Category Archives: NSA, DHS, FBI, Cyber Security, Spying

“Little by little, we’ve allowed our freedom to slip away,” Mr. Paul said


WASHINGTON — The government’s authority to sweep up vast quantities of phone records in the hunt for terrorists was set to expire at 12:01 a.m. Monday after Senator Rand Paul, Republican of Kentucky, blocked an extension of the program during an extraordinary and at times caustic Sunday session of the Senate.

Still, the Senate signaled that it was ready to curtail the National Security Agency’s bulk data collection program with likely passage this week of legislation that would shift the storage of telephone records from the government to the phone companies. The House overwhelmingly passed that bill last month. Senators voted, 77 to 17, on Sunday to take up the House bill.

Mr. Paul’s stand may have forced the temporary expiration of parts of the post-9/11 Patriot Act used by the National Security Agency to collect phone records, but he was helped by the miscalculation of Senator Mitch McConnell, the majority leader, who sent the Senate on a weeklong vacation after blocking the House bill before Memorial Day.

Photo

Senator Rand Paul, Republican of Kentucky, who was headed to Capitol Hill on Sunday, said he would block the rapid passage of a bill allowing a national surveillance program. Credit Drew Angerer/Getty Images

Mr. McConnell, also of Kentucky, relented Sunday, setting up a final round of votes on Tuesday or Wednesday that will most likely send a compromise version of the House bill to President Obama for his signature. Even Mr. Paul, using the procedural weapon of an objection, conceded he could not stop that.

“Little by little, we’ve allowed our freedom to slip away,” Mr. Paul said during a lengthy floor soliloquy.

The expiration of surveillance authority demonstrates a profound shift in American attitudes since the days after the Sept. 11, 2001, terrorist attacks, when national security was pre-eminent in both parties. Fourteen years after that attack, even as American conflicts continue abroad, a swell of privacy concerns stemming from both the vast expansion of communication systems and an increasing distrust of government’s use of data has turned those concerns on their head.

While it would represent a retrenchment on the part of the government, it does not end the argument over the dual imperatives of security and individual liberty brought to light by Edward J. Snowden, the former contractor for the National Security Agency.

The expiration of three key provisions of the Patriot Act means that, for now, the N.S.A. will no longer collect newly created logs of Americans’ phone calls in bulk. It also means that the F.B.I. cannot invoke the Patriot Act to obtain, for new investigations, wiretap orders that follow a suspect who changes phones, wiretap orders for a “lone wolf” terrorism suspect not linked to a group, or court orders to obtain business records relevant to an investigation.

However, the Justice Department may invoke a so-called grandfather clause to keep using those powers for investigations that had started before June 1, and there are additional workarounds investigators may use to overcome the lapse in the authorizations.

Mr. McConnell and other national security hawks who failed to continue the program badly underestimated the shift in the national mood, which has found its voice with Democrats and the libertarian wing of the Republican Party. The moment also put him at odds with Mr. Paul, whom he has endorsed for president.

“I remain determined to work toward the best outcome for the American people possible under the circumstances,” Mr. McConnell said. “This is where we are, colleagues — a House-passed bill with some serious flaws, and an inability to get a short-term extension to improve the House bill.”

Mr. Paul’s effort clearly angered many of his Republican colleagues, who met without him an hour before the Senate began to vote Sunday night. Senator John McCain, Republican of Arizona, who sparred with Mr. Paul on the floor over procedure, said later that Mr. Paul was not fit for the White House job he seeks. “I’ve said on many occasions that I believe he would be the worst candidate we could put forward,” he said.

Even as senators were trickling into the Capitol from the airport, Mr. McConnell attempted to extend some aspects of the law. He asked senators to consider a two-week continuation of the federal authority to track a “lone wolf” terrorism suspect not connected to a state sponsor and to conduct “roving” surveillance of a suspect, rather than of a phone number alone, to combat terrorists who frequently discard cellphones.

But Mr. Paul objected, and Mr. McConnell denounced from the Senate floor what he called “a campaign of demagoguery and disinformation” about the program.

Mr. McConnell then moved to a second option, a procedural move to take up the bill passed by the House, which he said the Senate would amend this week. It was unclear Sunday how many amendments, including any from Mr. Paul, would be considered and whether any could pass the Senate or be adopted by the House.

The House bill would overhaul the Patriot Act and scale back the bulk collection of phone records revealed by Mr. Snowden. Under the provisions of the House bill, sweeps that had operated under the guise of so-called national security letters issued by the F.B.I. would end. The data would instead be stored by the phone companies and could be retrieved by intelligence agencies only after approval of the Foreign Intelligence Surveillance Act court.

President Obama and his director of national intelligence, James R. Clapper Jr., have made dire warnings in recent days about the perils of letting the law expire and called for immediate approval of a surveillance bill passed by the House. “This shouldn’t and can’t be about politics,” Mr. Obama said in his weekly radio address. “This is a matter of national security.”

The C.I.A. director, John O. Brennan, echoed the president on Sunday during an interview on the CBS show “Face the Nation,” saying there had “been a little too much political grandstanding” and adding that “these tools are important to American lives.”

Speaker John A. Boehner, Republican of Ohio, also urged the Senate to act, citing the threat of groups like the Islamic State. “Al Qaeda, ISIL and other terrorists around the globe continue to plot attacks on America and our allies,” Mr. Boehner said in a statement. “Anyone who is satisfied with letting this critical intelligence capability go dark isn’t taking the terrorist threat seriously.”

Mr. McConnell had sought to get a series of short-term extensions passed so that Congress could continue to work on a compromise — like giving the phone companies more time to adapt to the new law — but that effort collapsed under the objections of Mr. Paul and two Democrats, Ron Wyden of Oregon and Martin Heinrich of New Mexico. Further, members of the House rejected extending the current law, given the wide support for their bill.

