfully violating the BSA
statute. Civil money penalties and regulatory enforcement actions may be imposed for noncompliance with money laundering regulations which can endanger capital and earnings.
Furthermore, banks may be criminally prosecuted for willful violations of money laundering statutes, which could ultimately lead to termination of FDIC insurance.
Wikipedia The Bank Secrecy Act of 1970 (or BSA, or otherwise known as the Currency and Foreign Transactions Reporting Act) requires financial institutions in the United States
to assist U.S. government agencies to detect and prevent money laundering. Specifically, the act requires financial institutions to keep records of cash purchases of negotiable
instruments, and file reports of cash purchases of these negotiable instruments of more than $10,000 (daily aggregate amount), and to report suspicious activity that might signify
money laundering, tax evasion, or other criminal activities. Many banks will no longer sell negotiable instruments when they are purchased with cash, requiring the purchase to be
withdrawn from an account at that institution. The BSA was originally passed by the Congress of the United States in 1970, and amended several times since then, including
provisions in title III of the USA PATRIOT Act. (See 31 USC 5311-5330 and 31 CFR Chapter X.) The BSA is sometimes referred to as an "anti-money laundering" law ("AML")
or jointly as BSA/AML. 1]
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
FirstFruits, Warrantless Surveillance of American Journalists top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Arstechnica evesdropping on American J ournalists,
for data mining,.
Electronic Frontier Foundation working to protect
civil and free speech
Big Brother and the ministry of Homeland Security
DailyKOS
Insider Magazine reprint Madsen Bill Gertz of The
Washington Times features prominently in the
database. Before Hayden's reign and during the
Clinton administration, Gertz was often leaked
classified documents by anti-Clinton intelligence
officials in an attempt to demonstrate that collusion
between the administration and China was hurting
U.S. national security.
Arstechnica evesdropping on American J ournalists,
for data mining,.
What is Tearerism?
Summary,
NSA listening to private
conversations of Americans,
data mining, blackmail?
ABCNews , Senate Intelligence
Committee, J ay Rockefeller
investigating.
FIRSTFRUITS NSA wiretaps of
American J ournalists, program revealed
by Wayne Madsen, name of program
then changed. WMR Higher Than Top
Secret
Daily Newscaster Martial Law Training,
Indianapolis --- J une, 2008
Neil Entwistle, 911, FAA, NORAD,
Ptech, foreknowledgeof 911
communication systems role in 911,
convicted of murder, questionable trial,
proceedings.

Cnet Tech News First
J urist University of Pittsburg, School of Law, Primary
sources. Global perspective
AP Yahoo story below
notes: WMR has learned from additional National
Security Agency (NSA) sources that this editor's
(Madsen) communications -- cell
phone, e-mail, text messages, and
faxes -- are under a full digital
interception order by the NSA.
Previously, I was informed by NSA sources that a "full
digital" surveillance package was authorized on all my
communications. ... It is becoming apparent that the
"Eyes Only"/compartmented code word program
authorized by President George W. Bush and Vice
President Dick Cheney in the wake of the 9/11 attacks
included warrantless surveillance of American
journalists and their sources. WMR exposed the
existence of a database containing journalist
surveillance data that was code-named
ABCNews
FBI
New York Times NSA executive order authorizing
data mining of phone calls and file.
Whitehouse Bush
Republicans opposed to Bush Warrantless
wiretapping are irrelevant and impotent.
UPI file In order that the database did not violate
United States Signals Intelligence Directive (USSID)
18, which specifies that the names of "U.S. persons"
are to be deleted through a process known as
minimization, the names of subject journalists were
blanked out. However, in a violation of USSID 18,
certain high level users could unlock the database
field through a super-user status and view the
"phantomnames" of the journalists in question. Some
of the "source" information in FIRSTFRUITS was
classifiedan indication that some of the articles in
database were not obtained through open source
means. In fact, NSA insiders report that the
communications monitoring tasking system known as
ECHELON is being used more frequently for purely
political eavesdropping having nothing to do with
national security or counter terrorism.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
"FIRSTFRUITS" before the code name was changed
after our disclosure.
WMR Higher Than Top Secret "Oneof the most classified surveillance programs in the Bush administration was so limited in access only very few individuals, including
President George W. Bush, Vice President Dick Cheney, Cheney Chief of Staff David Addington, CIA director Michael Hayden, FBI director Robert Mueller, then-White House
Chief of Staff Andrew Card, and threesuccessive Attorneys General -- J ohn Ashcroft, Alberto Gonzales, and Michael Mukasey -- know of its existence. ... Known by a code word,
sometimes abbreviated, following the classification TOP SECRET - EYES ONLY and which was contained on some files that Gonzales took home with him and kept in an
unsecured manner against J ustice Department regulations, the warrantless National Security Agency (NSA) surveillance program was so beyond legality that acting Attorney
General J ames Comey refused to re-certify it upon its expiration in March 2004. There is a strong possibility that the code word program was connected to the NSA surveillance
program aimed at tracking down leaks of classified information to the media from government sources. The leak tracking program was code named FIRSTFRUITS. Due the
program's revelations by WMR, NSA has renamed the operation with a new code word. Previously, WMR learned from an informed sourcethat part of the domestic surveillance
system may have also involved a Federal Emergency Management Agency (FEMA) database of suspect Americans. The database is called Main Core. "
DailyKOS "Apparently, they've also been spying on other members of the government who may have been potential
whistleblowers, journalists and even members of Congress. ... NSA spied on its own employees, other U.S. intelligence personnel, and their journalist
and congressional contacts. WMR has learned that the National Security Agency (NSA), on the orders of the Bush administration, eavesdropped on the private conversations and e-
mail of its own employees, employees of other U.S. intelligence agencies -- including the CIA and DIA -- and their contacts in the media, Congress, and oversight agencies and
offices. ... The journalist surveillance program, code named "Firstfruits," was part of a Director of Central Intelligence (DCI) program that was maintained at least until October
2004 and was authorized by then-DCI Porter Goss. Firstfruits was authorized as part of a DCI "Countering Denial and Deception" program responsible to an entity known as the
Foreign Denial and Deception Committee (FDDC). Since the intelligence community's reorganization, the DCI has been replaced by the Director of National Intelligence headed by
J ohn Negroponte and his deputy, former NSA director Gen. Michael Hayden."
Wired blog "Inside Operation Highlander: the NSA's Wiretapping of Americans Abroad ... A top secret NSA wiretapping facility in Georgia accused of spying on Americans
illegally was hastily staffed with inexperienced reservists in the months following September 11, where they worked under conflicting orders and with little supervision, according
to threeformer workers at the spy complex. ... "Nobody knew exactly what the heck we were doing," said a former translator for the project, code named Highlander, who spoke
on condition of anonymity. "We were figuring out the rules as we were going along." ... Former Army Reserve linguist Adrienne Kinne, who worked at the facility at Fort
Gordon, won new attention this week for her year-old claimthat she and her group intercepted and transcribed satellite phone calls of American civilians in the Middle East for the
National Security Agency. Senate intelligence committee chair J ay Rockefeller (D-W.Va.) opened a probe into the alleged abuses after ABC News reported on themThursday." Oct
2008
Garden Plot, Blog Tracking top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Amnesty International
Anthrax Vaccination Immunization ProgramArmy
cover-up, search court martial
Arms Sales Monitoring
Carlyle Group.net
Center for Constitutional Rights, watching the events of
Guantanamo, detainees, Supreme Court decisions.
Center for Defense Information weekly defense monitor
Center for Peace and Liberty, The Independent Institute
Center for Public Integrity midwife a terrorist
Conciliation Resources
Daily KOS
DissidentVoice 13 myths about case for war against Iraq
Garden Plot Summary,
Daily Newscaster Martial Law Training,
Indianapolis --- J une, 2008
What is Tearerism?
Neil Entwistle, 911, FAA, NORAD, Ptech
American Service-Members' Protection Act
Anti TerrorismCoalition, Islamis taking over the world
American Turkish Council
Battelle Memorial Institute develops new tech,
commercializes products
CISAC Stanford links
CNS News search, flushed Quran down toilet, US,
Guantanamo
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Ethical Spectacle Free speech, Bush fascism, what's
next.
Eurolegal Services International institutions, news,
comment, Middle East affairs, Iraq Body Count, Iraqi
resistance to occupation.
Go to
Bush / Obama warrantless surveillance of
American Journalists...program: FirstFruits
FAS search National Intelligence estimate
Findlaw, War on TerrorismSpecial coverage
Fired UP search terms: American Turkish Council,
Hastert, Sibel Edmonds,
Glasgow Media Group promote new research
methodologies on the media
Global Policy Watching Guantanamo
Global Witness International
GlobalVision News Network news / info from the inside
out
Guardian "Israel accused of using deadly new weapon in
Gaza. death due to unseen injuries, severe burning, deep
internal wounds, 'dusting' on severely damaged internal
organs, bodies severely fragmented, melted, disfigured.
DIME weapon: carbon fibre casing and contains fine
tungsten particles, limited blast radius, Dense Inert Metal
Explosive.
Human Rights Watch
Human Rights First, formerly Lawyers Committee for
Human Rights
IACenter Founded by Ramsey Clark
Indymedia.uk anthrax Bush, Bin Laden, search
Walsh Report, National
Archives search: Robert Gates, nominee for Secretary of
Defense and go to NFU 'War on Terrorism' pages for
more
Emp-zan) Iraq -- NFU visitor
American Immigration Lawyers Association search
Patriot Act
Center for Strategic and International Studies
Conflict Watch
FreePeoplesFifthEstate CIA/Mossad/SIS hit in Pakistan,
also responsible for deaths of J ournalist Daniel Pearl,
Nick Berg: Al-Qaida is the code name of special covert
operations of the U.S. CIA, Israeli Mossad, British SIS,
Indian RAW
IAEA International Atomic Energy Association
Institute for Defence and Strategic Studies, Singapore,
Thailand, links and thing tanks
Intel Daily, Sarkozy, "peopleare born pedophiles",
International Committee of the Red Cross, why did they
wait months to report Iraq prison abuse.
International Relations and Security Network, Swiss
Contribution to the Partnership for Peace
International TerrorismObservatory, Paris, France
Legislation related to 9/11
National CFIDS Foundation Chronic FatigueImmune
Dysfunction, ME, Myalgic Encephalopathy
National Security Archive in periodically releases
unclassified docs.
North American Freedom Foundation "Advocating for
U.S. and Canadian victims and survivors of mind control,
torture, slavery, and related terror through education and
remembrance."
Strategic Intelligence, from Loyola College Department
of Political Science
Times OnlineThe US is helping Morocco to build a new
interrogation and detention facility for Al-Qaeda suspects
near its capital, Rabat. search terms: Ain Aouda,
Direction de la Securit du Territoire (DST), Temara,
Moroccan secret police, rendition, CIA, Rumsfeld
UN NewsCentre
Office of Managing Risk and Public Safety
Urban Institute
UCLA, Dept of Epidemiology, School of Public Health
URUKnet Abu Ghraib
FEMA
Concentration Camp, Beech Grove, Indiana
YouTube
enlarge for full map
and FEMA Concentration Camps list and Liberty Post
Council on Foreign Relations corporate power to rural
poor Republicans
Danger Zone J obs.com
DARPA Defense Advanced Research Projects Agency
DefendAmerica
Dept of Homeland Security
Dept of State, International Info Prg Response to Terror
FEMA fake news conference
YouTube and more below Fox news
FBI War on Terrorism, most wanted list,
Gyre.org tracking the next military & tech revolutions.
Iraq, Facing the Threat
International Policy Institute for Counter-Terrorism,
Terrorismdatabase
Institute for Science and International Security
International Committee of the Red Cross, why did they
wait months to report Iraq prison abuse.
Lt. Gen WilliamG. Boykin, Pentagon investigation has
concluded that he violated regulations by failing to make
clear he was not speaking in an official capacity, when
he made church speeches casting the "war on terrorism"
in religious terms. In most cases he was wearing his
uniform. Search CBS News for more information.
National Intelligence Council Iraq War estimate.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Go to NewsFollowup.com
Economy Page
Intervention Magazine, "War, Politics, Culture",
Liberty Dogs, the Homeland Security Watchdogs
Military Corruption.comanthrax vaccine info, court
martial
Multinational Monitor column on corporate power
New American Bargain blog, politics: Oliver North was
central figure in Reagon Iran-Contra scandal, a convicted
felon for funneling arms and money to Nicaraguan
Contras in violation of 1984 Bolland Amendment.
Conviction overturned by Laurence Silberman, the
chairman of the Bush's WMD committee.
News from Russia Pravda, Israel, search
Not in Our Name
NoWarIraq
Pacific Life Research Center Understanding the 'war on
terrorism'.pdf
ProgresoWeekly UN has learned of allegations of
terrorist prison ships, Indian Ocean, Diego Garcia
island
Refuse & Resist
RightWeb, American Turkish Council
Sibel Edmonds, J ust a Citizen, official
SourceWatch on Sibel Edmonds, search terms: translator
hired by FBI after 9/11, Washington D.C. U.S. Court of
Appeals, unable to open hearings, whistleblower,
Stanton, Madsen
Talking Points Memo
Third World Traveler alternate view of democracy
The FireThis Time Weapons of Mass Deception
Transparency International
Who Dies for Bush Lies
World Peace Herald, on Pentagon stops Weldon /
Atta file destruction probe.
Web Index, 9/11, J ohns Hopkins
notes
Office of Special Plans? Mother J ones, on Pentagon
intelligence unit built case for Iraq war. more search
words: Kwiatkowski, NESA, Wolfowitz, Feith,
Committee for the Liberation of Iraq. Ignore
Palestinians, go for regime change in region. Harold
Rhode, American Enterprise Institute, Defense Policy
Board, David Wurmser. They all knew therewas no
noteworthy link between Al Qaeda and Iraq.
NATIONAL SECURITY PRESIDENTIAL DIRECTIVE / NSPD 51
HOMELAND SECURITY PRESIDENTIAL DIRECTIVE / HSPD-20
notes Chad, War on Terror, oil, France, Sarkozy
Cnet Tech News First
AngelBabe43 Operation Cable Splicer and Garden Plot
are the two sub programs which will be implemented
once the Rex 84 program is initiated for its proper
purpose.
Wikipedia MKUltra Project MKUltra, or MK-Ultra, was
a covert, illegal human research program into behavioral
modification run by the Central Intelligence Agency's
(CIA) Office of Scientific Intelligence. The program
began in the early 1950s, was officially sanctioned in
1953, was reduced in scope in 1964, further curtailed in
1967 and finally halted in 1973. 1] The program used
unwitting U.S. and Canadian citizens as its test subjects,
which led to controversy regarding its legitimacy. 2] 3] 4]
5] MKUltra involved the use of many methodologies to
manipulate people's individual mental states and alter
brain functions, including the surreptitious administration
of drugs (especially LSD) and other chemicals, hypnosis,
sensory deprivation, isolation, verbal and sexual abuse, as
well as various forms of torture. 6]

NBC Industry Group CB Defense systems
National Strategy to Secure Cyberspace Whitehouse,
Bush, Cheney, 'war on terrorism'
FEMA Concentration Camp, Beech Grove,
Indiana YouTube
New York Times force feeding detainees
NTI WMD411 preventing spread of wmd
PNNL, neural network, protein research, operated by
Battelle, with Agilent
Patterns of Global TerrorismUS StateDept
Harvard, Risk of death, bioterroism, 1 in 56 million
StateDept Counter TerrorismOffice, Counterterrorism
Office, codewords
Solutions North America,, Charles P. Sexton,
TerrorismQ&A
TerrorismResearch Center security analysis, terrorist
profiles, links,
TIP Terrorist Interdiction ProgramStateDept
War on TerrorismAmerican Enterprise Institute
War on Terrorism, Chicago Sun Times
Weldon: Atta papers destroyed on orders, letter
Weekly Defense Monitor
Wilmer Cutler & Pickering Chi
Winds of Change 'Covering the War on Terror'
Wisconson Project
Cybersecurity Enhancement Act
FCC, Powell
J ustice Technology Information Network, National Law
Enforcement and Corrections Technology Center.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Wikipedia The Operation Garden Plot is a map of the U.S. Army and the National Guard of the United States to respond to major disasters in civil society within the United States. The
plan was developed in the 1960s to respond to civil disorder and is now under the control of Northern Command ( NORTHCOM ). It allows the military to help U.S. federal law
enforcement to assist local governments in the States of the United States for public order problems. Operation Garden Plot was implemented to provide military assistanceto civil
authorities during the attacks of September 11, 2001 in New York triggering the operation Noble Eagle Protection airspace. The Pentagon has also developed this project to restore public
order during the 1992 riots in Los Angeles . "The monitoring of these missions on national security should be provided by the NGB (National Guard Bureau) based on the model" Garden
Plot "to which National Guard units are trained and equipped to support our missions to the civil authorities Crowd control problems and maintaining public order. " 1
AngelBabe43 Operation Cable Splicer and Garden Plot are the two sub programs which will be implemented once the Rex 84 program is initiated for its proper purpose. Garden Plot is the
program to control the population. Cable Splicer is the program for an orderly takeover of the state and local governments by the federal government. FEMA is the executive arm of the
coming police state and thus will head up all operations. The Presidential ExecutiveOrders already listed on the Federal Register also are part of the legal framework for this operation.
WMR has been investigating a covert operation involving active duty and reserve U.S. military personnel who infiltrate anti-war groups in the United States, particularly Iraq and
Afghanistan veterans groups opposed to the Bush administration's war policies. The move by the Bush administration appears to be a resurrection of Operation Garden Plot, a 1960s
program that saw the use of National Guard units to quell civil disturbances in the United States, in addition to the infiltration of anti-war groups by National Guard and Reserve
intelligence personnel.
WMR On April 11, 2002, Major General (ret.) Richard Alexander, the executive director of the National Guard Association of the United States, tipped his hand on Garden Plot when he
testified before the Senate Appropriations Committee on Homeland Defense. Alexander stated, "Oversight of these homeland security missions should be provided by the National Guard
Bureau based on the long-standing Garden Plot model in which National Guard units are trained and equipped to support civil authorities in crowd control and civil disturbancemissions."
The governing directive for Garden Plot is Department of Defense Civil Disturbance Plan 55-2, Garden Plot. The Air Force implements Garden Plot in United States Air Force Civil
Disturbance Plan 55-2, Garden Plot, dated J uly 11, 1984, while the Army implements Garden Plot with Department of the Army (DA) Civil Disturbance Plan - GARDEN PLOT, dated
March 1, 1984. Acting in coordination with the FBI's Domestic Counter-Intelligence Program(COINTELPRO), military intelligence agents infiltrated anti-war groups like the Vietnam
Veterans Against the War (VVAW).

Geographic Information Systems GIS top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation digital rights NGO, info,
news
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Cnet Tech News First
History of the Internet DARPA
Space Today Satellite wars,
Space Daily
Cybersecurity Enhancement Act
FCC, Powell
J ustice Technology Information Network, National Law
Enforcement and Corrections Technology Center.
GPS Location Technology top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU and NSA lawsuit
Electronic Frontier Foundation digital rights NGO, info,
news
Highbeam search
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Cnet Tech News First
History of the Internet DARPA
GPS-enabled cell phones
Wherify
police tagging cars of suspects in criminal investigations
Rental car tracking
Center for Strategic and International Studies
Cybersecurity Enhancement Act
FCC, Powell
Whitehouse, Bush
Republicans opposed to Bush Warrantless wiretapping
are irrelevant and impotent.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Satellite Security Systems, Inc
Health Information Systems top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
The Nation History and structure of global telegraphic
surveillance
Health Privacy Project raise public awareness of health
info privacy
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Cnet Tech News First
History of the Internet DARPA
Tetradyne J effrey Engel, M.D. StateEpidemiologist NC
DHHS, Division of Public health Presentation NC
initiatives Homeland Security Presidential Directive-21
October 18,, 2007 Calls on the federal DHHS to
"establish an operational national epidemiologic
surveillance system for human health, with international
connectivity where appropriate,
American Health Information Association provide
medical records professionals with educational resources
and programs
Cybersecurity Enhancement Act
Tetradyne Biosurveillance:: Big Brother or Homeland Security? J effrey Engel, M.D. StateEpidemiologist NC DHS, Division of Public health Presentation NC initiatives Homeland
Security Presidential Directive-21 October 18,, 2007 Calls on the federal DHS to "establish an operational national epidemiologic surveillance system for human health, with international
connectivity where appropriate, that is predicated on State, regional, and community-level capabilities and creates a networked system to allow for two-way information flow between and
among Federal, State, and local government public health authorities and clinical health care providers." Key Terms Operational: organizational expertiseand resources that produce real
information products as early as possible National: emphasis is on the national picture and reflects a gap in nationwide perspective International connectivity: this national picture should look
toward early detection and characterization of external threats to human health that could be imported Predicated onbuild first on what exists and establish current capabilities
Insurance Inspection, satellite top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Consumer Watchdog, Insurance search, satellite
surveillance.
Electronic Frontier Foundation working to protect civil
and free speech
Cnet Tech News First
Space Today Satellite wars,
Space Daily
Marsh & McLennan see campaign contributions
AIG search Elliot Spitzer, fraud investigation.
ACE Hartford
Munich American Risk Partners search Elliot Spitzer,
fraud investigation.
Internet Traffic Analysis top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Center for Democracy and Technology, domestic
spying watch
Council of Ethics-Based Organizations Associated with
The Department of Public Information of the United
Nations. Censorship page
Cryptorights.org human rights for security workers. SF
Electronic Frontier Foundation working to protect civil
and free speech
Echelon Watch discuss civil liberty threats
Epic Electronic Privacy Information Center
Internet Democracy Project enhance open participation,
public accountability and hr of internet
The Nation History and structure of global telegraphic
surveillance
NSAWatch formerly EchelonWatch, resources,
surveillance networks, documents.
Privacy International Human rights group, watchdog on
CBS down
C/Net downloads, spyware
Findlaw, Dean
History of the Internet DARPA
Info / Law, Harvard Blog filtering, modes of internet
regulation: code, law, markets, and social norms
LINKS
J urist University of Pittsburg, School of Law, Primary
sources. Global perspective
MSNBC VOIP Blocking
Narus Bill Crowell, past positions have included
President and Chief ExecutiveOfficer of Cylink, a
leading provider of e-business security solutions as well
as a series of senior positions at the National Security
Agency, including Deputy Director of Operations and
Deputy Director of the Agency
New York Times NSA executive order authorizing data
mining of phone calls and file Dec 16, 2005
Are Republicans who oppose Bush warrantless
spying irrelevant and impotent?
Center for Strategic and International
Comda Ltd. Israel
ComSign, Israel
Narus Partners see Pen-Link, Man-tech, Verisign,
Datacraft, Giza Systems...more
Republicans who are against Bush warrantless spying are
an irrelevant impotent.
Defense Tech Telcos Deny NSA Ties - and Allowed to
Lie?
Mathaba search content based billing, VOIP blocking
Narus see Pen-Link, Man-tech, Verisign, Datacraft, Giza
Systems.
Narus / Verisign IP lawful intercept
NICE, Shami, Shamir, Oz, Cohen, Huberman, Menkes,
Shaul, Zaltzman, Eidelman, Gorev, Ginat ...
Verisign Sclavos, Evan, Korzenliewski, Lin, Balogh,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
surveillance by govt/biz
PlanetFriendly Open sourcemovement
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Salon Israeli art students, DEA, Amdocs searchable file
Total Information Awareness Resource Center
White Dot find out how to free yourself from television.
ZDNet, UK news


OpenNet Initiative, search Narus
Notes: search terms, carrier-grade networks,
NetDiscovery, IP-based, intelligent infrastructure
services, IP security and compliancemanagement,
NarusSecure, monitoring, VOIP, IMS, IPTV, real-time
traffic insight, NarusInsight,
Schneier search terms: Operation Shamrock, FISA,
FISC, and:legal links
Skype VOIP blocking
USA Today NSA has massive database of Americans'
phone calls
Vonage search VOIP blocking
Wired News, Mark Klein, "Whistleblower Outs NSA
Spy Room ... Klein's job eventually included
connecting internet circuits to a splitting cabinet that led
to the secret room. During the courseof that work, he
learned from a co-worker that similar cabinets were
being installed in other cities, including Seattle, San
J ose, Los Angeles and San Diego."
Haddad, McLaughlin, Ulam, Bidzos, Chenevich,
Verso Technologies Inc, VOIP Blocking

PressTV U.S. companies are involved in providing technology that helps the Egyptian government to crack down on communications and monitor protestors on the Internet and mobile
phones. ... A U.S. company appears to have sold Egypt technology to monitor Internet and mobile phone traffic that is possibly being used by the ruling regime to crack down on
communications as protests erupt throughout the country. ...
Boeing-owned, California-based company Narus sold Telecom Egypt, the state-run Internet service provider, "real-time traffic intelligence" equipment, more commonly known as Deep
Packet Inspection (DPI) technology. Common Dreams ,,, HIGHLIGHTS
The company is also known for creating "NarusInsight," a supercomputer system allegedly used by US' National Security Agency and other entities to performmass surveillance and
monitoring of public and corporate Internet communications in real time. Common Dreams ...
Telecom Egypt, the nation's dominant phone and Internet service provider, is a state-run enterprise, which made it easy on Friday morning for authorities to pull the plug and plunge much
of the nation into digital darkness. .... Narus provides Egypt Telecom with Deep Packet Inspection equipment (DPI), a content-filtering technology that allows network managers to
inspect, track and target content from users of the Internet and mobile phones, as it passes through routers on the information superhighway. ... "Anything that comes through (an Internet
protocol network), we can record," Steve Bannerman, Narus' marketing vice president, once boasted to Wired about the service. "We can reconstruct all of their e-mails along with
attachments, see what web pages they clicked on; we can reconstruct their (Voice Over Internet Protocol) calls. ... Earlier this week, Secretary of StateHillary Clinton urged Egypt's
government "not to prevent peaceful protests or block communications, including on social media. Huffington Post .... FACTS & FIGURES Narus, now owned by Boeing, was founded
in 1997 by Israeli security experts to create and sell mass surveillance systems for governments and largecorporate clients. ... In addition to Narus, thereare a number of companies,
including many others in the United States, that produce and traffic in similar spying and control technology: Zeugma Systems (Canada), Camiant (USA), Procera Networks (USA), Allot
(Israel), Ixia (USA), AdvancedIO (Canada) and Sandvine (Canada), among others. ... When commercial network operators use DPI, the privacy of Internet users is compromised. But in
government hands, the use of DPI can crush dissent and lead to human rights violations. ... Virtually all internet access in Egypt is cut off as the government battles to contain the street
protests that threaten to topple President Hosni Mubarak. Telegraph HJ /KA/DB... more search terms: Egypt, Elbaradai, Tunisia, Algeria, Tunisia, protest, regime change,
Infragard top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Center for Democracy and Technology search,
Infraguard, info
The Nation History and structure of global telegraphic
surveillance
PrivacyToday news
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Cnet Tech News First
FreePeoplesFifthEstate CIA/Mossad/SIS hit in Pakistan,
also responsible for deaths of J ournalist Daniel Pearl,
Nick Berg: Al-Qaida is the code name of special covert
operations of the U.S. CIA, Israeli Mossad, British SIS,
Indian RAW
History of the Internet DARPA
ISP Planet news
Security Focus News Microsoft
SecureLab Computer security news and consulting
USA Today NSA has massive database of Americans'
BellSouth
Center for Strategic and International Studies
Critical Infrastructure Assurance Office ciao.gov
Infragard FBI
J ustice Technology Information Network, National Law
Enforcement and Corrections Technology Center.
House Armed Services Committee News
Pentagon
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
phone calls
ISP Surveillance top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Center for Democracy and Technology search,
Infraguard, info
The Nation History and structure of global telegraphic
surveillance
PrivacyToday news
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Cnet Tech News First
DigitallyMediatedSurveillance Ohmasserts that we
should focus on individual harms stemming from
surveillance and recognize that technological, economic,
and ethical forces all point towards a storm of
unprecedented, invasive ISP monitoring
History of the Internet DARPA
ISP Planet news
Security Focus News Microsoft
SecureLab Computer security news and consulting
USA Today NSA has massive database of Americans'
phone calls
BellSouth
Center for Strategic and International Studies
Critical Infrastructure Assurance Office ciao.gov
Infragard FBI
J ustice Technology Information Network, National Law
Enforcement and Corrections Technology Center.
House Armed Services Committee News
Pentagon
DigitallyMediatedSurveillance Ohmasserts that we should focus on individual harms stemming from surveillance and recognize that technological, economic, and ethical forces all point
towards a storm of unprecedented, invasive ISP monitoring (4). He maintains that ISPs oversell their ability to anonymize collected data, that providers claims of needing to more deeply
inspect content are suspect, and that we should distrust suggestions that users and ISPs have entered consensual agreements around DPI-based surveillance. To determinethe risk of
individual harms stemming from surveillance, ISPs and regulators should adopt a three-step process that asks how sensitive is the information at risk, whether theretherebeen harmful
breaches in the past and if so, requires policymakers to make predictions about the future. ... Critically, anonymity cannot effectively address the harmto the sense of repose. The harm
comes from the fear that one is being watched. It can result in self-censorship. It is not the kind of harmthat is easily offset by hypertechnical arguments about encryption and one-way hash
functions (49). Thus, novel surveillance systems like DPI must be (largely) restricted to preventing hacking and viral outbreaks and traditional monitoring systems that cannot capture
personal information relied upon for network management. Most importantly, Ohmargues that privacy, freedom, liberty, and autonomy must be introduced into the otherwise technocratic
discussions of network neutrality and management to ensurethat ISPs networks facilitate these key democratic values.
Libery Alliance Project top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Big Brother and the ministry of Homeland Security
Epic Electronic Privacy Information Center
Center for Democracy and Technology search,
Infraguard, info
The Nation History and structure of global telegraphic
surveillance
PrivacyToday news
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Cnet Tech News First
History of the Internet DARPA
ISP Planet news
Wikipedia The Liberty Alliance was formed in
September 2001 by approximately 30 organizations to
establish open standards, guidelines and best practices for
identity management. Today it has a global membership
of more than 150 organizations, including technology
vendors, consumer-facing companies,
Security Focus News Microsoft
SecureLab Computer security news and consulting
USA Today NSA has massive database of Americans'
phone calls
AT&T
Center for Strategic and International Studies
Critical Infrastructure Assurance Office ciao.gov
Infragard FBI
J ustice Technology Information Network, National Law
Enforcement and Corrections Technology Center.
House Armed Services Committee News
Pentagon
Wikipedia The Liberty Alliance was formed in September 2001 by approximately 30 organizations to establish open standards, guidelines and best practices for identity management. Today
it has a global membership of more than 150 organizations, including technology vendors, consumer-facing companies, educational organizations and governments from around the world, as
well as hundreds of additional organizations that participate in Liberty's various open community Special Interest Groups (SIGs). It has released Frameworks that address Federation (since
contributed to OASIS for the SAML standard), Identity Assurance, Identity Governance, and Identity Web Services, as various services applications. It has also been active in privacy and
policy issues relativeto identity. As of 2006, the Liberty Alliance has tracked well over one billion Liberty-enabled identities and devices in fields as diverse as defense & law enforcement to
telecommunications to egovernment. Management Board members include AOL, British Telecom, Computer Associates (CA), Fidelity Investments, Intel, Internet Society (ISOC), Novell,
Nippon Telegraph and Telephone (NTT), Oracle Corporation and Sun Microsystems. As of J une 2009, the work of the Liberty Alliance is transitioning to the Kantara Initiative.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
MATRIX Multi-State Anti-Terrorism Information Database, NCTC top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
ACCS-Net security, links
Disinfopedia search, Seisint, Multistate Anti-Terrorism
Information Database, MATRIX database, controlling
company.
Electronic Frontier Foundation digital rights NGO, info,
news
OccupyCorporatism American has quickly grown into a
big brother control and surveillance nation. Internet
ServiceProviders (ISP) will begin the biggest civilian
surveillance operation in history.
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
Security Focus News Microsoft
C/Net downloads
CodeMonkeyX security and news
GreyMagic security research, news
MyFlorida search Seisint,
Security Focus News Microsoft
SecureLab Computer security news and consulting
USA Today NSA has massive database of Americans'
phone calls
Advanced Research and Development Activity Office
ARDA, data mining alive and well
BellSouth
Institute for Intergovernmental Research serving law
enforcement, justicecommunity
Multi-StateAnti-TerrorismInformation Exchange
New York Times NSA executive order authorizing data
mining of phone calls and file.
Seisint Inc MATRIX database, controlling company.
OccupyCorporatism American has quickly grown into a big brother control and surveillance nation. Internet ServiceProviders (ISP) will begin the biggest civilian surveillance operation in
history. On J uly 12, 2012, your ISP will be watching your movements on the internet. They will profile your activity and report to the Motion Picture Association of American (MPAA),
Recording Industry Association of America (RIAAA) and National Security Agency (NSA) under direction of the Obama administration. Their goal: to penalize as many internet users as it
takes to justify their infringement on our right to freedom of information. ... A facility in Utah has been built to assist the NSA and CIA in spying more efficiently on Americans. Every
mode of communication (i.e. text messages, emails, phone calls, internet activity, etc . . . ) will be recorded, deciphered and filed for use at the distraction of the US government. ...
Department of J ustice Attorney General Eric Holder has signed new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on
American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not thereis the threat of terrorism. The will
collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.
Microsoft Explorer top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACCS-Net security, links
LUGOD Linux Users Group of Davis news
Insecure news
PlanetFriendly Open sourcemovement
Security Focus News Microsoft
C/Net downloads
CodeMonkeyX security and news
GreyMagic security research, news
ISP Planet news
J ava, Sun news
Security Focus News Microsoft
SecureLab Computer security news and consulting
Center for Strategic and International Studies
CIO Insight strategies for IT Business Leaders
ENTNews Enterprise Windows.
Microsoft, Security Bulletins: Microsoft
Republicans opposed to Bush Warrantless wiretapping
are irrelevant and impotent.
Rupert Murdoch top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Deadly.org search, Open BSD J ournal
Electronic Frontier Foundation working to protect civil
and free speech
LUGOD Linux Users Group of Davis news
PlanetFriendly Open sourcemovement
C/Net downloads
History of the Internet DARPA
ISP Planet news
J ava, Sun news
Center for Strategic and International Studies
CIO Insight strategies for IT Business Leaders
ENTNews Enterprise Windows.
Wikipedia Murdochgate The News International phone-
hacking scandal dubbed "Hackgate", "Rupertgate", or
"Murdochgate"
Wikipedia Murdochgate The News International phone-hacking scandal dubbed "Hackgate", "Rupertgate", or "Murdochgate" by the press is an ongoing controversy involving the
defunct News of the World and other British newspapers published by News International, a subsidiary of News Corporation. Employees of the newspaper were accused of engaging in
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
phone hacking, police bribery, and exercising improper influence in the pursuit of publishing stories. Investigations conducted from 20052007 concluded that the paper's phone hacking
activities were limited to celebrities, politicians and members of the British Royal Family. In J uly 2011, it was revealed that the phones of murdered schoolgirl Milly Dowler, relatives of
deceased British soldiers, and victims of the 7/7 London bombings were also accessed, resulting in a public outcry against News Corporation and owner Rupert Murdoch. Advertiser
boycotts contributed to the closure of the News of the World on 10 J uly, ending 168 years of publication. 1] Continued public pressure later forced News Corporation to cancel its proposed
takeover of the British telecommunications company BSkyB. British prime minister David Cameron announced on 6 J uly 2011, that a public inquiry would look into the affair after police
investigations had ended. On 13 J uly 2011, Cameron named Lord J ustice Leveson as chairman of the inquiry, with a remit to look into phone hacking and police bribery by the News of the
World, while a separate inquiry would consider the culture and ethics of the wider British media. 2] He also said the Press Complaints Commission would be replaced "entirely". 1] The
inquiries led to several high-profile resignations, including Dow J ones chief executive Les Hinton; News International legal manager Tom Crone; and chief executive Rebekah Brooks. The
commissioner of London's Metropolitan Police Service, Sir Paul Stephenson, also resigned his post. Former News of the World managing editor Andy Coulson, former executive editor
Neil Wallis, and Brooks were all arrested. Murdoch and his son, J ames, were summoned to give evidence before the Leveson Inquiry.
WMR J uly 14-15, 2011 -- Murdoch intelligence-gathering network extended to U.S. Congress ... U.S. Congressional sources have confirmed to WMR that the U.S. Capitol Police
and other congressional officials shared sensitive information on members of Congress with Rupert Murdoch's media outlets in Washington, including Fox News, in a manner similar to
the situation in the United Kingdom where reporters for Murdoch's now-defunct News of the World bribed British law enforcement officials for sensitive information on public officials
and private citizens. .... Representative Peter King (R-NY) has already leveled charges that News of the World reporters tried to bribe U.S. law enforcement officials for phone records
and transcripts of wiretaps of victims of the 9/11 attack. King did not elaborate on why law enforcement would have found it necessary, in the first place, to wiretap the conversations of
9/11 victims and their surviving next-of-kin. ... On March 28, 2007, WMR first reported the relationship between the newly-appointed U.S. Senate Sergeant-at-Arms Terrance Gainer,
who was formerly the chief of the U.S. Capitol Police, and Fox News in threehighly-publicized incidents involving only Democratic members of the U.S. Senate and House of
Representatives. The threeincidents involved Fox News receiving information directly from Gainer on incidents involving then-Representative Cynthia McKinney (D-GA), then-
Representative Patrick Kennedy (D-RI), and an aide to Senator J imWebb (D-VA). ... After a highly-publicized scuffle involving McKinney and an aggressive U.S. Capitol Police
officer, one in which McKinney was physically assaulted by the officer, Fox News was the first to report the incident. The media hype resulting from the incident resulted in a criminal
referral to the US Attorney for the District of Columbia. Shortly after Gainer resigned as chief and his being appointed by Senate Democratic Majority Leader Harry Reid, Representative
Kennedy was involved in a minor automobile accident on Capitol Hill. Again, Fox News was the first to receive the information about the incident and Gainer stated publicly that Kennedy
should have been given a sobriety test by the Capitol cops. ... The third incident involved Phillip Thompson, the executive assistant to Virginia Democratic Senator J imWebb, who was
arrested by the Capitol Police at the Russell Senate Office Building for carrying a loaded pistol allegedly given to him by Webb. The Capitol Police enforced a DC law in force at the time
that prohibited anyone other than law enforcement officers from carrying weapons in the District. Webb said he has a license to carry a concealed weapon in Virginia and Thompson, an
ex-Marine, inadvertently carried the weapon into the building after dropping Webb off at the airport. WMR's March 2007 report stated: "Details of the Thompson] incident were leaked by
the cops to Fox News and other neo-con outlets." WMR also reported that the leaks by US Capitol Police and Sergeant-at-Arms staff also occurred in the cases of McKinney and
Kennedy. ... Gainer is a long-time Republican who unsuccessfully challenged incumbent Richard M. Daley, J r. as the Republican candidate for Cook County (Illinois) State's Attorney
in 1988. Gainer got his start in law enforcement as a rookie Chicago cop in 1968 where he helped put down riots at the Democratic National Convention, a melee that saw Chicago cops
clubbing anti-VietnamWar protesters. ... As U.S. Senate Sergeant-at-Arms, Gainer is responsible for the installation and maintenance of the Senate's telecommunications networks and
computer and other equipment, including those that handle Senators' e-mail, phone calls, faxes, Blackberry tweets, and photocopies of documents. ... Some members of Congress have
indicated the investigation of Murdoch's News Corporation's information-gathering practices warrant a full-scaleinvestigation in the United States. Senator J ay Rockefeller (D-WV) told
CNN, "My bet is we'll find some criminal stuff . . . This is going to be a huge issue." Rockefeller said he may launch his own investigation. Perhaps he might want to start with the
Senate's Sergeant-at-Arms and ask Harry Reid why he chose to appoint Gainer, a Republican, to the post after evidence surfaced that tied Gainer to leaks of law enforcement information
to Fox News. ... In Britain, law enforcement officials, including royal guards, reportedly asked the News of the World for money in exchange for personal information about the Royal
family, including Queen Elizabeth II, Prince Philip, Prince Charles, Duchess of Cornwall Camilla, Duchess of Cambridge Catherine, and others. While he was Chancellor of the Exchequer
and Prime Minister, Gordon Brown was also subjected to private communication surveillance by private detectives who had a close relationship with law enforcement agencies, including
Scotland Yard.
NIST / NSA integration top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Deadly.org search, Open BSD J ournal
FreePeoplesFifthEstate CIA/Mossad/SIS hit in Pakistan, also responsible for
deaths of J ournalist Daniel Pearl, Nick Berg: Al-Qaida is the code name of
special covert operations of the U.S. CIA, Israeli Mossad, British SIS, Indian
RAW
LUGOD Linux Users Group of Davis news
PlanetFriendly Open sourcemovement
C/Net downloads
FreePeoplesFifthEstate CIA/Mossad/SIS hit in Pakistan, also responsible
for deaths of J ournalist Daniel Pearl, Nick Berg: Al-Qaida is the code name
of special covert operations of the U.S. CIA, Israeli Mossad, British SIS,
Indian RAW
History of the Internet DARPA
ISP Planet news
J ava, Sun news
Center for
Strategic and
International
Studies
CIO Insight
strategies for IT
Business
Leaders
ENTNews
Enterprise
Windows.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
SANS 2012 NIST Issues (Flawed) Draft Updates to Cybersecurity Guides (J uly 30, 2012) The National Institute of Standards and Technology (NIST) has issued updated versions of two
publications aimed at helping federal agencies and private organizations protect their networks from attacks, intrusions, and malware infections. The Guide to Intrusion Detection and
Prevention Systems and the Guide to Malware Incident Prevention and Handling for Desktop and Laptops have been updated to incorporate current best practices in cybersecurity. NIST is
accepting public comment on the documents through August 31, 2012. The intrusion detection publication was originally released in February 2007 and has not been updated since then.
and NSA NSA Director Asks Defcon Attendees to Help Defend Cyberspace (J uly 27 & 29, 2012) Speaking at the Defcon hacker conference, General Keith Alexander, who heads both
the National Security Agency (NSA) and the US Cyber Command, asked attendees for help securing cyberspace. Alexander told those present that "In this room right here is the talent our
nation needs to secure cyberspace," and spoke about the "superb" program called Defcon Kids, which guides kids in the direction of white-hat hacking. Alexander also told his audience
that the NSA does not compile dossiers on US citizens. However, a former NSA employee speaking on a panel at the same conference said that the NSA does collect
information about US citizens' email messages, tweets, online searches and other information.
Epic New NIST/NSA Revelations Less than threeweeks after the White House announced a controversial initiative to secure the nation's electronic communications with government-
approved cryptography, newly released documents raise serious questions about the process that gave rise to the administration's proposal. The documents, released by the National Institute
of Standards and Technology (NIST) in response to a Freedom of Information Act lawsuit, suggest that the super-secret National Security Agency (NSA) dominates the process of
establishing security standards for civilian computer systems in contravention of the intent of legislation Congress enacted in 1987. ... The released material concerns the development of
the Digital Signature Standard (DSS), a cryptographic method for authenticating the identity of the sender of an electronic communication and for authenticating the integrity of the data in
that communication. NIST publicly proposed the DSS in August 1991 and initially made no mention of any NSA role in developing the standard, which was intended for use in
unclassified, civilian communications systems. NIST finally conceded that NSA had, in fact, developed the technology after Computer Professionals for Social Responsibility (CPSR) filed
suit against the agency for withholding relevant documents. The proposed DSS was widely criticized within the computer industry for its perceived weak security and inferiority to an
existing authentication technology known as the RSA algorithm. Many observers have speculated that the RSA technique was disfavored by NSA because it was, in fact, more secure than
the NSA-proposed algorithm and because the RSA technique could also be used to encrypt data very securely. ... The newly-disclosed documents -- released in heavily censored form at
the insistence of NSA -- suggest that NSA was not merely involved in the development process, but dominated it. NIST and NSA worked together on the DSS through an intra-agency
Technical Working Group (TWG). The documents suggest that the NIST-NSA relationship was contentious, with NSA insisting upon secrecy throughout the deliberations. A NIST report
dated J anuary 31, 1990, states that ... The members of the TWG acknowledged that the efforts expended to date in the determination of a public key algorithm which would be publicly
known have not been successful. It's increasingly evident that it is difficult, if not impossible, to reconcile the concerns and requirements of NSA, NIST and the general public through
using this approach. more
Wikipedia TIDES Translingual Information Detection, Extraction and Summarization (TIDES) developing advanced languageprocessing technology to enableEnglish speakers to find
and interpret critical information in multiple languages without requiring knowledge of those languages. 16] Outside groups (such as universities, corporations, etc.) were invited to
participate in the annual information retrieval, topic detection and tracking, automatic content extraction, and machine translation evaluations run by NIST. 16]