After a middle-of-the-night vote for a short-term extension failed on the Saturday before Memorial Day, senators left for a weeklong recess as the clock ticked. Senate Republican leaders sought a compromise that would make a new bill acceptable to both hawkish lawmakers and Mr. Paul. “I still have deep concerns,” said Senator Susan Collins, Republican of Maine.

Over the week, negotiators on the House and Senate Intelligence Committees had laid out a series of options to revise the bipartisan USA Freedom Act, including the addition of a certification process to ensure that the technology is ready to move metadata storage to the phone companies and allowing for a longer transition to phone company storage of the data. The House negotiators were skeptical of all efforts.

Democrats were critical of Mr. McConnell on Sunday night. “The job of the leader is to have a plan,” Senator Harry Reid of Nevada said on the Senate floor. “In this case, it is clear the majority leader simply didn’t have a plan.”

A version of this article appears in print on June 1, 2015, on page A1 of the New York edition with the headline: Senate, in Reversal, Turns Toward Limits on Spying.

CONTINUE READING…

Paul begins Patriot Act filibuster


Presidential hopeful Sen. Rand Paul took to the Senate floor Wednesday, in what the Kentucky Republican’s staff is calling a long-anticipated filibuster of extending the Patriot Act.

"I will not let the Patriot Act, the most unpatriotic of acts, go unchallenged," the Kentucky Republican said from the Senate floor. "The bulk collection of all Americans phone records all of the time is a direct violation of the fourth amendment."

Separately, Paul tweeted that he had taken to the Senate floor "to begin a filibuster of the Patriot Act renewal."

Paul suggested that the agency’s phone collection program could be the "tip of the iceberg" of the government’s surveillance practices. He said Americans must "decide as a country whether we value our Bill of Rights … or if we are willing to give that up so we feel safer."

The Kentucky Republican also slammed President Obama for not shutting down the NSA’s program in the wake of the a court ruling that determined the program is illegal.
"Where is the executive?" Paul asked. "How come the press gives him a free pass?

The Senate is currently debating "fast-track" trade legislation, with a procedural vote expected Thursday, so Paul is actually blocking his Senate colleagues from offering, debating and voting on amendments to that bill — something Democrats were quick to highlight.

Still, Paul appears poised to deliver a long speech from the floor that could tie up the Senate for hours.

Paul has made his opposition to NSA surveillance one of the cornerstones of his presidential campaign, and has pledged that he would end the "unconstitutional" program on his first day in the White House.

As he began Wednesday’s speech, Paul’s campaign blasted out an email on the NSA speech to supporters, seeking to build momentum.

"I will not rest. I will not back down. I will not yield one inch in this fight so long as my legs can stand," Paul wrote in the email.

The note to supporters included a link to Paul’s campaign website where supporters could "join the filibuster" by filing out their name, email and zip code.

Paul has used the Seante floor to his advantage before, famously staging a 13-hour filibuster of CIA nominee John Brennan in 2013. On Wednesday, Paul suggested that without his speech, there wouldn’t be a real debate in Congress on the Patriot Act.

"We are mired in a debate over trade. There’s another debate over the highway bill and the word is, we won’t actually get any time to debate if we’re going to abridge the Fourth Amendment," he said.

Senators are facing a looming deadline for action on the Patriot Act, with key provisions set to expire June 1.
Senate Majority Leader Mitch McConnell (R-Ky.) has pledged a vote on the USA Freedom Act, which would end the NSA’s collection of bulk phone records. Under the bill, the agency would have to ask private companies for a narrow set of phone records tied to a particular case. The NSA would also no longer hold the phone records in a government database.

Still, it’s not clear whether the USA Freedom Act can garner the needed 60 votes in the Senate.
McConnell and other top Republicans oppose the USA Freedom Act and are pushing to pass a "clean" extension of the Patriot Act, including Section 215, which the NSA uses to justify its phone records program.

If both bills fail, the Senate could be forced to pass a short-term extension of the spy powers — though it’s unclear whether a stopgap measure could pass muster with the House, which passed the USA Freedom Act last week in a resounding vote.

— This story was updated at 2:42 p.m.

Tags: Rand Paul, National security, Mass surveillance, Filibuster, National Security Agency, Patriot Act

CONTINUE READING…

Patriot Act extension bill introduced by Sen. McConnell


By Andrew V. Pestano Follow @AVPLive9 Contact the Author   |   April 22, 2015 at 9:34 AM

 

 

 

WASHINGTON, April 22 (UPI) — Senate Majority Leader Mitch McConnell, R-Ky.,

introduced a bill Tuesday to extend the controversial Patriot Act and its surveillance provisions until 2020.

The extension would allow the National Security Agency to continue to collect data of millions on U.S. phone records daily. The NSA does so under the authority of Section 215, which allows for secret court orders to collect "tangible things" that could be used by the government in investigations.

The Patriot Act was enacted after the Sept. 11 attacks to combat terrorism. McConnell used a Senate rule that will take the bill’s extension straight to the floor for voting, a move that would bypass traditional committee vetting process.

Section 215 expires on June 1. The NSA’s mass collection program was revealed by former contractor Edward Snowden, sparking a debate about privacy, security and the reach of government surveillance.

"Despite overwhelming consensus that the bulk collection of Americans’ phone records under Section 215 of the USA Patriot Act must end, Senate Republican leaders are proposing to extend that authority without change," Sen. Patrick J. Leahy, D-Vt., said in a statement. "This tone deaf attempt to pave the way for five and a half more years of unchecked surveillance will not succeed. I will oppose any reauthorization of Section 215 that does not contain meaningful reforms."

Leahy and a bipartisan group of lawmakers on the House Judiciary Committee are attempting to end the NSA’s mass collection of records. Advocates for privacy condemned McConnell’s extension introduction.