NSA, Domestic phone records database, NFU pages index
US surveillance of citizens page 1
Amdocs Israeli art students 9/11
9/11 Investigation
'Terrorism'
Urban Moving Systems, WTC, 9/11
and Summary below
and News
and related
research
Abramoff /
Tom Delay
Watch
BushWatch
Iran
Israel
Middle East
Judiciary
RiceWatch
Issues to research
How is the internet and phone system tapped? Narus
Are there ties between the recent NSA warrantless wiretapping and the old 'Israeli art students' revelations? How does
Comverse Infosys (Verint), Amdocs, Telrad, Israel fit?
How does it all tie back to 9/11? FoxNews, Carl Cameron, Israeli art students?
What lawsuits are now pending?
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
What are administrative subpoenas, National Security letters?
William T. Crowell, Narus Board of Directors, was Deputy Director of Operations of NSA.
Wired News, Mark Klein, Whistleblower Outs NSA Spy Room ...more
Israeli companies dominate phone billing and firewall markets
News

National Security Agency NSA top and go to Amdocs
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU lawsuit, wiretap without a warrant on U.S. soil. and NSA lawsuit
Center for Constitutional Rights New York, letter to Senate Intelligence
Committee,
CommonDreams search terms: lawsuit, AT&T, submitted under seal, illegal
electronic surveillance, Negroponte, Lt. General Keith Alexander (director of
NSA), state secrets privilege used to deny info on NSA, phone and internet
records turned over illegally without a warrant or suspicion of wrongdoing.
class action,
CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief
J udge Vaughn Walker rejected the government's argument that merely
allowing the case to proceed would cause critical harmto U.S. national
security.
Constant Pated, blog Narus STA-6400, state secrets, prove Bush broke the
law.
J ohn Conyers
CounterPunch, Bush wiretaps to identify whistleblowers.
Dailykos Narus ST-6400
Detroit Free Press "U.S. District J udge Anna Diggs Taylor declared the
administration's secret spying program unconstitutional and blocked the
government from intercepting calls into this country from abroad that might
involveterrorists without getting warrants from the Foreign Intelligence
SurveillanceCourt.
Electronic Frontier Foundation working to protect civil and free speech,
search AT&T lawsuit.
Huffington Post NSA, amdocs, Hayden and Hayden "the sudden resignation
of Goss as the Foggo sex scandal comes creeping centerwise provided the
Department of Defense its best-yet opportunity to finally seizeits long-time
intelligence and covert operations rival for itself"
Indymedia
The Nation History and structure of global telegraphic surveillance
NSAWatch formerly EchelonWatch, resources, surveillance networks,
documents.
OpEdNews "Amdocs, Hayden, CIA, phone records, database, billing data,
Israeli-based company, 9/11, students, Bobby Ray Inman, AT&T, BellSouth,
Verizon, legality of surveillance, Sen. Spector
RawStory,
Salon Israeli art students, DEA, Amdocs searchable file
TimesOnline.UK "A report in the newspaper USA Today, which claimed that
since the 9/11 attacks the National Security Agency (NSA) has secretly
collected the records of billions of domestic calls, also cast doubt on the
confirmation prospects for General Michael Hayden, Mr Bushs choiceto
BBC George W Bush personally stopped an inquiry into a controversial
programmeto monitor the phone calls and e-mails of Americans, a top
official has said. Attorney General Alberto Gonzales said internal
investigators wanted to look at the role justicedepartment lawyers had
played in drafting the programme
Findlaw, Dean, Bush's impeachability..
search terms: Amdocs, Hayden, CIA, phone records, database, billing data,
Israeli-based company,
Use NSA data to mineall of Karl Rove's phone calls....right....
search terms: Hayden was architect of Bush's domestic spying program. The
Federal Intelligence Security Act (FISA) is prohibited in monitoring people
inside the U.S. without express permission of a federal judge. Nixon era
controls. 2005 Bush issued executive order undermining FISA.
Statesecrets privilege defense says a lawsuit must be dismissed if it can't be
litigated without the risk of exposing military secrets. But thereis political
fallout from this.
How does all this tieback to Israel spying: J onathon Pollard, Pentagon,
Douglas Feith, Mega,
J urist, legal news and research, Bush used argument that warrantless was
implicitly authorized by the resolution for the Authorization for the Use of
Military Force in Afghanistan, but....more
Rense All US Phone Call Records And Billing Done In Israel - Part 2 Carl
Cameron Investigates FoxNews.com 12-13-1
Schneier search terms: Operation Shamrock, FISA, FISC, and:legal links
Yahoo, BellSouth denies working with NSA. Included in $200 billion
lawsuit
Wikipedia
Are
Republicans
who oppose
Bush
warrantless
spying are an
irrelevant
impotent
group?
AT&T lawsuit
$200 billion
Amdocs Israel,
phone records
database,
Hayden
BellSouth
Cato Institute
Defense Tech
Telcos Deny
NSA Ties - and
Allowed to Lie?
FCC, won't
investigate
warrantless
wiretapping
because Bush
effectively used
the StateSecrets
defense to shut
themdown.
GOP search
GOP Insight
search
Haaretz search
Heritage.org
"....this critical
counterterrorism
effort isn't
intrusive, illegal
or
unnecessary...?
commentary.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
head the CIA"
TomPaine search: Bush's NSA Spying Defense
Wayne Madsen Report, exclusive1
Wired News, Mark Klein, "Whistleblower Outs NSA Spy Room ... Klein's
job eventually included connecting internet circuits to a splitting cabinet that
led to the secret room. During the courseof that work, he learned from a co-
worker that similar cabinets were being installed in other cities, including
Seattle, San J ose, Los Angeles and San Diego."
go to Amdocs
search internet: Tony Snow, FoxNews, Carl Cameron,
Israeli Art Students.
also see Jonathan Pollard.com
see Smith v.
Maryland 1979.
Markle
Foundation
MiddleEast
Info discussion
Middle East
Intelligence
Bulletin Daniel
Pipes
Narus Semantic
Traffic Analysis
Narus &
Amdocs more
below
Narus Board of
Directors:
WilliamT.
Crowell
(DARPA,
Markle
Foundation,
Cylink, Deputy
Director of
Operations
NSA, Presidents
Export Council
on Encryption.
Also Yogen K.
Dalal (Mayfield
Fund), Andrew
Kau (Walden
International),
Greg Oslan
(CNET Inc,
AT&T), Tony
Pantuso (
NeoCarta, GE),
Shahan D.
Soghikian (J P
Morgan
Partners).
National
Institute for
Public Policy,
Iran policy
New York
Times NSA
executive order
authorizing data
mining of phone
calls and file.
TMCnet
Amdocs, Israeli
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Business Arena
Via Thomson
Dialog
NewsEdge,
Topix Amdocs
DOX page
US-Israel.org
US News &
World Report ,
Gergen rebuttal
to "The Israel
Lobby and U.S.
Foreign Policy"
NSA
Verizon
Walden Media,
Walden
International,
Walden Israel
Ventures II,
Walden VC II,
Ambex
Whitehouse
Bush

Summary of NSA issues
ABC News Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding
Answers By BRIAN ROSS, VIC WALTER, and ANNA SCHECTER Oct. 9, 2008 Despite pledges by President George W. Bush and American intelligence officials to the
contrary, hundreds of US citizens overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at
the giant National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, J ay Rockefeller (D-WV), called the allegations
"extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller said Thursday.
"The Committee will take whatever action is necessary." continued below
New York Times and file A senior government official, granted anonymity to speak for publication about the classified program, confirmed on Friday that the security agency (NSA)
had access to records of most telephone calls in the United States. The official said the call records were used for the limited purpose of identifying regular contacts of "known bad
guys." The official would not discuss the details of the program, including the identity of companies involved. lawsuit (EFFsuit) see Amdocs / Narus
New York Times and file In 2004, more than 80 percent of the 463 billion domestic calls made in the United States were local, according to the Federal Communications Commission.
Verizon said yesterday that "phone companies do not even make records of local calls in most cases because the vast majority of customers are not billed per call for local calls.". but
see Narus
New York Times Because federal law protects the privacy of phone records in the absence of warrants, companies providing such records could face legal action. Yesterday in
Manhattan, a class-action suit filed against Verizon after the USA Today article appeared was expanded to include BellSouth and AT&T as defendants, The Associated Press reported. It
asked $200 billion in damages.
ACLU "The American Civil Liberties Union today strongly condemned a new proposal drafted by Senate J udiciary Committee Chairman Arlen Specter (R-PA) that embraces the
presidents claims of inherent power to secretly wiretap Americans without meaningful checks. Also today, the organization renewed its request to the J ustice Departments Inspector
General to open an investigation into the involvement of the department in the warrantless spying on Americans by the National Security Agency .... Specters new draft would replace a
bill he had previously introduced, S.2453, the National Security SurveillanceAct of 2006. The new version would pardon the president for authorizing the warrantless wiretapping of
Americans, in violation of current criminal and intelligence laws. Specifically, the new bill would amend the Foreign Intelligence SurveillanceAct (FISA) and the criminal code by
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
allowing wiretapping at the direction of the president outside of those existing laws. This move would create a retroactive exception to criminal liability when warrantless wiretapping is
done at the presidents direction under a claimof inherent authority."
ACLU v. NSA lawsuit: "The ACLU is suing the National Security Agency for violating the U.S. Constitution. The illegal NSA spying program authorized by President Bush just after
September 11, 2001, allows the NSA to intercept vast quantities of the international telephone and Internet communications of innocent Americans without court approval. Without a
system of checks and balances, the government can monitor any phone call or e-mail they want, and they can collect and disseminate any data they find however they like. J ust knowing
that the government is spying without cause on innocent Americans sends a chilling message to all of us that our conversations are not our own. The NSA's warrantless surveillance must
end and checks and balances be restored."
Information Clearing House on Fox News (Carl Cameron) investigative report and Eric Umansky BellSouth subcontracts with an Israeli company known as Amdocs to handle its
billing, as do several other U.S. phone companies. In 2001, U.S. intelligence officials were on record as saying that the information that Amdocs handled was so valuable that a great deal
could be learned if sophisticated data-mining techniques were used against that information -- Brit? Information Clearing House search Amdocs, Israeli art students.

Information Clearing House Fox News has learned that the N.S.A has held numerous classified conferences to warn the F.B.I. and C.I.A. how Amdocs records could be used. At one
NSA briefing, a diagramby the Argon national lab was used to show that if the phone records are not secure, major security breaches are possible.
see Amdocs / Narus relationship
Information Clearing House, Carl Cameron report: Comverse works closely with the Israeli government, and under special programs, gets reimbursed for up to 50 percent of its research
and development costs by the Israeli Ministry of Industry and Trade. But investigators within the DEA, INS and FBI have all told Fox News that to pursue or even suggest Israeli spying
through Comverse is considered career suicide.
Wired Blog: One of the questions to emerge in press analysis of Wednesday's court hearing in the EFF's case against AT&T is whether the company might be legally immunized if the
attorney general wrote a secret letter authorizing the alleged internet wiretaps. Declan McCullagh at CNET News.com parsed the AT&T lawyer's oral arguments carefully, and
concluded that the company may have received certification from the J ustice Department under this section of Title 18 U.S.C. 2511
London's 7/7 where Visor Consulting headed up by the ex-spokesman of Scotland Yard Peter Power was conducting drills of a terrorist attack at the exact locations at the exact times
where Verint Systems (Comverse) was running security and hasn't released the videos from inside the tube,
CommonDreams "FBI Plans New Net-Tapping Push" search terms: new legislation that would require ISP's to create wiretapping hubs for police surveillance...introduced by Sen. Mike
DeWine, Ohio Republican, CALEA
CommonDreams "In a 72-page written ruling (.pdf), U.S. District Court Chief J udge Vaughn Walker rejected the government's argument that merely allowing the case to proceed would
cause critical harmto U.S. national security. search terms: Case 3:06-cv-00672-VRW Document 308, Northern District of California, Tash Hepting et al Plaintiffs,v AT&T
CORPORATION, et al Defendants. AT&T Inc., violate First and Fourth Amendments to the Constitution, by illegally intercepting, disclosing, divulging and/or using plaintiffs'
communications. collaborating with the National Security Agency NSA in a massive warrantless surveillance program. Section 109 of FISA, Section 802 of Title III of the Omnibus
Crime Control and Safe Streets Act of 1968, Section 705 of Title VII of the Communications Act of 1934, Section 201 of Title II of the ECPA, Seciton 201 of the Stored Commications
Act, California Unfair Competition Law, Mark Klein, J . Scott Marcus, state secrets privilege, Negroponte, Alexander,
Click on pic to go to NFU Internet page
NSA ISP data mining, Narus source: Scoop Are We Paranoid Enough Yet? utunga.blogspot.com On 26 J an 2006 I wrote: Particularly scary is that the Patriot
act gives the feds the right to basically march up to every ISP in the country and install special 'black boxes' doing] God only knows what and the ISP's cannot even mention this fact
publicly let alone not comply... ********* Now we have confirmation from a whistleblower that this is exactly what they'vebeen doing.
"I learned that the person whom the NSA interviewed for the secret job was the person working to install equipment in this room," Klein wrote. "The regular technician work force was
not allowed in the room." .. he learned from a co-worker that similar cabinets were being installed in other cities, including Seattle, San J ose, Los Angeles and San Diego."While doing
my job, I learned that fiber optic cables from the secret room were tapping into the Worldnet (AT&T's internet service) circuits by splitting off a portion of the light signal," Klein
wrote.The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or
from other domestic and international providers, according to Klein's statement.The secret room also included data-mining equipment called a Narus STA 6400... " And what can we
find out about the Narus 6400? Well the google cache appeared busted on the subject but the preview gives us this one sentence..
Fully configured, the Model 6400 captures application-layer usage details via NARUS Semantic Traffic Analysis (STA) on up to six full-duplex 100 BaseTADVERTISEMENT
(Update: Dailykos has since published an artice All About NSA's and AT&T's Big Brother Machine, the Narus 6400 which fills out a lot of the details). In my opinion the key words here
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
are "Semantic Traffic Analysis". As I wrote previously: Many people think ECHELON simply targets 'keywords'. However, based on patents filed by various government agencies you
can assume it is *much* more sophisticated than that, for instance rudimentary 'language recognition' patents as well as 'topic classification' patents. The topic classification patent is
especially interesting, because, if they are able to create a map of all the types of people / types of conversations that people have, then they can more easily filter out the 'J ana's having a
baby!' conversations and zero in on the 'lets organize a march' conversation of radicals and other undesirables - oh, yeah, and those] "terrorists" and "drug dealers" - the only problem here
is that to find the largest number of these in the most cost effective way all they would need to do is walk down the hall start arresting people.. The words semantic analysis are used
somewhat differently in the patents I mention than in the technical specs for the Naurus 6400, but forgive me for assuming that the NSA has technology that is more advanced (by a
small margin and in the same direction) than what is availableto the general public.
********* I guess this casts the Google action in preventing DOJ into their data centers in a quitedifferent light. As I said previously, this isn't about reading the query log - this was
always about the right to install a room of 'black servers' right in the middle of the google data center. Google's actions in standing up to that are all the more laudable. ********* J ust to
be crystal clear on this; at this time what we now have is clear evidence of (sophisticated) *monitoring and analysis* of internet and phone traffic - something we pretty much knew for a
long time. Thats very scary (and illegal, in my opinion), but its certainly better than actual direct government censorship of content on the internet ('chilling effects' on free speech
aside). On the pessimistic side, however, direct (but covert) censorship is probably the next obvious step once you have the right hardware installed in the key data centers.
It may be that if you want to actually directly censor and block information all you need to do is control the choke points - which means ISP's (like AT&T) and not the search engines
(like Google). However, it could well be that a more sophisticated (and probably more practical) form of censorship is to control the search engines. Certainly the Chinese found that
controlling the search engine content was more effective (and subtle) form of censorship than outright blocks on entire search engines or particular websites.
My suspicion (OK, its a total guess) is that, in the States at least, the NSA and other parts of the state/non-state military-technological apparatus are probably experimenting with the
censorship of certain specifc pieces of information even right now. A good place for themto start might be, for instance, information about themselves, their methods and what they plan
to do next.
At this time I'mpretty sure that direct censorship or control of political discourse on the internet is something that organisations such as the NSA wouldn't consider themselves able to do.
Despite all their technology and hardware, the number of bits to flip and the sheer volumeof content to mechanically 'understand' and filter makes that effectively impossible. It can be
argued that have achieved a high degree of success in the mass media - ask someone who's actually lived in the states for a few years and I'msure you'll see what i mean - but its still too
hard for themto control the discourse of 'blogosphere' directly at this stage - but you just wait and see.. as soon as they believe they can do this - they will. Furthermore, if 'they' are smart
they won't give any indication that this is their next step until they are ready to go. "The internet" may be the last truly free bastion of political free speech in the States at ths time.. and
if that were to be closed down via a more sophisticated version of 'the chinesefirewall" .. well God help us all.
ENDS
NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother',
says corporate insider
The Register NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider .... By Lewis Page , 8th J uly 2010 09:20 GMT ... The US National
Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national infrastructure such as power
grids and transport systems. ... The Wall Street J ournal, citing unnamed government and industry sources, says that the NSA has awarded a "black" (classified) $100m contract to
defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of national importance. ... According to the WSJ , Perfect Citizen
has caused some disquiet among those in the know. It could be seen as the NSA - a military combat support agency whose focus is supposed to be on external threats - carrying out
massive automated surveillance of American companies and citizens. The paper quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother". ... The stated
purpose of the project is to get a clear idea of the level of threat facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up
to the internet for ease of use and maintenance. It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing
these systems with a view to learning how to attack them. ... The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending
cyber attack, according to the WSJ 's sources. ... "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed
military sourcetold the paper. ... Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some could also
potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems might allow the NSA to
work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for intrusive monitoring. ... The full scope of
the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of companies would be asked to cooperate - or how much
information the NSA would get access to. ... The NSA - whose boss has now also been confirmed as head of the Pentagon's uniformed Cyber Command - apparently got the job by
default, as it is considered the only US agency with enough network and cyber savvy to take the task on. ... The Reg has contacted Raytheon and the NSA for comment on Perfect
Citizen, but thus far has not received any reply.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Open BSD FBI Backdoor top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU
Deadly.org search, Open BSD J ournal
Electronic Frontier Foundation working to protect civil
and free speech
LUGOD Linux Users Group of Davis news
PlanetFriendly Open sourcemovement
C/Net downloads
History of the Internet DARPA
ISP Planet news
J ava, Sun news
Center for Strategic and International Studies
CIO Insight strategies for IT Business Leaders
ENTNews Enterprise Windows.
ArsTechnica FBI accused of planting backdoor in OpenBSD IPSEC stack ... In an e-mail sent to BSD project leader Theo de Raadt, former NETSEC CTO Gregory Perry has claimed that
NETSEC developers helped the FBI plant "a number of backdoors" in the OpenBSD cryptographic framework approximately a decade ago. ... Perry says that his nondisclosure agreement
with the FBI has expired, allowing him to finally bring the issueto the attention of OpenBSD developers. Perry also suggests that knowledge of the FBI's backdoors played a role in
DARPA's decision to withdraw millions of dollars of grant funding from OpenBSD in 2003. ... "I wanted to make you aware of the fact that the FBI implemented a number of backdoors
and sidechannel key leaking mechanisms into the OCF, for the express purpose of monitoring the site to site VPN encryption system implemented by EOUSA, the parent organization to the
FBI," wrote Perry. "This is also probably the reason why you lost your DARPA funding, they more than likely caught wind of the fact that those backdoors were present and didn't want to
create any derivativeproducts based upon the same." ... The e-mail became public when de Raadt forwarded it to the OpenBSD mailing list on Tuesday, with the intention of encouraging
concerned parties to conduct code audits. To avoid entanglement in the alleged conspiracy, de Raadt says that he won't be pursuing the matter himself. Several developers have begun the
process of auditing the OpenBSD IPSEC stack in order to determineif Perry's claims are true.
Patriot Act top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Patriot II, details, Alternet,
ACLU, Civil Liberties in the Post 9/11 World
Council of Ethics-Based Organizations Associated with
The Department of Public Information of the United
Nations. search Patriot Act.
Epic Electronic Privacy Information Center
FAS Project on Government Security
Big Brother and the ministry of Homeland Security
The Nation History and structure of global telegraphic
surveillance
National Immigration Law Center protect rights and
opportunities of low-income immigrants
Patriot II, details
PrivacyToday news
Privacy Watch, Cotse.net Internet Privacy Website, Civil
liberty watchdog
(Veterans for Peace) article: Sami Omar Al-Hussayen,
Idaho, grad student who set up websites for Hamas,
charged with Patriot Act violations. Also charged with
setting up banking accounts and visafraud.
Veterans for Peace Sami Omar Al-Hussayen, article
ALA, American Library Association
Cnet Tech News First
FreePeoplesFifthEstate CIA/Mossad/SIS hit in Pakistan,
also responsible for deaths of J ournalist Daniel Pearl,
Nick Berg: Al-Qaida is the code name of special covert
operations of the U.S. CIA, Israeli Mossad, British SIS,
Indian RAW
ISP Planet news
PrivacyDigest privacy news
Security Focus News Microsoft
SecureLab Computer security news and consulting
Military seeks student data from schools name, address,
phone #to recruiters
USA Today NSA has massive database of Americans'
phone calls
Click on pic to go to NFU Internet page
Advanced Research and Development Activity Office
ARDA, data mining alive and well
BellSouth
CAMERA AP Israeli spying story an Urban Myth
according to J ustice Department
Critical Infrastructure Assurance Office ciao.gov
FCC, won't investigate warrantless wiretapping because
Bush effectively used the StateSecrets defense to shut
themdown.
Infragard FBI
New York Times NSA executive order authorizing data
mining of phone calls and file.
Securius.com defending cyberspace security
U.S. Departmant of State, Consular Affairs US-VISIT,
info
Pentagon
Whitehouse.gov Bush war on the internet
Republicans opposed to Bush Warrantless wiretapping
are irrelevant and impotent.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
The Israel Lobby and U.S. Foreign, Policy J ohn J .
Mearsheirmer, University of Chicago, Stephen Walt
Harvard University



Patriot Act top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Patriot II, details, Alternet,
ACLU, Civil Liberties in the Post 9/11 World
Council of Ethics-Based Organizations Associated
with The Department of Public Information of the
United Nations. search Patriot Act.
Epic Electronic Privacy Information Center
FAS Project on Government Security
Big Brother and the ministry of Homeland Security
National Immigration Law Center protect rights and
opportunities of low-income immigrants
Patriot II, details
PrivacyToday news
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
(Veterans for Peace) article: Sami Omar Al-
Hussayen, Idaho, grad student who set up websites for
Hamas, charged with Patriot Act violations. Also
charged with setting up banking accounts and visa
fraud.
Veterans for Peace Sami Omar Al-Hussayen, article
ALA, American Library Association
Cnet Tech News First
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name
of special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
ISP Planet news
PrivacyDigest privacy news
Security Focus News Microsoft
SecureLab Computer security news and consulting
Military seeks student data from schools name,
address, phone #to recruiters
Advanced Research and Development Activity Office
ARDA, data mining alive and well
Critical Infrastructure Assurance Office ciao.gov
Infragard FBI
Securius.com defending cyberspace security
U.S. Departmant of State, Consular Affairs US-VISIT,
info
Pentagon
Whitehouse.gov Bush war on the internet
Police Depts tracking protesters, Pre-crime surveillance top top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Common Dreams Police depts tracking local
protesters
Cnet Tech News First
, info
National Security Agency
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
RFID Technology top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Center for Democracy and Technology search,
Epic Electronic Privacy Information Center
Electronic Frontier Foundation digital rights NGO,
info, news
NoNAIS.comProtect Traditional Rights to Farm, stop
RFID privicacy intrusion by Bush corporate America.
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
eWeek
EETimes
Intelnet news from 500 sources automated
InfoWorld for IT Managers
Internet News for IT Managers
RFID, remotely storing and retrieving info from
product stickers, tags, via radio signals.
Axalto, BearingPoint, Infineon, Supercom, passport
chips contracts. ICAO, Enhanced Border Security
Act
Wikpedia, definition, info
AIM Global Association for Automatic Identification
and Mobility
CIO Insight strategies for IT Business Leaders
Wal-mart at the forefront of RFID Technology
RFID J ournal, search Wal-mart,
Restroom taping top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
FreePeoplesFifthEstate CIA/Mossad/SIS hit in
Pakistan, also responsible for deaths of J ournalist
Daniel Pearl, Nick Berg: Al-Qaida is the code name
of special covert operations of the U.S. CIA, Israeli
Mossad, British SIS, Indian RAW
Employment Law Information Network, Articles,
Human Resources, Experts, Newsletter
Privacy & Security Law Report BNA
Wikipedia MKUltra Project MKUltra, or MK-Ultra,
was a covert, illegal human research program into
behavioral modification run by the Central Intelligence
Agency's (CIA) Office of Scientific Intelligence. The
program began in the early 1950s, was officially
sanctioned in 1953, was reduced in scope in 1964,
further curtailed in 1967 and finally halted in 1973. 1]
The program used unwitting U.S. and Canadian citizens
as its test subjects, which led to controversy regarding
its legitimacy
Road Sensors top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Avia Inc, distributor of speed, red light and rr
crossing surveillance equip
Columbia Telecommunications Corporation,
Telecommunications Systems Engineering.
EPA, Environmental Protection Agency
National Research Council
Sensors Inc, vehicle surveillance.
EPA, Environmental Protection Agency
National Research Council
J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
Oak Ridge National Laboratory, Science, Technlogy,
Government, Business.
Right Wing News
Universities Research Association, consortium of 60
universities,
UT-Battelle, University of Tennesse, DOE, ORNL

Satellites top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
FAS, Federation of American Scientists Project on
Government Secrecy.
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
Wikipedia, National Geospatial Intelligence Agency
search Beaulieu, Arctic Slope Regional Corp,
Chenega Corp, ANSCA, NIMA, no bid contracts,
J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
National Imagery and Mapping Agency, nima, mil, in
support of national security. Burt Beaulieu
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
roads in Alaska.
American Federation of Government Employees,
Bush gave no-bid contracts for mapping project to
Native Indian contractors. (Union busting)
Search engines top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Electronic Frontier Foundation digital rights NGO,
info, news
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
Google Desktop Search automatically reads and
records locally Outlook e-mail, also saves copies of
web pages, chat conversations in AOL IM, and finds
Word Powerpoint and Excel files on your computer.
Google says it has no access. But its multi-user
capabilities reveal security flaws.
Wikipedia, National Geospatial Intelligence Agency
Google Desktop Search automatically reads and records
Outlook e-mail, Outlook Express or Microsoft Internet
Explorer.
Microsoft Internet Explorer see Microsoft campaign
contributions, anti trust defense.
Stoplight Cameras top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
Wikipedia, National Geospatial Intelligence Agency
J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
National Imagery and Mapping Agency, nima, mil, in
support of national security.
Synchronization, Knowledge Management and Intelligence Fusion top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Code Pink under surveillance by SKMIF,
Schema-Root military intelligence, news feeds
Sen. J oe Dunn, tracking California National Guard
spying on citizens
Veterans for Peace
San J ose Mercury News
SignOnSanDiego search
notes: National Guard Bureau investigating if SKMIF
spied on citizens, protesters. similar to Viet Nam era
surveillance?
National Guard Bureau search legal division.
Synchronization, KnowledgeManagement and
Intelligence Fusion unit. Schwarzenegger
SWIFT, Society for Worldwide Interbank Financial Telecommunication top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
ACLU, National ID card,
EPIC Electronic Privacy Information Center,
National ID card,
Privacy International, Swift violated European and
Asian data protection rules, fishing expedition, not a
legally authorized investigation,

Council of Europe, Strasbourg,
San J ose Mercury News
European Union, Stras
Financial Times, SWIFT, bank transaction data
mining, "Tens of thousands of electronic searches
have been conducted under a secret US programmeto
monitor global financial transfers for signs of terrorist
activity" more search terms: Stuart Levy (under-
secretary for terrorismand financial intelligence, US
Treasury), SWIFT (Society for Worldwide Interbank
Financial Telecommunication), Bush used
CIA
FBI
New York Times
Senate Republicans support warrantless wiretaps of
international financial transactions.
SWIFT Society for Worldwide Interbank Financial
Telecommunication, Brussels,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
International Emergency Economic Powers Act to
gain access to the data.
People's Party, largest and most influential bloc in the
European Parliament, demand compensation, Swift
did not seek approval from European authorities.
Wikipedia SWIFT, Terrorist Finance Tracking
Program
Terrorist Finance Tracking Program
TALON, Threat and Local Observation Notice top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Common Dreams TALON government surveillance
of anti-war protesters, Defense Dept, search: Stephen
Cambone.
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog

Wikipedia, National Geospatial Intelligence Agency
J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
Lockheed Martin US personal database, defense
contractor, Bush
Dept of Homeland Security domestic spying
TIDE, Terrorist Identities Datamart Environment" or
"TIDE" and "Railhead."
Washington Post "TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead." TIDE, Terrorist Identities Datamart Environment" or "TIDE" and "Railhead." ... In
2006, authorities quietly launched Railhead, a project worth as much as $500 million over five years, to improve TIDE and eventually replace it and some related systems with
technology that would significantly expand their capabilities. ... After more than a year and about $100 million, the Railhead project has become the focus of criticism from some
counterterrorismanalysts and contractors, who have said it does not provide the search capabilities they expected and appears to be behind schedule. One lawmaker has taken up
those questions and publicly asked for an investigation by the inspector general of the Office of the Director of National Intelligence, saying his congressional staff has information
from a contractor whistle-blower that shows the project is on the "brink of collapse," possibly threatening national security.
Terahertz Spectroscopy top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Widipedia J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components covering the
whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way an audio card transforms
electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse interacts in the detector with a much-
shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the THz pulse at the time the laser pulse gates the
detector on. By repeating this procedureand varying the timing of the gating laser pulse, it is possible to scan the THz pulse and construct its electric field as a function of time.
Subsequently, a Fourier transform is used to extract the frequency spectrumfrom the time-domain data. edit]Advantages of THz radiation THz radiation has several distinct
advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation is safefor biological tissues because it is non-ionizing (unlike for example X-
rays), and images formed with terahertz radiation can have relatively good resolution (less than 1 mm). Also, many interesting materials have unique spectral fingerprints in the
terahertz range, which means that terahertz radiation can be used to identify them. Examples which have been demonstrated include several different types of explosives,
polymorphic forms of many compounds used as Active Pharmaceutical Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many
materials are transparent to THz radiation, these items of interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a
spectroscopic technique, the ultrashort width of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam).
The measurement capability shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely
imaged. THz measurements are non-contact however.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Traffic Stop, drug sniffing dogs top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
Wikipedia, National Geospatial Intelligence Agency
J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
TRAPWIRE top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
Cnet Tech News First
Wikipedia, National Geospatial Intelligence Agency
J ustice Technology Information Network, National
Law Enforcement and Corrections Technology Center.
US-VISIT top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
National Immigration Forum, embrace and uphold
America's tradition as a nation of immigrants.
National Network for Immigrant and Refugee Rights
National Immigrants' Rights Project
Privacy Watch, Cotse.net Internet Privacy Website,
Civil liberty watchdog
National Network for Immigrant and Refugee Rights
U.S. English
National Immigrants' Rights Project
Wikipedia MKUltra Project MKUltra, or MK-Ultra,
was a covert, illegal human research program into
behavioral modification run by the Central
Intelligence Agency's (CIA) Office of Scientific
Intelligence. The program began in the early 1950s,
was officially sanctioned in 1953, was reduced in
scope in 1964, further curtailed in 1967 and finally
halted in 1973. 1] The program used unwitting U.S.
and Canadian citizens as its test subjects, which led to
controversy regarding its legitimacy
Dept of Homeland Security ID all immigrants, potential
terrorists?
FAIR Federation for American Immigration. Reform,
mass immigration to the U.S. should stop
U.S. Departmant of State, Consular Affairs US-VISIT,
info
US Info search: collect biometric data on foreigners
White House, 'web tracking bug' top
PROGRESSIVE REFERENCE CONSERVATIVE 1%*
... AP White House Tracking Bug CAMERA AP Israeli spying story an Urban Myth
according to J ustice Department
Dept of Homeland Security ID all immigrants, potential
terrorists?
Fox
US Info search: collect biometric data on foreigners

Smile - You're on Candid Cable SurveillanceCamera! http://www.tbrnews.org/Archives/a2734.htm The Voice of the White House Washington, D.C., August 10, 2007: How do they
watch you? Let me count the ways. With the new surveillance law being voted in by a weak-kneed Congress, the useless AG, Gonzales can now listen to any conversation or read any
email without a court order. I have several additional comments to be made on this subject. Let s consider a means by which you can be spied on without a warrant. The first is by
using your very own television set to listen to you. Sounds fantastic? Another nutty blog idea? Think again. Here I amquoting from an in-
house memorandum: The methodology of using a commercial television set connected to a cable network system being used as a transmitter as well as a receive, allowing other parties to
hear conversations conducted in the vicinity of the set utilizes the mediumof a digital oscillator installed in television sets. This use is only for a set itself connected to a cable system. The
additional use of a cable box connected to the television set is the only means by which the set can be used to listen to nearby conversations because these boxes are designed to feed back
information through the cable system. This feedback makes it possible for a subscriber to cable to use his telephone to call the cable company for the inclusion of a special program to the
subscribers system. The cable company is automatically able to ascertain the telephone number from the call and using that information, send the desired program to the television set via
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
their network and the box. The subscriber code of the subscriber matches the data on the subscribers box. This makes the use of the box as an instrument of clandestine surveillance
possible.. It is then possible for such information to be fed into other channels, including investigative ones. The use by private parties of the cable system to obtain clandestine
information in this manner would be difficult if not impossible but the NSA and FBI techniques in other electronic surveillance matters are more than sufficient to ensureelectronic
eavesdropping.