"The Senate majority leader’s bill makes no attempt to protect Americans’ privacy or reform ongoing NSA surveillance programs that do not provide any tangible benefit to national security," Harley Geiger, policy counsel at the Center for Democracy & Technology, said. "For Americans concerned about government intrusion in their lives, the bill is a kick in the stomach."

READ MORE…

http://www.theguardian.com/us-news/2015/feb/24/chicago-police-detain-americans-black-site


 

 

https://embed.theguardian.com/embed/video/us-news/video/2015/feb/24/homan-square-chicago-black-site-video

 

http://www.theguardian.com/us-news/2015/feb/24/chicago-police-detain-americans-black-site

While US military and intelligence interrogation impacted people overseas, Homan Square – said to house military-style vehicles and even a cage – focuses on American citizens, most often poor, black and brown. ‘When you go in,’ Brian Jacob Church told the Guardian, ‘nobody knows what happened to you.’ Video: Phil Batta for the Guardian; editing: Mae Ryan

 

The Chicago police department operates an off-the-books interrogation compound, rendering Americans unable to be found by family or attorneys while locked inside what lawyers say is the domestic equivalent of a CIA black site.

 

Held for hours at secret Chicago ‘black site': ‘You’re a hostage. It’s kidnapping’

<?XML:NAMESPACE PREFIX = "[default] http://www.w3.org/2000/svg&quot; NS = "http://www.w3.org/2000/svg&quot; />

Read more

The facility, a nondescript warehouse on Chicago’s west side known as Homan Square, has long been the scene of secretive work by special police units. Interviews with local attorneys and one protester who spent the better part of a day shackled in Homan Square describe operations that deny access to basic constitutional rights.

Alleged police practices at Homan Square, according to those familiar with the facility who spoke out to the Guardian after its investigation into Chicago police abuse, include:

  • Keeping arrestees out of official booking databases.
  • Beating by police, resulting in head wounds.
  • Shackling for prolonged periods.
  • Denying attorneys access to the “secure” facility.
  • Holding people without legal counsel for between 12 and 24 hours, including people as young as 15.

At least one man was found unresponsive in a Homan Square “interview room” and later pronounced dead.

Brian Jacob Church, a protester known as one of the “Nato Three”, was held and questioned at Homan Square in 2012 following a police raid. Officers restrained Church for the better part of a day, denying him access to an attorney, before sending him to a nearby police station to be booked and charged.

Chicago’s Homan Square ‘black site': surveillance, military-style vehicles and a metal cage

 

“Homan Square is definitely an unusual place,” Church told the Guardian on Friday. “It brings to mind the interrogation facilities they use in the Middle East. The CIA calls them black sites. It’s a domestic black site. When you go in, no one knows what’s happened to you.”

The secretive warehouse is the latest example of Chicago police practices that echo the much-criticized detention abuses of the US war on terrorism. While those abuses impacted people overseas, Homan Square – said to house military-style vehicles, interrogation cells and even a cage – trains its focus on Americans, most often poor, black and brown.

 

Unlike a precinct, no one taken to Homan Square is said to be booked. Witnesses, suspects or other Chicagoans who end up inside do not appear to have a public, searchable record entered into a database indicating where they are, as happens when someone is booked at a precinct. Lawyers and relatives insist there is no way of finding their whereabouts. Those lawyers who have attempted to gain access to Homan Square are most often turned away, even as their clients remain in custody inside.

“It’s sort of an open secret among attorneys that regularly make police station visits, this place – if you can’t find a client in the system, odds are they’re there,” said Chicago lawyer Julia Bartmes.

Chicago civil-rights attorney Flint Taylor said Homan Square represented a routinization of a notorious practice in local police work that violates the fifth and sixth amendments of the constitution.

“This Homan Square revelation seems to me to be an institutionalization of the practice that dates back more than 40 years,” Taylor said, “of violating a suspect or witness’ rights to a lawyer and not to be physically or otherwise coerced into giving a statement.”

Much remains hidden about Homan Square. The Chicago police department did not respond to the Guardian’s questions about the facility. But after the Guardian published this story, the department provided a statement insisting, without specifics, that there is nothing untoward taking place at what it called the “sensitive” location, home to undercover units.

“CPD [Chicago police department] abides by all laws, rules and guidelines pertaining to any interviews of suspects or witnesses, at Homan Square or any other CPD facility. If lawyers have a client detained at Homan Square, just like any other facility, they are allowed to speak to and visit them. It also houses CPD’s Evidence Recovered Property Section, where the public is able to claim inventoried property,” the statement said, something numerous attorneys and one Homan Square arrestee have denied.

“There are always records of anyone who is arrested by CPD, and this is not any different at Homan Square,” it continued.

The Chicago police statement did not address how long into an arrest or detention those records are generated or their availability to the public. A department spokesperson did not respond to a detailed request for clarification.

When a Guardian reporter arrived at the warehouse on Friday, a man at the gatehouse outside refused any entrance and would not answer questions. “This is a secure facility. You’re not even supposed to be standing here,” said the man, who refused to give his name.

A former Chicago police superintendent and a more recently retired detective, both of whom have been inside Homan Square in the last few years in a post-police capacity, said the police department did not operate out of the warehouse until the late 1990s.

But in detailing episodes involving their clients over the past several years, lawyers described mad scrambles that led to the closed doors of Homan Square, a place most had never heard of previously. The facility was even unknown to Rob Warden, the founder of Northwestern University Law School’s Center on Wrongful Convictions, until the Guardian informed him of the allegations of clients who vanish into inherently coercive police custody.

“They just disappear,” said Anthony Hill, a criminal defense attorney, “until they show up at a district for charging or are just released back out on the street.”