WMR How 9/11 began the process of a massive grab by the government of personal data. January 28-30, 2011
With the neo-fascist Republican Party now in charge of the House of Representatives, thereis proposed data retention legislation that would give the FBI virtual unfettered access to
stored Internet transactional data from a variety of service providers with or without a criminal predicate. Democrats like Debbie Wasserman-Shultz from Florida also support the
proposed mandatory data retention legislation. Government "fishing expeditions" for personal data had its beginning in the weeks after 9/11. This hunger for personal data has
culminated in a massive $1.5 billion National Security Agency data warehouse now under construction at Camp Williams in Utah.
Although NSA insists that it will have few analysts at its new data warehouse, the NSA Utah Data Center, the government's grab for Internet user data clearly shows intent by NSA to
conduct more sophisticated forms of data mining, extraction, and analysis than NSA and other federal agencies sought in the weeks and months after 9/11. J etBlueprovided passenger
data to a firm called Torch Concepts, a defense contractor based in Huntsville, Alabama, that had major plans to apply military- and intelligence-level data analysis programs to the
American public. American and Delta Airlines had rejected requests for their passenger data by Torch.
Torch's conclusions were that poorer people who did not live in their homes for a long period of time time posed a greater terrorist risk (passenger stability indicator) than wealthier
long-termhomeowners.
The Census Bureau is also vulnerable to seeing its massive databases acquired by NSA Utah for data mining purposes. This editor previously reported on the value of U.S. Census data
to intelligence analysts in 2004:
HOMELAND SECURITY MINES CENSUS DATA FILES
Possible Violation of Federal Law
By Wayne Madsen
According to US Census Bureau documents, the U.S. Census Bureau shared confidential census data files with the Department of Homeland Security (DHS). Of particular interest to
DHS were census files on U.S. citizens of Arab ancestry sorted by individual ZIP code tabulation areas. In a U.S. Census Bureau memo dated April 23, 2004, a senior systems analyst
with the Population Division writes to DHS that "my superiors are now asking questions about the usage of the data, given the sensitivity of different data requests we have received
about the Arab population."
The Branch Officer of the DHS Customs and Border Protection Bureau's Container Security Division Operational Support and Oversight Branch responds to the Census Bureau concern
by stating that the information on Americans of Arab ancestry is required for "U.S. Outbound operations; which include both cargo and passenger operations." The Branch Chief
continues by stating, "at U.S. International airports, U.S. Customs posts signage informing various nationalities of the U.S. Customs regulations to report currency brought into the US
upon entry. Current regulations require passengers bringing more than $10,000 into the U.S. to claimit on a currency entry declaration . . . My reason for asking for U.S. demographic
data is to aid the Outbound Passenger ProgramOfficer in identifying which languageof signage, based on U.S. ethnic nationality population, would be best to post at the major
International airports. Some cases this would identify multiple copies needed of a specific languagesign versus other cities only one copy."
The Branch Chief then assures Census, "the data obtained from Census was used only for the above purpose and subsequently has been purged from my files!" Although the Branch
Chief's name was blocked out in the released documents, the names of two DHS officials involved in the Census data request, J erome A. Walfish and Mark S. Ziner, were not redacted.
Privacy experts point out that the reasoning given by DHS for obtaining the Arab ancestry files has some major flaws. One, is why someone involved with Outbound operations would
be concerned with entry currency declarations. Another is why DHS requested data files on Arab ancestry populations in New England that include a number of second, third, and fourth
generation Maronite Christian Lebanese whose languageis English and would, therefore, not require airport signage written in Arabic.
The confidentiality of U.S. Census data is established in federal law. Title 13 U.S.C. Section 9, states that U.S. census data is confidential. In addition, Title 13, U.S.C. Section 9 (a) (a)
states that non-employees of the Census Bureau must take an "oath of non disclosure," and must be special sworn status (SSS) officers if they are from another department or agency.
There is no indication that DHS personnel who viewed the confidential Census records were special sworn status officers of the Census Bureau.
DHS was particularly interested in a 2000 Census file denoting the "population of Arab ancestry" from all places in the United States with 10,000 or more population. The information
would be helpful in the possible targeting by DHS of cities with largepercentages of Arab-American citizens, particularly Dearborn, Michigan with a 30.01 percent Arab-American
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
population; Bailey's Crossroads, Virginia, 0.69 percent; Hamtramck, Michigan, 9.39 percent; Dearborn Heights, Michigan, 7.86 percent; Bridgeview, Illinois, 7.18; Tyson's Corner,
Virginia, 6.53 percent; and Lackawanna, New York, 5.83. Lackawanna is home to the "LackawannaSix," six Yemeni-Americans who were convicted of aiding Al Qaeda. There were
allegations of U.S. J ustice Department prosecutorial misconduct in the case against the six, mainly that the government threatened to indefinitely jail the six in a military detention
facility unless they voluntarily pleaded guilty to terrorismcharges.
In addition, DHS was provided with very detailed Arab-American demographic data from the states of Massachusetts, RhodeIsland, and New Hampshire, and the commonwealth
territory of Puerto Rico. In the case of New Hampshire, the census data yielded some very definitive information on Arab-Americans broken down by ZIP codes into small towns and
cities. In the case of Nashua, New Hampshire, the combined ZIP codes of 03060,03062, 03063, and 03064 indicates the presence of 269 Lebanese-Americans. This community of
Maronite Christian Catholics includes some of New Hampshire's best-known politicians and their families, including current Republican Senator J ohn E. Sununu and his threechildren
and former NashuaMayor Brenda Elias.
In the case of Salem, New Hampshire (ZIP code 03079), the 594 Lebanese Americans include former New Hampshire Republican Governor and chief of staff to former President
George H. W. Bush, J ohn H. Sununu, the father of Senator Sununu. In Bedford (ZIP code 03110), the 44 Lebanese-Americans in the town include members of the Sununu family. In the
case of Dover (ZIP Code 03820), the Lebanese-American community includes Bill Shaheen, the husband of former Democratic Governor J eanne Shaheen, and their threechildren.
J eanne Shaheen is currently the national co-chair of Senator J ohn Kerry's presidential campaign.*
DHS also obtained specific breakdowns of Iraqi-Americans and Palestinian-Americans. In certain towns, where their respective populations are low, it would not be difficult for DHS to
ascertain the identities of the individuals by family unit. Such are the cases with the Iraqi-American populations of the Massachusetts towns of Longmeadow (7 people), Andover (8
people), Cambridge (6 people), Chelsea (8 people), and East Providence, RhodeIsland (5 people). The same situation applies to Palestinian-Americans in the census records where the
breakdown shows 5 members of that ancestry in Springfield, Massachusetts and 3 in Londonderry, New Hampshire.
* Shaheen is now the senior Senator from New Hampshire.




anonymous
This administration likes to write memos to itself, justifying the most horrendous acts. Wars of aggression, torture, assassination, the destruction of 800 years of our
common law heritage (habeas corpus), and 250 years of American law in the body of our Constitution.
Some of these are public. Two more have recently come partially into the light.
The first is an awareness of some kind of communication surveillance. Currently some groups believe that this is limited to the data mining of so called pen register
information. But, pen register data does not require a warrant for access. This data is composed of basic information about individual calls like date, time, length, and
number called. There is no need for the NSA to collect this data either. All most all billing of American phone calls is done by an Israeli company called Amdocs. This
data would be most cheaply and conveniently purchased directly from Amdocs.
NSA also has the legal "right" to collect basic email data without a warrant as well. This includes the information in the email header including but not limited to
sender, recipients, data, time, length, attachment names, etc. The legal precedent for the NSAs gathering of basic email data without a warrant was actually based on
its existing "right" to pen register data.
So this current debacle is over something more than pen register data. For around two decades, academic publication of much optical computing theory and technology
has been suppressed by our government. The suppression of academic information is nothing new. I specifically recall that during the 1970's our government prevented
the publication of biomedical research because the research referred to unapproved uses of FDA cleared drugs.
Specialized optical units and array processors will massively increase the parallel processing capacities of the real time capacity required to effectively provide voice
recognition capabilities on a large scale. The NSA has been rumored to have these capacities for some time. It is much more likely that the contents of the phone calls
themselves are being monitored and data mined. Otherwise, there would be no furor over this whole issue.
The other significant Constitutional attack that is presently coming into the light is about a program of warrant-less sneak and peek searches of Muslim owned homes,
businesses and property. These illicit searches are reputed to center around searches for radioactive material. At first 100 such searches were said to have taken
place, but more recent reports have upped that number to over 500.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
It is clear that this tyrant president will not accept any limitations on his power. Even though the law is clear, his minions tout the line that his war powers are unlimited.
Our entire legal and societal heritage as well as our way of life is under viscious attack from our own leaders.

Wired Appeals Court Allows Classified Evidence in Spy Case By David Kravets February 27, 2009 | 3:49:39 PMCategories: Surveillance A federal appeals court
dealt a blow to the Obama administration Friday when it refused to block a judge from admitting top secret evidence in a lawsuit weighing whether a U.S. president
may bypass Congress, as President George W. Bush did, and establish a program of eavesdropping on Americans without warrants.
The legal brouhaha concerns U.S. District J udge Vaughn Walker's decision in J anuary to admit as evidence a classified document allegedly showing that two
American lawyers for a now-defunct Saudi charity were electronically eavesdropped on without warrants by the Bush administration in 2004. The lawyers Wendell
Belew and Asim Ghafoor sued the Bush administration after the U.S. Treasury Department accidentally released the top secret memo to them.
The courts had ordered the document, which has never been made public, returned and removed from the case after the Bush administration declared it a state
secret. The document's admission to the case is central for the two former lawyers of the Al-Haramain Islamic Foundation charity to acquire legal standing so they
may challenge the constitutionality of the warrantless-eavesdropping program Bush publicly acknowledged in 2005.
Absent intervention from the U.S. Supreme Court, the one-line decision (.pdf) by the 9th U.S. Circuit Court of Appeals means the lawyers' case is the only lawsuit
likely to litigate the merits of a challenge to Bush's secret eavesdropping program adopted in the aftermath of the Sept. 11 terror attacks.
"We're trying to establish a legal precedent: A rule that the president must comply with legislation passed by Congress," said J on Eisenberg, the attorney for the two
lawyers. "The president is not above the law. This case is important to establish a legal precedent."
The lawyers' suit looked all but dead in J uly when they were initially blocked from using the document to prove they were spied on. They were forced to return it to
the government after it was declared a state secret.
But last month, Walker said the document could be used in the case because there was sufficient, anecdotal evidence unrelated to the document that suggests the
lawyers for the Al-Haramain charity were spied upon. Without the document, the lawyers didn't have a case.
The Bush and the Obama administration's said the document's use in the trial was a threat to national security. The document at issue isn't likely to ever become
public. Walker's J an. 5 order only allows lawyers in the case to view it, and they are forbidden to publicly discuss its contents.
Bush acknowledged the existence of the so-called Terror Surveillance Program in 2005. It authorized the NSA to intercept, without warrants, international
communications to or from the United States that the government reasonably believed involved a member or agent of al-Qaeda, or affiliated terrorist organization.
Congress authorized such spying activity in J uly.
The Electronic Frontier Foundation claims the TSP went further, and accuses the nations' telecommunication companies of funneling all electronic communications to
the National Security Agency without warrants. However, as part of the spy bill approved in J uly, the government immunized the telcos from lawsuits accusing them of
being complicit with the Bush administration.
The Obama administration on Thursday urged J udge Walker, the same judge in the Al-Haramain case, to dismiss the EFF's challenge to the immunity legislation.
Walker's decision is pending. The U.S. government had designated Al-Haramain a terror organization. The J ustice Department declined comment.

Warrantless searches by FBI
WASHINGTON - The FBI secretly sought information last year on 3,501 U.S. citizens and legal residents from their banks and credit card, telephone and
Internet companies without a court's approval, the Justice Department said Friday.
It was the first time the Bush administration has publicly disclosed how often it uses the administrative subpoena known as a National Security Letter, which allows the
executive branch of government to obtain records about people in terrorism and espionage investigations without a judge's approval or a grand jury subpoena. Friday's
disclosure was mandated as part of the renewal of the Patriot Act, the administration's sweeping anti-terror law.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
The FBI delivered a total of 9,254 NSLs relating to 3,501 people in 2005, according to a report submitted late Friday to Democratic and Republican leaders in the
House and Senate. In some cases, the bureau demanded information about one person from several companies.
The numbers from previous years remain classified, officials said. The department also reported it received a secret court's approval for 155 warrants to examine
business records last year under a Patriot Act provision that includes library records. However, Attorney General Alberto Gonzales has said the department has never
used the provision to ask for library records.
The number was a significant jump over past use of the warrant for business records. A year ago, Gonzales told Congress there had been 35 warrants approved
between November 2003 and April 2005. The spike is expected to be temporary, however, because the Patriot Act renewal that President Bush signed in March made
it easier for authorities to obtain subscriber information on telephone numbers captured through certain wiretaps.
The Foreign Intelligence Surveillance Court, the same panel that signs off on applications for business records warrants, also approved 2,072 special warrants last year
for secret wiretaps and searches of suspected terrorists and spies. The record number is more than twice as many as were issued in 2000, the last full year before the
terrorist attacks of Sept. 11, 2001.
The FBI security letters have been the subject of legal battles in two federal courts because, until the Patriot Act changes, recipients were barred from telling anyone
about them. Ann Beeson, the associate legal counsel for the American Civil Liberties Union, said the report to Congress "confirms our fear all along that National
Security Letters are being used to get the records of thousands of innocent Americans without court approval." The number disclosed Friday excludes requests for
subscriber information, an exception written into the law. It was unclear how many FBI letters were not counted for that reason.
Inside Account of U.S. Eavesdropping on Americans U.S. Officers' " Phone Sex" Intercepted
Exclusive: Inside Account of U.S. Eavesdropping on Americans U.S. Officers' "Phone Sex" Intercepted; Senate Demanding Answers By BRIAN ROSS, VIC WALTER,
and ANNA SCHECTER Oct. 9, 2008 Despite pledges by President George W. Bush and American intelligence officials to the contrary, hundreds of US citizens
overseas have been eavesdropped on as they called friends and family back home, according to two former military intercept operators who worked at the giant
National Security Agency (NSA) center in Fort Gordon, Georgia. The chairman of the Senate Intelligence Committee, J ay Rockefeller (D-WV), called the allegations
"extremely disturbing" and said the committee has begun its own examination. "We have requested all relevant information from the Bush Administration," Rockefeller
said Thursday. "The Committee will take whatever action is necessary." "These were just really everyday, average, ordinary Americans who happened to be in the
Middle East, in our area of intercept and happened to be making these phone calls on satellite phones," said Adrienne Kinne, a 31-year old US Army Reserves Arab
linguist assigned to a special military program at the NSA's Back Hall at Fort Gordon from November 2001 to 2003. Kinne described the contents of the calls as
"personal, private things with Americans who are not in any way, shape or form associated with anything to do with terrorism." WATCH Kinne discuss why it was
'awkward' listening to her fellow Americans. She said US military officers, American journalists and American aid workers were routinely intercepted and "collected on"
as they called their offices or homes in the United States. Watch "World News Tonight with Charles Gibson" and "Nightline" for more of Brian Ross' exclusive report.
Another intercept operator, former Navy Arab linguist, David Murfee Faulk, 39, said he and his fellow intercept operators listened into hundreds of Americans picked up
using phones in Baghdad's Green Zone from late 2003 to November 2007. "Calling home to the United States, talking to their spouses, sometimes their girlfriends,
sometimes one phone call following another," said Faulk. WATCH Faulk discuss what a day on the job was like listening to Americans. The accounts of the two former
intercept operators, who have never met and did not know of the other's allegations, provide the first inside look at the day to day operations of the huge and
controversial US terrorist surveillance program. "There is a constant check to make sure that our civil liberties of our citizens are treated with respect," said President
Bush at a news conference this past February. But the accounts of the two whistleblowers, which could not be independently corroborated, raise serious questions
about how much respect is accorded those Americans whose conversations are intercepted in the name of fighting terrorism. US Soldier's 'Phone Sex' Intercepted,
Shared Faulk says he and others in his section of the NSA facility at Fort Gordon routinely shared salacious or tantalizing phone calls that had been intercepted,
alerting office mates to certain time codes of "cuts" that were available on each operator's computer. "Hey, check this out," Faulk says he would be told, "there's good
phone sex or there's some pillow talk, pull up this call, it's really funny, go check it out. It would be some colonel making pillow talk and we would say, 'Wow, this was
crazy'," Faulk told ABC News. Faulk said he joined in to listen, and talk about it during breaks in Back Hall's "smoke pit," but ended up feeling badly about his actions.
"I feel that it was something that the people should not have done. Including me," he said. In testimony before Congress, then-NSA director Gen. Michael Hayden, now
director of the CIA, said private conversations of Americans are not intercepted. "It's not for the heck of it. We are narrowly focused and drilled on protecting the nation
against al Qaeda and those organizations who are affiliated with it," Gen. Hayden testified. He was asked by Senator Orrin Hatch (R-UT), "Are you just doing this
because you just want to pry into people's lives?" "No, sir," General Hayden replied. Asked for comment about the ABC News report and accounts of intimate and
private phone calls of military officers being passed around, a US intelligence official said "all employees of the US government" should expect that their telephone
conversations could be monitored as part of an effort to safeguard security and "information assurance." "They certainly didn't consent to having interceptions of their
telephone sex conversations being passed around like some type of fraternity game," said J onathon Turley, a constitutional law professor at George Washington
University who has testified before Congress on the country's warrantless surveillance program. "This story is to surveillance law what Abu Ghraib was to prison law,"
Turley said. Listening to Aid Workers NSA awarded Adrienne Kinne a NSA J oint Service Achievement Medal in 2003 at the same time she says she was listening to
hundreds of private conversations between Americans, including many from the International Red Cross and Doctors without Borders. "We knew they were working for
these aid organizations," Kinne told ABC News. "They were identified in our systems as 'belongs to the International Red Cross' and all these other organizations. And
yet, instead of blocking these phone numbers we continued to collect on them," she told ABC News. WATCH Kinne describe how listening to aid workers was part of
the job. A spokesman for Doctors Without Borders, Michael Goldfarb, said: "The abuse of humanitarian action through intelligence gathering for military or political
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
objectives, threatens the ability to assist populations and undermines the safety of humanitarian aid workers." Both Kinne and Faulk said their military commanders
rebuffed questions about listening in to the private conversations of Americans talking to Americans. "It was just always, that , you know, your job is not to question.
Your job is to collect and pass on the information," Kinne said. Some times, Kinne and Faulk said, the intercepts helped identify possible terror planning in Iraq and
saved American lives. "IED's were disarmed before they exploded, that people who were intending to harm US forces were captured ahead of time," Faulk said. NSA
job evaluation forms show he regularly received high marks for job performance. Faulk left his job as a newspaper reporter in Pittsburgh to join the Navy after 9/11.
Kinne says the success stories underscored for her the waste of time spent listening to innocent Americans, instead of looking for the terrorist needle in the haystack.
"By casting the net so wide and continuing to collect on Americans and aid organizations, it's almost like they're making the haystack bigger and it's harder to find that
piece of information that might actually be useful to somebody," she said. "You're actually hurting our ability to effectively protect our national security." The NSA: "The
Shadow Factory" Both former intercept operators came forward at first to speak with investigative journalist J im Bamford for a book on the NSA, "The Shadow Factory,"
to be published next week. "It's extremely rare," said Bamford, who has written two previous books on the NSA, including the landmark "Puzzle Palace" which first
revealed the existence of the super secret spy agency. "Both of them felt that what they were doing was illegal and improper, and immoral, and it shouldn't be done,
and that's what forces whistleblowers." WATCH Bamford describe how the NSA missed signals leading up to 9/11. A spokesman for General Hayden, Mark Mansfield,
said: "At NSA, the law was followed assiduously. The notion that General Hayden sanctioned or tolerated illegalities of any sort is ridiculous on its face."
NSA setting up secret 'Perfect Citizen' spy system 'This is Big
Brother', says corporate insider
The Register NSA setting up secret 'Perfect Citizen' spy system 'This is Big Brother', says corporate insider .... By Lewis Page , 8th J uly 2010 09:20 GMT ... The
US National Security Agency (NSA) is embarking on a secret domestic surveillance project dubbed "Perfect Citizen", intended to monitor and protect important national
infrastructure such as power grids and transport systems. ... The Wall Street J ournal, citing unnamed government and industry sources, says that the NSA has
awarded a "black" (classified) $100m contract to defence contractor Raytheon which will see secret monitoring equipment installed within US networks deemed to be of
national importance. ... According to the WSJ , Perfect Citizen has caused some disquiet among those in the know. It could be seen as the NSA - a military combat
support agency whose focus is supposed to be on external threats - carrying out massive automated surveillance of American companies and citizens. The paper
quotes an internal Raytheon email as saying that "Perfect Citizen is Big Brother". ... The stated purpose of the project is to get a clear idea of the level of threat
facing American infrastructure IT. Many older systems, designed in the pre-network world, have since been hooked up to the internet for ease of use and maintenance.
It is feared by some in the US intelligence / defence community that unfriendly powers and organizations are already engaged in probing these systems with a view to
learning how to attack them. ... The NSA's Perfect Citizen equipment would be designed to flag up unusual network events indicating an impending cyber attack,
according to the WSJ 's sources. ... "You've got to instrument the network to know what's going on, so you have situational awareness to take action," an unnamed
military source told the paper. ... Many of the networks that the NSA would wish to place Perfect Citizen equipment on are privately owned, however, and some
could also potentially carry information offering scope for "mission creep" outside an infrastructure-security context. For instance, full access to power company systems
might allow the NSA to work out whether anyone was at home at a given address. Transport and telecoms information would also make for a potential bonanza for
intrusive monitoring. ... The full scope of the project remains to be determined, according to the WSJ report, with no certainty as yet on which companies or types of
companies would be asked to cooperate - or how much information the NSA would get access to. ... The NSA - whose boss has now also been confirmed as head
of the Pentagon's uniformed Cyber Command - apparently got the job by default, as it is considered the only US agency with enough network and cyber savvy to take
the task on. ... The Reg has contacted Raytheon and the NSA for comment on Perfect Citizen, but thus far has not received any reply.
Electronic Frontier Foundation
AP SAN FRANCISCO - The J ustice Department said Friday it was moving to dismiss a federal lawsuit challenging the Bush administration's secretive domestic
wiretapping program. The lawsuit, brought by the Internet privacy group, Electronic Frontier Foundation, does not include the government. Instead, it names AT&T,
which the San Francisco-based group accuses of colluding with the National Security Agency to make communications on AT&T networks available to the spy agency
without warrants.
The government, in a filing here late Friday, said the lawsuit threatens to expose government and military secrets and therefore should be tossed. The administration
added that its bid to intervene in the case should not be viewed as a concession that the allegations are true. As part of its case, the EFF said it obtained
documents from a former AT&T technician showing that the NSA is capable of monitoring all communications on AT&T's network,
and those documents are under seal. The former technician said the documents detail secret NSA spying rooms and electronic surveillance equipment in AT&T facilities.
Next month, U.S. District J udge Vaughn Walker will hold a hearing on whether they should be divulged publicly. President Bush confirmed in December that the NSA
has been conducting the surveillance when calls and e-mails, in which at least one party is outside the United States, are thought to involve al-Qaida terrorists. In
congressional hearings earlier this month, Attorney General Alberto Gonzales suggested the president could order the NSA to listen in on purely domestic calls without
first obtaining a warrant from a secret court established nearly 30 years ago to consider such issues.
Gonzales said the administration, assuming the conversation related to al-Qaida, would have to determine if the surveillance were crucial to the nation's fight against
terrorism, as authorized by Congress following the Sept. 11 attacks. The EFF lawsuit, alleging AT&T violated U.S. law and its customers' privacy, seeks to stop the
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
surveillance program. The San Antonio-based telecommunications giant said it follows all applicable laws.


60 Minutes on NSA corruption and incompetence. Report follows WMR report by six
years May 24, 2011 -- WayneMadsenReport
CBS "60 Minutes" reported on May 22 on former National Security Agency (NSA) official Thomas Drake's charges of high-level corruption and incompetence within the
eavesdropping agency.
WMR is re-publishing our report on NSA, which includes a reference to "Thinthread," the first ever report in the media on this system. There is an Israeli espionage
angle to the story about Drake, NSA mathematician Bill Binney, NSA analyst J . Kirk Wiebe, NSA computer scientist Ed Loomis, House Intelligence Committee staffer
Diane Roark, J ustice Department prosecutor Thomas Tamm and NSA espionage against U.S. citizens. "The New Yorker" article by J ane Mayer fails to mention this
important element, which may be the real reason for the prosecution of Drake and the prosecution, recently aborted, of Tamm. Because when it comes to Israeli
espionage in the United States, it's "see no evil, hear no evil, say no evil."
NSA and selling the nation's prized secrets to contractors
J une 1, 2005
On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2 billion, ten-year contract
known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although GROUNDBREAKER was limited to outsourcing NSA's
administrative support functions such as telephones, data networks, distributed computing, and enterprise architecture design, the contract soon expanded into the
operational areas -- a sphere that had always been carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer
components such as semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at Fort
Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical maintenance provided from off-
shore locations like India.
CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998 that permitted CSC to
operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999, the floodgates for outside contractors were opened
and a resulting deluge saw most of NSA's support personnel being converted to contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil
Alliance" by NSA government personnel), a consortium led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to
Eagle, which then made offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI, Omen,
Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and Windemere.
In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under J ohn Negroponte, opened NSA up further to
contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called TRAILBLAZER to develop a demonstration test bed for
a new signals intelligence processing and analysis system. SAIC's team members included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team
leader CSC. TRAILBLAZER, according to Hayden's own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the
tune of over $600 million.
But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which could be a terrorist nuclear
strike on the United States.
NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple tasks like phones being fixed
to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance and DNE team members are rife with former NSA top
officials who are reaping handsome bonuses from the contracts -- and that has many NSA career employees crying conflict of interest and contract fraud.
CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts former NSA Deputy Director
Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former NSA Deputy Director for Information Systems Security.
Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz Allen. Former NSA Director General Ken Minihan is President of the Security Affairs
Support Association (SASA), an intelligence business development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics,
Northrop Grumman, Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of directors
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
(surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General Hayden.
Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close connections between some NSA
contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited Israel in early 2004 and received the Albert Einstein
Technology Award at ceremony in J erusalem attended by Likud Party Defense Minister Shaul Mofaz. The special ceremony honoring CACI's president was sponsored
by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox United Torah J udaism Party's J erusalem Mayor, Uri Lupolianski, was also in attendance. According to
Lebanon's Daily Star, CACI's president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S.
delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants from U.S.-Israeli bi-national
foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI employees as being involved in the prison torture at Abu
Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General J anis Karpinski, reported that she witnessed Israeli interrogators working alongside
those from CACI and another contractor, Titan.
When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon employees not to download the
report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to U.S. government insiders, his name has come up in FBI
wiretaps of individuals involved in the proliferation of nuclear weapons material to Israel via Turkish (including Turkish J ewish) intermediaries. These wiretaps are the
subject of a Federal probe of who compromised a sensitive CIA counter-proliferation global operation that used a carve out company called Brewster J ennings &
Associates to penetrate nuclear weapons smuggling networks with tentacles extending from Secaucus, New J ersey to South Africa and Pakistan and Turkey to Israel.
According to the J ewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's assistants, Larry Franklin, met
with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in Arlington, Virginia. According to FBI surveillance tapes, Franklin
relayed top secret information to Steve Rosen, AIPAC's then policy director, and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for
passing classified information to AIPAC. In addition, three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the
political officer at the Israeli embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the
headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American J ewish Committee.
What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA), State Department, and National
Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In 1967, Israeli warplanes launched a premeditated attack on
the NSA surveillance ship, the USS Liberty, killing and wounding a number of U.S. sailors and NSA civilian personnel. Convicted Israeli spy J onathan Pollard
compromised a number of NSA sensitive sources and methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident
where Israelis used a contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan administration
forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and direction finding system for the Israeli Defense
Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was established at a separate facility in Mount Laurel, New J ersey and apart from the
main NSA developmental center at RCA's facility in Camden, New J ersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence
contract work and the separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few
American J ewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental systems being compromised
to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was quickly cancelled but due to the sensitivity surrounding
the American J ewish engineers, the Reagan J ustice Department avoided bringing espionage charges. There were some forced retirements and transfers, but little more.
But for NSA, the duplicity of the Israelis added to the enmity between Fort Meade and Israeli intelligence.
With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again there is a fear within NSA that
foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual "Fort Knox" of intelligence treasures and secrets.
Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from November 2002 that shows
how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain access to and even virtual control over some of the most
sensitive systems within the U.S. intelligence community. One suspect in this unchecked outsourcing is the person Hayden hired from the outside to act as Special
Adviser to his Executive Leadership Team, Beverly Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright
had been the Chief Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board member. As
one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"
According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most sensitive signals intelligence
(SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and electronics intelligence (ELINT) applications, including databases
that contain communications intercepts, are now firmly in the grasp of the Eagle Alliance. Operational workstations are being migrated to a less-than-reliable
Windows/Intel or "WINTEL" environment. The document boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and
maintain Information Technology services, tools, and capabilities for all emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-
operational administrative support functions originally specified in the GROUNDBREAKER contract.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets of users in order to
successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of systems that impact on other members of the
U.S. intelligence community, foreign SIGINT partners, and national command authorities. These systems include INTELINK, Common Remoted Systems, National
SIGINT Requirements Process, Overhead Tasking Distribution, RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity
Detection, Network Analysis Tools, Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross
Agency Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base, Language Knowledge
Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction, Dominant Facsimile Processing System and
DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF) Database, Satellite database, Protocol Analysis Terminal, Global Numbering
Database, Intercept Tasking Databases, DEFSMAC Space Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend
Analysis in Data Streams, Signal Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the
ELINT database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community partners (foreign and
domestic) in the contractors' revamping of NSA's operational systems.
The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System servers have been assigned
various cover terms:
CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO HALF HEALYMINK
LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT.
A number of SIGINT applications are also impacted by the outsourcing mania. They are also assigned cover terms:
ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA) GALLEYMAN GALLEYPROOF
J AGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II, III, and KL TEXTA SPOT
In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the whims of outside contractors. These systems include
ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II, ARCHIVER, ARCVIEW GIS,
ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION, AUTOPILOT, AUTOSTAR, AXIOMATIC
BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD, BLACKBOOK, BLACKFIN,
BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA, BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE,
BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE, BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY,
BLUESTREAM, BOTTOM, BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER,
BUILDINGCODE, BULK, BUMPER
CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL, CARRAGEEN, CARTOGRAPHER, CAT,
CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL, CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON,
CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS, CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF,
CHILLFLAME, CHIMERA, CHIPBOARD, CHUJ ING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II,
CLUBMAN, COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA, CONFRONT,
CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY, CRAZYTRAIN, CRISSCROSS,
CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS
DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE, DESERTFOX, DESOTO,
DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO, DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION,
DRAGONMAKER, DUALIST
EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH, ENCAPSULATE, ENGRAFT,
ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET
FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB, FIREBOLT, FINETUNE,
FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY, FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON,
FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE, FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE,
FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA, FREESTONE, FRENZY/GRANULE, FUSEDPULL
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW, GHOSTWIRE, GIGACOPE,
GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS, GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH,
GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER, GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN,
GUARDDOG, GUIDETOWER
HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III, HEDGEHOG, HELMET II,
HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI, HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY,
HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE, HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE
ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST, INTERSTATE, INTRAHELP,
IOWA, ISLANDER, IVORY ROSE, IVORY SNOW
J ABSUM, J ACAMAR, J ADEFALCON, J ARGON, J ARKMAN, J ASPERRED, J AZZ, J EALOUSFLASH, J EWELHEIST, J OVIAL, J OBBER INCOMING, J OSY,
J UMBLEDPET, J UPITER
KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS, KINSFOLK, KLASHES,
KLOPPER, KNOSSOS, KRYPTONITE
LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART, LATENTHEAT, LEGAL
REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART, LIONROAR, LIONWATCH, LOAD, LOCKSTOCK,
LOGBOOK, LONGROOT, LUMINARY
MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH, MAINWAY, MARINER II,
MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II, MASTING, MATCHLITE, MAUI, MAVERICK, MECA,
MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE, MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG,
MONITOR, MONOCLE, MOONDANCE, MOONFOX, MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY
NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS, NIGHTFALL 16, NIGHTFALL
32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON, NUMERIC
OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-WORD 2000 TRANSCRIPTION,
OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH
PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING, PATHFINDER, PATRIARCH,
PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET, PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE,
PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING, PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP,
PORCELAIN, PORTCULLIS, POSTCARD, POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY,
PRIZEWINNER, PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II
QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER
RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJ ET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION, RED ARMY, RED BACK,
RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT, REDCOATS, REDMENACE, REDSEA, REDSTORM,
REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA, ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE,
RUTLEY
SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK, SEABEACH II,
SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY, SHARK, SHARKBITE, SHARKKNIFE,
SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR, SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK,
SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT, SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER,
SLAMDANCE, SLATEWRITER, SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN,
SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL, SPECTAR, SPIROGRAPH,
SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE, STARCICLE, STARGLORY, STARLOG, STARQUAKE,
STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE, STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL,
SUPERCODING, SURREY, SWEETDREAM, SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO, TELLTALE, TELLURITE, TEMAR,
TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER, TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY,
TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN, TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO,
TRINIAN, TROLLEYTRACK, TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT
UMORPH, UNLIMITED
VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST, VIOLATION, VISIONARY,
VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED
WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER -- ACCESS TO DBS, WESTRICK,
WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL, WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART,
WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP
XVTUBA
YELLOWSTONE, YETLING
ZENTOOLS, ZIGZAG, and ZIRCON