‘Never going to see the light of day’: the search for the Nato Three, the head wound, the worried mom and the dead man

Homan Square

 

‘They were held incommunicado for much longer than I think should be permitted in this country – anywhere – but particularly given the strong constitutional rights afforded to people who are being charged with crimes,” said Sarah Gelsomino, the lawyer for Brian Jacob Church. Photograph: Phil Batta/Guardian

Jacob Church learned about Homan Square the hard way. On May 16 2012, he and 11 others were taken there after police infiltrated their protest against the Nato summit. Church says officers cuffed him to a bench for an estimated 17 hours, intermittently interrogating him without reading his Miranda rights to remain silent. It would take another three hours – and an unusual lawyer visit through a wire cage – before he was finally charged with terrorism-related offenses at the nearby 11th district station, where he was made to sign papers, fingerprinted and photographed.

In preparation for the Nato protest, Church, who is from Florida, had written a phone number for the National Lawyers Guild on his arm as a precautionary measure. Once taken to Homan Square, Church asked explicitly to call his lawyers, and said he was denied.

“Essentially, I wasn’t allowed to make any contact with anybody,” Church told the Guardian, in contradiction of a police guidance on permitting phone calls and legal counsel to arrestees.

Church’s left wrist was cuffed to a bar behind a bench in windowless cinderblock cell, with his ankles cuffed together. He remained in those restraints for about 17 hours.

“I had essentially figured, ‘All right, well, they disappeared us and so we’re probably never going to see the light of day again,’” Church said.

Brian Church, Jared Chase and Brent Vincent Betterly, known as the ‘Nato Three’ Brian Jacob Church, Jared Chase and Brent Vincent Betterly, known as the ‘Nato Three’. Photograph: AP/Cook County sheriff’s office

Though the raid attracted major media attention, a team of attorneys could not find Church through 12 hours of “active searching”, Sarah Gelsomino, Church’s lawyer, recalled. No booking record existed. Only after she and others made a “major stink” with contacts in the offices of the corporation counsel and Mayor Rahm Emanuel did they even learn about Homan Square.

They sent another attorney to the facility, where he ultimately gained entry, and talked to Church through a floor-to-ceiling chain-link metal cage. Finally, hours later, police took Church and his two co-defendants to a nearby police station for booking.

After serving two and a half years in prison, Church is currently on parole after he and his co-defendants were found not guilty in 2014 of terrorism-related offenses but guilty of lesser charges of possessing an incendiary device and the misdemeanor of “mob action”.

It’s almost like they throw a black bag over your head and make you disappear for a day or two

Brian Jacob Church

The access that Nato Three attorneys received to Homan Square was an exception to the rule, even if Jacob Church’s experience there was not.

Three attorneys interviewed by the Guardian report being personally turned away from Homan Square between 2009 and 2013 without being allowed access to their clients. Two more lawyers who hadn’t been physically denied described it as a place where police withheld information about their clients’ whereabouts. Church was the only person who had been detained at the facility who agreed to talk with the Guardian: their lawyers say others fear police retaliation.

One man in January 2013 had his name changed in the Chicago central bookings database and then taken to Homan Square without a record of his transfer being kept, according to Eliza Solowiej of Chicago’s First Defense Legal Aid. (The man, the Guardian understands, wishes to be anonymous; his current attorney declined to confirm Solowiej’s account.) She found out where he was after he was taken to the hospital with a head injury.

“He said that the officers caused his head injuries in an interrogation room at Homan Square. I had been looking for him for six to eight hours, and every department member I talked to said they had never heard of him,” Solowiej said. “He sent me a phone pic of his head injuries because I had seen him in a police station right before he was transferred to Homan Square without any.”

Bartmes, another Chicago attorney, said that in September 2013 she got a call from a mother worried that her 15-year-old son had been picked up by police before dawn. A sympathetic sergeant followed up with the mother to say her son was being questioned at Homan Square in connection to a shooting and would be released soon. When hours passed, Bartmes traveled to Homan Square, only to be refused entry for nearly an hour.

An officer told her, “Well, you can’t just stand here taking notes, this is a secure facility, there are undercover officers, and you’re making people very nervous,” Bartmes recalled. Told to leave, she said she would return in an hour if the boy was not released. He was home, and not charged, after “12, maybe 13” hours in custody.

On February 2, 2013, John Hubbard was taken to Homan Square. Hubbard never walked out. The Chicago Tribune reported that the 44-year old was found “unresponsive inside an interview room”, and pronounced dead. After publication, the Cook County medical examiner told the Guardian that the cause of death was determined to be heroin intoxication.

Homan Square is hardly concerned exclusively with terrorism. Several special units operate outside of it, including the anti-gang and anti-drug forces. If police “want money, guns, drugs”, or information on the flow of any of them onto Chicago’s streets, “they bring them there and use it as a place of interrogation off the books,” Hill said.

‘That scares the hell out of me’: a throwback to Chicago police abuse with a post-9/11 feel

Homan Square

 

‘The real danger in allowing practices like Guantanamo or Abu Ghraib is the fact that they always creep into other aspects,’ criminologist Tracy Siska told the Guardian. Photograph: Chandler West/Guardian

A former Chicago detective and current private investigator, Bill Dorsch, said he had not heard of the police abuses described by Church and lawyers for other suspects who had been taken to Homan Square. He has been permitted access to the facility to visit one of its main features, an evidence locker for the police department. (“I just showed my retirement star and passed through,” Dorsch said.)

Transferring detainees through police custody to deny them access to legal counsel, would be “a career-ender,” Dorsch said. “To move just for the purpose of hiding them, I can’t see that happening,” he told the Guardian.

Richard Brzeczek, Chicago’s police superintendent from 1980 to 1983, who also said he had no first-hand knowledge of abuses at Homan Square, said it was “never justified” to deny access to attorneys.

“Homan Square should be on the same list as every other facility where you can call central booking and say: ‘Can you tell me if this person is in custody and where,’” Brzeczek said.

“If you’re going to be doing this, then you have to include Homan Square on the list of facilities that prisoners are taken into and a record made. It can’t be an exempt facility.”