Terahertz Spectroscopy
Wikipedia Typically, the terahertz pulses are generated by an ultrashort pulsed laser and last only a few picoseconds. A single pulse can contain frequency components
covering the whole terahertz range from 0.05 to 4 THz. For detection, the electrical field of the terahertz pulse is sampled and digitized, conceptually similar to the way
an audio card transforms electrical voltage levels in an audio signal into numbers that describe the audio waveform. In THz-TDS, the electrical field of the THz pulse
interacts in the detector with a much-shorter laser pulse (e.g. 0.1 picoseconds) in a way that produces an electrical signal that is proportional to the electric field of the
THz pulse at the time the laser pulse gates the detector on. By repeating this procedure and varying the timing of the gating laser pulse, it is possible to scan the THz
pulse and construct its electric field as a function of time. Subsequently, a Fourier transform is used to extract the frequency spectrum from the time-domain data.
edit]Advantages of THz radiation THz radiation has several distinct advantages over other forms of spectroscopy: many materials are transparent to THz, THz radiation
is safe for biological tissues because it is non-ionizing (unlike for example X-rays), and images formed with terahertz radiation can have relatively good resolution (less
than 1 mm). Also, many interesting materials have unique spectral fingerprints in the terahertz range, which means that terahertz radiation can be used to identify them.
Examples which have been demonstrated include several different types of explosives, polymorphic forms of many compounds used as Active Pharmaceutical
Ingredients (API) in commercial medications as well as several illegal narcotic substances. Since many materials are transparent to THz radiation, these items of
interest can be observed through visually opaque intervening layers, such as packaging and clothing. Though not strictly a spectroscopic technique, the ultrashort width
of the THz radiation pulses allows for measurements (e.g., thickness, density, defect location) on difficult to probe materials (e.g., foam). The measurement capability
shares many similarities to that observed with pulsed ultrasonic systems. Reflections from buried interfaces and defects can be found and precisely imaged. THz
measurements are non-contact however.
Prodigal
Cherie Anderson runs a travel company in southern California, and shes convinced the federal government is reading her emails. But
shes all right with that. I assume it's part of the Patriot Act and I really don't mind, she says. I figure I'm probably boring them to death.
It's likely Anderson is not alone in her concerns that the government may be monitoring what Americans say, write, and read. And now
there may be even more to worry about: a newly revealed security research project called PRODIGAL -- the Proactive Discovery of Insider
Threats Using Graph Analysis and Learning -- which has been built to scan IMs, texts and emails . . . and can read approximately a
quarter billion of them a day.
Every time someone logs on or off, sends an email or text, touches a file or plugs in a USB key, these records are collected within the
organization, David Bader, a professor at the Georgia Tech School of Computational Science and Engineering and a principal investigator
on the project, told FoxNews.com. PRODIGAL scans those records for behavior -- emails to unusual recipients, certain words cropping up,
files transferred from unexpected servers -- that changes over time as an employee "goes rogue." The system was developed at Georgia
Tech in conjunction with the Defense Advanced Research Projects Agency (DARPA), the Army's secretive research arm that works on
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
everything from flying cars to robotic exoskeletons. Initially, PRODIGAL will scan only the communications of military volunteers and
people who work in federal agencies. But the very existence of such a project is sure to unnerve citizens like Anderson. Is the government
reading my emails? Are they already monitoring me? "Some people say it's one step further toward a police state," said Anthony Howard,
a book author and security expert who has consulted for the Department of Homeland Security. But Bader and other experts are quick to
dismiss the idea that PRODIGAL could be used to monitor everyone in America. The scans work only on internal systems, they say -- not
across the entire Internet. And the experts say such a project is long overdue: by monitoring for "anomalies" and predicting extreme
behavior, catastrophes can be prevented, such as a soldier in good mental health becoming homicidal or a government employee sharing
key classified information. Today, an analyst may receive tens of thousands of 'anomalies' per day, where an anomaly is an unexplained
event, Bader said. The new system is designed to aid analysts in processing those anomalies. And it's not alone. Bader equated the
PRODIGAL system to Raytheon SureView, an internal scanning system that looks for suspicious activity and alerts federal agencies about
possible threats. Another system is the Einstein project, which was developed after 9/11 and scans government employees for key words
and links suspicious activity to National Security Agency databases. But PRODIGAL scans vastly more data than those systems: as much
as a terabyte or more per day, what Georgia Tech described as "massive data sets." PRODIGAL is part of an existing DARPA security
project called Anomaly Detection at Multiple Scales (ADAMS), which was announced earlier this year. Details about how ADAMS works
are not widely known; Georgia Tech's recent announcement is one of the first reports to explain how these detection engines work.
According to Bader, PRODIGAL uses complex "graph-processing" algorithms to analyze threats and piece together a jigsaw puzzle of
communications. The system then ranks the unusual activity before feeding the most suspicious threats to agents. Cyber-security expert
J oseph Steinberg, CEO of Green Armor Solutions, said ADAMS is unique in that it scans through a massive stream of data. He says the
new project, which will take about two years to develop and will cost $9 million, will be more effective at analyzing threats and determining
if they are valid. But the issue is not the scanning technology itself; its how the information is interpreted -- and whether it ultimately helps
at all, Howard told FoxNews.com. "Since there is no real data publicly available to substantiate that any of this technology is preventing
terrorist attacks or strengthening our borders from within, we can't] really say definitively that this technology is doing any good," he said.
The challenge, he said, is that criminals and terrorists often use multiple channels of communication, some encrypted -- and know how to
avoid existing detection systems. Nevertheless, PRODIGALs ability to scan reams of data is clearly the next step in tracking unusual
activity, and its guaranteed to raise a red flag for Anderson and others. "Since people tend to be imperfect, the data captured can easily be
mishandled. Where does it end?" Howard said.
Read more: http://www.foxnews.com/scitech/2011/12/03/could-us-government-start-reading-your-emails/#ixzz1fUgqaOeA

WMR NSA spying operation targeting journalists focused but massive
April 20-22, 2012 -- NSA spying operation targeting journalists focused but massive National Security Agency (NSA) sources have reported
the following to WMR: The NSA has conducted a targeted but massive surveillance operation against certain journalists who have routinely
exposed NSA's illegal domestic communication surveillance program, code named STELLAR WIND. ... NSA has, for some time, kept
tabs on journalists who wrote about the communication spying agency. In its embryonic stage, the journalist surveillance system, originally
code-named FIRSTFRUITS, was basically a clipping service that provided NSA and CIA analysts with copies of newspaper, magazine, and
Internet articles that mentioned one or both of the two agencies. ... Shortly after the September 11, 2001 attacks, Vice President Dick
Cheney's legal counsel, David Addington, visited NSA headquarters at Fort Meade, Maryland with a list of individuals he wanted NSA to spy
on and provide Cheney's office with transcripts of phone calls and e-mails. From that visit, STELLAR WIND was developed as an illegal
surveillance system targeting journalists, members of Congress, and other "persons of interest" for the White House. ... In March 2004,
Attorney General J ohn Ashcroft ruled STELLAR WIND illegal but the next day he became critically ill with pancreatitis. When White House
chief of staff Andrew Card and White House counsel Alberto Gonzales visited Ashcroft in his hospital room to demand he sign off on the
program, Ashcroft deferred to his deputy J ames Comey and FBI director Robert Mueller who both refused to authorize the program. George
W. Bush overruled Ashcroft, Comey, and Mueller and continued to authorize STELLAR WIND. President Obama has continued to authorize
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
STELLAR WIND, according to NSA sources. ... Although STELLAR WIND continues to generally target journalists who write about
intelligence and national security matters, NSA has concentrated its efforts on three journalists, in particular. They are New York Times'
reporter and author of State of War J ames Risen, journalist and author of The Puzzle Palace and Body of Secrets J ames Bamford, and
WMR editor Wayne Madsen. Risen continues to fight a grand jury subpoena to testify about his sources on Operation Merlin, a CIA program
to deliver flawed nuclear design technology to Iran. Former CIA officer J effrey Sterling has been indicted and charged under the Espionage
Act for revealing details of the program. Risen's subpoena was quashed by J udge Louise Brinkema of the U.S. District Court for the Eastern
District of Virginia, but the Obama administration has appealed the decision to the U.S. Appeals Court for the Fourth Circuit in Richmond,
Virginia and oral arguments in the case are scheduled for next month. ... NSA sources report: Wayne Madsen's e-mails and phone
conversations back to 2002 are in the possession of the NSA. The phone calls range from those with his mother to those with government
sources. All passwords to social networking websites, banks, phone companies, credit card companies, and his website,
WayneMadsenReport, are held by the NSA. The data includes the list of his subscribers to WayneMadsenReport, as well. ... The same
level of detailed data is maintained on Risen and Bamford. ... Personal observation: It is very clear that a number of individuals who
contacted this editor over the past several years to pass on information were stymied at the last minute from maintaining contact. These
individuals were willing to provide information on: the movement and temporary "loss" of nuclear weapons from Minot Air Force Base in
North Dakota to Barksdale Air Force Base in Louisiana in 2007 coupled with the murder of Air Force special operation Captain J ohn Frueh
in Washington state; documents proving Canadian military involvement in torture of detainees in Afghanistan; information on the 2000 attack
on the USS Cole in Aden harbor being a "false flag" attack; evidence that there were no human remains found at the crash site of United
flight 93 in Shanksville, Pennsylvania; and evidence showing that Harvard virologist Dr. Don Wiley, who was investigating the initial anthrax
attacks, was murdered in Memphis in November 2001. ... In all these cases, individuals who contacted this editor and were willing to
provide information ceased contact after their initial phone calls, letters, and email. ... NSA also maintains mail covers on addresses of
certain individuals in the event that contact is made via the U.S. Postal Service or private companies such as FedEx or DHL. ...
FIRSTFRUITS, which is now known by a different cover name, contains, in addition to articles, complete transcripts of phone calls, e-mails,
faxes, and letters, in addition to the numbers and names of all individuals who have been in contact with targeted journalists. In addition to
the three high priority targets -- Risen, Bamford, and Madsen -- other journalists who are a subject of the NSA warrantless surveillance
include Bill Gertz of The Washington Times, Eric Lichtblau and Scott Shane of The New York Times, Siobhan Gorman, formerly of The
Baltimore Sun and now with The Wall Street J ournal, and Seymour Hersh with The New Yorker. .. So far, the Obama administration has
brought Espionage Act charges against six individuals for contact with the media. They are charged with providing classified information to
journalists and "aiding the enemy." ... However, the J ustice Department may take an even more draconian turn. This editor has heard
from NSA insiders that there is a willingness by some quarters to charge two of the three key targeted journalists under the Espionage Act.
Since Bamford and Madsen both once worked at NSA and both signed non-disclosure agreements -- Bamford in the 1960s and Madsen in
the mid-1980s -- there has been talk of indicting them also for violations of the Espionage Act, along with their sources in the intelligence
community.

RT Stratfor emails reveal secret, widespread TrapWire surveillance system
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology
and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous. Every few seconds,
data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then
encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other
intelligence. Its part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from
Americas intelligence community. The employee roster at Arbaxas reads like a whos who of agents once with the Pentagon, CIA and other
government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented.
The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a
tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the programs public
presence to be relatively limited. But thanks to last years hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is
quickly changing. Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as
the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across
the country were circulated on the Web this week after security researcher J ustin Ferguson brought attention to the matter. At the same
time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the
whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the
emails. On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks
could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the
assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor J ulian Assange, the head of a new
breed of terrorist. As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning. Mr. Ferguson
and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original
documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early
Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote
on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second
on the site. According to a press release (pdf) dated J une 6, 2012, TrapWire is designed to provide a simple yet powerful means of
collecting and recording suspicious activity reports. A system of interconnected nodes spot anything considered suspect and then input it
into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of
behavior that are indicative of pre-attack planning. In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence
Fred Burton is alleged to write, TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It
helps you connect the dots over time and distance. Burton formerly served with the US Diplomatic Security Service, and Abraxas staff
includes other security experts with experience in and out of the Armed Forces. What is believed to be a partnering agreement included in
the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their
TrapWire system (pdf). Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run
through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations, Crime and
J ustice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf).
Any patterns detected links among individuals, vehicles or activities will be reported back to each affected facility. This information can
also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell. In a 2005
interview with The Entrepreneur Center, Abraxas founder Richard Hollis Helms said his signature product can collect information about
people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under
observation from terrorists. He calls it a proprietary technology designed to protect critical national infrastructure from a terrorist attack by
detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack
is executed, and that, The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push
information out to local law authorities automatically. An internal email from early 2011 included in the Global Intelligence Files has
Stratfors Burton allegedly saying the program can be used to walk] back and track the suspects from the get go w/facial recognition
software. Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has
appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with
TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York
City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have
subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to
employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well. In one email from 2010 leaked by
Anonymous, Stratfors Fred Burton allegedly writes, God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada,
Vegas, Los Angeles, NYC as clients. Files on USASpending.gov reveal that the US Department of Homeland Security and Department of
Defense together awarded Abraxas and TrapWire more than one million dollars in only the eleven months. News of the widespread and
largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to
prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the governments Trailblazer
Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former
NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every
American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
FBI / BioMetric Facial Recognition and Identification Initiative.pdf
text and RT
Facial Recognition and Identification Initiatives Richard W. Vorder Bruegge Federal Bureau of Investigation 2 Image Technology in the
Forefront Unparalleled ease of capturing, storing, copying, and sharing images Proliferation of surveillance cameras, expanding global
media enterprises, and average citizens with mobile phone still and video camera capabilities Unprecedented level of sharing images and
videos via the internet and other advanced communication methods Photographs and videos depicting victims, suspects, and
eyewitnesses are becoming the subject of investigations Face: Forensic Discipline And Biometric 3 Biometrics Forensics A measurable
biological (anatomical and physiological) or behavioral characteristic used for identification Facial Recognition (FR) - the automated
searching of a facial image in a computer database, typically resulting in a group of facial images ranked by computer evaluated similarity
computer- evaluated Visible physical characteristics one can use for the purposes of measurements or comparisons that are collected
after an event Facial Identification (FI) - the manual examination of the differences and similarities between two facial images for the
purpose of determining if they represent different persons or the same person Event 4 FI & FR Address Multiple Missions Mission Areas:
Access control Automated identity verification Human identification Screening Surveillance Law enforcement & national security
investigations Identity intelligence to understand intent 5 FBI Facial Use Cases Identifying fugitives and missing persons in FR systems
Identifying unknown persons of interest from images (1:N) Tracking subjects movements to/from critical events (e.g., 9/11) Conducting
automated surveillance at lookout locations (1:M, where 1<M<<N) Identifying subjects in public datasets Identifying subjects from images
in seized systems Verifying mug shots against National Criminal Information Center (NCIC) records (1:1) Controlling access 6 Identifying
Subjects from Images for 40 Years The FBIs Facial Recognition/Identification work is performed within the Forensic Audio, Video, and
Image Analysis Unit (FAVIAU) The FAVIAU is one of only a few accredited laboratories in the world that conducts examinations in the
disciplines of video, image, and audio analysis The Biometric Center of Excellence (BCOE) is the Federal Bureau of Investigations (FBI)
program for exploring and advancing the use of new and enhanced biometric technologies and capabilities for integration into operations 7
Driving New FBI Biometric Capabilities 8 Sponsoring Applied Research Ongoing applied research, development, test & evaluation:
Universal Face & Iris Workstation FBI Facial Collaboration-Facial Land marking/Facial Aging Automated Face Detection and
Recognition in Video FI/FR of Twins (blemishes) Obscuring Identity in Video Repro Face (2D-3D-2D) Facial Image and Camera
Certification Process Automated Retrieval of Scars, Marks, and Tattoos Ear Recognition Multiple Biometric Grand Challenge/Multiple
Biometric Evaluation/ III Data Set Testing 9 Sponsoring Standards Development Facial Identification Scientific Working Group (FISWG)
Sponsored by the BCOE and established in 2009 Mission - develop consensus standards, guidelines, and best practices for the discipline
of image-based comparisons of human features Participants include federal, state, local, and international government agencies, as well
as invited non-governmental organizations Next meeting scheduled for November 15-18 in San Antonio, Texas Visit www.FISWG.org
Deepening FR Collaboration Sponsored the International Face Collaboration Meeting 5 foreign countries and 11 U.S. agencies
participated Participated in the FR workshop From Bones to Bits 55 U.S. government and 47 contractor attendees Sponsored the
U.S. Government Facial Collaboration Meeting 88 attendees representing numerous law enforcement, intelligence, and military agencies
10 Analyzing Legal And Privacy Concerns Tasks associated with this analysis include: Identifying databases external to the FBI to which
the FBI has legal access Defining policy for both automated and human-tandem searching of databases and methods of how the images
are used in searching and how they are destroyed or retained Identifying privacy implications of applied research using images of human
subjects 11 Developing Training Curriculum 12 Preparing for FR incorporation into Next Generation Identification (NGI) The NGI system:
Incremental replacement of the current IAFIS Improving current functionality and providing new functionality Developing multimodal
collection and search identification services ? An upgrade to IAFIS The FBI is developing an automated, interoperable multimodal
biometric system 13 Enhanced ten print services 2011 Palmprints and latents 2012 Photos/Facial, scars, marks, and tattoos 2013 Iris 2014
13 Value Of the FBI-DMV Pilot Operational Results FR System Testing Identification of Follow-On Projects The BCOE-sponsored FR pilot
program with NC DMV led to more than 700 leads including: One federal fugitive apprehension Six state fugitive apprehensions One
missing person resolution FACEMASK has also served as an opportunity for FBI analysts to operationally test a FR system and determine
its strengths and weaknesses. This aids the FBI as it develops its own FR capability Due to this success, the FBI took advantage of an
ongoing survey of U.S. DMVs and used it as an opportunity to identify other prospective state DMVs for follow-on projects Purpose Of The
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
DMV Survey Initial Purpose Collect DMV FR POC Information Identify DMVs that have implemented FR systems Expanded Purpose
Gather data about FR vendors, state laws, and search protocol to help the FBI identify a DMV for a potential follow-on project Technical
systems information Receptiveness to collaborating with the FBI Various concerns and suggestions voiced by the DMVs and trends were
recorded The FBI wanted to identify key FR POC in order to direct inquiring investigators and agencies. The original DMV survey focuses
around contact information; however, with the success of the original pilot the purpose and scope of the data gathering effort changed.
Potential FBI-DMV FR Pilot Expansion Active FR System NO FR System Unknown/No Response Key Takeaway: More than half of all state
DMVs have FR systems. Their main goal is to detect and combat fraud Responses current as of (05/28/2010) 16 * * * * * * * * * * * * * * * * *
* Permit Law Enforcement Access to Data * DMV Survey High Level Findings Specific Findings ? The vast majority of states that have FR
Systems use L1 Technologies Technology Vendors Legal Requirements Funding Knowledge ? Many DMV image databases are maintained
and searched by their vendors. This presents privacy issues that should be explored ? ? Across the nation, there are widely varying legal
requirements. To initiate searches, some DMVs require Memorandums of Understanding (MOU) while some just require the requesting
agency to buy their vendors software ? Due to a lack of funding, some states who had planned to develop FR systems had to delay or
cancel their plans due to budgetary constraints ? Many DMV POCs lacked technical knowledge about their systems and the legal issues
involved in their use. Since most POCs were unable or unwilling to nominate alternative POCs, more in-depth research may be required
before FBI collaboration can be considered (i.e., researching state laws that apply to the DMVs FR system or interviewing a DMVs vendor
for more specific systems information) ? Questions / Comments Contact Information: Richard Vorder Bruegge Email:
Richard.VorderBruegge@ic.fbi.gov Additional Resources: www.BiometricCoE.gov Email: BiometricCoE@leo.gov
WMR GROUNDBREAKER NSA and selling the nation's prized secrets to contractors
J une 1, 2005
On August 1, 2001, just five and a half weeks before the 911 attacks, NSA awarded Computer Sciences Corporation (CSC) a more than $2
billion, ten-year contract known as GROUNDBREAKER. The contract was never popular with NSA's career professionals. Although
GROUNDBREAKER was limited to outsourcing NSA's administrative support functions such as telephones, data networks, distributed
computing, and enterprise architecture design, the contract soon expanded into the operational areas -- a sphere that had always been
carefully restricted to contractors. NSA was once worried about buying commercial-off-the-shelf computer components such as
semiconductors because they might contain foreign bugs. NSA manufactured its own computer chips at its own semiconductor factory at
Fort Meade. Currently, NSA personnel are concerned that outsourcing mania at Fort Meade will soon involve foreign help desk technical
maintenance provided from off-shore locations like India.
CSC had originally gained access to NSA through a "buy in" project called BREAKTHROUGH, a mere $20 million contract awarded in 1998
that permitted CSC to operate and maintain NSA computer systems. When General Michael V. Hayden took over as NSA Director in 1999,
the floodgates for outside contractors were opened and a resulting deluge saw most of NSA's support personnel being converted to
contractors working for GROUNDBREAKER's Eagle Alliance (nicknamed the "Evil Alliance" by NSA government personnel), a consortium
led by CSC. NSA personnel rosters of support personnel, considered protected information, were turned over to Eagle, which then made
offers of employment to the affected NSA workers. The Eagle Alliance consists of CSC, Northrop Grumman, General Dynamics, CACI,
Omen, Inc., Keane Federal Systems, ACS Defense, BTG, Compaq, Fiber Plus, Superior Communications, TRW (Raytheon), Verizon, and
Windemere.
In October 2002, Hayden, who has now been promoted by Bush to be Deputy Director of National Intelligence under J ohn Negroponte,
opened NSA up further to contractors. A Digital Network Enterprise (DNE) team led by SAIC won a $280 million, 26 month contract called
TRAILBLAZER to develop a demonstration test bed for a new signals intelligence processing and analysis system. SAIC's team members
included Booz Allen Hamilton, Boeing, Northrop Grumman, and Eagle Alliance team leader CSC. TRAILBLAZER, according to Hayden's
own testimony before the Senate Select Committee on Intelligence, is now behind schedule and over budget to the tune of over $600
million.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
But that is not the only consequence of these two mega-contracts for NSA's ability to monitor global communications for the next 911, which
could be a terrorist nuclear strike on the United States.
NSA insiders report that both contract teams have melded into one and that NSA's operations are being adversely impacted. From simple
tasks like phones being fixed to computers being updated with new software, the Eagle Alliance has been a disaster. The Eagle Alliance
and DNE team members are rife with former NSA top officials who are reaping handsome bonuses from the contracts -- and that has many
NSA career employees crying conflict of interest and contract fraud.
CACI, called "Colonels and Captains, Inc." by critics who cite the revolving door from the Pentagon to its corporate office suites, counts
former NSA Deputy Director Barbara McNamara as a member of its board of directors. CACI alumni include Thomas McDermott, a former
NSA Deputy Director for Information Systems Security. Former NSA Director Adm. Mike McConnell is a Senior Vice President of Booz
Allen. Former NSA Director General Ken Minihan is President of the Security Affairs Support Association (SASA), an intelligence business
development association that includes Boeing, Booz Allen, CACI, CSC, the Eagle Alliance, General Dynamics, Northrop Grumman,
Raytheon, SAIC, and Windemere, all GROUNDBREAKER and TRAILBLAZER contractors, among its membership. SASA's board of
directors (surprise, surprise) includes CACI's Barbara McNamara. One of SASA's distinguished advisers is none other than General
Hayden.
Although contractors are required to have the same high level security clearances as government personnel at NSA, there are close
connections between some NSA contractors and countries with hostile intelligence services. For example, CACI's president and CEO visited
Israel in early 2004 and received the Albert Einstein Technology Award at ceremony in J erusalem attended by Likud Party Defense Minister
Shaul Mofaz. The special ceremony honoring CACI's president was sponsored by the Aish HaTorah Yeshiva Fund. The ultra-Orthodox
United Torah J udaism Party's J erusalem Mayor, Uri Lupolianski, was also in attendance. According to Lebanon's Daily Star, CACI's
president also met with notorious racist Israeli retired General Effie Eitam who advocates expelling Palestinians from their lands. The U.S.
delegation also included a number of homeland security officials, politicians, and businessmen. CACI has also received research grants
from U.S.-Israeli bi-national foundations. A few months after the award ceremony for CACI's president, the Taguba Report cited two CACI
employees as being involved in the prison torture at Abu Ghraib prison in Iraq. The U.S. military commander for the Iraqi prisons, General
J anis Karpinski, reported that she witnessed Israeli interrogators working alongside those from CACI and another contractor, Titan.
When the Taguba Report was leaked, the office of Deputy Defense Secretary for Policy Douglas Feith issued an order to Pentagon
employees not to download the report from the Internet. Feith is a well-known hard line supporter of Israel's Likud Party and, according to
U.S. government insiders, his name has come up in FBI wiretaps of individuals involved in the proliferation of nuclear weapons material to
Israel via Turkish (including Turkish J ewish) intermediaries. These wiretaps are the subject of a Federal probe of who compromised a
sensitive CIA counter-proliferation global operation that used a carve out company called Brewster J ennings & Associates to penetrate
nuclear weapons smuggling networks with tentacles extending from Secaucus, New J ersey to South Africa and Pakistan and Turkey to
Israel.
According to the J ewish Telegraph Agency, some six months before the Abu Ghraib torture scandal was first uncovered, one of Feith's
assistants, Larry Franklin, met with two officials of the American Israel Public Affairs Committee (AIPAC) at the Tivoli Restaurant in
Arlington, Virginia. According to FBI surveillance tapes, Franklin relayed top secret information to Steve Rosen, AIPAC's then policy director,
and Keith Weissman, a senior Iran analyst with AIPAC. Franklin has been indicted for passing classified information to AIPAC. In addition,
three Israeli citizens have been identified as possible participants in the spy scandal. They are Naor Gilon, the political officer at the Israeli
embassy in Washington; Uzi Arad, an analyst with the Institute for Policy and Strategy in Herzliya (the northern Tel Aviv suburb where the
headquarters of Mossad is located); and Eran Lerman, a former Mossad official who is now with the American J ewish Committee.
What has some NSA officials worried is that with pro-Israeli neocons now engrained within the CIA, Defense Intelligence Agency (DIA),
State Department, and National Security Council, NSA is ripe for penetration by Israeli intelligence. NSA has a troubled past with Israel. In
1967, Israeli warplanes launched a premeditated attack on the NSA surveillance ship, the USS Liberty, killing and wounding a number of
U.S. sailors and NSA civilian personnel. Convicted Israeli spy J onathan Pollard compromised a number of NSA sensitive sources and
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
methods when he provided a garage full of classified documents to Israel. But NSA is also aware of an incident where Israelis used a
contractor, RCA, to gain access to yet additional NSA sources and methods. In the 1980s, against the wishes of NSA, the Reagan
administration forced NSA to permit RCA, one of its major contractors, to develop a tethered aerostat (balloon) signals intelligence and
direction finding system for the Israeli Defense Force. According to NSA officials, the Israeli-NSA joint project, codenamed DINDI, was
established at a separate facility in Mount Laurel, New J ersey and apart from the main NSA developmental center at RCA's facility in
Camden, New J ersey. Although NSA and RCA set up a strict firewall between the contractor's national intelligence contract work and the
separate DINDI contract, Israeli engineers, who were working for Mossad, soon broke down the security firewall with the assistance of a few
American J ewish engineers assigned to the DINDI project. The security breach resulted in a number of national intelligence developmental
systems being compromised to the Israelis, including those code named PIEREX, MAROON ARCHER, and MAROON SHIELD. DINDI was
quickly cancelled but due to the sensitivity surrounding the American J ewish engineers, the Reagan J ustice Department avoided bringing
espionage charges. There were some forced retirements and transfers, but little more. But for NSA, the duplicity of the Israelis added to the
enmity between Fort Meade and Israeli intelligence.
With outside contractors now permeating NSA and a major Israeli espionage operation being discovered inside the Pentagon, once again
there is a fear within NSA that foreign intelligence services such as the Mossad could make another attempt to penetrate America's virtual
"Fort Knox" of intelligence treasures and secrets.
Thanks to some very patriotic and loyal Americans inside NSA, this author is now in possession of an internal NSA contract document from
November 2002 that shows how GROUNDBREAKER and TRAILBLAZER have allowed the Eagle Alliance and other contractors to gain
access to and even virtual control over some of the most sensitive systems within the U.S. intelligence community. One suspect in this
unchecked outsourcing is the person Hayden hired from the outside to act as Special Adviser to his Executive Leadership Team, Beverly
Wright, who had been the Chief Financial Officer for Legg Mason Wood Walker in Baltimore. Before that, Wright had been the Chief
Financial Officer for Alex Brown, the investment firm at which George W. Bush's grandfather, Prescott Bush, once served as a board
member. As one senior NSA official sarcastically put it, "She's highly qualified to work in intelligence!"
According to the document, the future of some 10,000 Windows NT and UNIX workstations and servers that handle some of NSA's most
sensitive signals intelligence (SIGINT) (the Signals Intelligence Directorate workstation upgrade is code named BEANSTALK) and
electronics intelligence (ELINT) applications, including databases that contain communications intercepts, are now firmly in the grasp of the
Eagle Alliance. Operational workstations are being migrated to a less-than-reliable Windows/Intel or "WINTEL" environment. The document
boldly calls for the Eagle Alliance to establish a SIGINT Service Applications Office (SASO) to "provide and maintain Information
Technology services, tools, and capabilities for all emphasis added] SIGINT mission applications at the NSA." This is a far cry from the non-
operational administrative support functions originally specified in the GROUNDBREAKER contract.
The document also calls for NSA to provide extremely sensitive information on SIGINT users to the contractors: "Identification of target sets
of users in order to successfully coordinate with the Eagle Alliance modernization program." The Eagle Alliance is involved in a number of
systems that impact on other members of the U.S. intelligence community, foreign SIGINT partners, and national command authorities.
These systems include INTELINK, Common Remoted Systems, National SIGINT Requirements Process, Overhead Tasking Distribution,
RSOC (Regional SIGINT Operations Center) Monitoring Tool, RSOC Modeling Tool, Speech Activity Detection, Network Analysis Tools,
Network Reconstruction Tools, Advanced Speech Processing Services, Automatic Message Handling System, CRITIC Alert, Cross Agency
Multimedia Database Querying, Message Format Converter, Central Strategic Processing and Reporting, Collection Knowledge Base,
Language Knowledge Base and Capabilities, K2000 Advanced ELINT Signals, Speech Content Services, Speech Information Extraction,
Dominant Facsimile Processing System and DEFSMAC Support, Data Delivery (TINMAN), High Frequency Direction Finding (HFDF)
Database, Satellite database, Protocol Analysis Terminal, Global Numbering Database, Intercept Tasking Databases, DEFSMAC Space
Systems Utilities, Message Server, Extended Tether Program, Language Knowledge Services, Trend Analysis in Data Streams, Signal
Related Database, SANDKEY Support (SIGINT Analysis and Reporting), and the SIGINT interception database ANCHORY and the ELINT
database WRANGLER. In fact, the document states that the contractors' plans foresee the inclusion of NSA's intelligence community
partners (foreign and domestic) in the contractors' revamping of NSA's operational systems.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
The servers include those that support mission-critical National Time Sensitive Systems (NTSS). These National Time Sensitive System
servers have been assigned various cover terms:
CANUCKS DOLLAR EASTCAKE HEALYCUFF MUDDYSWELT NEEDYWHAT RIMTITLE RISKDIME ROWLOAD SEAWATER CURACAO
HALF HEALYMINK LEARNGILT LINEFURL MOBLOOSE SPELLBEAK THOSEHOT. A number of SIGINT applications are also impacted
by the outsourcing mania. They are also assigned cover terms:
ADVERSARY ADVERSARY GOLD CHECKMATE FANBELT FANBELT II FIREBLAZE GALE-LITE (the primary owner of which is DIA)
GALLEYMAN GALLEYPROOF J AGUAR KAFFS MAGNIFORM MAINCHANCE OILSTOCK PATHSETTER PINSETTER SIGDASYS FILE II,
III, and KL TEXTA SPOT In fact, the document indicates that literally hundreds of NSA intelligence applications are now subject to the
whims of outside contractors. These systems include
ABEYANCE, ACROPOLIS, ADROIT, ADVANTAGE, AGILITY, AIRLINE, AIRMAIL, ALERT, ALCHEMIST, ANTARES, APPLEWOOD II,
ARCHIVER, ARCVIEW GIS, ARROWGATE, ARROWWOOD, ARTFUL, ASPEN, ASSOCIATION, ATOMICRAFT, ATTRACTION,
AUTOPILOT, AUTOSTAR, AXIOMATIC
BABBLEQUEST, BACKSAW, BANYAN, BARAD, BASERUNNER, BEAMER, BEIKAO, BELLVIEW, BIRDSNEST, BISON, BLACKBIRD,
BLACKBOOK, BLACKFIN, BLACKHAWK, BLACKNIGHT/SHIPMASTER, BLACKMAGIC, BLACKONYX, BLACKOPAL, BLACKSEA,
BLACKSHACK, BLACKSHIRT, BLACKSMYTH, BLACKSNAKE, BLACKSPIDER, BLACKSTAR, BLACKSTORM, BLACKSTRIKE,
BLACKWATCH PULL, BLOODHUNTER, BLACKSWORD, BLOSSOM, BLUEBERRY, BLUESKY, BLUESTREAM, BOTTOM,
BOTTOMLINE, BOWHUNT, BRAILLEWRITER, BRICKLOCK, BRIGHTENER, BROADWAY, BRIO INSIGHT, BUCKFEVER,
BUILDINGCODE, BULK, BUMPER
CADENCE, CAINOTOPHOBIA, CALLIOPE, CALVIN, CANDID, CANDELIGHTER, CANDLESTICK, CAPRICORN, CARNIVAL,
CARRAGEEN, CARTOGRAPHER, CAT, CATCOVE, CELLBLOCK, CELTIC II, CELTIC CROSS, CENTERBOARD, CENTERCOIL,
CENTERPOINT, CENTRALIST, CERCIS, CHAGRIN, CHAMELEON, CHAMITE, CHAPELVIEW, CHARIOT, CHARMANDER, CHARTS,
CHATEAU, CHECKMATE, CHECKWEAVE, CHERRYLAMBIC, CHEWSTICK, CHICKENOFF, CHILLFLAME, CHIMERA, CHIPBOARD,
CHUJ ING, CIVORG, CHUCKLE, CLEANSLATE, CLIPS, CLOSEREEF I, CLOUDBURST, CLOUDCOVER, CLOUDCOVER II, CLUBMAN,
COASTLINE, COASTLINE COMPASSPOINT, CLIENT, CODEFINDER, COMMONVIEW, CONCERTO, CONDENSOR, CONESTOGA,
CONFRONT, CONTRIVER, CONUNDRUM, CONVEYANCE, COPPERHEAD, CORESPACE, CORTEZ, COUNTERSINK, COUNTERSPY,
CRAZYTRAIN, CRISSCROSS, CRUISESHIP, CRYSTALLIZE, CYBERENGINE, CYGNUS
DAFIF, DANCEHALL, DARKSHROUD, DATATANK, DAYPUL, DAZZLER, DEATHRAY, DECOMA, DELTAWING, DEPTHGAUGE,
DESERTFOX, DESOTO, DESPERADO, DIALOG, DIAMONDCHIP, DIFFRACTION, DISPLAYLINE, DITCHDIGGER, DITTO/UNDITTO,
DIVINATION, DOITREE, DOLLARFISH, DOUBLEVISION, DRAGONMAKER, DUALIST
EAGERNESS, EAGLESTONE, EASYRIDER, ECTOPLASM, ELATION, ELECTRIFY, ELTON, ELEVATOR, EMPERORFISH,
ENCAPSULATE, ENGRAFT, ETCHINGNEEDLE, EXPATRIATE, EXPERTPLAYER, EXTENDER, EXTRACTOR, EUREKA, EYELET
FAIRHILL, FAIRVIEW, FALCONRY, FALLOWHAUNT, FANATIC, FANCINESS, FASCIA II, FATFREE, FENESTRA, FIESTA, FINECOMB,
FIREBOLT, FINETUNE, FIREBRAND II, FIRELAKE, FIRERUNG, FIRETOWER, FIRSTVIEW, FISHERMAN, FISHINGBOAT, FISHWAY,
FLAGHOIST (OCS), FLASHFORWARD, FLEXAGON, FLEXMUX, FLEXSTART, FLIP, FLOTSAM, FOLKART, FORESITE, FORTITUDE,
FOURSCORE, FOXFUR, FPGA GSM ATTACK, FIRSTPOINT, FARMHOUSE, FLODAR, FLOVIEW, FOSSIK, FROZENTUNDRA,
FREESTONE, FRENZY/GRANULE, FUSEDPULL
GALAXYDUST, GARDENVIEW, GATCHWORK, GATOR, GAUNTLET, GAYFEATHER, GAZELLE, GEMTRAIL, GENED, GHOSTVIEW,
GHOSTWIRE, GIGACOPE, GIGASCOPE B, GISTER, GIVE, GLIDEPLANE, GOLDVEIN, GOLDPOINT, GNATCATCHER-GRADUS,
GOKART, GOLDENEYE, GOLDENFLAX, GOLDENPERCH, GOLDMINE, GOMBROON, GOTHAM, GRADIENT, GRANDMASTER,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
GRAPEANGLE, GRAPEVINE, GRAPHWORK, GREATHALL, GREENHOUSE, GREMLIN, GUARDDOG, GUIDETOWER
HACKER, HABANERO, HAMBURGER, HAMMER, HARPSTRING, HARVESTER, HARVESTTIME, HEARTLAND II, HEARTLAND III,
HEDGEHOG, HELMET II, HELMET III, HERONPOND, HIGHPOWER, HIGHTIDE, HILLBILLY BRIDE, HIPPIE, HOBBIN, HOKUSAI,
HOMBRE, HOMEBASE, HOODEDVIPER, HOODQUERY, HOPPER, HOST, HORIZON, HOTSPOT, HOTZONE,
HOUSELEEK/SPAREROOF, HYPERLITE, HYPERWIDE
ICARUS, ICICLE, IMAGERY, INFOCOMPASS, INNOVATOR, INQUISITOR, INROAD, INSPIRATION, INTEGRA, INTERIM, INTERNIST,
INTERSTATE, INTRAHELP, IOWA, ISLANDER, IVORY ROSE, IVORY SNOW
J ABSUM, J ACAMAR, J ADEFALCON, J ARGON, J ARKMAN, J ASPERRED, J AZZ, J EALOUSFLASH, J EWELHEIST, J OVIAL, J OBBER
INCOMING, J OSY, J UMBLEDPET, J UPITER
KAHALA, KAINITE, KEBBIE, KEELSON, KEEPTOWER, KEYCARD, KEYMASTER, KEYS, KEYSTONE WEB, KINGCRAFT, KINGLESS,
KINSFOLK, KLASHES, KLOPPER, KNOSSOS, KRYPTONITE
LADYSHIP, LAKESIDE, LAKEVIEW, LAMPSHADE, LAMPWICK, LARGO, LASERDOME, LASERSHIP, LASTEFFORT, LATENTHEART,
LATENTHEAT, LEGAL REPTILE, LETHALPAN, LIBERTY WALK, LIGHTNING, LIGHTSWITCH, LINKAGE, LIONFEED, LIONHEART,
LIONROAR, LIONWATCH, LOAD, LOCKSTOCK, LOGBOOK, LONGROOT, LUMINARY
MACEMAN, MACHISMO, MADONNA, MAESTRO, MAGENTA II, MAGIC BELT, MAGICSKY, MAGISTRAND, MAGYK, MAKAH,
MAINWAY, MARINER II, MARKETSQUARE, MARLIN, MARSUPIAL, MARTES, MASTERCLASS, MASTERSHIP, MASTERSHIP II,
MASTING, MATCHLITE, MAUI, MAVERICK, MECA, MEDIASTORM, MEDIATOR, MEDIEVAL, MEGAMOUSE, MEGASCOPE,
MEGASTAR, MERSHIP (CARILLON), MESSIAH, MICOM, MIGHTYMAIL, MILLANG, MONITOR, MONOCLE, MOONDANCE, MOONFOX,
MOORHAWK, MORETOWN, MOSTWANTED, MOVIETONE III, MUSICHALL, MUSTANG, MYTHOLOGY
NABOBS, NATIONHOOD, NAUTILUS, NDAKLEDIT, NEMESIS, NERVETRUNK, NETGRAPH, NEWSBREAK, NEWSHOUND, NEXUS,
NIGHTFALL 16, NIGHTFALL 32, NIGHTWATCH, NOBLEQUEST, NOBLESPIRIT, NOBLEVISION, NSOC SHIFTER, NUCLEON,
NUMERIC
OAKSMITH, OBLIGATOR, OCEANARIUM, OCEANFRONT, OCTAGON, OCTAVE, OFFSHOOT, OLYMPIAD, ONEROOF, ONEROOF-
WORD 2000 TRANSCRIPTION, OPALSCORE, OPENSEARCH, OPERA, ORCHID, ORIANA, OUTERBANKS, OUTFLASH, OUTREACH
PADDOCK, PACESETTER, PALINDROME, PAPERHANGER II, PARTHENON, PARTHENON II, PASSBACK, PASTURE, PATCHING,
PATHFINDER, PATRIARCH, PAYMASTER, PAYTON, PEDDLER, PEARLWARE, PERFECTO, PERSEUS, PERSEVERE, PICKET,
PINWALE, PIEREX, PILEHAMMER, PINNACLE, PINSTRIPE, PITONS, PIXIEDUST, PIZARRO, PLATINUM PLUS, PLATINUMRING,
PLUMMER, PLUS, PLUTO, POLARFRONT, POLYSTYRENE, POPPYBASE, POPTOP, PORCELAIN, PORTCULLIS, POSTCARD,
POWDERKEG, POWERPLANT, PRAIRIE DOG, PRANKSTER, PREDATOR, PRELUDE, PROSCAN, PROSPERITY, PRIZEWINNER,
PROPELLER, PROTOVIEW, PUFFERFISH, PYTHON II
QUARTERBACK, QUASAR, QUEST, QUICKER, QUICKSILVER
RAGBOLT, RAINGAUGE, RAINMAN, RAKERTOOTH, RAMJ ET, RAP, RAPPEL, RAUCOVER, REACTANT, RECEPTOR, RECOGNITION,
RED ARMY, RED BACK, RED BELLY, RED DAWN, RED DEMON, RED ROOSTER, RED ROVER, REDALERT, REDCAP, REDCENT,
REDCOATS, REDMENACE, REDSEA, REDSTORM, REDZONE, RELAYER, RENEGADE, RENOIR, RIGEL LIBRARY, RIKER, RIMA,
ROADBED, ROADTURN, ROCKDOVE, ROOFTOP, ROOTBEER, ROSEVINE, RUTLEY
SAGACITY, SANDSAILOR, SASPLOT, SATINWOOD, SATURN, SAYA, SCANNER, SEALION, SEAPLUM, SCISSORS, SCREENWORK,
SEABEACH II, SEARCHLIGHT, SELLERS, SEMITONE, SENIOR GLASS, SENTINEL, SHADOWBOXER, SHADOWCHASER, SHANTY,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
SHARK, SHARKBITE, SHARKKNIFE, SHARPSHOOTER, SHILLET, SHILOH, SHIPMASTER, SHORTSWING, SIDEMIRROR,
SIGHTREADY, SIGNATURE, SILKRUG, SILVERFISH, SILVERHOOK, SILVERLINER, SILVERVINE, SINGLEPOINT, SINGLESHOT,
SITA, SKEPTIC, SKILLFUL, SKYBOARD, SKYCAST, SKYGAZER, SKYLINE, SKYLOFT, SKYWRITER, SLAMDANCE, SLATEWRITER,
SLIDESHOW, SMOKEPPIT, SNAKEBOOT, SNAKECHARMER, SNAKEDANCE II, SNAKERANCH II, SNORKEL, SNOWMAN,
SOAPOPERA, SOAPSHELL, SOFTBOUND, SOFTRING, SORCERY, SPANISH MOSS, SPARKVOYAGE, SPEARHEAD, SPECOL,
SPECTAR, SPIROGRAPH, SPLINTER, SPLITTER, SPORADIC, SPOTBEAM, SPRINGRAY, SPUDLITE, STAIRWAY, STAR SAPPHIRE,
STARCICLE, STARGLORY, STARLOG, STARQUAKE, STARSWORD, STATIONMASTER, STEAKHOUSE, STELLAH, STONEGATE,
STORMCHASER, STORMPEAK, STOWAWAY, STRONGHOLD, SUBSHELL, SUNDIAL, SUPERCODING, SURREY, SWEETDREAM,
SWEETTALK, SWEEPINGCHANGE, SWITCHPOINT
TABLELAMP, TALION, TANGOR, TAROTCARD, TARP, TARSIS, TART, TAXIDRIVER, TEAS, TECBIRD, TEL, TELE, TELESTO,
TELLTALE, TELLURITE, TEMAR, TERMINAL VELOCITY, THINKCHEW, THINTHREAD, THUNDERWEB, TIDYTIPS III, TIEBREAKER,
TIGER, TIMELINE, TIMEPIECE, TIMETRAVELER, TINKERTOY, TINSEL, TIPPIE, TOPSHELF, TOPSPIN II, TOPVIEW, TRACECHAIN,
TRAILBLAZER, TRBUSTER, TREASURE, TREASURE TROVE, TRED, TRIFECTA, TRINFO, TRINIAN, TROLLEYTRACK,
TROLLEYMASTER, TRUNK MOBILE, TRYSTER, TSUNAMI, TWILIGHT, TWOBIT
UMORPH, UNLIMITED
VIEWEXCHANGE, VEILED DATABASE, VEILED FORTHCOMING, VENTURER II, VICTORY DAEMON, VINTAGE HARVEST,
VIOLATION, VISIONARY, VISIONQUEST, VOICECAST, VOICESAIL, VOIP SEED
WARGODDESS, WARSTOCK, WATCHOUT, WAXFLOWER, WAYLAND, WEALTHYCLUSTER, WEBSPINNER, WEBSPINNER --
ACCESS TO DBS, WESTRICK, WHARFMAN II, WHITE SEA, WHIRLPOOL, WHITE SHARK, WHITE SWORD, WHITESAIL,
WHITEWASH, WILDFIRE, WINDSHIELD, WINTERFEED, WIREDART, WIREWEED, WORLDWIDE, WIZARDRY, WOLFPACK, WRAPUP
XVTUBA
YELLOWSTONE, YETLING
ZENTOOLS, ZIGZAG, and ZIRCON

National Security letter, Administrative subpoena color coding airline passengers top
PROGRESSIVE REFERENCE
CONSERVATIVE 1%*
ACLU and NSA lawsuit
ACLU objects to CAPPS, no due process,
easily circumvented.
Electronic Frontier Foundation working to protect
civil and free speech & lawsuit
Epic Electronic Privacy Information Center
TomPaine search: Bush's NSA Spying Defense
Cnet Tech News First, search Carnivore
Findlaw, Dean
J urist, legal news and research, University of
Pittsburg
PrivacyDigest privacy news
Wikipedia NSA National Security Agency,
warrantless wiretapping, administrative
subpoena, National Security letter.

Center for Strategic and International Studies
Critical Infrastructure Assurance Office internet,
infrastructure, surveillance, code words.
Dept of Homeland Security domestic spying
GWU NSA Declassified Transistion 2001, National
Security Archive Electronic Briefing Book No. 24
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK temporary
restraining order (which they subsequently converted to a motion for preliminary
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
injunction in a conference with the Court), seeking to enjoin enforcement of 1021.
UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK ---------------------------------------- CHRISTOPHER
HEDGES, DANIEL ELLSBERG, J ENNIFER BOLEN, NOAM CHOMSKY, ALEXA OBRIEN, US DAY OF RAGE, KAI WARG ALLA, HON.
BRIGITTA J ONSDOTTIR M.P., Plaintiffs, -v- BARACK OBAMA, individually and as representative of the UNITED STATES OF AMERICA;
LEON PANETTA, individually and in his capacity as the executive and representative of the DEPARTMENT OF DEFENSE, J OHN
MCCAIN, J OHN BOEHNER, HARRY REID, NANCY PELOSI, MITCH MCCONNELL, ERIC CANTOR as representatives of the UNITED
STATES OF AMERICA, Defendants. ---------------------------------------- X : : : : : : : : : : : : : : : : : : : : : : X 12 Civ. 331 (KBF) OPINION AND
ORDER KATHERINE B. FORREST, District J udge: On December 31, 2011, President Obama signed into law the National Defense
Authorization Act for Fiscal Year 2012, Pub. L. 112-81, 125 Stat. 1298 (Dec. 31, 2011) (the NDAA). Plaintiffs, a group of writers and
activists, brought a lawsuit on J anuary 13, 2012, seeking preliminary and permanent injunctive relief with respect to one section (indeed, one
page) of that voluminous legislation: 1021. Plaintiffs assert that Section 1021 is constitutionally infirm, violating both their free speech and
associational rights guaranteed by the First Amendment as well as USDC SDNY DOCUMENT ELECTRONICALLY FILED DOC #:
_________________ DATE FILED: May 16, 2012 2 due process rights guaranteed by the Fifth Amendment of the United States
Constitution. On February 27, 2012, plaintiffs filed a motion for a temporary restraining order (which they subsequently converted to a
motion for preliminary injunction in a conference with the Court), seeking to enjoin enforcement of 1021. In support of their motion,
plaintiffs assert that 1021 already has impacted their associational and expressive activities--and would continue to impact them, and that
1021 is vague to such an extent that it provokes fear that certain of their associational and expressive activities could subject them to
indefinite or prolonged military detention. On March 30, 2012, after expedited discovery, this Court held an evidentiary hearing on plaintiffs
motion. At the hearing, three plaintiffs testified live and, pursuant to stipulation, another by sworn declaration. The Government did not call
any witnesses, submit any documentary evidence, or file any declarations in connection with its opposition to plaintiffs motion.1 As
mentioned, plaintiffs challenge 1021 as vague and thus, violative of their First and Fifth Amendment rights. The Government opposes
plaintiffs request for preliminary injunctive relief on three bases: first, that plaintiffs lack standing; The parties filed post-hearing memoranda;
and the motion was fully submitted on May 4, 2012. 1 The Government refers to all defendants in this action. 3 second, that even if they
have standing, they have failed to demonstrate an imminent threat requiring preliminary relief; and finally, through a series of arguments that
counter plaintiffs substantive constitutional challenges, that Section 1021 of the NDAA is simply an affirmation or reaffirmation of the
authority conferred by the 2001 Authorization for Use of Military Force, Pub. L. 107-40, 115 Stat. 224 (Sept. 18, 2011) (the AUMF), passed
in the wake of September 11, 2001. In essence, the Government argues that as an affirmation of the AUMF, 1021 of the NDAA does
nothing new; and therefore, since the type of activities in which plaintiffs are engaged were not subject to legal action under the AUMF, there
is no reasonable basis for plaintiffs to assert that 1021 could suddenly subject them to governmental action now. According to the
Government, as an affirmation of the AUMF, the NDAA must be read against the backdrop of Executive practice and court decisions--a
backdrop which clarifies the scope of 1021. (See Govts Supplemental Mem. of Law in Oppn to Pls. Mot. for a Prelim. Inj. (Govt Supp.
Mem.) (Dkt. No. 33) at 1.) For the reasons set forth below, this Court finds that 1021 is not merely an affirmation of the AUMF. To so
hold would be contrary to basic principles of legislative interpretation that require Congressional enactments to be given independent
meaning. To find that 1021 is merely an affirmation of the AUMF would 4 require this Court to find that 1021 is a mere redundancy--that
is, that it has no independent meaning and adds absolutely nothing to the Governments enforcement powers. In addition to rendering
1021 meaningless, the Governments position ignores the differences between the two statutes. Section 1021 lacks what are standard
definitional aspects of similar legislation that define scope with specificity. It also lacks the critical component of requiring that one found to
be in violation of its provisions must have acted with some amount of scienter--i.e., that an alleged violators conduct must have been, in
some fashion, knowing. Section 1021 tries to do too much with too little--it lacks the minimal requirements of definition and scienter that
could easily have been added, or could be added, to allow it to pass Constitutional muster. This Court finds that plaintiffs (who, as discussed
below, have a reasonable fear of future government action sufficient to confer standing) have carried their burden with respect to the
necessary elements for issuance of preliminary injunctive relief. They have demonstrated a likelihood of success on the merits with respect
to their constitutional challenges; they have put forward specific evidence of actual and threatened irreparable harm; the balance of the
equities and the public interest favors issuance of preliminary relief (particularly, but not only, in light of the fact that the Governments entire
position is premised on the 5 assertion that 1021 does nothing new--that it simply reaffirms the AUMF; in which case, preliminarily
enjoining enforcement should not remove any enforcement tools from those the Government currently assumes are within its arsenal).
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Accordingly, this Court preliminarily enjoins enforcement of 1021 pending further proceedings in this Court or remedial action by Congress
mooting the need for such further proceedings. BACKGROUND I. THE STATUTES The Governments central argument with respect to both
standing and the merits is that the NDAA is nothing more than an affirmation of the AUMF. Thus, the Court sets forth the relevant portions of
both statutes as well as the relevant enforcement history relating to the AUMF. The Court also discusses a similar statute recently examined
by the Supreme Court of the United States, which has informed some of its thinking on the merits of the instant motion. A. The AUMF The
AUMF was passed in direct response to the terrorist event of September 11, 2001. The AUMF provides: t]hat the President is authorized to
use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or
aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future 6
acts of international terrorism against the United States by such nations, organizations or persons. Pub. L. 107-40, 115 Stat. 224 (Sept. 18,
2001) 2(a). President Bush utilized the authorization granted under the AUMF to send U.S. armed forces into Afghanistan with a mission
to subdue al Qaeda and quell the Taliban regime that was known to support it. Hamdi v. Rumsfeld, 542 U.S. 507, 510 (2004)(plurality);
accord Rasul v. Bush, 542 U.S. 466, 470 (2004). The hostilities that commenced in 2001 remain ongoing today. The Government has
captured and detained a number of individuals pursuant to the authority in the AUMF. See generally, e.g., Hamdi, 542 U.S. 507. In Hamdi,
the Supreme Court recognized the authority granted by the AUMF to detain the individuals captured: detention of individuals . . . for the
duration of the particular conflict in which they were captured, is so fundamental and accepted an incident to war as to be an exercise of the
necessary and appropriate force Congress has authorized the President to use. Id. at 518. A number of subsequent cases, many of which
arose in the context of habeas proceedings relating to those captured pursuant to the AUMF and detained at Guantanamo Bay, have
similarly upheld the detention authority granted under the AUMF. See, e.g., Barhoumi v. Obama, 609 F.3d 416, 432 (D.C. Cir. 2010); In re
Petitioners Seeking Habeas Corpus Relief, 700 F. Supp. 2d 7 119, 135 (D.D.C. 2010); see also Hamdan v. Rumsfeld, 548 U.S. 557, 603-04
(2006). In March 2009, the Government submitted a memorandum in an action relating to Guantanamo Bay detainees, In re Guantanamo
Bay Detainee Litigation, Misc. No. 08-442 (D.D.C.), in which it set forth its views on the Presidents AUMF detention authority (March 2009
Mem.).2 The President has the authority to detain persons that the President determines planned, authorized, committed, or aided the
terrorist attacks that occurred on September 11, 2001, and persons who harbored those responsible for those attacks. The President also
has the authority to detain persons who were part of or substantially supported, Taliban or al-Qaida forces or associated forces that are
engaged in hostilities against the United States or its coalition partners, including any person who has committed a belligerent act, or has
directly supported hostilities, in the aid of such enemy forces. That memorandum, upon which the Government relies in the instant matter
regarding certain interpretative principles and the scope of 1021 of the NDAA, states: March 2009 Mem. at 1-2. At oral argument, the
Government conceded that the March 2009 Memorandum simply states the Governments litigation position in the Guantanamo Bay
Detainee Litigation, and that it does not have the effect of law. Tr. 216-17.3 2 In re Guantanamo Bay Detainee Litigation, Misc. No. 08-442,
Resps. Mem. Re: the Govts Detention Authority Relative to Detainees Held at Guantanamo Bay (D.D.C. Mar. 13, 2009). (Filed in this
litigation at Dkt. No. 24-1.) 3 References to Tr. are to the transcript of the March 30, 2012 hearing on plaintiffs motion for preliminary
injunction. 8 B. The NDAA Section 1021 of the NDAA--entitled Affirmation of Authority of the Armed Forces of the United States to Detain
Covered Persons Pursuant to the Authorization for Use of Military Force--provides (a) In General. Congress affirms that the authority of the
President to use all necessary and appropriate force pursuant to the AUMF] includes the authority of the Armed Forces of the United States
to detain covered persons (as defined in subsection (b)) pending disposition under the law of war. (b) Covered Persons. A covered person
under this section is any person as follows . . . (2) A person who was part of or substantially supported al-Qaeda, the Taliban, or associated
forces that are engaged in hostilities against the United States or its coalition partners, including any person who has committed a
belligerent act or has directly supported such hostilities in aid of such enemy forces. (c) Disposition Under the Law of War. The disposition of
a person under the law of war as described un subsection (a) may include the following: (1) Detention under the law of war without trial until
the end of hostilities authorized by the AUMF]. . . . (4) Transfer to the custody or control of the persons country of origin, any other foreign
country or any other foreign entity. (d) Construction. Nothing in this section is intended to limit or expand the authority of the President or the
scope of the AUMF]. (e) Authorities. Nothing in this section shall be construed to affect existing law or authorities 9 relating to the detention
of United States citizens . . . . Pub. L. 112-81, 125 Stat. 1298 1021. When he signed the NDAA into law on December 31, 2011, President
Obama simultaneously issued a signing statement. A portion of that statement referred explicitly to 1021: Section 1021 affirms the
executive branchs authority to detain persons covered by the AUMF]. This section breaks no new ground and is unnecessary. The authority
it describes was included in the 2001 AUMF, as recognized by the Supreme Court and confirmed through lower court decisions since then .
. . . Moreover, I want to clarify that my Administration will not authorize the indefinite military detention without trial of American citizens . . . .
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
My Administration will interpret section 1021 in a manner that ensures that any detention it authorizes complies with the law. Statement on
Signing the National Defense Authorization Act for Fiscal Year 2012, 2011 DAILY COMP. PRES. DOC. 978 (Dec. 31, 2011) at 1-2
(hereinafter Signing Statement), available at http://www.gpo.gov/fdsys/pkg/DCPD-201100978/pdf/DCPD-201100978.pdf. As stated above,
the NDAA is a broad package of legislation that includes both authorizations for military spending as well as additional, non-spending
legislation (such as 1021). Pub. L. 112-81, 125 Stat. 1298 at Preamble (An Act); see also generally Pub. L. 112-81, 125 Stat. 1298 2.
In addition to 1021, the NDAA includes 1022 which separately authorizes Military Custody for Foreign Al-Qaeda Terrorists. See Pub. L.
112-81, 125 Stat. 10 1298 1022. That statute authorizes Custody Pending Disposition Under Law of War. Id. Section 1022(a)(2) defines
who constitutes a Covered Person ] under that prong of the statute, id. 1022(a)(2), and contains a specific provision that states that, The
requirement to detain a person in military custody under this section does not extend to citizens of the United States . . . , id. 1022(b)(1).
Section 1022 further provides, in pertinent part: (c)(1) Not later than 60 days after the date of the enactment of this Act, the President shall
issue, and submit to Congress, procedures for implementing this section. (2) Elements. The procedures for implementing this section shall
include, but not be limited to, procedures as follows: (A) Procedures designating the persons authorized to make determinations under (a)(2)
and the process by which such determinations are to be made . . . . Pub. L. 112-81, 125 Stat. 1298 1022(c)(1)-(2)(A). On February 28,
2012, the White House issued a Presidential Policy Directive (PPD-14) entitled, Requirements of the National Defense Authorization Act
regarding the procedures for implementing 1022 of the NDAA (but not 1021). Directive on Procedures Implementing Section 1022 of
the National Defense Authorization Act for Fiscal Year 2012, 2012 DAILY COMP. PRES. DOC. 136 (Feb. 28, 2012), available at
http://www.gpo.gov/fdsys/pkg/DCPD-201200136/pdf/DCPD-201200136.pdf. That directive provides specific guidance as to 11 the Scope of
Procedures and Standard for Covered Persons Determinations. Specifically, it states that covered persons applies only to a person who is
not a citizen of the United States and who is a member or part of al-Qaeda or an associated force that acts in coordination with or pursuant
to the direction of al-Qaeda; and who participated in the course of planning or carrying out an attack or attempted attack against the United
States or its coalition partners. Id. at 1-2. The directive consists of 11 pages of specific implementation procedures including defining scope
and limitations. As mentioned, no such directive was issued with respect to section 1021 of the NDAA. C. 18 U.S.C. 2339B and Holder v.
Humanitarian Law Project In Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010), the Supreme Court considered whether a criminal
statute prohibiting the provision of material support to terrorists, or providing resources to foreign terrorist organizations, was constitutionally
infirm under either the First or Fifth Amendments. Id. at 2712-13. There, the relevant statutory provision stated, in pertinent part: Whoever
provides material support or resources or conceals or disguises the nature, location, source or ownership of material support or resources,
knowing or intending that they are to be used in preparation for, or in carrying out, a violation of various criminal statutes] . . . shall be . . .
imprisoned for not more than 15 years. 12 18 U.S.C. 2339A(a). The term material support, as well as the types of activities
encompassed by material support--e.g., expert advice or assistance--are defined within the statute itself. See 18 U.S.C. 2339A(b)(1)-
(3). The following section of that statute, 2339B, sets forth the penalties associated with violating 18 U.S.C. 2339A, and in doing so,
relies upon the definitions supplied in 2339A. See 18 U.S.C. 2339B. The penalties to be imposed are for, as 2339B states, the
prohibited activit y] of p]roviding material support or resources to a foreign terrorist organization, or attempts or conspires to do so . . . .
18 U.S.C. 2339B(a)(1). The penalties set forth in 2339B are imposed only upon a showing that the person ha d] knowledge that the
organization is a designated terrorist organization . . . , or that the organization has engaged or engages in terrorism . . . . Id. In finding that
2339B did not violate either the First or Fifth Amendments, the Supreme Court pointed specifically to the definitional sections and the
requirement for knowing conduct. Holder, 130 S. Ct. at 2720. The Supreme Court found, Applying the statutory terms in this action
training, expert advice or assistance, service, and personnel--does not require similarly untethered, subjective judgments . . . Congress
took care to add narrowing definitions to the material-support statute over time. These definitions 13 increased the clarity of the statutes
terms . . . and the knowledge requirement of the statute further reduces any potential for vagueness, as we have held with respect to other
statutes containing a similar requirement. Id. (citations omitted). II. THE PARTIES A. Plaintiffs Plaintiffs are a group of writers and political
activists. Of the seven named plaintiffs, only five submitted any evidence in connection with this motion: J ennifer Ann Bolen, Christopher
Hedges, Alexa OBrien, Kai Wargalla, and Hon. Brigitta J onsdottir. (Dkt. Nos. 10, 11, 14, 17, 18.) Two of the plaintiffs, Daniel Ellsberg and
Noam Chomsky, are listed in the caption and referred in the text of the verified amended complaint (see Dkt. No. 4-1), but did not submit
either affidavits in support of the motion or appear live to provide testimony at the evidentiary hearing.4 4 This action was commenced by
filing a verified complaint. While procedurally the factual statements relating to a plaintiff in a verified complaint may be taken as having the
weight of a declaration or other statement under penalty of perjury, see Colon v. Coughlin, 58 F.3d 865, 872 (2d Cir. 1995), this Court
required that any plaintiff asserting standing for preliminary relief put forward a specific, separate declaration and make him or herself
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
available for deposition (see Dkt. No. 16). Accordingly, the Court has not based its determination herein on the allegations in the verified
amended complaint. Bolen, who, as mentioned, submitted a declaration in support of the motion, did not testify at the evidentiary hearing
and was not deposed. Thus, her statements were not cross-examined and this Court has not relied upon them for purposes of deciding the
14 instant motion. 5 Plaintiffs Hedges, OBrien, Wargalla, and J onsdottir testified at the hearing (J onsdottir by declaration as agreed by the
parties).6 1. Christopher Hedges At the hearing in this matter, Hedges testified that he has been a foreign correspondent for 20 years. Tr.
156. He won the Pulitzer Prize for journalistic reporting. Tr. 157. Over the course of his career, he has primarily worked in Latin America,
Africa, the Middle East, and the Balkans. Tr. 157. He makes his living writing, teaching, and lecturing. He has published a number of articles
in the New York Times, the Christian Science Monitor, the Dallas Morning News, Harpers Magazine, and the New York Review of Books.
Tr. 157. After September 11, 2001, Hedges was based in Paris and covered al-Qaeda in all European countries (with the exception of
Germany) as well as the Middle East. Tr. 157.7 5 Based upon the oral representations of plaintiffs counsel, plaintiff Bolen was apparently ill
and unable to appear for deposition. She did attend the hearing, but due to the fact that she was not deposed prior to that date, she did not
testify at the hearing. As part of that coverage, Hedges retraced the steps of Mohammed Atta, one of the participants in the 9/11 events; he
covered the abortive Paris embassy bombing plot, the suicide bombing attack on the synagogue 6 The Court found the testimony of each of
the witnesses who testified live to be earnest and credible. 7 Hedges does not speak German but does speak English, French, Spanish, and
Arabic. Tr. 157. 15 in Djerba in Tunisia, and he covered Richard Reed, the so-called Shoe Bomber. Tr. 158. Hedges testified that some of
the people he has interviewed in connection with his work were al-Qaeda members who were later detained and are currently in prison. Tr.
158. Accordingly to Hedges himself, his reporting on al-Qaeda or other terrorist organizations is read widely in the Middle East. Tr. 159.
Certain of Hedges writings appear on Islamic or jihadist websites. Id. Hedges stated that having covered war for 20 years, he is familiar with
the fact that a number of individuals who may be detained as enemy combatants might not have ever carried a weapon. Tr. 160. In that
regard, he referred to Osama Bin Ladens driver, a Guantanamo detainee. Tr. 160. Hedges testified that he has read 1021 of the NDAA.
Tr. 160. Hedges testified that he is also familiar with the provisions of the AUMF and has a specific understanding as to what they mean. Tr.
165 (enemy combatants on foreign soil that are engaged in direct hostilities with the United States and are linked directly with those who
carried out the attacks of 9/11). He does not, however, understand that 1021 is entirely co-extensive and goes no further than the AUMF.
Tr. 165. Indeed, he testified that he reads 1021 as radically different from the AUMF. Tr. 166. In that regard, Hedges is unclear as to the
16 meaning of what constitutes associated forces in 1021, see Tr. 168, nor does he understand what the phrases engaged in hostilities,
covered person, or substantially supported means as used in 1021, Tr. 162-63. Hedges testified that he has reported on 17 groups
contained on a list prepared by the State Department of known terrorist organizations. (See Court Ex. 9 (Country Reports on Terrorism,
Report of the U.S. State Dept, Ch. 6 (Terrorist Groups) (Aug. 2010) at 1 (Certification of Christopher Lynn Hedges Ex. A (Dkt. No. 11-1).)8
Hedges testified that some of those organizations are considered to be in hostilities with coalition partners of the Included among the groups
on which Hedges has reported (and which are on the State Department lists admitted as Court Exhibit 9) are: the Abu Nidal Organization,
the al-Aqsa Martyrs Brigade, the Armed Islamic Group, Al-J ihad, the Gamaa al-Islamiya, Hamas, Hizballah, Kahane Chai, the Konga-Gel,
KGK (a/k/a PKA), the Mujahedin-e Khalq Organization (MEK), the Palestine Liberation Front, the Palestine Islamic J ihad, the Popular
Front for the Liberation of Palestine (including also the Central Command), al-Qaeda, Revolutionary Peoples Party/Front, and the Salafist
Group for Call and Combat. (Id. at 1-2.) See also Tr. 169. 8 References to Court Ex. refer to documents marked for identification during the
March 30 preliminary injunction hearing. 17 United States. For instance, the PKK is engaged in hostilities with Turkey, which is one of the
United States coalition partners. Tr. 169. In connection with his coverage of the PKK, he travelled with members of the PKK on occasion,
and was with the PKK when it was attacked by Turkish war planes. Tr. 170-71. Other groups Hedges has covered, such as the Popular
Front for the Liberation of Palestine (PFLP), have carried out acts of terrorism against U.S. targets. Tr. 170. Hedges has also had a
number of speaking engagements in Belgium and France in which he has encountered and conversed with members of al-Qaeda and the
Taliban. Tr. 174. In connection with his reporting on Hamas, Hedges met with members of Hamas leadership, stayed in their homes, and
socialized with them. Tr. 172. Hedges lived in Gaza and had frequent contact with members of Hamas in connection with his work. Tr. 172.
Hedges testified that because he speaks a number of languages, he has been approached by publications--e.g., Harpers Magazine, the
Nation and others--to return to the Middle East as a correspondent. Tr. 172-73. He testified that he has a realistic expectation that his work
will bring him back to the Middle East. Tr. 173. Hedges testified that since the passage of 1021, he has altered his associational and
speech activities with respect to 18 some of the organizations upon which he previously reported due to his concern that those activities
might bring him within the ambit of 1021, thereby subjecting him to indefinite military detention. See, e.g., Tr. 174, 177, 186 (When people
begin to speak about carrying out acts that are clearly illegal or embracing acts that are violent or talking about terrorism, my reaction so far
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
is to get out as fast as I can because I think under the NDAA i.e., 1021], at least as I see it, there is a possibility that those people looking
at my activities from the outside would not make a distinction between myself and the person who embraced that kind of activity.). At the
time of the hearing, Hedges had speeches scheduled in Paris and Brussels at which he expected members of al-Qaeda or the Taliban to be
present and he intended to change his speech as a result of 1021. Tr. 174. Hedges also testified that he has previously associated with a
group called Bob Avakiam Revolutionary Party, a Maoist group, which he stated he understands endorses the use of violence towards
revolutionary ends--a philosophy to which Hedges stated he did not ascribe. Tr. 177. Despite that fact, Hedges understands 1021 as
potentially encompassing his association with the Avakiam Revolutionary Party and thus, the statute already has had a chilling effect on his
associational activities. Tr. 177. 19 Hedges testified that prior to the passage of 1021 he had never feared military detention for his
activities. Tr. 206. 2. Alexa OBrien Alexa OBrien has written a number of articles on a variety of topics relating to, inter alia, interviews of
prison guards or detainees at Guantanamo Bay. (Court Ex. 3 (series of articles authored by OBrien, published on WL Central).) She refers
to her occupation as a content strategist. Tr. 38. She is the founder and website designer for U.S. Day of Rage. Tr. 40, 42. She testified
that she founded U.S. Day of Rage in March 2011. Tr. 42. U.S. Day of Rage has never been involved in armed conflict with the United
States, and never been a co-belligerent with al-Qaeda or the Taliban, according to OBrien. Tr. 52, 56. OBrien is also a contributor and
editor to a website called WL Central. Tr. 40. WL Central is a collection of international news journalists. Tr. 40. OBrien testified that our
definition of news is information that enables citizens to govern themselves. Tr. 40. OBrien has made a number of contributions to that
website, including reporting on WikiLeaks release of U.S. State Department cables, the J TF Memoranda for Guantanamo Bay, and
various revolutions in the Middle East (e.g., Egypt, Bahrain, Yemen, Iran). Tr. 41. Her reporting has included both articles and live blogs. Tr.
41. Altogether, since J anuary 2011, she has written approximately 50 pieces covering these types 20 of topics. Tr. 41. She testified that to
her knowledge WL Central has not been involved in armed conflict with the United States nor has it been a co-belligerent with al-Qaeda or
the Taliban. Tr. 56. OBrien testified credibly that in February 2012, she learned that an individual employed by a private security firm had
allegedly been asked to tie U.S. Day of Rage to Islamic fundamentalist movements. Tr. 43. She received a copy of an email which indicated
that there had been communications in this regard dating back to August 2011. Tr. 43. The email exchange was located on the WikiLeaks
website and was between individuals named Thomas Kopecky and Fred Burton. Tr. 45. Based on first-hand knowledge, OBrien testified
that she is aware that Burton is a former diplomatic security official, previously employed by the U.S. State Department. Tr. 45-46. OBrien
testified that she also received twitter messages from a private security contractor called Provide Security. Tr. 47. One of the messages
indicated that U.S. Day of Rage had been found on an Islamic jihadist website. Tr. 48. The message stated, Now you are really in over your
head with this. Muslims from an Afghanistan jihad site have jumped in.9 9 The messages that OBrien received were marked as Court
Exhibit 4, admitted to show the reasonableness of OBriens fearful state of mind regarding being subject to 1021, and not for the truth. 21
OBrien also testified that in September 2011 she was contacted by someone she knew to be a Federal agent, but to whom she guaranteed
confidentiality of source. Tr. 52. She testified that that individual had seen a memorandum from the Department of Homeland Security
(DHS) addressed to law enforcement across the nation (a) regarding the fact that DHS planned to infiltrate U.S. Day of Rage and (b)
linking U.S. Day of rage to a loosely knit organization called Anonymous that OBrien knew to be associated with cyber-terrorism. Tr. 51-
54. OBrien later met with a journalist who told her that he had seen either the same memo to which the federal agent had referred or one
with similar content. Tr. 69. OBrien testified that in August 2011 she learned of an article suggesting that U.S. Day of Rage had been posted
on Shamuk and Al-J ihad, two al-Qaeda recruitment sites. Tr. 59. OBrien testified that since 1021 has gone into effect (or when she
perceived it to go into effect because there is a dispute by the Government as to when 1021 became effective), it has had a chilling effect
on her speech. Tr. 72 (Court: Are you saying that there is a causal relationship between the passage of 1021] and your withholding of
these articles? A: Absolutely.). She testified specifically to two articles that she has withheld from publication. Tr. 70. One of the articles
details conversations with former military personnel at Guantanamo 22 describing physical restraints used there and other information. Tr.
70. The second article relates to discussions with a defense attorney making accusations that a military defense attorney for a military
detainee threw a case. When asked why she had withheld those articles, OBrien testified she could not risk the danger to herself under
1021. Tr. 71. She testified that prior to the passage of 1021, in J uly 2011, she had published an article relating to a former Guantanamo
detainee, Omar Deghayes, and that she was currently concerned regarding whether her publication of that article could be encompassed
within the conduct of 1021. Tr. 77. Plaintiffs marked as Court Exhibits 2 and 3 a number of articles published by OBrien. Exhibit 3
consisted of a compilation of articles that on the topics she testified gave her concern with regard to whether they would be encompassed by
1021. Tr. 79-80. OBrien also testified that she has incurred expenses in connection with 1021 including the purchase of an additional
hard drive on which she double encrypts files in order to protect them from detection by others, including for purposes of protecting them
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
from the NDAA. OBrien testified that she has read 1021. Tr. 74. She testified that in particular the statutes references to associative sic]
forces and substantial support led to her withholding her articles. Tr. 74. She stated: 23 I think its best to use an example of someone like
Sami Al-Hajj, who is a Sudanese Al J azeera cameraman, who was later released from Guantanamo Bay and now works for Al J azeera.
Again, substantially supported, what does that mean? In a war on terror where intelligence collection and the information-sharing
environment are competing with the press for collection of information, its very similar activities of collect, talking with people, getting
information. Its very hard when Secretary Clinton talks about the information war that we are in to understand what substantially support
means in relationship to journalists. Tr. 74. She testified that she understood that Sami Al-Hajj had been detained for six or seven years. Tr.
75. OBrien testified that she was unaware of any action taken by the United States Government to date regarding the activities of U.S. Day
of Rage or against her personally under the AUMF or 1021. Tr.90-91. She also testified that she is not aware of any U.S. Government
official who has threatened to take action against U.S. Day of Rage as a result of expressive activities. Tr. 93. However, she also testified
that pursuant to a request made under the Freedom of Information Act, an organization called TruthOut.org had obtained a memorandum
from the Department of Homeland Security and which states National Cybersecurity and Communications Integration Center Bulletin.
Details on Anonymous, upcoming U.S. operations 17 September 2011 Occupy Wall Street, U.S. Day of Rage. Tr. 110.10 10 The Court
admitted the document obtained pursuant to that request under the general hearsay exception contained in Fed. R. Evid. 807 as having
sufficient indicia of reliability to come in for the truth. The Court invited counsel for the Government to notify the Court if, after the hearing,
they determined that the document was not authentic. The Court has not received such a 24 3. Kai Wargalla Kai Wargalla is an organizer
and activist based in London. Tr. 116. She is the Deputy Director of Revolution Truth, an organization that conducts online, live panel
discussions and campaigns relating to, inter alia, WikiLeaks. Tr. 117-18. Wargalla also founded Occupy London in September 2011 and
J ustice for Assange UK.11 Tr. 117. Wargalla testified that in October 2011 she received a copy of a bulletin12 Wargalla testified that she
has read 1021. Tr. 121-22. She expressed concern regarding the lack of definition around the phrase covered persons and not
understanding whether her activities could be construed to bring her within that definition. Tr. 122. She also testified that she is concerned
about the lack of clarity surrounding the phrase substantially supported. Tr. 130. She testified that to her, this phrase could mean anything
apparently issued by the City of London Police, which listed Occupy London in a terrorism and extremism update. Tr. 120. communication
and therefore assumes the document to be authentic. See Tr. 109-111. 11 J ustice for Assange UK refers to an organization, the efforts of
which are directed at supporting J ulien Assange, founder of WikiLeaks. See www.justice4assange.com. Revolution Truth is an international
group of volunteers conducting campaigns on Bradley Manning and WikiLeaks . . . and online live panel discussions. Tr. 117. 12 Similar to
many other documents presented during this hearing, the bulletin was admitted not for its truth, but for Wargallas state of mind regarding
her concerns relating to enforcement of 1021. 25 really, from having someone on a panel discussion, from conducting campaigns, to
organizing rallies and demonstrations. Tr. 131. Wargalla testified that 1021 has led to changes in the expressive activities of Revolution
Truth. Revolution Truth holds live panel discussions that are streamed over the Internet. Tr. 124. In light of 1021, Revolution Truth is
considering not inviting members of certain organizations to participate whom they otherwise would have. Tr. 124-25. In particular, Wargalla
testified that they would likely not invite Hamas to participate because they would not want to put themselves in danger of prosecution under
1021. Tr. 126. She testified that other than those panel discussions, she has not made any other changes in response to the passage of
1021. Tr. 140. She testified that she is aware that several U.S. politicians have referred to WikiLeaks as a terrorist organization and that
there is a grand jury investigation that involves WikiLeaks. Tr. 139. She also testified that she is, however, unaware of whether WikiLeaks
has been officially classified as a terrorist organization. Tr. 139. Wargalla testified that to date, she has not learned that the U.S.
Government taking, or threatening to take, any action against her in connection with her expressive activities. Tr. 137. However, she
testified that she fears that the U.S. Government 26 could well take action against her for her associational and expressive activities set
forth at this litigation. 4. Hon. Brigitta J onsdottir13 The Honorable Brigitta J onsdottir is a member of parliament in Iceland. Tr. 147-48. She
stated that she has been an activist and spokesperson for various groups such as WikiLeaks, Saving Iceland, and Friends of Tibetan
Iceland. Tr. 148. She has also organized Art Against War in which a number of Icelandic artists and poets protested the war in Iraq. Tr.
148. She has participated in international events relating to writing and activism against the war in Iraq including Poets Against the War,
Dialogue Among the Nations Through Poetry, and Poets for Human Rights. Tr. 148. As part of her work in connection with WikiLeaks, she
assisted in producing a movie called Collateral Murder. Tr. 148. That film was released in 2010, and alleges the commission of war crimes
by Americans and others during the war in Iraq. She stated that the footage shown . . . showed an American Apache helicopter in Baghdad,
after the Iraqi war but during the insurrection, open fire on a group of nine to eleven men, most of them unarmed, and two of whom were
journalists working for Reuters. Eight men were killed, including the two journalists. A second and third strike killed more people and
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
wounded two children. 13 The parties stipulated that the declaration of Hon. Brigitta J onsdottir could be read at the hearing as if it were live
testimony to which the Government waived cross examination. Tr. 155. Naomi Wolf read the declaration into the record. 27 Tr. 149.
J onsdottir further averred that she understands that several U.S. politicians have classified WikiLeaks as a terrorist organization. Tr. 149.
She stated that she is also aware that Bradley Manning, who she stated leaked U.S. documents, has been charged in 2011 with treason,
based upon, in the Governments view, his aiding of terrorists. Tr. 150. She stated that Manning allegedly leaked the footage that formed the
basis for the video Collateral Murder. Tr. 150. She has received a subpoena for her Twitter and other social media accounts for materials
relating to J ulian Assange and Bradley Manning. Tr. 152. J onsdottir stated that due to that subpoena, and now in addition due to the
passage of 1021, she is fearful of travelling to the U.S. Tr. 153. She has been invited to be the keynote speaker at a number of events in
the U.S. but has declined those invitations due to her concerns. Tr. 154. She stated that she has a very real, legitimate fear that the federal
government will enforce the Homeland Battlefield Act 1021] against me in that my work could be construed as giving substantial support
to terrorists and/or associated forces because of the way the United States government views WikiLeaks. Tr. 154. 6. The Remaining
Plaintiffs Other individuals are named as plaintiffs in this action and shall be plaintiffs as the matter proceeds in its subsequent 28 stages.
Those additional individuals include Bolen, Chomsky, and Ellsberg. Plaintiffs are not relying on those individuals to support their motion for
preliminary injunctive relief. 14 B. Defendants Defendants in this action are President Barack Obama, U.S. Secretary of Defense Leon
Panetta, and the Department of Defense (the DOD). In their Amended Complaint, plaintiffs also named members of Congress--J ohn
McCain, J ohn Boehner, Harry Reid, Nancy Pelosi, Mitch McConnell, and Eric Cantor. (See Dkt. No. 4-1.) As the Government stated at oral
argument, none of those additional defendants have been served and thus, none are properly part of this action at this time. Accordingly,
when the Court refers to the Government in this Opinion, it is referring only to the defendants properly before this Court--i.e., President
Obama, Secretary Panetta, and the DOD. C. Amici Curae Movants On April 17, 2012, a group of entities and individuals--Virginia State
Delegate Bob Marshall, Virginia State Senator Dick Black, Downsize DC Foundation, DownsizeDC.org, Inc., U.S. J ustice 14 As mentioned,
Court required that any person upon whom plaintiffs wished to rely for evidentiary support for their motion needed to both submit a
declaration by a certain point in time and make him/herself available for deposition. (Dkt. No. 16.) Plaintiffs Hedges, OBrien, Wargalla did so
and the parties reached agreement with respect to plaintiff J onsdottir. 29 Foundation, Institute on the Constitution, Gun Owners Foundation,
Gun Owners of America, Inc., The Lincoln Institute for Research and Education, the Western Center for J ournalism, Conservative Legal
Defense and Education Fund, U.S. Border Control, Restoring Liberty Action Committee, Tenth Amendment Center, Center for Media and
Democracy, Bill of Rights Defense Committee, Pastor Chuck Baldwin, Professor J erome Aumente, and the Constitution Party National
Committee (collectively, the Amici Movants)--filed a motion to file amicus brief. (Dkt. No. 31.) The Amici Movants filed their motion, in
support of plaintiffs motion for preliminary injunction, because they share Plaintiffs concerns that, as members of the press or
organizations which exercise First Amendment freedom of press rights, they could be targeted due to the nature of the work that they do
and opinions they express. (Decl. of Steven J . Harfenist in Supp. of Mot. for Leave to File Amicus Curae Br. (Dkt. No. 32) 7.) Although
some of the arguments in the amicus brief overlap substantially with the arguments advanced by plaintiffs, certain arguments differ entirely--
i.e., the amicus brief injects new issues into this matter which the Court need not--and will not--consider. See 16A Wright, Miller & Cooper,
Fed. Prac. & Proc. 3975.1 (4th ed. 2012) (In ordinary circumstances, an amicus will not be permitted to raise issues not argued by the
parties.). To the extent that the Amici Movants reiterate 30 arguments already made by plaintiffs, the Court does not find the amicus brief
necessarily helpful. See Tiffany (NJ ) Inc. v. eBay Inc., 600 F.3d 93, 106 n.10 (2d Cir. 2010) (quoting Universal City Studios, Inc. v. Corley,
273 F.3d 429, 445 (2d Cir. 2001)). However, the Court accepts the amicus brief for filing in order to have a full record on this motion. III. THE
GOVERNMENTS REPRESENTATIONS REGARDING 1021 The Government did not call any witnesses at the hearing on this motion.
They did, however, submit briefing in advance of (and subsequent to) the hearing, cross-examine plaintiffs at the hearing, and made legal
arguments at the hearing. As stated above, the Governments main contention is that 1021 is merely an affirmation of the authority given
the President in 2001 under the AUMF--it goes no further and does nothing more. See, e.g., Tr. 214-15. (See also Govts Mem. of Law In
Oppn to Pls. Mot. for a Prelim. Inj. (Govt Mem.) (Dkt. No. 24) at 7-10.) The Government relies upon Supreme Court precedent which has
upheld the authority granted under the AUMF, including Hamdi. Tr. 214. The Court asked whether there was any language in the AUMF
similar to 1021(b)(2) regarding in particular the phrases substantially supported, associated forces, and directly supported. Tr. 215-16.
The Government stated that the phrase directly supported has not been interpreted in any case law but 31 is referenced in the
Governments March 2009 Memorandum. Tr. 216. However, the Government argued that the phrase associated forces can be tied directly
into the body of law relating to the Laws of War as being co-extensive with co-belligerency. Tr. 220-21. According to the Government,
therefore, the Laws of War place important and clear limits on which organizations can be construed as associated forces. Tr. 221. As to
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
the phrase substantially supported, the Government conceded that the two cases in which that language has previously been examined--
Barhoumi v. Obama, 609 F.3d 416 (D.D.C. 2010), and al-Bihani v. Obama, 590 F.3d 866, 873-74 (D.C. Cir.), rehg en banc denied, 619
F.3d 1 (D.C. Cir. 2010), cert. denied, 131 S. Ct. 1814 (2011)--did not construe the contours or parameters of that phrase. Tr. 223. The Court
asked when we are talking about cases which have used the phrase substantially supported and said that that is a valid criterion under the
AUMF or of the legislation, thats not the same thing as saying that . . . any court has found, one way or the other, that substantially
supported has an understandable meaning to an ordinary citizen? The Government responded, Its true that the courts have not expressly
ruled that, thats right. Tr. 223. The Court then asked: Give me an example. Tell me what it means to substantially support associated
forces. 32 Government: Im not in a position to give specific examples. Court: Give me one. Government: Im not in a position to give one
specific example. Tr. 226. The Court then asked: What does directly supported mean? Government: We have not said anything about that
in our brief. Court: What do you think it means? Government: . . . Your Honor, we had focused so much on the phrase that was challenged
by the plaintiffs, substantial support that I have not thought through exactly and we have not come to a position on what direct support and
what that means. Tr. 229-230. The Court then asked: Assume you were just an American citizen and youre reading the statute and you
wanted to make sure you do not run afoul of it because you are a diligent U.S. citizen wanting to stay on the right side of 1021, and you
read the phrase directly supported. What does that mean to you? Government: Again it has to be taken in the context of armed conflict
informed by the laws of war. Court: Thats fine. Tell me what that means? The Government then returned to the Laws of War and finally
stated, I cannot offer a specific example. I dont have a specific example. Tr. 230. The Court then asked the Government specific
questions regarding plaintiffs present and intended activities at issue 33 here and whether those activities would fall within the scope of
1021. The Court required that each plaintiff testifying at the evidentiary hearing both to submit a declaration prior to the hearing on the
topics about which he/she intended to testify and to submit to deposition. (See Dkt. No. 16.) The Government therefore knew well before the
hearing the types of expressive and associational conduct in which each plaintiff would testify he/she engaged, and the conduct he/she
asserted had already been or would imminently be chilled. In short, plaintiffs positions should have come as no surprise to the Government.
Nevertheless, when confronted with what the Court assumed was certainly among the critical questions likely to be posed at the hearing--
i.e., whether plaintiffs activities fell within 1021s scope, the Government responded, I cant make specific representations as to particular
plaintiffs. I cant give particular people a promise of anything. Tr. 235. It must be said that it would have been a rather simple matter for the
Government to have stated that as to these plaintiffs and the conduct as to which they would testify, that 1021 did not and would not apply,
if indeed it did or would not. That could have eliminated the standing of these plaintiffs and their claims of irreparable harm. Failure to be
able to make such a representation given the prior notice of the activities at issue requires this Court to assume that, in fact, the
Government takes 34 the position that a wide swath of expressive and associational conduct is in fact encompassed by 1021. With
respect to the witnesses who had appeared in Court, the Court had the following colloquy with the Government: Court: These people have
real things they are saying. These are not speculative or hypotheticals. These are people who have actually written articles that we have
here. The Court then held up the articles written by OBrien and marked as Court Ex. 3.] We are trying to figure out, are these articles going
to subject Ms. OBrien to risk under 1021? . . . . Government: Again, Im not authorized to make specific representations regarding specific
people. Im saying that associated forces cannot extend to groups that are not armed groups at all. Court: So we dont know about the
articles, it depends? Government: Maybe they are an armed group. Tr. 236. With respect to J onsdottir the Court asked: Im asking you as a
representative of the United States Government here today, can Ms. J onsdottir travel to the United States without any concern that she will
be captured by her current activities under 1021? Government: Again, I cant make representations on specifics. I dont know what she has
been up to. I dont know what is going on there. Tr. 239. With regard to Hedges the Court asked, Is it possible, in your view, that Mr.
Hedges, any of his activities as he has described them, should they occur in the future, and also as to his past 35 activities], can you say
that he would not be subject to military detention without trial under 1021? Government: Im not prepared to address that question here
today, but I would answer that by saying that his concerns that he has raised are addressed by what I have said and he has the burden of
showing that his fear as articulated is a reasonable fear. Tr. 245. DISCUSSION Plaintiffs challenge to the constitutionality of 1021 and
request for preliminary injunctive relief requires this Court to answer the following questions: do these plaintiffs have the standing to bring
this action? If plaintiffs do have standing--or at least some of them do--are they able to meet the demanding standards for preliminary
injunctive relief? As set forth below, the Court answers those questions in the affirmative. I. ARTICLE III AND PLAINTIFFS STANDING
Article III, 2 of the United States Constitution empowers this Court only to entertain actual cases and controversies. Standing doctrine
determines whether the plaintiff has made out a case or controversy between himself and the defendant within the meaning of Art. III and
is therefore entitled to have the courts decide the merits of the dispute or of particular issues. Amnesty Intl USA v. Clapper, 638 F.3d 118,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
131 (2d Cir. 2011) (quoting Warth v. Seldin, 422 U.S. 490, 498 (1975)). A citizen 36 who dislikes a particular law may not require a court to
address its constitutionality simply by stating in a complaint his belief, however deeply held, that the law is inconsistent with some provision
of the Constitution. Id. Concrete injury is required. Id. In Allen v. Wright, 468 U.S. 737 (1984), the Supreme Court made clear that standing
is built on a single basic idea--the idea of the separation of powers. Id. at 752. Article III limits judicial review of legislative or executive acts
only to those instances in which it is truly necessary to protect a complaining partys interests. Clapper, 638 F.3d at 132. The Supreme Court
has set forth three elements a plaintiff must establish to show standing: first, a plaintiff must have suffered a concrete or particularized
invasion of a legally protected interest, which is must be actual or imminent, not conjectural or hypothetical; second, there must be a causal
connection between the injury and the conduct complained of--that is, the injury has to be fairly traceable to some action by the defendant;
and third, it must be likely, not merely speculative, that the injury will be redressed by a favorable decision. Lujan v. Defenders of Wildlife,
504 U.S. 555, 560-61 (1992); see also Clapper, 638 F.3d at 131-32; Pac. Capital Bank, N.A. v. Conn., 542 F.3d 341, 350 (2d Cir. 2008). 37
The Second Circuit recently took on the question of standing again in Clapper. There, the Second Circuit found that plaintiffs challenging
certain legislation (i.e., section 702 of the Foreign Intelligence Surveillance Act of 1978--a recent amendment to the statute) had
demonstrated that they suffered present injuries when they demonstrated concrete economic and professional harms. 638 F.3d at 135. The
Court noted that in cases in which plaintiffs allege an injury based on prospective government action, they need only show a realistic danger
of direct injury. Id. (quoting Babbitt, 442 U.S. at 298). The court found further that where plaintiffs allege a prospective injury to First
Amendment rights, they must only show an actual and well-founded fear. Id. The Second Circuit also stated that the fact that the
Government has authorized the potentially harmful conduct here, indefinite detention under 1021] means that the plaintiffs can reasonably
assume that government officials will actually engage in that conduct by carrying out the authorized detention]. Id. at 138. Here, each of the
four plaintiffs who testified (either live or via declaration as in the case of J onsdottir) has shown an actual fear that their expressive and
associational activities are covered by 1021; and each of them has put forward uncontroverted evidence of concrete--non-hypothetical--
ways in which the presence of the legislation has already impacted those expressive and associational activities. 38 For instance, Hedges
has testified that he is currently concerned about associating with certain individuals and in fact has now removed himself from certain
situations in the course of his professional activities because of that concern. In addition, given his prior journalistic activities relating to
certain organizations such as al-Qaeda and the Taliban, as well as others that are denominated terrorist organizations by the U.S. State
Department (e.g., associating with these individuals in these groups as part of his investigative work, reporting on the groups in the press),
he has a realistic fear that those activities will subject him to detention under 1021. That fear cannot be said to be ill-founded when, at the
injunction hearing itself, the Government was unwilling to commit that such conduct does not fall within 1021s ambit.15 Further, and as
discussed below, since this Court is not convinced that 1021 is simply a reaffirmation of the AUMF, and since the Government has
authorized detention for violations of 1021, plaintiffs here can reasonably assume that Government officials will actually undertake the
detention authorized by the statute. See Clapper, 638 F.3d at 138. OBrien likewise has established a reasonable fear of future government
action that is likely to occur. OBrien has written a 15 The inability to make specific representations as to the plaintiffs here renders confusing
the Governments repeated assertion that plaintiffs fears are unreasonable. 39 series of articles already--some of which relate to al-Qaeda,
the Taliban, or associated forces no matter how defined. The Government was unwilling to state at the hearing that OBrien would not be
detained under 1021 for her expressive conduct in regard to those articles. Moreover, OBrien testified that she has withheld at least two
articles from publication because of her concerns regarding the potential for her expressive conduct in those articles to render her a
covered person under 1021 and thereby subject her to military detention. Wargalla stated that, as Deputy Director of RevolutionTruth.org,
she is concerned that she not expose herself or others to possible detention under 1021 by inviting Hamas to participate in certain panel
discussions. That is a clear chilling of her associational activities,16 J onsdottirs concerns are based upon her specific fear that her
connections to WikiLeaks, the video Collateral Murder (which and supports a reasonable fear that at least some of her associational
activities could result in enforcement under 1021. Again, it is important to this Courts determination that that at the hearing on this motion
the Government was unwilling to represent that Wargallas activities would not subject her to detention under 1021. 16 It is less clear that
her activities with respect to Occupy London would provide her with a sufficient basis for standing--the only connection she draws between
that group and known terrorist groups is her understanding that the City of London included Occupy London on an extremist and terrorist
update along with other organizations including al-Qaeda and FARC. 40 constitutes expressive conduct), and other associational anti-war
organizations could cause her to fall within the definition of covered person under 1021. She also testified by declaration that she has not
engaged in certain expressive conduct in the form of speeches in the United States given her concerns. Again, the Government refused to
state that those activities would not be subject to prosecution under 1021. Under such circumstances, her fear is reasonable. Each of the
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
four plaintiffs who presented evidence in connection with this motion therefore have specific, concrete past actions which they fear may
already have brought them within the ambit of 1021, to which the Government has not represented--and will not represent--otherwise.
Each have also already experienced a chilling of specific associational and expressive conduct. On the record before the Court on this
motion, those plaintiffs have shown actual, as well as imminent and particularized, invasion of legally-protected interests. See Clapper, 638
F.3d at 131-32. Plaintiffs have also shown a causal connection between their imminent injury and potential detention under 1021. Each
plaintiff testified that certain of his or her expressive or associational conduct had in fact been chilled as a result of his/her understanding (or
lack thereof) of the scope of 1021. That creates the necessary link between their asserted injury and 41 the action by the Government--
namely, the passage of 1021 in its current form. See id. at 132. Further, with respect to the costs undertaken to avoid being prosecuted
under the challenged statute as discussed in Clapper, see 638 F.3d at 134, the Court finds that all four plaintiffs have sufficiently sustained
costs to confer standing. The Court does not find that the costs incurred must be monetary. Although the plaintiffs in Clapper had
sustained monetary costs based upon their reasonable fear of future government action that was likely to occur--as have certain plaintiffs in
this action (e.g., OBriens purchase of a hard drive to protect certain of her articles)--it cannot be that only monetary costs will suffice to
evidence the reasonable fear of future government harm that is reasonably likely to occur. Id. at 140. The costs to plaintiffs in changing
their respective associational or expressive activities imposes concrete, personal, human costs on these plaintiffs.17 17 Plaintiffs focus on
the monetary costs associated with their pursuing this litigation in relation to their standing arguments. (See, e.g., Certification of Kai
Wargalla (Dkt. No. 18) 18; Certification of Alexa OBrien (Dkt. No. 14) 30.) Those costs are not properly considered as costs associated
with plaintiffs reasonable fear of future government harm, and the Court does consider them in its analysis of plaintiffs standing here.
Forgoing professional opportunities cannot be said not to carry some costs, even of those costs cannot be quantified in monetary terms.
The human costs associated with altering their behavior--both in their personal, day-to-day lives 42 as well as their professional lives--are
certainly cognizable costs undertaken based upon their reasonable fear. Indeed, the fact that the instant action is a pre-enforcement
challenge to the NDAA goes precisely to that point. Courts have been willing to review pre-enforcement challenges with respect to criminal
statutes more readily than for civil. See, e.g., Holder, 130 S. Ct. at 2717; see also Babbitt v. Farm Workers, 442 U.S. 289, 298 (1979). In
Holder, the Supreme Court reviewed a pre-enforcement challenge to a criminal statute based upon the fact that p]laintiffs face a credible