Indeed, Chicago police guidelines appear to ban the sorts of practices Church and the lawyers said occur at Homan Square.

A directive titled “Processing Persons Under Department Control” instructs that “investigation or interrogation of an arrestee will not delay the booking process,” and arrestees must be allowed “a reasonable number of telephone calls” to attorneys swiftly “after their arrival at the first place of custody.” Another directive, “Arrestee and In-Custody Communications,” says police supervisors must “allow visitation by attorneys.”

Attorney Scott Finger said that the Chicago police tightened the latter directive in 2012 after quiet complaints from lawyers about their lack of access to Homan Square. Without those changes, Church’s attorneys might not have gained entry at all. But that tightening – about a week before Church’s arrest – did not prevent Church’s prolonged detention without a lawyer, nor the later cases where lawyers were unable to enter.

The combination of holding clients for long periods, while concealing their whereabouts and denying access to a lawyer, struck legal experts as a throwback to the worst excesses of Chicago police abuse, with a post-9/11 feel to it.

On a smaller scale, Homan Square is “analogous to the CIA’s black sites,” said Andrea Lyon, a former Chicago public defender and current dean of Valparaiso University Law School. When she practiced law in Chicago in the 1980s and 1990s, she said, “police used the term ‘shadow site’” to refer to the quasi-disappearances now in place at Homan Square.

I’ve never known any kind of organized, secret place where they go and hold somebody before booking for hours and hours

James Trainum, former detective, Washington DC

“Back when I first started working on torture cases and started representing criminal defendants in the early 1970s, my clients often told me they’d been taken from one police station to another before ending up at Area 2 where they were tortured,” said Taylor, the civil-rights lawyer most associated with pursuing the notoriously abusive Area 2 police commander Jon Burge. “And in that way the police prevent their family and lawyers from seeing them until they could coerce, through torture or other means, confessions from them.”

Police often have off-site facilities to have private conversations with their informants. But a retired Washington DC homicide detective, James Trainum, could not think of another circumstance nationwide where police held people incommunicado for extended periods.

“I’ve never known any kind of organized, secret place where they go and just hold somebody before booking for hours and hours and hours. That scares the hell out of me that that even exists or might exist,” said Trainum, who now studies national policing issues, to include interrogations, for the Innocence Project and the Constitution Project.

Regardless of departmental regulations, police frequently deny or elide access to lawyers even at regular police precincts, said Solowiej of First Defense Legal Aid. But she said the outright denial was exacerbated at Chicago’s secretive interrogation and holding facility: “It’s very, very rare for anyone to experience their constitutional rights in Chicago police custody, and even more so at Homan Square,” Solowiej said.

Church said that one of his more striking memories of Homan Square was the “big, big vehicles” police had inside the complex that “look like very large MRAPs that they use in the Middle East.”

Cook County, home of Chicago, has received some 1,700 pieces of military equipment from a much-criticized Pentagon program transferring military gear to local police. It includes a Humvee, according to a local ABC News report.

Tracy Siska, a criminologist and civil-rights activist with the Chicago Justice Project, said that Homan Square, as well as the unrelated case of ex-Guantánamo interrogator and retired Chicago detective Richard Zuley, showed the lines blurring between domestic law enforcement and overseas military operations.

“The real danger in allowing practices like Guantánamo or Abu Ghraib is the fact that they always creep into other aspects,” Siska said.

“They creep into domestic law enforcement, either with weaponry like with the militarization of police, or interrogation practices. That’s how we ended up with a black site in Chicago.”

 

CONTINUE READING…

Secret US spy program targeted Americans’ cellphones


The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.

The technology in the two-foot-square device enables investigators to scoop data from tens of thousands of cellphones in a single flight, collecting their identifying information and general location, these people said.

People with knowledge of the program wouldn’t discuss the frequency or duration of such flights, but said they take place on a regular basis.

A Justice Department official would neither confirm nor deny the existence of such a program. The official said discussion of such matters would allow criminal suspects or foreign powers to determine U.S. surveillance capabilities. Justice Department agencies comply with federal law, including by seeking court approval, the official said.

The program is the latest example of the extent to which the U.S. is training its surveillance lens inside the U.S. It is similar in approach to the National Security Agency’s program to collect millions of Americans phone records, in that it scoops up large volumes of data in order to find a single person or a handful of people. The U.S. government justified the phone-records collection by arguing it is a minimally invasive way of searching for terrorists.

Click for more from The Wall Street Journal.

Published November 14, 2014

The Wall Street Journal

Casper Leitch: FaceBook is censoring activists


https://fbcdn-profile-a.akamaihd.net/hprofile-ak-prn2/v/t1.0-1/c30.30.369.369/s50x50/47043_511083858956206_398116326_n.jpg?oh=f896645c351f283b2527e68a676eab71&oe=54F5E0FD&__gda__=1424027838_418020e8d77dffc03b7386621cc9aabd  FaceBook is censoring activists – PLEASE visit my profile often and share my links!