threat of prosecution and should not be required to await and undergo a criminal prosecution as the sole means of seeking relief. 130 S.
Ct. at 2717 (quoting Babbitt, 442 U.S. at 298). There, plaintiffs claimed that they had provided certain support to the PKK and LTTE before
the enactment of the statute at issue and would do so again if the statutes allegedly unconstitutional bar were lifted. Id. The Supreme
Court noted that t]he Government has not argued to this Court that plaintiffs will not be prosecuted for what they wish to do. Id. Thus, the
Court concluded that the case before it presented a justiciable case or controversy (with plaintiffs who had standing). Id. Section 1021 of the
NDAA is not classically a criminal statute in that it does not provide for a maximum or minimum 43 period of imprisonment. However, there
can be no doubt that the possibility of indefinite military detention, involving similar deprivation of personal liberty as criminal incarceration, is
analogous to a criminal statute. Indeed, as the court noted in Hamlily v. Obama, 616 F. Supp. 2d 63 (D.D.C. 2009), when reviewing the
breadth of the term substantially support with respect to detention authority under the AUMF, a detention authority that sweeps so broadly
is simply beyond what the law of war will support. The Governments approach in this respect evidences an importation of principles from
the criminal law context. Id. at 75. An individual detained under 1021 could be subject to military detention until the cessation of hostilities-
-and in the context of the war on terrorism, that is an uncertain period of time to be sure. In addition, and this bleeds into the Courts analysis
of plaintiffs irreparable harm below, the uncontroverted testimony at the evidentiary hearing indicated that certain plaintiffs have, intend to
or would engage in conduct that the Government will not represent is outside of 1021. Thus, similar to the Supreme Courts finding in
Holder as well as the Second Circuits in Clapper, these plaintiffs have standing precisely because their undisputed testimony clearly
establishes that they are suffering injuries in fact, and because the Court] finds those injuries are causally connected to 1021]--because
they are taken in 44 anticipation of future government action that is reasonably likely to occur. Clapper, 638 F.3d at 140. Finally, the
injunctive relief requested by plaintiffs will, at least preliminarily, redress the alleged injuries connected to enactment of 1021. Each of the
four plaintiffs testified that the recent chilling of his or her expressive and associational conduct is directly related to 1021; therefore,
issuance of the relief they seek would redress this asserted injury. Id. at 132, 143-45. Accordingly, plaintiffs Hedges, OBrien, Wargalla, and
J onsdottir have sufficiently established their standing to bring this action. II. PLAINTIFFS MOTION FOR PRELIMINARY INJ UNCTION In
order for plaintiffs to demonstrate entitlement to preliminary injunctive relief, they must demonstrate (a) a likelihood of success on the merits
of their claims of constitutional infirmity; (b) that they will suffer irreparable harm in the absence of the requested relief; (c) that the balance
of the equities tips in their favor; and (d) that the injunction is in the public interest. Winter v. Natural Resources Defense Council, 555 U.S.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
7, 20 (2008); accord Salinger v. Colting, 607 F.3d 68, 79-80 (2d Cir. 2010). T]here is judicial power to enjoin enforcement of an act of
Congress pending final determination of constitutionality where 45 such an injunction is necessary in order to prevent irreparable damage.
Heart of Atlanta Motel v. United States, 85 S. Ct. 1, 2 (1964). However, j]udicial power to stay an act of Congress, like judicial power to
declare an act unconstitutional, is an awesome responsibility calling for the utmost circumspection in its exercise. Id.; Turner v. Broad. Sys.
v. F.C.C., 507 U.S. 1301, 1302 (1993). In the context of determining whether the justiciable controversy here favors preliminary relief, this
Court has kept clearly before it those admonitions on judicial restraint. 1. Likelihood Of Success On The Merits18 Plaintiffs have asserted
both facial and as applied challenges against 1021. They assert that the statutes purported overbreadth captures their expressive and
associational conduct in violation of their rights under the First Amendment, and they separately assert that the statutes vagueness violates
their due process rights under the Fifth Amendment. This Court starts with the proposition that there is strong presumption of validity that
attaches to an act of Congress. This Courts first task is to try to avoid having to pass on constitutional questions. See F.C.C. v. Fox
Television Stations, 18 Plaintiffs focus heavily on the constitutionality of the type of military detention authorized by 1021. That question of
such detention has been examined at length by the Supreme Court--and the contours of what is, and is not, permissible are well established
at this point. The Court need not reach the issue of detention here because the question of constitutionality rests most significantly in
plaintiffs First and Fifth Amendment claims. 46 Inc., 566 U.S. 502, 516 (2009) (The so-called canon of constitutional avoidance is an
interpretive tool, counseling that ambiguous statutory language be construed to avoid serious constitutional doubts.). If such constitutional
avoidance is itself unavoidable, the Court must then seek to find an interpretation of the statute that upholds the constitutionality of the
legislation. United States v. Natl Dairy Prods. Corp., 372 U.S. 29, 32 (1963). The Courts attempt to avoid having to deal with the
Constitutional aspects of the challenge was by providing the Government with prompt notice in the form of declarations and depositions of
the precise conduct in which plaintiffs are involved and which they claim places them in fear of military detention. To put it bluntly,
eliminating these plaintiffs standing simply by representing that their conduct does not fall within the scope of 1021 would have been
simple. The Government chose not to do so--thereby ensuring standing and requiring this Court to reach the merits of the instant motion. a.
Facial versus As Applied Challenge: The First Amendment This Court approaches plaintiffs facial challenge to 1021 with great caution.
The Supreme Court has repeatedly cautioned that facial challenges to the constitutionality of a law-which, if successful, would invalidate
the entirety of the law--are 47 disfavored. Washington State Grange v. Washington State Republican Party, 552 U.S. 442, 449 (2008).
Outside the context of the First Amendment, it is accepted that a facial challenge must generally fail when a statute has a plainly legitimate
sweep. Id. Facial challenges run the risk of declaring the constitutionality of statutes on an inadequate record; they run the risk of addressing
more than the bare minimum that must be addressed in order to resolve the problem before a court; and they most importantly threaten to
short circuit the democratic process by preventing laws embodying the will of the people from being implemented in a manner consistent
with the Constitution. Id. at 451. We must keep in mind that a ruling of unconstitutionality frustrates the intent of the elected representatives
of the people. Ayotte v. Planned Parenthood of Northern New England, 546 U.S. 320, 329 (2006) (quoting Regan v. Time, Inc., 468 U.S.
641, 652 (1984) (plurality)). 19 The statute at issue here has a plainly legitimate sweep. Indeed, as this Court noted at the evidentiary
hearing, the conduct in which the plaintiffs here engage is without a doubt not the core conduct that is intended to be covered by the statute.
See Tr. 20-21. Section 1021 is a statute aimed at 19 Outside the First Amendment context, a facial challenge can generally only prevail
when a plaintiff establishes that no set of circumstances exist under which the law would be valid. Washington State Grange, 552 U.S. at
449. In other words, the Court is quite mindful of the nearly infinite bar that applies to facial challenges when something other than the First
Amendment is at issue. 48 individuals associating with, and providing some degree of support (a degree known only to the drafters of
1021, if at all), terrorists connected to al-Qaeda and the Taliban. It stands to reason that the type of person Congress intended to be
covered under 1021 is someone who has taken up arms, or might be providing arms, to al-Qaeda, the Taliban or some of their off-
shoots. No doubt the public should be protected from such people and we should affirmatively defer to Congress and those in appropriate
law enforcement and military positions wherever possible as to how best to accomplish this. Nevertheless, with respect to 1021, and
particularly in light of the Governments representations that it could not represent that plaintiffs expressive and associational conduct does
not bring them within the ambit of the statute, plaintiffs have stated a more than plausible claim that the statute inappropriately encroaches
on their rights under the First Amendment. When a statute encroaches on rights guaranteed by the First Amendment, facial challenges are
allowed to prevent the possibility that a statutes mere existence might inhibit free expression. See Members of the City Council of the City
of Los Angeles, et al. v. Taxpayers for Vincent, 466 U.S. 789 (1984). In Dombrowski v. Pfister, 380 U.S. 479 (1965), the Supreme Court
stated, Because of the sensitive nature of constitutionally 49 protected expression, we have not required that all of those subject to
overbroad regulations risk prosecution to test their rights. For free expression--of transcendent value to all society, and not merely those
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
exercising their rights--might be the loser. Id. at 486. When a statute captures both speech and non-speech conduct, the overbreadth of a
statute (e.g., the overbreadth equating with capturing constitutionally protected conduct) must not only be real, but substantial as well,
judged in relation to the statutes plainly legitimate sweep. Broaderick v. Oklahoma, 413 U.S. 601, 615 (1973). However, where the statute
unquestionably attaches sanctions to protected conduct e.g., expressive and associational conduct], the likelihood that the statute will deter
that conduct is ordinarily sufficiently great to justify an overbreadth attack. Erznoznik v. City of J acksonville, 422 U.S. 205, 217 (1975). In
short, there must be a realistic danger that the statute itself will significantly compromise recognized First Amendment protections of parties
not before the Court for it to be facially challenged on overbreadth grounds. Id. at 216; Members of the City Council of the City of Los
Angeles, 466 U.S. at 801. In Citizens United v. Federal Election Commission, 130 S. Ct. 876 (2010), J ustice Kennedy wrote that s]peech is
an essential mechanism of democracy, for it is the means that hold officials 50 accountable to the people . . . . The right of citizens to
inquire, to hear, to speak, and to use information to reach consensus is a pre-condition to enlightened self-government. Id. at 899. Laws
that burden political speech are therefore subject to strict scrutiny. Id. at 898. The First Amendment protects speech and speaker, and the
ideas that flow from each. Id. at 899. A facial challenge is appropriate here. That does not, however, mean that plaintiffs have necessarily
shown a likelihood of success on the merits as to that claim--the Court separately analyzes that below. As the Supreme Court noted in
Broaderick, it has been the judgment of this Court that the possible harm to society in permitting some unprotected speech to go
unpunished is outweighed by the possibility that protected speech of others may be muted and perceived grievances left to fester because
of the possible inhibitory effects of overly broad statutes. 413 U.S. at 612. There is a societal interest against requiring official approval for
protected speech or delegating standardless discretionary power to local functionaries, resulting in virtually unreviewable prior restraints on
First Amendment rights. See id.; see also Cox v. State of Louisiana, 379 U.S. 536, 557 (1965) (It is clearly unconstitutional to enable a
public official to determine which expressions of view will be permitted and which will not or to engage in invidious 51 discrimination among
persons or groups either by use of a statute providing a system of broad discretionary licensing power or, as in this case, the equivalent of
such a system by selective enforcement of an extremely broad prohibitory statute.). b. Likelihood of Success on Plaintiffs First Amendment
Claim Here, each of the four plaintiffs who testified at the evidentiary hearing put forward evidence that their expressive and associational
conduct has been and will continue to be chilled by 1021. The Government was unable or unwilling to represent that such conduct was
not encompassed within 1021. Plaintiffs have therefore put forward uncontroverted proof of infringement on their First Amendment rights.
Applying strict scrutiny to the question of whether there is a compelling government interest that outweighs infringement upon First
Amendment rights, the Court finds that plaintiffs have shown a likelihood of success that there is not. Again, that is particularly so in light of
the Governments position that 1021 does no more than the AUMF; therefore, the infringing potential for 1021 may well be unintentional,
but it is real nonetheless. There is no doubt that the type of speech in which Hedges, OBrien, Wargalla, and J onsdottir engage is political in
nature. It is also likely that some of their views may be extreme and 52 unpopular as measured against views of an average individual. That,
however, is precisely what the First Amendment protects. It is certainly true, as this Court stated at the hearing, that not all speech is in fact
protected by the First Amendment. The exceptional circumstances in which the First Amendment does not cover speech has been limited
to speech that incites violence, is obscene, or is incidental to criminal activity. Nebraska Press Assn v. Stuart, 427 U.S. 539, 590 (1976).
However, the type of speech in which the plaintiffs here have engaged does not, as presented at the hearing, fall into any of those
categories. This Court is left then, with the following conundrum: plaintiffs have put forward evidence that 1021 has in fact chilled their
expressive and associational activities; the Government will not represent that such activities are not covered by 1021; plaintiffs activities
are constitutionally protected. Given that record and the protections afforded by the First Amendment, this Court finds that plaintiffs have
shown a likelihood of succeeding on the merits of a facial challenge to 1021. c. The Due Process Challenge: Is the Statute Void for
Vagueness? To satisfy the Due Process Clause of the Fifth Amendment, individuals are entitled to understand the scope and nature of 53
statutes which might subject them to criminal penalties. Thus, a] penal statute must define the criminal offense (1) with sufficient
definiteness that ordinary people can understand what conduct is prohibited and (2) in a manner that does not encourage arbitrary and
discriminatory enforcement. Skilling v. United States, 130 S. Ct. 2896, 2928 (2010). That analysis is performed against the backdrop of a
strong presumption of validity given to acts of Congress. Id. In the absence of an accompanying First Amendment challenge, a vagueness
challenge is generally evaluated on an as applied basis. United States v. Rybicki, 354 F.3d 124, 129 (2d Cir. 2003); accord United States
v. Whittaker, 999F.2d 38, 42 (2d Cir. 1993). However, there is an exception to the general rule that vagueness challenges are generally
evaluated on an as applied basis: courts have allowed facial attacks for vagueness when a criminal statute lacks a mens rea requirement,
even in the absence of an accompanying First Amendment challenge. See City of Chicago v. Morales, 527 U.S. 41 (1999). In City of
Chicago, the Supreme Court found a criminal statute that lacked a scienter requirement vague and subject to facial invalidation. Id. at 55. As
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
stated above, 1021 (unlike 1022, or even 18 U.S.C. 2339A/B--i.e., the statute(s) under review in Holder) lacks a knowledge
requirement; an individual could fall within the 54 definition of covered person under 1021 without having either intentionally or recklessly
known that he or she was doing so. A question, then, for this Court is whether 1021 should be treated as analogous to a criminal statute. If
it is, then the test set forth in Skilling applies. See Rybicki, 354 F.3d at 129. As stated above, this Court preliminarily finds that 1021, which
could be used for the indeterminate military detention, is sufficiently akin to a criminal statute to be treated as such. At the hearing on this
motion, the Government was unwilling or unable to state that these plaintiffs would not be subject to indefinite detention under 1021.
Plaintiffs are therefore at risk of detention, of losing their liberty, potentially for many years. In relevant part, then, that is the analytical
equivalent of a penal statute. Cf. Hamlily, 616 F. Supp. 2d at 75 ( A] detention authority that sweeps so broadly is simply beyond what the
law of war will support. The Governments approach in this respect evidences an importation of principles from the criminal law context.).
Before anyone should be subjected to the possibility of indefinite military detention, the Due Process Clause of the Fifth Amendment
requires that individuals be able to understand what conduct might cause him or her to run afoul of 1021. Unfortunately, there are a
number of terms that are sufficiently vague that no ordinary citizen can reliably define such conduct. 55 Plaintiffs have shown a likelihood of
success on their vagueness challenge. The terms upon which they focused at the hearing relate to who is a covered person. In that
regard, plaintiffs took issue with the lack of definition and clarity regarding who constitutes an associated forces, and what it means to
substantially or directly support such forces or, al-Qaeda or the Taliban. The Governments strongest position is with respect to the
definition of associated forces. The Government argued that there is an accepted definition of what constitutes associated force under the
Laws of War, which is defined in terms of principles of co-belligerency and the Laws of War. Specifically, associated forces is understood,
at least by the Government, to be individuals who, in analogous circumstances in a traditional international armed conflict between the
armed forces of opposing governments, would be detainable under principles of co-belligerency. (Govt Mem. at 6 (quoting March 2009
Mem. at 7); see also Govt Supp. Mem. at 9.)20 20 As discussed above, Hedges testified that he knows a number of individuals detained as
enemy combatants pursuant to the Laws of War who were not armed per se. Thus, the definition provided by the Government--albeit in a
litigation position taken in a wholly separate litigation--does not provide clear parameters to plaintiffs here regarding the meaning of
associated forces. The Court notes that even accepting the Governments definition of associated forces, that does not resolve plaintiffs
concerns since they each testified to 56 activities with or involving individuals or organizations that are associated forces as defined by the
Government. As to substantially or direct support, plaintiffs have the stronger argument, stating that those terms lack sufficient
definition. That is particularly persuasive in light of the fact that a number of other statutes, including the prong of the NDAA that directly
follows this one (i.e., 1022 of the NDAA), have lengthy definitional provisions. See Pub. L. 112-81, 125 Stat. 1298 1022. The
Government was unable to define precisely what direct or substantial support means. Instead, the Government pointed to cases in
which the phrase substantially supported had been referred to in connection with the interpretation of the AUMF (Govt Mem. at 5 & n.5),
but also conceded, as it must, that the parameters of substantial support were not at issue and not addressed in those cases. In addition,
the Government conceded that the statute lacks a scienter or mens rea requirement of any kind. Tr. 230-31. Thus, an individual could run
the risk of substantially supporting or directly supporting an associated force without even being aware that he or she was doing so. Finally,
and most importantly of course, the Government was unable to state that plaintiffs conduct fell outside 1021. In the face of what could be
indeterminate military detention, due process requires more. Indeed, 1022 of the NDAA contains a 57 long series of definitions, as does 18
U.S.C. 2339A and 2339B (examined in Holder). In Holder, the Supreme Court specifically found that the statute at issue was not
unconstitutionally vague because of the very definitions and the knowledge requirement that are missing from this statute. See Holder, 130
S. Ct. at 2719-22. But, as the Supreme Court stated in Holder, its upholding of 2339A and 2339B does not mean that any other statute
relating to speech and terrorism would satisfy the First Amendment. In particular, we in no way suggest that a regulation on independent
speech would pass constitutional muster, even if the Government were to show such speech benefits foreign terrorist organizations. Id. at
2730. That is precisely the difficult situation in which 1021 puts this Court: the statute at issue places the public at undue risk of having
their speech chilled for the purported protection from al-Qaeda, the Taliban, and associated forces--i.e., foreign terrorist organizations.
The vagueness of 1021 does not allow the average citizen, or even the Government itself, to understand with the type of definiteness to
which our citizens are entitled, or what conduct comes within its scope. Because this Court has also found that that plaintiffs have shown a
likelihood of success on the merits of their facial challenge under the First Amendment, this Court need not and does 58 not reach the
question of whether a facial challenge (versus an as applied challenge) would succeed on the Fifth Amendment claim at this stage. d.
Possible Limiting Constructions The Supreme Court has instructed courts to refrain from invalidating more of the statute than is absolutely
necessary. Alaska Airlines, Inc. v. Brock, 480 U.S. 678, 684 (1987) (quoting Regan, 468 U.S. at 652)). This Court is mindful of its
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
responsibility not to enjoin a statute without considering whether the statute--or the majority of the statute--is susceptible to a limiting
construction that renders the statute constitutional. See, e.g., Washington State Grange, 552 U.S. at 456; Ayotte, 546 U.S. at 328-29; Reno
v. Am. Civil Liberties Union, 521 U.S. 844, 884 (1997). The Court has considered that responsibility carefully and does not believe that the
brevity of this statute, the myriad interpretations of substantial support, direct support, and associated forces, and the absence of clear
guidance from the Government on appropriate definitions for those terms, renders 1021 susceptible to a limiting construction that would
not result in the Court improperly taking on a legislative role. It is certainly true that in certain instances it is possible to place a limiting
construction on a statute that will save it from facial invalidation. See Reno, 521 U.S. at 884. In 59 Skilling, the Supreme Court reiterated that
it has long been our practice, however, before striking a federal statute as impermissibly vague, to consider whether the prescription is
amenable to a limiting construction. 130 S. Ct. at 2929. Indeed, every reasonable construction must be resorted to. Id. J ustice Scalia
warned, however, that construction s] should not be judicial inventions. Id. at 2931 n.43. In considering a facial challenge, a court can
impose a limiting construction on a statute only if it is readily susceptible to such a construction. Reno, 521 U.S. at 884. There is no such
construction available here. This Court could state, and has considered, imposing a construction that simply says that (1) knowledge is a
required element; and (2) that speech and association protected by the First Amendment are not covered. However, that adds words and
provides meaning in a way that dips into the role of legislature. Importing that construction into 1021 might, in fact, run contrary to what
Congress intends; Congress may want to capture certain otherwise protectable associational conduct or they may want to capture conduct
that is not knowing--and they therefore may not want a court using a blunt instrument of caselaw construction to alter their legislative
intent. The Court has also considered importing certain principles from the AUMF into 1021 to give the statute at issue a limiting 60
construction. But that runs afoul of at least three things. First, it runs afoul of J ustice Scalias admonition in Skilling that courts should not
invent limiting constructions. 130 S. Ct. at 2931 n.43. Second, it runs afoul of the separation of powers between the Executive and
Legislative branches at it imports a construction provided by the Executive, and not Congress. Doing so would strip Congress of its power to
legislate--and to give statutes the meaning it intends. Even though Congress entitled 1021 an affirmation of the AUMF, see Pub. L. 112-
81, 125 Stat. 1298 1021, the stark differences between 1021 and the AUMF (as discussed further below) leave the Court without a
framework provided by Congress itself through which to impose a limiting construction and salvage 1021--or any part thereof. Third, it runs
afoul of the rule of construction that states that courts must presume that Congress acted intentionally in crafting legislation--and in
importing (or not) concepts from one statute into a related or reaffirming statute. Cf. Bates v. United States, 522 U.S. 23, 30-31 (1997).
One choice Congress had to affirm the AUMF could have been to restate it verbatim--or simply state, We affirm the AUMF and stop
there. They did not. The Court finds that importing its interpretation of principles from the AUMF into 1021 would ignore the differences
between those two statutes that this Court is required to assume are intentional. Cf. id. 61 Because this Court cannot fashion an appropriate
limiting construction, it finds that preliminarily enjoining enforcement of 1021 is the only appropriate remedy at this stage. 2. Irreparable
Injury The second essential element of sustaining a claim for preliminary injunctive relief is that a plaintiff suffers irreparable harm in the
absence of such relief. Salinger, 607 F.3d at 80. In the context of the First Amendment, the Supreme Court has held that the loss of First
Amendment freedoms, for even minimal periods of time, unquestionably constitutes irreparable injury. Elrod v. Burns, 427 U.S. 347, 373
(1976). In Salinger, the Second Circuit reiterated that point, but clarified that it did not mean that First Amendment challenges necessarily
carried a presumption of irreparable injury; rather, that the loss of First Amendment freedoms--even for a short duration--constituted
irreparable injury without more. 607 F.3d at 81-82. Here, the uncontradicted testimony at the evidentiary hearing was that the plaintiffs have
in fact lost certain First Amendment freedoms as a result of the enactment of 1021. Hedges, Wargalla, and J onsdottir have changed
certain associational conduct, and OBrien and J onsdittir have avoided certain expressive conduct, because of their concerns about 1021.
Under Elrod and Salinger, that is sufficient to meet the element of irreparable harm. Moreover, since plaintiffs continue to have 62 their
associational and expressive conduct chilled, there is both actual and continued threatened irreparable harm. In addition, it is certainly the
case that if plaintiffs were detained as a result of their conduct, they could be detained until the cessation of hostilities--i.e., an indeterminate
period of time. Being subjected to the risk of such detention, particularly in light of the Governments inability to represent that plaintiffs
conduct does not fall with 1021, must constitute a threat of irreparable harm. The question then is: Is that harm immediate? Since the
Government will not say that the conduct does not fall outside of 1021, one cannot predict immediacy one way or the other. The penalty
we know would be severe. The Government argues that there cannot be a threat of imminent harm because 1021 is simply an
affirmation of the AUMF--and since plaintiffs have not to date been subject to detention under the AUMF, there is no reasonable basis for
them to fear detention under 1021. (See Govt Mem. at 16-25.) That argument, however, ignores that, as mentioned above, there are
obvious differences between the AUMF and 1021. Section 1021 is certainly far from a verbatim reprise of the AUMF. This Court assumes,
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
as it must, that Congress acted intentionally when crafting the differences as between the two statutes. 63 First, by its terms, the AUMF is
tied directly and only to those involved in the events of 9/11. Pub. L. 107-40, 115 Stat. 224 at 2(a) (authorization of the president to use
force related to attacks that occurred on September 11, 2001); see also id. at Preamble (Whereas, on September 11, 2001, acts of
treacherous violence were committed against the United States and its citizens . . .). Section 1021, in contrast, has a non-specific definition
of covered person that reaches beyond those involved in the 9/11 attacks by its very terms. See Pub. L. 112-81, 125 Stat. 1298
1021(b)(2) (a covered person is a] person who was a part of or substantially supported al-Qaeda, the Taliban, or associated forces that
are engaged in hostilities against the United States . . .). To wit, 1021 speaks in terms of engaged in hostilities, id.; that is the present
progressive tense, not the past tense relating to 9/11. Relatedly, the individuals or groups at issue in the AUMF are also more specific than
those at issue in 1021. At issue in the AUMF are those who were directly involved in the 9/11 attacks while those in 1021 are specific
groups and associated forces. Compare Pub. L. 107-40, 115 Stat. 224 at 2(a) with Pub. L. 112-81, 125 Stat. 1298 1021(b)(2). But the
Government has not provided a concrete, cognizable set of organizations or individuals that constitute associated forces, lending further
indefiniteness to 1021. 64 Further, any question of support is specifically defined by the verbs in the statute--i.e., planned, authorized,
committed, or aided in relation to the 9/11 attacks themselves or harbored in relation to the organizations or persons who engaged in
the just-discussed acts. Pub. L. 107-40, 115 Stat. 224 at 2(a). Such clarity is not provided in 1021 with respect to what acts--and what
mental state related to those acts--falls within the broad, general phrase of substantial support. Thus, the indefinite--indeed, vague--
nature of 1021, coupled with the Governments inability to provide assurances that the specific conduct at issue here (of which the
Government had ample notice) would not subject plaintiffs to prosecution and detention for their acts lays the foundation for plaintiffs
reasonable fear of irreparable harm.21 3. Balancing Of The Equities In considering whether to issue a preliminary injunction, the Court must
consider, as noted above, the balance of the hardships 21 The assertion that President Obamas Signing Statement erases any reasonable
fear of imminent harm does not take into account precisely on what that Signing Statement focuses. It does not state that 1021 of the
NDAA will not be applied to otherwise-protected First Amendment speech nor does it give concrete definitions to the vague terms used in
the statute. Rather, the Signing Statement simply assures the public that the Obama Administration will not authorize the indefinite military
detention without trial of American citizens and will interpret section 1021 in a manner that ensures that any detention it authorizes
complies with the Constitution, the laws of war, and all other applicable law. Singing Statement, 2011 DAILY COMP. PRES. DOC. 978 at 1,
2. Thus, the question only goes to the constitutionality of the detention authorized by 1021--not the type of conduct that may fall within
1021. Accordingly, the Signing Statement does not eliminate the reasonable fear of future government harm that is likely to occur--i.e., the
irreparable injury at issue here. 65 between the plaintiff and defendant and issue the injunction only if the balance of the hardships tips in
the plaintiffs favor. Salinger, 607 F.3d at 80. The Governments primary argument in opposition to this motion is that 1021 is simply an
affirmation of the AUMF; that it goes no further, it does nothing more. As is clear from this Opinion, this Court disagrees that that is the effect
of 1021 as currently drafted. However, if the Governments argument is to be credited in terms of its belief as to the impact of the
legislation--which is nil--then the issuance of an injunction should have absolutely no impact on any Governmental activities at all. The
AUMF does not have a sunset provision: it is still in force and effect. Thus, to the extent the Government believes that the two provisions
are co-extensive, enjoining any action under 1021 should not have any impact on the Government. Even if, however, 1021 does convey
some authority not provided under the AUMF, the equities nonetheless tip strongly in favor of enjoining its enforcement. The Government
was given a number of opportunities at the hearing and in its briefs to state unambiguously that the type of expressive and associational
activities engaged in by plaintiffs--or others--are not within 1021. It did not. This Court therefore must credit the chilling impact on First
Amendment rights as reasonable--and real. Given 66 our societys strong commitment to protecting First Amendment rights, the equities
must tip in favor of protecting those rights. Moreover, Congress can add definitional language to the statute and resolve the issues the
plaintiffs have raised and the Court has flagged. By adding definitions and imposing a scienter requirement, it can resolve the issues with
the statute and proceed with enforcement activities it deems fit. In the meantime, there are a variety of other statutes which can be utilized to
detain those engaged in various levels of support of terrorists--including the AUMF and 1022. Thus, preliminarily enjoining the
enforcement of 1021 does not divest the Government of its many other tools. 4. Public Interest There is a strong public interest in
protecting rights guaranteed by the First Amendment. See Pac. Gas & Elec. Co. v. Pub. Utils. Commn of Cal., 475 U.S. 1, 8 (1986) (The
constitutional guarantee of free speech serves significant societal interests . . . . By protecting those who wish to enter the marketplace of
ideas from government attack, the First Amendment protects the publics interest in receiving information. (quotation marks and citations
omitted)); Salinger, 607 F.3d at 82. There is also a strong public interest in ensuring that due process rights guaranteed by the Fifth
Amendment are protected by ensuring that ordinary citizens are able to 67 understand the scope of conduct that could subject them to
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
indefinite military detention. Cf. Mathews v. Eldridge, 424 U.S. 319, 335, 348-49 (1976). Weighed against these public interests is the strong
public interest in upholding acts of Congress and thereby maintaining the appropriate separation of powers; there is also a clear public
interest which counsels for cautious use of judicial power to enjoin an act of Congress, and the public interest in ensuring protection from
terroristic acts--and that law enforcement has the tools necessary to be as effective as possible in that regard. The Government has assisted
the Court in its deliberations with respect to the risks associated with the various interests on each side of the ledger. In light of the
Governments contention that 1021 does nothing new, that it goes no further than the AUMF, the Court can only assume that the
Government believes that preliminarily enjoining enforcement of 1021 will not expose the public to any increased risk and that 1021 does
not add anything new to law enforcements tools.22 This Court is acutely aware that preliminarily enjoining an act of Congress must be done
with great caution. However, it is the responsibility of our judicial system to protect the public from acts of Congress which infringe upon
constitutional rights. 22 The Court disagrees with this scope argument, as set forth above, but refers to it as an indication of the expected
impact on the Government. As set forth above, this Court has found that plaintiffs have shown a likelihood of success on the merits
regarding their constitutional claim and it therefore has a responsibility to insure that the public's constitutional rights are protected.
Accordingly, this Court finds that the public interest is best served by the issuance of the preliminary relief recited herein. CONCLUSION For
the aforementioned reasons, plaintiffs' motion for preliminary injunction is GRANTED; enforcement of 1021 of the NDAA is preliminarily
enjoined pending further order of this Court or amendments to the statute rendering this Opinion & Order moot. The Clerk of the Court is
directed to terminate the motion for preliminary injunction and the motion to file amicus brief at Docket Nos. 3 and 31. SO ORDERED:
Dated: New York, New York May 16, 2012 Katherine B. Forrest UNITED STATES DISTRICT J UDGE
NDAA Section 1021 site
Sec. 1021. Affirmation of authority of the Armed Forces of the United States to detain covered persons pursuant to the Authorization for Use
of Military Force. Sec. 1022. Military custody for foreign al-Qaeda terrorists. Sec. 1023. Procedures for periodic detention review of
individuals detained at United States Naval Station, Guantanamo Bay, Cuba. Sec. 1024. Procedures for status determinations. Sec. 1025.
Requirement for national security protocols governing detainee communications. Sec. 1026. Prohibition on use of funds to construct or
modify facilities in the United States to house detainees transferred from United States Naval Station, Guantanamo Bay, Cuba. Sec. 1027.
Prohibition on the use of funds for the transfer or release of individuals detained at United States Naval Station, Guantanamo Bay, Cuba.
Sec. 1028. Requirements for certifications relating to the transfer of detainees at United States Naval Station, Guantanamo Bay, Cuba, to
foreign countries and other foreign entities. Sec. 1029. Requirement for consultation regarding prosecution of terrorists. Sec. 1030.
Clarification of right to plead guilty in trial of capital offense by military commission. Sec. 1031. Counterterrorism operational briefing
requirement. Sec. 1032. National security planning guidance to deny safe havens to al-Qaeda and its violent extremist affiliates. Sec. 1033.
Extension of authority to make rewards for combating terrorism. Sec. 1034. Amendments relating to the Military Commissions Act of 2009.
INDYBAY Could Obama use NDAA To Arrest Militias?
Could Obama use NDAA To Arrest Militias? by Rwolf Thursday Oct 25th, 2012 10:10 AM Pres. Obama could use NDAA provisions to order
U.S. Military Forces to round up without evidence, millions of Americans including militias by alleging they are belligerents or a threat to
National Security. Many observers believe Obama intends to extend NDAA to imprison U.S. Citizens in Indefinite Detention not involved
with or associated with enemy forces. Could Obama use NDAA To Arrest Militias on the Premise members are Militants and Belligerents
that pose a threat to National Security? Recently the Obama administration stated to Federal J udge Katherine Forest that under (NDAA)
The National Defense Authorization Act of 2012 the President had authorization to lock up belligerents indefinitely. That they (were justified)
to lock belligerents up indefinitelybecause cases involving belligerents directly-aligned with militants against the good of America
warrants such punishment.) Pres. Obama could use NDAA provisions to order U.S. Military Forces to round up without evidence, millions of
Americans including militias by alleging they are belligerents or a threat to National Security. Many observers believe Obama intends to
extend NDAA to imprison U.S. Citizens in Indefinite Detention not involved with or associated with enemy forces. Hitler included similar
provisions in his fascist (Discriminatory Decrees signed February 28, 1933). Almost immediately after the German Parliament passed
Hitlers laws, the Reich Government ordered the arrest of German Citizens and confiscated their guns without probable cause or evidence;
delegated powers to German Police and other authorities to arrest anyone Nazi authorities claimed attempted or incited public unrest:
arrested among others were outspoken Germans, writers, journalists, peaceful protestors and artists. After World War II the East German
Secret Police (Stasi) used the threat of Indefinite Detention to forcibly recruit thousands of informants. The U.S. 2012 NDAA legislation
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Obama signed 12-31-11 is similar to Hitlers 1933 fascist laws the SS and Gestapo used to target persons in Germany for arrest,
imprisonment and execution without probable cause; and confiscate millions of dollars of property. Hitler used his laws to suspend
Parliament and the Supreme Court insuring his laws could not be rescinded. During the Obama Administration's recent request for a (stay)
to stop U.S. District J udge Katherine Forrest blocking enforcement of vague NDAA provisions, the Obama Administrationnever clarified
what constitutes a (belligerent); or militant; or what belligerent activities (directly aligned with a militant) to order a belligerents arrest or
indefinite detention; or what is against the good of America. Under vague provisions of NDAA, the President could accuse anyone of being
(directly aligned with militants by way of any political or other association; activity, statement, writing or communication with an individual or
group government deemed (militant) to arrest and indefinitely detain Americans. Writers, journalists, Americans that disagree with or
question U.S. Government or its alliesmay under NDAA be subject to arrest and indefinite detention. NDAA 2012, like Hitlers 1933
Discriminatory Decrees enforces censorship; refers to the Patriot Act e.g. warrant-less searches of private property and forfeiture of property
from persons not charged with crime. Provisions in NDAA 2012 keep the door open for corrupt U.S. police; government agents and
provocateurs which there are many, to falsify reports and statements to target any American, group or organization for arrest, indefinite
detention, complete disappearance; civil asset forfeiture of their property. You may have noted NDAA referred to the USA Patriot Act. The
Patriot Act lends itself to Government / police corruption; the Federal Government may use secret witnesses and informants to cause
arrests and civil asset forfeiture of Americans property. Witness(s) and informants may be paid up to 50% of assets forfeited. Federal
Government under 18USC may use a mere preponderance of civil evidence, little more than hearsay to Civilly Forfeit Private Property.
Under the Patriot Act innocent property owners may be barred by government knowing the evidence federal government uses to forfeit their
property. Sections of NDAA 2012 are so broad, it appears U.S. Government or the President could (retroactively) deem an Americans past
1st Amendment activities prior to passage of 2012 NDAAsupported hostilities, terrorism or (Belligerents) to order the arrest and Indefinite
Detention of any U.S. Citizen, writer, group or organization. Under NDAA 2012 it should be expected that indefinitely detained U.S. Citizens
not involved in terrorism or hostile activities, not given Miranda Warnings when interrogated, not allowed legal counsel or habeas corpus
may be prosecuted for non-terrorist (ordinary crimes) because of their (alleged admissions) while held in Indefinite Detention.
RT Nov 15, 2012 Obama secretly signs the most aggressive cybersecurity directive ever
The White House is being asked by attorneys to explain a top-secret presidential policy directive signed last month that may allow for the
domestic deployment of the US military for the sake of so-called cybersecurity. Lawyers with the Electronic Privacy Information Center
(EPIC) have filed a Freedom of Information Act (FOIA) request with the office of US President Barack Obama in hopes if hearing more
about an elusive order signed in secrecy in mid-October but only made public in an article published this week in the Washington Post.
According to persons close to the White House who have seen the order and spoke with the Post, Presidential Policy Directive 20 (PP20)
aims to finalize new rules of engagement that would guide commanders when and how the military can go outside government networks to
prevent a cyberattack that could cause significant destruction or casualties. Attorneys with EPIC are now demanding that they see this
secret order to find out what exactly that could mean, citing the possibility of putting boots on the ground in the United States if the
government argues its imperative for cybersecurity. In the FOIA request, EPIC attorneys Amie Stepanovich and Ginger McCall ask to see
information about PP20 because they fear it may enable military deployment within the United States by way of a secret law that lets the
National Security Agency and Pentagon put armed forces in charge of protecting Americas cyberinfrastructure and crucial routes of
communications. We dont know whats in this policy directive and we feel the American public has the right to know, McCall tells Raw
Story this week. On her part, Stepanovich adds that getting to the truth of the matter could be a nightmare given the NSAs tendency to
keep these sorts of things secret. The NSAs cyber security operations have been kept very, very secret, and because of that it has been
impossible for the public to react to them, Stepanovich adds. That makes it] very difficult, we believe, for Congress to legislate in this area.
Its in the publics best interest, from a knowledge perspective and from a legislative perspective, to be made aware of what authority the
NSA is being given. The potential of martial law became a topic actually discussed by Congress last year when lawmakers first considered
provisions for this years National Defense Authorization Act, or NDAA. Before the House and Senate agreed on including a section to the
law letting the White House arrest and detain any US citizen indefinitely without trial or charge, another provision was almost put on the
books that would have essentially allowed for military rule during some situations. The NDAAs S. 1867 would basically say in law for the
first time that the homeland is part of the battlefield Sen. Lindsey Graham (R-S.C.), a supporter of the bill, said last year. Sen. Kelly Ayotte
(R-N.H) agreed with his colleagues claim, telling Congress that America is part of the battlefield suggesting that the laws of war are
applicable anywhere, even in someones own backyard. EPIC writes that PPD 20 may violate federal law that prohibits military deployment
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
within the United States without congressional approval if their worse fear prove correct. According to the Posts tale on the directive, the
Pentagon now has blueprints to wage more offensive cyberassaults on entities that may be jeopardizing the cybersecurity of domestic
computer systems. How they do that, however, remains an issue that the FOIA request will have to coerce from Washington.
RT Obama secretly signs the most aggressive cybersecurity directive ever
Six years after the White House first started running amok on the computer networks of its adversaries, US President Barack Obama has
signed off on a top-secret order that finally offers blueprints for the Pentagons cyberwars. Pres. Obama has autographed an executive
order outlining protocol and procedures for the US military to take in the name of preventing cyberattacks from foreign countries, the
Washington Post reports, once and for all providing instructions from the Oval Office on how to manage the hush-hush assaults against
opposing nation-states that have all been confirmed by the White House while at the same time defending America from any possible harm
from abroad. According to Posts sources, namely officials who have seen the classified document and are not authorized to speak on the
record, Pres. Obama signed the paperwork in mid-October. Those authorities explain to the paper that the initiative in question, Presidential
Policy Directive 20, establishes a broad and strict set of standards to guide the operations of federal agencies in confronting threats in
cyberspace. Confronting a threat may sound harmless, but begs to introduce a chicken-and-the-egg scenario that could have some very
serious implications. The Post describes the directive as being the most extensive White House effort to date to wrestle with what
constitutes an offensive and a defensive action in the rapidly evolving world of cyberwar and cyberterrorism, but the ambiguous order
may very well allow the US to continue assaulting the networks of other nations, now with a given go-ahead from the commander-in-chief.
Next in line, the Post says, will be rules of engagement straight from the Pentagon that will provide guidelines for when to carry out assaults
outside the realm of what is considered American in terms of cyberspace. What it does, really for the first time, is it explicitly talks about
how we will use cyber operations, one senior administration official tells the paper of the policy directive. Network defense is what youre
doing inside your own networks. .?.?. Cyber operations is stuff outside that space, and recognizing that you could be doing that for what
might be called defensive purposes. When The New York Times published an expos on the White Houses so-called Olympics Games
program earlier this year, the world became fully aware for once of Americas involvement in international cyberwar, but much to the chagrin
of Washington. Officials including members of Pres. Obamas national security team spoke on condition of anonymity to tell the Times that
his predecessor, then-Pres. George W. Bush, began the program in 2006 to target Irans nuclear facilities and then passed it along to the
current administration to continue under the leadership of the current commander-in-chief. From his first months in office, David Sanger
wrote for the Times, Pres. Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Irans main nuclear
enrichment facilities, significantly expanding Americas first sustained use of cyberweapons. Congress has fought tooth-and-nail in the
months since to plug any leaks that could potentially spill the beans regarding any further secrets with the potential of effecting national
security, but those efforts appear unsuccessful given this weeks Post report on Presidential Police Directive 20. Now take the example of
Iran: according to the Post, Pres. Obamas signature on last months directive means the US now has rules and regulations when it comes
to protecting its own infrastructure from cyberattack, and can do so by means of launching what appear to be pre-emptive assaults of their
own. It should enable people to arrive at more effective decisions, a second senior administration official tells the Post. In that sense, its
an enormous step forward. That comment echoes US Defense Secretary Leon Panettas insistence earlier this year that defense alone is
not enough in terms of keeping the country safe. But what it also seems to do is put on the books a presidential policy that equates an
overzealous offense with a solid defense. While the US has cited Iranian hackers as the key players behind a recent attack on the websites
of Capital One Financial Corp. and BB&T Corp., two of the biggest names in the American banking industry, the US has done little on the
record to reveal any similar assaults from abroad. Instead, rather, its relied on fear-mongering to try and convince the country to accept a
cybersecurity legislation that will assure Americans safety from foreign hackers, all for the small price of sacrificing their digital-age privacy.
While the Obama White House has failed to acknowledge the Olympic Games program or any involvement in the Stuxnet or Flames viruses
linked to the initiative, computer researchers in both the US and Russia have tied Washington to the cripplingly malicious coding. Earlier this
month, California-based Chevron, one of the worlds leaders in the oil sector, went public with claims that Stuxnet had infected but not
affected their computers after the virus was unleashed. The ability to slow down or speed up centrifuges in nuclear facilities from
thousands of miles away made Stuxnet a virus that had very substantial powers. Refusing to speak of the Olympic Games program
specifically, former CIA chief Michael Hayden told the Times, This is the first attack of a major nature in which a cyberattack was used to
effect physical destruction. According to the Posts latest, though, future assaults by way of Stuxnet or similar worms could be considered
by Washington as defense mechanisms to make sure Iran doesnt retaliate for what America has long-been lashing out with. One source
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
tells the Times that, before last months directive, severing any link between a US-computer and an overseas server by any means possible
would be an act that would put America on the offensive. Now even a preemptive attack that disconnects other countries could be
considered a defensive ploy according to the president. That was seen as something that was aggressiveparticularly by some at the
State Department, one defense official tells the Post. With the signing of Pres. Obamas latest order, though, the paper writes that the
directiveeffectively enables the military to act more aggressively to thwart cyberattacks on the nations web of government and private
computer networks. It is thought that, through the directive, any systems linked even remotely with Americas can be fair game for an
assault. Given the expansion of cloud computing and the ever-expanding interconnection of communities across the globe on the Web,
though, that could essentially enable Uncle Sams cybersquad to get away with a whole new slew of tricks to try and topple adversaries of
any kind that threaten the American way of life. When and where those actions are necessary, of course, remains another topic of
discussion. Will those orders be signed in secrecy as well, though?
NaturalNews Aaron Swartz Suicided
Natural News Aaron Swartz Suicided Visionary internet activist Aaron Swartz found dead; was this brilliant internet revolutionary 'taken
out?' Learn (NaturalNews) Adding to the list of mysterious deaths that have happened over the last few days, internet visionary and brilliant
internet activist Aaron Swartz was found dead yesterday. Swartz, only 26 years old, was the co-founder of Reddit.com, the co-creator of
RSS technology, and the key activist who achieved a stunning defeat of the freedom-crushing SOPA / PIPA bills in the U.S. Congress.
Swartz was found dead yesterday, and the official story is that he committed suicide. But Swartz himself would have wanted us to question
the official story and dig deeper. After all, his own website, Demand Progress, questions the "PROTECT-IP" act, the insanity of George
Bush's Patriot Act, the censorship of free speech by Facebook, the financial scams of Goldman Sachs, the internet kill switch and much
more. He even questioned the TSA's naked body scanners, just like I have here at Natural News. In fact, when I look at Aaron Swartz, I see
him as the next generation of American activists who we all desperately need: energized, intelligent, freedom-loving critical thinkers who
spread truth and beat back tyranny and oppression at every opportunity. It's quite clear that had Swartz not been assassinated (er, I mean
"suicided"), he would have gone on to be a game changer for freedom in our world. Who benefits from the death of Aaron Swartz? Who
benefits? Hollywood and all its tyrannical copyright-pushing maniacs who want to criminalize anyone who downloads a movie off the
internet. The MPAA, in other words. That's the Motion Picture Association of America. Former U.S. Senator Christopher Dodd is the key
lobbyist representing the MPAA. He's now the chairperson and CEO of the MPAA, which has a long history of operating much like a mafia
organization in its use of threats and mafia-style intimidation tactics. In fact, if the MPAA joined with the RIAA (recording industry
association), it would create the MAFIAA, jokes one website. See also www.MafiaaFire.com Would this mafia pay good money to have
Aaron Swartz killed? (Are you kidding me? Do I even have to answer this question?) Mysterious deaths of people who question government
now becoming more frequent The official explanation is that Swartz "hanged himself" with a rope in his own apartment. I'm certain that
sooner or later additional information will come out about how he also knocked out his own teeth and beat himself badly before hanging
himself, because that's the way these "suicides" of activists usually turn out. Swartz's death is just one of many mysterious deaths that have
recently taken place. J ust a few days ago, a celebrated rifle manufacturer named J ohn Noveske was killed in a mysterious car crash -- not
long after posting details of all the school shooters who were taking psychiatric drugs. Another prominent internet technology pioneer
committed "suicide" just over a year ago. Ilya Zhitomirskiy co-created Diaspora, the so-called 'Facebook-killer' technology that created a
free, decentralized technology system that posed a severe threat to the data-mining monopoly of Facebook. It has also been reported and
confirmed that radio host Alex J ones was stalked by gun-toting goons while in New York to appear on CNN. They tried to force him into
some sort of altercation, but he escaped by hailing a cab and fleeing the area. The next day, CNN guests announced live on the air that
Piers Morgan should shoot Alex J ones with an AR-15, and they even threatened Alex's children with a thinly-veiled comment about "I hope
his children don't die." Furthermore, another person I know who is a powerful activist for truth and freedom was very nearly killed yesterday
in what looks like a planned automobile accident. He doesn't yet wish to release his name or any further details, but from what he described
to me, he was just "inches" away from being turned into roadkill. As these mysterious deaths start to add up, intelligent people are asking
questions: Is this part of a deliberate assassination campaign to take out top activists who question the government? It's not an
unreasonable question given our current political climate and the existence of Obama's secret kill list. Even Ron Paul has openly asked the
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
question of who is on Obama's kill list. I am NOT suicidal, depressed or on any drugs or medications For the record, no one has attempted
to kill me in at least the last 18 months. I am not aware of any threats against me, and I haven't noticed anyone following me or stalking me.
But just for the record, in case something happens to me, I am NOT suicidal or depressed or unhappy with life. I'm thrilled to be alive, thrilled
to keep moving humanity forward, and thrilled to be part of what can only be called a mass awakening of spiritual freedom in our world. I'm
not taking any medications whatsoever (and haven't for decades), I do not drink alcohol, I do not use ANY recreational drugs whatsoever, I
don't visit prostitutes and I'm not in any way a violent person. In fact, I can't even stand the thought of shooting animals (which is why I don't
hunt). I actually avoid stepping on ants! I don't drive at fast speeds on the highway, I don't engage in dangerous hobbies like skydiving, and
I'm actually very safety-minded about everything I do. While I take precautions to protect myself from bad people, I'm obviously not going to
detail those on the internet. All I can say is that if someone comes to kill me, they'd better be ready to take some casualties in the process. I
very much doubt people like Aaron Swartz knew much about self defense. He probably didn't even own a gun. But this is a lesson all
activists need to take to heart right now: Get armed. Go get trained in basic self defense. Start moving through your environments (cities,
streets, parking lots, apartment buildings, etc.) with more of a "tactical" mindset. Be aware of your surroundings. Stop using credit cards as
they instantly reveal your physical location. Turn off your cell phones and remove their batteries whenever possible. If you don't learn to live
a lot like a fugitive, you too might soon be "suicided" as part of what appears to be a national purge of the very best humanity has to offer.
Learn more: http://www.naturalnews.com/038650_Aaron_Swartz_suicide_assassination.html#ixzz2HqhzjbjW

RT Boots on the ground: Obamas cybersecurity directive could allow military deployment within the US
Get short URL email story to a friend print version
Published: 16 November, 2012, 22:54
TAGS:
Military, Obama, Law, USA
US President Barack Obama (AFP Photo / J im Watson)
The White House is being asked by attorneys to explain a top-secret presidential policy directive signed last month that may allow for the
domestic deployment of the US military for the sake of so-called cybersecurity.
Lawyers with the Electronic Privacy Information Center (EPIC) have filed a Freedom of Information Act (FOIA) request with the office of US
President Barack Obama in hopes if hearing more about an elusive order signed in secrecy in mid-October but only made public in an
article published this week in the Washington Post.
According to persons close to the White House who have seen the order and spoke with the Post, Presidential Policy Directive 20 (PP20)
aims to finalize new rules of engagement that would guide commanders when and how the military can go outside government networks to
prevent a cyberattack that could cause significant destruction or casualties. Attorneys with EPIC are now demanding that they see this
secret order to find out what exactly that could mean, citing the possibility of putting boots on the ground in the United States if the
government argues its imperative for cybersecurity.
In the FOIA request, EPIC attorneys Amie Stepanovich and Ginger McCall ask to see information about PP20 because they fear it
may enable military deployment within the United States by way of a secret law that lets the National Security Agency and Pentagon put
armed forces in charge of protecting Americas cyberinfrastructure and crucial routes of communications.
We dont know whats in this policy directive and we feel the American public has the right to know, McCall tells Raw Story this week.
On her part, Stepanovich adds that getting to the truth of the matter could be a nightmare given the NSAs tendency to keep these sorts of
things secret.
The NSAs cyber security operations have been kept very, very secret, and because of that it has been impossible for the public to react to
them, Stepanovich adds. That makes it] very difficult, we believe, for Congress to legislate in this area. Its in the publics best interest,
from a knowledge perspective and from a legislative perspective, to be made aware of what authority the NSA is being given.
The potential of martial law became a topic actually discussed by Congress last year when lawmakers first considered provisions for this
years National Defense Authorization Act, or NDAA. Before the House and Senate agreed on including a section to the law letting the White
House arrest and detain any US citizen indefinitely without trial or charge, another provision was almost put on the books that would have
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
essentially allowed for military rule during some situations.
The NDAAs S. 1867 would basically say in law for the first time that the homeland is part of the battlefield Sen. Lindsey Graham (R-S.C.),
a supporter of the bill, said last year.
Sen. Kelly Ayotte (R-N.H) agreed with his colleagues claim, telling Congress that America is part of the battlefield suggesting that the laws
of war are applicable anywhere, even in someones own backyard.
EPIC writes that PPD 20 may violate federal law that prohibits military deployment within the United States without congressional
approval if their worse fear prove correct.
According to the Posts tale on the directive, the Pentagon now has blueprints to wage more offensive cyberassaults on entities that may be
jeopardizing the cybersecurity of domestic computer systems. How they do that, however, remains an issue that the FOIA request will have
to coerce from Washington.