April 25, 2013 at 5:11pm

At first, I thought it was just ME.  But, over time I have encountered SEVERAL activists on FaceBook who SUDDENLY get the same WARNING messages from FaceBook that I have been receiving.  It would seem, to those of us who attempt to reach a LARGE number of our friends, that FaceBook is doing EVERYTHING it can to prohibit the  sharing of REAL information.
When FaceBook forced us all to use it’s new TIMELINE FEATURE – it became impossible, at that point, to control who would have access to any thing and EVERY thing that is posted on the profiles of this social site.  If NOTHING ELSE, advertisers get access to our information – and we know that the government (ie. the DEA, FBI, CIA and HomeLand Security) have free access to our profiles and often times are reading our posts.
At that time, I removed ALL personal information from my profile…every bit of it – my private e-addy, my ph numbers, my real age, who my real family members are, date and place of birth information, current address, likes and dislikes, personal photos…every single bit of it and rebuilt my FaceBook personal profile into an electronic magazine focused on ending marijuana prohibition and preserving Freedom.
Members of the FaceBook community embraced my hard work and the number of friends I have quickly swelled to the 5,000 limit allowed by FaceBook.  Even tho I am the host of a global radio program with a listening audience of over 2-million people, I am still allowed to interact with ONLY 5,000 members of my audience on the worlds biggest SOCIAL MEDIA website.
To overcome THAT obstacle I started the ‘TIME 4 HEMP – LIVE’ page that people have liked and now visit for news in the world of hemp/marijuana that is found at: https://www.facebook.com/Time4HempLIVE
On this page, I post information that is MOSTLY about marijuana with a few posts about our loss of Freedoms.  On my profile page I have gone CRAZY and put up posts about marijuana AND A GOOD NUMBER about our loss of Freedoms along with some links to great music.
I have many well informed friends who post fantastic information that I feel needs to be shared with ALL of my other friends….it seems that FaceBook does NOT agree.
When FaceBook first went to TimeLine – several of my friends requested that I tag them in my posts – and I did.  FaceBook blocked me one day from tagging any of my photos because I was "tagging too many people" in them.  I had about 50 friends that liked being tagged in my images because the images would appear on their profiles and the information attached that I was wanting to share could also reach their friends.  As of now, I am allowed to tag only 4 people per image – if I attempt to do more than that, I can then not tag anyone in an image for 30-days.
To overcome THAT obstacle, I began posting images and URL’s onto my profile and then would re-post them onto the profiles of my friends.  FaceBook won’t allow me to re-post the same image or URL now more than 8 times before they start blocking that option.
To overcome THAT obstacle, I attached my Twitter feed to my FaceBook account and began visiting the profile pages of my friends and sharing THEIR information onto my Profile so my friends could review it and….well, wouldn’t you know it….now FaceBook tells me that I am ”over using the SHARE button and need to slow down other wise be blocked from using this feature for 30-days" and if I should attempt to share more than 25 URL’s or images in about an hours time – I am blocked form using the share button – FIRST for 4-hours and if I keep OVER USING THE SHARE BUTTON that day – then I’m am blocked from using it for 30-days.
Now, I just post EVERY THING onto Twitter (and nearly 9,000 people follow the head-lines that I post at: https://twitter.com/time4hemp – check it out!) and have begun using the marijuana social site established by Todd McCormick more and more to interact with my friends.  The link to that is http://www.HEMP.xxx and is free to join AND does NOT limit how you interact with other members.
I have to say – FaceBook is very successful in censoring activists.  In order for any one to discover the information posted on this profile page – it is now COMPLETELY up to my friends to actually come to my profile page each day and review the new links that I have been able to successfully post to find the information and SHARE IT WITH THEIR FRIENDS.
Instead of being able to get a message out to the 5,000 friends that I have like I could when TimeLine FIRST began…..instead of being able to get a message out to the approximate 2,000 friends that I use to reach when TimeLine was just a few months old….instead of being able to get a message out to the approximate 300 friends that I use to reach when TimeLine was just a year old….instead of being able to get a message out to the approximate 150 friends that I use to reach up until this week – I can now reach about 30 people a day.  For every one else interested in the material I post – they MUST take time to visit my profile and then SHARE any information they discover to be of importance.
THIS IS WHY I AM ASKING that my friends visit my profile OFTEN and make it a point to share and re-post the material that you consider to be important. 
PLEASE READ:
The IRS is spying on you through Facebook, Twitter
http://www.bizpacreview.com/2013/04/08/irs-spying-on-you-through-facebook-twitter-60352
Does Facebook spy on you, even after you’re logged out?
http://www.spywarewarrior.org/newsflash/does-facebook-spy-on-you-even-after-youre-logged-out.html
The Government is Spying On You Through Facebook Right…Now
http://singularityhub.com/2011/05/18/the-government-is-spying-on-you-through-facebook-right-now/
Facebook’s Spying On You For a Good Cause
http://motherboard.vice.com/blog/facebook-s-reading-your-messages-but-it-s-for-a-good-cause#ixzz2RVe1aNki
The FBI Is Spying On You: On Facebook, Twitter & Myspace
http://www.thisis50.com/profiles/blogs/the-fbi-is-spying-on-you-on
Many people watch you every move on Facebook
http://ca.finance.yahoo.com/news/whos-watching-facebook-213557740.html

CASPER LEITCH ON FACEBOOK

DEA agent sued over Facebook decoy page


DEA agent sued over Facebook decoy page

This image obtained by The Associated Press shows a Facebook page for "Sondra Prince." The Justice Department said Tuesday it is reviewing a woman’s complaint that a Drug Enforcement Administration agent set up a fake Facebook account using her identity. AP

 

WASHINGTON – The Drug Enforcement Administration set up a fake Facebook account using photographs and other personal information it took from the cellphone of a New York woman arrested in a cocaine case, to trick her friends and associates into revealing incriminating drug secrets.

The Justice Department initially defended the practice in court filings but now says it is reviewing whether the Facebook guise went too far.

Sondra Arquiett’s Facebook account looked as real as any other. It included photos of her posing on the hood of a sleek BMW and a close-up with her young son and niece. She even appeared to write that she missed her boyfriend, who was identified by his nickname.

But it wasn’t her. The account was the work of DEA Agent Timothy Sinnigen, Arquiett said in a federal lawsuit. The case is scheduled for trial next week in Albany, New York.

Justice Department spokesman Brian Fallon said in a statement Tuesday that officials are reviewing both the incident and the practice, although in court papers filed earlier in the case, the federal government defended it. Fallon declined to comment further because the case is pending.

Details of the case were first reported by the online news site Buzzfeed.

Arquiett was arrested in July 2010 on charges of possession with intent to distribute cocaine. She was accused of being part of a drug distribution ring run by her boyfriend, who had been previously indicted.

In a court filing in August, the Justice Department contended that while Arquiett didn’t directly authorize Sinnigen to create the fake account, she "implicitly consented by granting access to the information stored in her cellphone and by consenting to the use of that information to aid in … ongoing criminal investigations."

The government also contended that the Facebook account was not public. A reporter was able to access it early Tuesday, though it was later disabled.

A spokesman for Facebook declined Tuesday to comment on the legal dispute. Facebook’s own policies appear to prohibit the practice, telling users that "You will not provide any false personal information on Facebook, or create an account for anyone other than yourself without permission."

Lawyers for Arquiett did not immediately respond to email and telephone messages from The Associated Press. Arquiett did not immediately respond to an email asking to discuss the case.

Arquiett said in her filing that she suffered "fear and great emotional distress" and was endangered because the fake page gave the impression that she was cooperating with Sinnigen’s investigation as he interacted online with "dangerous individuals he was investigating."

The fate of Arquiett’s fight against the government’s use of her identity online is unclear.

A staff attorney at the Electronic Frontier Foundation – a civil liberties organization – Nate Cardozo, said the government’s rationale was "laughable."

"If I’m cooperating with law enforcement, and law enforcement says, ‘Can I search your phone?’ and I hand it over to them, my expectation is that they will search the phone for evidence of a crime – not that they will take things that are not evidence off my phone and use it in another context," Cardozo said,

Lawrence Friedman, a privacy and constitutional law professor at New England Law-Boston, a law school, said the Arquiett’s "privacy claim rises and falls on the extent to which she consented to what it is the government says she consented to."

If Arquiett agreed to cooperate with an ongoing investigation and allow her phone to be used as part of that probe – as the government alleged in its court filing – then it would be harder for her to prove that her privacy rights were violated, Friedman said. If her phone were seized without consent, then she would have an easier claim.

"Basically, when you strike that kind of deal, you kind of have to play by the government’s rules," Friedman said. "This is not the ordinary situation in which the person walking down the street can have their identity stolen by the government," he said. "She was involved in a criminal investigation."

AP

CONTINUE READING…

The US government can brand you a terrorist based on a Facebook post. We can’t let them make up the rules


Innocent people’s lives are being ruined. Why isn’t anyone watching the watchlist?

Arjun Sethi

theguardian.com, Saturday 30 August 2014 09.00 EDT

 

facebook surveillance illustration

Reasonable suspicion is based on a circular logic – people can be watchlisted if they are suspected of being suspected terrorists – that is ultimately backwards, and must be changed. Illustration: Joelle L / Flickr via Creative Commons Illustration: Joelle L / Flickr via Creative Commons

The US government’s web of surveillance is vast and interconnected. Now we know just how opaque, inefficient and discriminatory it can be.

As we were reminded again just this week, you can be pulled into the National Security Agency’s database quietly and quickly, and the consequences can be long and enduring. Through ICREACH, a Google-style search engine created for the intelligence community, the NSA provides data on private communications to 23 government agencies. More than 1,000 analysts had access to that information.

This kind of data sharing, however, isn’t limited to the latest from Edward Snowden’s NSA files. It was confirmed earlier this month that the FBI shares its master watchlist, the Terrorist Screening Database, with at least 22 foreign governments, countless federal agencies, state and local law enforcement, plus private contractors.

The watchlist tracks “known” and “suspected” terrorists and includes both foreigners and Americans. It’s also based on loose standards and secret evidence, which ensnares innocent people. Indeed, the standards are so low that the US government’s guidelines specifically allow for a single, uncorroborated source of information – including a Facebook or Twitter post – to serve as the basis for placing you on its master watchlist.

Of the 680,000 individuals on that FBI master list, roughly 40% have “no recognized terrorist group affiliation”, according to the Intercept. These individuals don’t even have a connection – as the government loosely defines it – to a designated terrorist group, but they are still branded as suspected terrorists.

The absurdities don’t end there. Take Dearborn, Michigan, a city with a population under 100,000 that is known for its large Arab American community – and has more watchlisted residents than any other city in America except New York.

These eye-popping numbers are largely the result of the US government’s use of a loose standard – so-called “reasonable suspicion” – in determining who, exactly, can be watchlisted.

Reasonable suspicion is such a low standard because it requires neither “concrete evidence” nor “irrefutable evidence”. Instead, an official is permitted to consider “reasonable inferences” and “to draw from the facts in light of his/her experience”.

Consider a real world context – actual criminal justice – where an officer needs reasonable suspicion to stop a person in the street and ask him or her a few questions. Courts have controversially held that avoiding eye contact with an officer, traveling alone, and traveling late at night, for example, all amount to reasonable suspicion.

This vague criteria is now being used to label innocent people as terrorism suspects.

Moreover, because the watchlist isn’t limited to known, actual terrorists, an official can watchlist a person if he has reasonable suspicion to believe that the person is a suspected terrorist. It’s a circular logic – individuals can be watchlisted if they are suspected of being suspected terrorists – that is ultimately backwards, and must be changed.

The government’s self-mandated surveillance guidance also includes loopholes that permit watchlisting without even showing reasonable suspicion. For example, non-citizens can be watchlisted for being associated with a watchlisted person – even if their relationship with that person is entirely innocuous. Another catch-all exception allows non-citizens to be watchlisted, so long as a source or tipster describes the person as an “extremist”, a “militant”, or in similar terms, and the “context suggests a nexus to terrorism”. The FBI’s definition of “nexus”, in turn, is far more nebulous than they’re letting on.

Because the watchlist designation process is secret, there’s no way of knowing just how many innocent people are added to the list due to these absurdities and loopholes. And yet, history shows that innocent people are inevitably added to the list and suffer life-altering consequences. Life on the master watchlist can trigger enhanced screening at borders and airports; being on the No Fly List, which is a subset of the larger terrorist watchlist, can prevent airline travel altogether. The watchlist can separate family members for months or years, isolate individuals from friends and associates, and ruin employment prospects.