America is opening up a new warfront and its in your own backyard. Its in your neighbors house, its three states over and its on the other
side of the Mississippi.
Thats what a new legislation could lead to and the consequences are dire and constitutionally damning.
The United States Senate is set to vote this week on a bill that would categorize the entire USA as a battlefield, allowing law enforcement
duties to be dished out by the American Military, who in turn could detain any US citizen as a war criminal even coming into their own
homes to issue arrests.
The National Defense Authorization Act regularly comes before Congress for changes and additions, but the latest provision, S. 1867,
proves to be the most powerful one yet in raping constitutional freedoms from Americans. Move over, Patriot Act. Should S. 1867 pass,
lawmakers could conjure the text to keep even regular citizens detained indefinitely by their own military.
Sen. Lindsey Graham (R-S.C.), a supporter of the bill, has explicitly stated that the passing of S. 1867 would basically say in law for the first
time that the homeland is part of the battlefield and could lead to the detention of citizens without charge or trial, writes Chris Anders of the
American Civil Liberties Unions Washington office.
Sen. Kelly Ayotte (R-N.H) sits on the same side of the aisle and agrees wholeheartedly. America is part of the battlefield, says the
lawmaker.
Americas Military is already operating in roughly 200 countries, dishing out detention and executions to citizens of other nations. As unrest
erupts on the countrys own soil amid a recession, economic collapse and protests in hundreds of cities from coast-to-coast, is it that much
of a surprise that lawmakers finally want to declare the US a warzone?
Maybe not, but if the Senate has their way, the consequential could be detrimental to the US Constitution.
The Senate is going to vote on whether Congress will give this president and every future president the power to order the military to
pick up and imprison without charge or trial civilians anywhere in the world, adds Anders. The power is so broad that even US citizens
could be swept up by the military and the military could be used far from any battlefield, even within the United States itself.
American citizens and people picked up on American or Canadian or British streets being sent to military prisons indefinitely without even
being charged with a crime. Really? Does anyone think this is a good idea? And why now?asks Anders.
J ust like its supporters, the provision has attracted its share of critics as well. The Obama administration has threatened to veto the bill if it
makes its way through Congress, but given the presidents poor standing among the American public (his disapproval rating is at its highest
ever in recent polling), a hawkish Republican could usurp Obama as commander-in-chief as the 2012 election is less than a year away and
the unemployment level stays stagnant and sad. With the exception of Congressman Ron Paul, the frontrunners currently vying for the
Republican Partys nomination for the presidency have remained outspoken in their support for not just increasing American military
presence overseas at a time when the Pentagons budget dwarfs many governmental sectors, but in adding provisions to the Patriot Act
itself to further remove freedoms from the people.
During last weeks GOP debate televised on CNN, former House speaker Newt Gingrich said that the country musttry to find that balancing
act between our individual liberties and security. That same night, pizzaman Herman Cain said suspected terrorists should be killed before
identified and former Pennsylvania Senator Rick Santorum suggested that Muslims should be profiled by the American government
because, obviously, they are the group that are most likely to be committing these crimes, speaking broadly of his assumption of those
that construct terrorist attacks.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
I have a personal belief that you never have to give up liberty for security. You can still provide security without sacrificing our Bill of
Rights, responded Rep. Paul. You can prevent crimes by becoming a police state . . . So if you advocate the police state, yes, you can
have safety and security and you might prevent a crime, but the crime then will be against the American people and against our freedoms.
Sen. Mark Udall (D-Colo.) has already aligned himself as an opponent of the legislation, but needs to garner the backing of others if he
wants to keep Congress from enacting the provision. One section of these provisions, section 1031, would be interpreted as allowing the
military to capture and indefinitely detain American citizens on US soil, the Senator said in a speech last month. Section 1031 essentially
repeals the Posse Comitatus Act of 1878 by authorizing the US military to perform law enforcement functions on American soil. That alone
should alarm my colleagues on both sides of the aisle, but there are other problems with these provisions that must be resolved.
Udall isnt the only one on Capitol Hill that has seen a problem with the provision, which was developed under shady circumstances. The text
itself was drafted in secrecy in a closed-door meeting by US Sen. Carl Levin, D-Michigan, and Sen. J ohn McCain, R-Arizona, two of the
biggest names in Washington. No hearing was held to discuss the details and it was passed in a closed-door committee meeting, reports
Infowars Paul J oseph Watson.
Watson continues to conjure up a list of characteristics that the Department of Homeland Security have identified as traits of domestic
terrorism, calling into question past maneuvers from the government that led to those owning guns, buying gold and even donating to
charity being considered Americas enemy. At last weeks debate, Ron Paul added that Its anybody associated with organizations, which
means almost anybody can be loosely associated, referring to how the government can use its discretion or lack thereof to bring
terrorism charges against its own people. Calling into question the recent execution of two Americans with alleged ties to Al-Qaeda, Paul
added, So, that makes all Americans vulnerable, and now we know American citizens are vulnerable to assassination.
The provision itself passed in the House all the way back in May, and only now is going before the Senate. J ustin Amash, a Republican
representative from Cascade Township, was one of the five House Republicans that voted against it. It is destructive of our
Constitution, he writes on his Facebook page. It would permit the federal government to indefinitely detain American citizens on American
soil, without charge or trial, at the discretion of the president.
Given that the passing of the provision would allow for legally lengthy and questionable detention, it becomes bizarre why Sen. McCain, a
former prisoner of war, would pen such a bill. McCain was imprisoned in North Vietnam for over five years in a camp where he was detained
and tortured before entering American politics.
The president should not have the authority to determine whether the Constitution applies to you, no matter what the allegations, adds
Amash, who also writes, Note that it does not preclude US citizens from being detained indefinitely, without charge or trial, it simply makes
such detention discretionary.
Please urge your Senators to oppose these outrageous provisions.
As a solution, Sen. Udall has offered a counter act, being dubbed the Udall Amendment, that would keep S. 1867 from its critical
consequences and would instead require lawmakers to examine the necessity of detaining citizens domestically, and instead would make
Congress consider whether any detention legislation is needed at all.
In the meantime, Anders and ACLU are calling on Americans to voice their concerns to the US Senate. As political posturing keeps the
country divided and the branches of government fight to find a solution to the crumbling economy, infrastructure and now the Constitution
a solution to this problem is only the tip of the iceberg when it comes to the assaults on Americans that is underway.

Yahoo " prisoner x" , as Ben Zygier
LONDON (Reuters) - An Australian man committed suicide in a high-security Israeli jail in 2010 after being held for months in great
secrecy, Australia's ABC channel said on Tuesday, throwing new light on a case that has rattled Israel. The unforced ABC story named the
man, known previously only as "prisoner x", as Ben Zygier. It added that it "understood" the 34-year-old from Melbourne had been
previously recruited by the Israeli spy agency Mossad. There was no official comment on the story in Israel. However, within hours of the
report surfacing, Prime Minister Benjamin Netanyahu's office summoned Israeli editors to ask them not to publish a story "that is very
embarrassing to a certain government agency", Israel's Haaretz newspaper said. "The emergency meeting was called following a broadcast
outside Israel regarding the incident in question," Haaretz said, giving no further information. Shortly afterwards, all reference to the
Australian report vanished from Israeli news sites -- including Haaretz itself. Such a gag order is highly unusual in Israel, where state military
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
censors normally allow local media to quote foreign sources on controversial incidents -- such as an alleged attack on Syria last month by
the Israeli airforce. ABC said that Zygier's imprisonment was so secret that not even his guards knew his name. However, word got out at
the time of a mysterious prisoner and human rights groups wrote to the state to demand more information. "It is insupportable that, in a
democratic country, authorities can arrest people in complete secrecy and disappear them from public view without the public even knowing
such an arrest took place," the Association for Civil Rights in Israel wrote in J une 2010. When Israel's Ynet website wrote about the case
that same month the story was quickly removed because of a gag order. ABC said Zygier had moved to Israel 10 years before his death
and changed his name to Ben Alon. It gave no reason for his imprisonment, speculating only that it would have had to concern espionage
and sensitive state secrets. Funeral notices from Australia show that Zygier's body was flown back to Melbourne at the end of December
2010 for burial.

RT Obama moves to keep kill list memos secret forever
United States President Barack Obama has no plans to show Congress the legal rulings that justify his use of drones to kill US citizens,
despite urging from members of his own political party. Both members of the House and Senate have demanded as of late that the Obama
administration explain more about the presidents ability to execute Americans suspected of terrorist activity without ever taking them to trial.
Members of his own party have continuously pressed President Obama to disclose more information on his targeted kill program to no avail,
but even as questions intensify and answers continue to be unknown, the president is reportedly dismissing pleas largely coming from the
left and is preparing to side with Republicans political foes who are much less concerned about his drone program than last years
terrorist attack in Benghazi, Libya. In lieu of opening up about the justification for killing his own citizens, Pres. Obama will reportedly instead
offer up instead intelligence about last Septembers incident in Libya that left four Americans dead, including US Ambassador Chris
Stevens. The event has become a point of contention on both sides of the aisle, and ongoing disputes over the mishandling of the assault
and an alleged cover-up in the days and weeks after have driven a rift in Washington. Now with some lawmakers threatening to halt cabinet
nominations recently made by the president in protest, Mr. Obama will reportedly offer Congress information about the Benghazi attack and
not his drone program. According to the New York Times, Obama administration officials are in talks with members of the Republican Party
that are expected to end with the White House opening up about Benghazi. In making that decision, though, the paper reports that the
commander-in-chief will ignore pleas from his own political party to discuss his overseas drone program, his ability to wage extrajudicial
killings on US citizens and his secretive kill list. By siding with right-wing opponents, Pres. Obama may finally succeed in having hand-
picked choice J ohn O. Brennan confirmed for a role as director of the CIA after having his nomination held up on Capitol Hill be lawmakers
wanting to learn more about Benghazi. In the process, though, the president could be alienating Democrats and once more going back on a
promise to bring drone discussion to the forefront of politics. I recognize that in our democracy, no one should just take my word that were
doing things the right way, the president said during his State of the Union address this month. So, in the months ahead, I will continue to
engage with Congress to ensure not only that our targeting, detention and prosecution of terrorists remains consistent with our laws and
system of checks and balances, but that our efforts are even more transparent to the American people and to the world. As the president
bides his time, however, less is being revealed about an increasingly deadly program. Earlier this week, Sen. Lindsey Graham (R-South
Carolina) claimed that Americas drone program has caused around 4,700 deaths internationally. At least two US citizens including a
teenage boy have been killed in American-led drone strikes overseas. Earlier this week, Sen. J ohn McCain (R-Arizona) told CBS
television program Meet the Press that information about Benghazi has not been forthcoming and he personally has many questions he
wants answered by the White House. "We've had two movies about getting bin Laden and we don't even know who the people were who
were evacuated from the consulate the day after the attack. So there are many, many questions. And we've had a massive cover-up on the
part of the administration, he said.

List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
WMR Is there a connection between alleged double murder -suicide in California and dead
American woman in Turkey?
February 6-7, 2013 -- Is there a connection between alleged double murder-suicide in California and dead American woman in Turkey?
Leave it to a small town newspaper, The Calaveras Enterprise of California, to provide the details on the alleged double murder-suicide of former CIA pilot Philip
Marshall and his two children. It is the details of Marshall's occupation and his recent travels that may link the suspicious deaths in the Forest Meadows subdivision of
Murphys, California to the suspicious death of a Staten Island, New York amateur photographer, wife, and mother of two in Istanbul, Turkey.
Between late Thursday, J anuary 31, and Saturday, J anuary 2, Saturday being the same day the badly beaten body of Sarai Sierra was found along the ancient wall of
Istanbul, Marshall, age 54, allegedly took a Glock 9 mm handgun and shot his 17-year old son Alex and 14-year old daughter Macaila in their heads while they slept on
a couch before turning the gun on himself. Marshall was a former airline pilot for Eastern and United and was a contract pilot for the Central Intelligence Agency and
Drug Enforcement Agency during the Iran-contra episode of the 1980s. Marshall was also the author of two books about 9/11, which suggested that the Bush
administration, along with Saudi Arabia, not any terrorist group, were responsible for the 9/11 attacks. Marshall also wrote an earlier book, a novel titledLakefront Airport,
which was a recollection of his experiences in the Iran-contra episode.
According to the Enterprise, Marshall's neighbors discounted the Calaveras County Sheriff's quick determination that the shooting deaths of the Marshalls, along with
that of Marshalls' wife's dog, were a murder-suicide. Toxicological findings for the final autopsy reports may not be available for several weeks, the Enterprise reported.
TheStockton Record reported that police "did not find any evidence at the scene to indicate what motivated Phillip Marshall to kill his children." Yet the police made the
determination of a double homicide, pet dog killing, and suicide anyway.
Neighbors said they heard no gun shots but police were quick to dispel the notion that the suspected gun used was silenced. However, the police did not say whether
other guns used by other parties may have used silencers. One neighbor across the street said he heard strange noises late Friday night.
Friends of the Marshall children said they exchanged text messages with them Thursday night and nothing appeared abnormal. Although Marshall was estranged from
his wife Sean and there was a police record from 2008 of domestic physical altercations between them and between Marshall and his sister-in-law, Marshall and his wife
traveled to Turkey together six weeks prior to allegedly buy saffron for an unnamed import-export business. Sierra, who left her husband and children in New York and
had never traveled abroad, took a trip to Turkey and disappeared from sight around J anuary 21. Marshall's wife, Sean, was in Istanbul the same time Sierra's body was
discovered.
The Sacramento Bee conveniently omitted the fact that Marshall's wife was traveling to Turkey at the time of the deaths of her family, merely reporting she was "out of
the country."
Police reported that Sierra's Samsung Galaxy phone and iPad were missing although her gold earrings, necklace and bracelet were still on her body. Other reports said
Sierra's i-Phone was also missing. Sierra had been beaten so bad her face was said to be unrecognizable. Police also said that although Sierra was only wearing a shirt
and underwear, she had not been raped.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Sierra reportedly flew from Istanbul to Amsterdam and Munich before returning to Istanbul after which she disappeared. Sierra also reportedly was hanging around with a
criminal element, according to the FBI. Sierra's travels and interests in her first trip abroad correspond to those of a DEA or other federal agent who was either a rookie
or was using a new "cover" passport. The CIA and DEA also use "import-export" businesses, such as one importing "saffron" from Turkey, as covers.
Marshall's 2008 book, False Flag 911: How Bush, Cheney and the Saudis Created the Post-911 World, is described as follows by Amazon:
From the flight deck of a Boeing 767, airline captain Philip Marshall pulls back the veil of deception surrounding the 911 attacks. In gripping, authoritative detail he
recreates the hijacked flights, including all their technical challenges, exploding the myths behind official accounts of pilot training and tactical planning. His finding: the
mission could not have been carried out by any known terrorist group. Explaining for the first time the hijackers mysterious trips to Las Vegas, where and how they
could have been trained, and the document that actually states a political motive for the attacks, he finds abundant evidence implicating a nexus of Saudi officials,
American contractors and, most unthinkably, members of the Bush administration. Analyzing 911 in terms of its original tactical plan, Marshall concludes that the attack
partially failed, and that its failures could ultimately serve to bring the creators of the Post 911 World to light, if not to justice.
Marshal's last book, published in 2012, The Big Bamboozle: 9/11 and the War on Terror, is described as follows:
From the perspective of a Boeing 767 captain and former "special activities" contract pilot, Philip Marshall straps the reader into the cockpits of hijacked commercial
airliners to tell the story of the most sophisticated terrorist attack in history. Based on a comprehensive ten-year study into the murders of his fellow pilots on 9/11, he
explains how hijackers, novice pilots at the controls of massive guided missiles, were able to beat United States Air Force fighters to iconic targets with advanced
maneuvering, daring speeds and a kamikaze finish. But, as Marshall explains, the tactical plan was so precise that it rules out car-bombers and shoe-bombers known as
al Qaeda, KSM and Osama bin Laden. So then, who was it? That's what you are about learn. Backed by official NTSB, FAA and black box recordings, Marshall finds the
most capable and most documented group of conspirators buried deep within a Congressional Inquiry's report and retraces their work in gripping detail. Fasten your
seatbelt--- the sad truth is that all of the solid evidence points to a dark collaboration between members of the Bush Administration and a covert group of Saudi
government officials. This is a game changer that will finally set the record straight on the most horrific crime in US history. This book is a compilation of official reports
that disputes the Bush Administration, the Bush Intelligence Community and the American media's account of the 9/11 attack. United States Senator Bob Graham's
Congressional J oint Inquiry in 2002 revealed that Saudi Arabian Intelligence agents met the 9/11 hijackers in the Los Angeles in J anuary of 2000, harbored them and led
them to 18 months of flight training in Florida and Arizona. Marshall follows reports from FBI field agents that warned George W. Bush's Administration that a "cadre of
individuals of investigative interest were engaged in flight training" in the Arizona desert in the spring of 2001. Marshall identifies three top federal investigators who
complained that Dick Cheney obstructed justice by refusing access to suspects who supposedly confessed to the greatest crime in U.S. history. None of the federal
investigators were ever allowed to verify the confession of Khalid Sheik Mohammed who had been water boarded over 180 times at Guantanamo detention facility. The
book disputes the video and media confession of Osama bin Laden and points out that none of the accusations by the Bush Administration could be proved. Marshall
asserts that the Saudi government was the true executioners of the 9/11 attack and framed their enemies while CIA special operations set up an elaborate decoy named
Osama bin Laden to divert attention away from the Saudi operation. He follows the hijackers to flight training airports and finds that Saudi agents led the hijackers to the
Arizona desert where Boeing 757 and Boeing 767 airliners were parked at a secluded CIA operated airport. The operators of the CIA airport were traced to suspicious
insider stock trades on two airlines, United Airlines and American Airlines, the only two airlines used in the 9/11 attack. Marshall breaks down the tactical flight plan that
was used by the hijackers and chronicles the actions of Condoleezza Rice, Donald Rumsfeld, Saudi Arabian Prince Bandar bin Sultan, Dick Cheney and George W.
Bsuh to learn that their account of the attack was severely flawed. Three top investigators wrote that Dick Cheney had obstructed the investigation and redacted the
involvement of the Saudi government agents who were employed in California by the Saudi Civil Aviation authority. The Congressional Inquiry reported that the Saudi
agents had "seemingly unlimited funding from Saudi Arabia" and had traced the hijacker financial support to Prince Bandar through a Riggs Bank account. Finally
Marshall chronicles the media trial that allowed Bush and Cheney to derail American J ustice by trying the 9/11 case with media propaganda and away from the American
federal court system.
Marshall also apparently knew CIA contract pilot, government informant, and drug smuggler Barry Seal, gunned down in his car execution style in Baton Rouge,
Louisiana in 1986. Seal was preparing to provide evidence to federal investigators of Vice President George H W Bush's involvement in CIA cocaine smuggling and the
Iran-contra scandal. Vice President Bush's personal phone number was reportedly found in the trunk of Seal's car. Seals murderer or murderers were never brought to
justice. Pulitzer Prize-winning author Gary Webb documented the CIA drug smuggling activities in his book Dark Alliance. Webb was found dead in his Sacramento
home in 2004 from two gunshot wounds to the head. The county coroner ruled the death a suicide.
Former Senator Graham's novel, Keys to the Kingdom, is about a retired senator from Florida named J ohn Billington who takes meticulous notes and tells a State
Department intelligence officer about a Saudi connection to terrorism. Before he can provide any further details, Billington is run over by a black pickup truck, killing him.
Billington is obviously Graham in the novel that points to a significant Saudi government connection to terrorism. The late Philip Marshall agreed with Graham's
contention concerning Saudi links to terrorist attacks in the United States.
President Obama's policy on assassinating American citizens anywhere in the world has been authorized by what are called "elastic" Department of J ustice criteria. Four
Americans are now dead with Turkey being a common factor. Because of his policies, Mr. Obama now owes the nation a full explanation of "what he knew and when he
knew it" every time an American dies from suspicious causes at home or abroad. The Marshall-Sierra deaths call for an immediate "what they knew and when they
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
knew it" explanation from Mr. Obama and the architect of America's torture, kidnapping, and assassination policies, J ohn O. Brennan, nominated by Obama to head the
CIA.
and
February 21-22, 2013 -- Political backlash in Calaveras County against Sheriff
WMR has been contacted by a number of Calaveras County residents who have expressed outrage over the unprofessional and quick investigation by Calaveras County
Sheriff Gary Kuntz of the shooting deaths of 9/11 analysis author Philip Marshall, his two teenage children -- Alex and Macaila -- and the family dog.
Kuntz, a native of North Dakota who enjoys dancing to German music, is loosely affiliated with a group of Western states' sheriffs called "county supremacists," offshoots
of the Western state sheriffs-led "Sagebrush Rebellion" of the 1970s and 80s. One Calaveras County resident said many believed Kuntz to be a "prepper" and "truther."
Prepper is the slang term for people who are prepared for everything from Armageddon to an economic collapse. "Truther" is a pejorative term for those who believe the
government hid important facts about the 9/11 attack.
As news spreads around the county about the quick conclusion by Kuntz that Marshall shot his two children, his dog, and then himself with a 9 mm Glock, for which
Marshall previously claimed he did not possess ammunition, other details about the case are beginning to show that the Sheriff's Department is, as local critics claim,
incompetent. For example, Marshall was shot through the left side of his head. However, people who knew Marshall have come forward claiming that they knew the
retired United Airlines pilot to be right-handed. They saw him throw baseballs and footballs with his right hand and one said he did not know Marshall to be ambidextrous
but strictly right-handed.
Sheriff Gary Kuntz taking the political heat from those who helped elect him to office.
Kuntz, a 24-year veteran of the Calaveras County Sheriff's Department before being laid off in 2009, was elected to the non-partisan Sheriff's position in 2010, defeating
incumbent sheriff Dennis Downum. However, it is no secret that Kuntz affiliates himself with the "Tea Party" wing of the Republican Party, which has a strong base in
Calaveras County. However, Kuntz's handling of the suspicious death of Marshall, considered a hero by a number of libertarian-oriented voters of Calaveras County, has
some previous supporters of Kuntz talking about mounting a challenge and replacing him with someone who will re-open the investigation of Marshall and his children as
not a murder-suicide, as quickly concluded by Kuntz, but as a triple homicide.
Some county residents who know Kuntz said that if he was approached by federal agents to cover up the Marshall murders, he would have quickly shedded his
libertarian cloak and gone along with the federal government.
Last November, just as Marshall was releasing his second book on 9/11 titled
The Big Bamboozle: 9/11 and the War on Terror, Kuntz lamented that his department required residents to help in reporting crimes because budget cuts forced the
laying off of 13 deputies. He told residents of Murphys, where Marshall lived, to keep an eye out for unusual events: "You have a neighbor on either side of you, talk to
them, watch out for their residence and let them know when you are on vacation. Watch out for cars, strange characters walking around and that sort of thing." When a
neighbor of Marshall reported hearing a strange noise on the evening of J anuary 31, Kuntz brushed it aside, adding that the gunshots that killed Marshall and his
children and dog could not have been heard by neighbors because the houses in the Forest Meadows subdivision are far apart. In fact, the homes are close together
horizontally and vertically, owing to the mountainous terrain on which they are built.
Upon the announcement of his candidacy for Sheriff, Kuntz's campaign released the following press release: "One of Calaveras County's most experienced law
enforcement man sic] announced his candidacy for Sheriff. On the steps of the county courthouse surrounded by friends, elected officials, and supporters from all parts
of Calaveras, Gary Kuntz officially through sic] his hat into the ring..."
Many Calaveras voters appear ready to throw Kuntz and his hat out of the ring over the poor investigation of the Marshall family shootings.

Aljazeera NDAA: Pre-emptive prosecution coming to a town near you
The potent charge of terrorism has been used to systematically curtail justice, writes author. Last Modified: 18 Feb 2013 11:35
On May 16, 2012, days before the NATO summit was scheduled to take place in Chicago, the local police arrested nine Occupy activists
who had come together from around the country to protest the convention Getty Images]
In the US, due process - one of the defining features of a democratic judicial process - continues to be badly bludgeoned: Obama fights
tooth and nail to push through NDAA, which would allow indefinite detention of US citizens, and the definition of terrorism has expanded its
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
unwieldy scope, casting a widening net that ensures more and more people are captured in its snare.
The US has pursued "domestic terrorism" by practicing pre-emptive prosecution, that is, going after individuals who have committed no
crime but are alleged to possess an ideology that might dispose them to commit acts of "terrorism". Maintaining that it can -and should - be
in the business of divining intent, the government decimates crucial elements of the US justice system.
Thus, in cases where terrorism is charged, prosecutors need not prove guilt beyond a reasonable doubt. Rather, only the defendant's
potential for committing a crime need be established in order to convict.
Consider the case of Tareq Abufayyad, a young Palestinian man and recent college graduate who was detained at San Francisco
International Airport when he was on his way to unite with his family, all of them naturalised citizens of the US. Tareq was deemed
inadmissible merely on the grounds that he had the potential to become a Hamas-operative.
FBI Agent Robert Miranda, the lead investigator into the government's case against the Holy Land Foundation, argued before the
Immigration J udge presiding over Tareq's case that, because he was a well-educated man from Gaza, a strong-hold of Hamas, Tareq would
be "attractive to Hamas" as a future recruit.
It's not hard to understand why David Cole, a professor of law at Georgetown University, concluded pre-emptive prosecution as an
"inevitably speculative endeavour".
Project Salam, an organisation devoted to monitoring and documenting the US J ustice Department's prosecution of terrorism cases, points
out that the logic of pre-emptive prosecution - enthusiastically embraced after 9/11 - was derived in significant part from Dick Cheney's
infamous "One Percent Doctrine". Ron Suskind explained Cheney's reasoning:
"Even if there's just a 1 percent chance of the unimaginable coming due, act as if it is a certainty. J ustified or not, fact-based or not, 'our
response' is what matters."
Commenting on the impact Cheney's policy had on the role of evidence in judicial proceedings, Suskind writes:
"As to 'evidence', the bar was set so low that the word itself almost didn't apply."
Terrorism statutes
For the past 12 years, this wanton policy has been wielded primarily against Muslims in a frenzy of cases brought against US citizens and
others in immigration, civil and criminal courts, with anguished and predictable devastation wrought on individuals and their families.
Frost Over the World - The 'war on terror'
10 years on
"If they are sufficiently 'Muslim', they are sufficiently 'predisposed'," writes Steve Downs, civil liberties lawyer and founder of Project Salam,
in Victims of America's Dirty Wars.
In a telephone conversation with me, however, Downs noted that this policy has recently been extended to apply to those who hold other
"ideologies", namely leftists and anarchists. Downs pointed to a handful of cases, including the "Cleveland 5", "RNC 8" and "Nato 3" that
suggest the direction in which the policy of preemptive prosecution is going.
In the wake of 9/11, many states - including Illinois, New York, New J ersey and Oklahoma - passed terrorism statutes that included their
own variations on the definition of terrorism. However, because it is the federal government that primarily handles cases of terrorism, states
have rarely employed these laws.
Last year, for the first time, Illinois deployed its own statute against terrorism. Illinois' terrorism law states:
"A person commits the offence of terrorism, when with the intent to intimidate or coerce a significant portion of a civilian population; he or
she knowingly commits a terrorist act."
The language used is vague, opaque and clearly lends itself to a chillingly broad landscape of prosecutorial action. But most significant, the
statute does not require that an unlawful act be committed in order for a charge of terrorism to be brought against an individual in an Illinois
court.
Indeed, civil rights lawyer Michael Deutsch believes, "The law could theoretically be used against labour strikes, acts of civil disobedience,
demonstrations, and so on." In other words, acts that should be protected under the First Amendment are not exempted from the definition
of terrorism.
We have already seen how the domestic front of the "War on Terror" has effectively turned lawful acts, like contributing to charities in the
Middle East, into illegal "material support" of Foreign Terrorist Organisations. Staggering attacks on democracy and liberty continue as a
growing list of activities that are framed as terrorism.
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
The only time the Illinois statute has been used was against a group of Occupy activists.
On May 16, 2012, days before the NATO summit was scheduled to take place in Chicago, the local police raided an apartment and arrested
nine Occupy activists who had come together from around the country to protest the convention.
Over the next few days, all but three were released. Those who remained behind bars were: Brian Church, 22, and Brent Betterly, 24, from
Florida, and J ared Chase, 27, from New Hampshire.
On May 19, they were indicted under the state's anti-terrorism statute and charged with conspiracy to commit terrorism and possession of
explosives.
After announcing the charges, the State's Attorney, Anita Alvarez, released a document to the press that introduced the three young men as
"self-proclaimed anarchists" and "members of the "'Black Bloc' group", and sketched out the plans they had been "conspiring" against the
city of Chicago.
What the press release did not mention is that the group had been infiltrated and coached by two undercover police officers named "Gloves"
and "Mo".
"There is no real definition of terrorism beyond our 'collective understanding' of it. But in the term's meaninglessness lies its limitless power
to undermine justice everywhere."
Definition of terrorism
Utilising one of the classic tactics perfected in time-honoured counter-intelligence operations used to intimidate, threaten and entrap people
engaged with political groups out of favour with the government (from the Black Panthers, environmental protection groups, and
Communists to protesters of the Vietnam war and others), the cops convinced the young men to concoct Molotov cocktails and, as soon as
they did, phoned into police headquarters - triggering the raid.
After the charges were announced, Deutsch, the lawyer representing the three men, told the press that the case was "even worse than
entrapment".
On the phone, Deutsch explained to me that this case fits within "the whole policy of pre-emptive prosecution, of creating the crime and then
solving it".
Entrapment is consistently employed in these cases. However, where the presence of entrapment may have seen a case thrown out in the
past, the logic of pre-emptive prosecution arms the state with the ability to justify its actions and successfully circumvent that defence, as
noted by Project Salam:
"When the defendant claims as a defence to have been entrapped in a crime manufactured by the government, the government counters
with the claim that the defendant was 'predisposed' to commit the crime, which would negate the entrapment defence."
On J anuary 25, the Nato 3's lawyers filed a motion in the Circuit Court of Cook County, Illinois, challenging the constitutionality of the state's
terrorism law. If the court agrees with them, the defendants will be charged with possession of explosives but will no longer face a 40-year
prison sentence for terrorism.
While the Illinois court should find the law unconstitutional, the truth remains that the nebulous but potent charge of terrorism has been used
to systematically curtail justice. In the words of Glenn Greenwald:
"It's just a manipulative slogan legitimising all forms of American violence against Muslims and delegitimising any acts meaningfully impeding
US will."
As a New York Court of Appeals decision admitted last December, there is no real definition of terrorism beyond our "collective
understanding" of it. But in the term's meaninglessness lies its limitless power to undermine justice everywhere.
Charlotte Silver is a journalist based in San Francisco and the West Bank. She is a graduate of Stanford University.
Follow her on Twitter: @CharEsilver
The views expressed in this article are the author's own and do not necessarily reflect Al J azeera's editorial policy.

TransparencyPlanet
Google
List activists/protesters detained or disappeard, NDAA
http://www.newsfollowup.com/ndaa_registry_list_activist_disappeared_detained_without_charge_trial_obama_unconstitutional.htm[5/28/2014 4:43:06 PM]
Analytics