Being branded a terrorism suspect also has far-reaching privacy implications. The watchlist is widely accessible, and government officials routinely collect the biometric data of watchlisted individuals, including their fingerprints and DNA strands. Law enforcement has likewise been directed to gather any and all available evidence when encountering watchlisted individuals, including receipts, business cards, health information and bank statements.

Watchlisting is an awesome power, and if used, must be exercised prudently and transparently.

The standards for inclusion should be appropriately narrow, the evidence relied upon credible and genuine, and the redress and review procedures consistent with basic constitutional requirements of fairness and due process. Instead, watchlisting is being used arbitrarily under a cloud of secrecy.

A watchlist saturated with innocent people diverts attention from real, genuine threats. A watchlist that disproportionately targets Arab and Muslim Americans or other minorities stigmatizes innocent people and alienates them from law enforcement. A watchlist based on poor standards and secret processes raises major constitutional concerns, including the right to travel freely and not to be deprived of liberty without due process of law.

Indeed, you can’t help but wonder: are you already on the watchlist?

CONTINUE READING…

4-year-old expelled from pre-school for mom’s Facebook post


Originally posted on FOX2now.com:

[van id=”van/ns-acc/2014/08/27/SE-024WE_CNNA-ST1-1000000002435a6c”]

CALLAHAN, FL – A Florida mom says her four-year-old was expelled from his preschool over a message she posted on her personal Facebook page.

Ashley Habat says she and her son will were running late for school. It was picture day at Sonshine Christian Academy

“The administrator of the preschool checking him in she’s like “Well it’s picture day Will are you excited?” and you know he of course just went on to class but I had mentioned that they didn’t give enough notice. And she’s like, “Well we put it in his folder last week.” said Ashley Habat.

So Habat says she took to Facebook, saying she just wanted to vent her frustrations. She also never thought the school would ever see her post.

“They couldn’t see it, it was private to my friends only.” said Ashley Habat.

The post read, “Why is it that every single…

View original 194 more words

Why Potential Marijuana Investors Should Study Wiretapping


Rich Smith       Aug 4th 2014 9:22AM

Once upon a time, AT&T (T) urged its customers to "reach out and touch someone" with a long-distance phone call (which Ma Bell could charge extra for at the time). Those were simpler times.
Today, in our post-9/11 world, if you reach out by phone, you may end up touching more people than you bargain for. And those people may have guns, badges and court-approved wiretap warrants.

Top States for Wiretapping
This is especially true in Nevada, Colorado, California and New York. A recent report by the Administrative Office of U.S. Courts said these four states issue the majority of wiretap authorizations in America (measured proportionate to their populations):

  • Nevada authorized 38.2 wiretap authorizations per 500,000 residents
  • Colorado authorized 12.4 per 500,000
  • California authorized 11.7 per 500,000
  • And New York State authorized 10.7 per 500,000

Rounding out the top 10 states for state-sanctioned wiretapping are Arizona, Georgia, Kentucky, Maine, Missouri and New Jersey — in that order. In each state, state and federal law enforcement sought and received authorizations to conduct more than six wiretaps per 500,000 residents. (In case you were wondering, that office points out that it is not authorized to collect and report data on NSA wiretaps regulated by the Foreign Intelligence Surveillance Act of 1978).
According to Pew Research, which analyzed the report, 90 percent of the wiretaps authorized in 2013 were authorized to investigate "criminal drug-related offenses."
The 3,576 total wiretaps authorized resulted in 3,744 arrests (more than the number of wiretaps authorized). But the conviction rate from these wiretaps was less than 19 percent — just 709 convictions. (Curiously, AO also notes that in all of 2013, only one application for a wiretap was turned down.)
If that sounds bad, it is. According to a 2010 annual statistical report filed by the Justice Department’s Executive Office for United States Attorneys, the average conviction rate in the federal criminal judicial system for that year was 93 percent.

What It Means to Investors
But we digress. To find out how all of this may be relevant to investors, let’s return to the 90 percent figure. You’ll notice that while Nevada is the No. 1 state for wiretapping, No. 2 is Colorado — a state which in January decriminalized the recreational use of marijuana.
Now, there’s been a lot of talk lately about the opportunities that marijuana legalization — first in Colorado, and more recently in Washington state — might offer for investors. Over the past year, shares of GW Pharmaceuticals (GWPH) have risen more than eight times, and microcap Advanced Cannabis Solutions (CANN) have more than tripled in value. Small cap Medical Marijuana (MJNA) has risen 50 percent.
Still, the fact remains that even if individual states are beginning to move toward legalization, the federal government and its Drug Enforcement Administrationstill consider marijuana an illegal drug, period. Until this changes, the fear of federal prosecution of a state-legal drug therefore still hangs over this industry.
Reading the Tea Leaves at the DEA
What will be our first clue that the DEA has begun backing off enforcement of drug laws in places like Colorado, where the state strictures are loosening? It could be this AO report we’ve been talking about up above. Let’s quickly run back down the list of what we know:

  • Colorado is one of the states most active in issuing state and federal wiretap authorizations.
  • Nine out of 10 such wiretaps concern drug offenses.
  • Colorado no longer finds marijuana as offensive as it used to.

It will be interesting to watch what happens to Colorado’s rank on the list of most frequent wiretappers when the AO issues its report on 2014 wiretap authorizations next summer. If Colorado falls a lot from No. 2, this could mean that law enforcement has decided to back off from prosecuting (at least marijuana-related) drug offenses in the state.
Such a development would bode well for marijuana stocks as more and more states vote to legalize, suggesting the DEA will bow to local interpretations of the drug laws.
If, on the other hand, Colorado continues to rank highly in the wiretap ratings — look out. That will be our first clue that the heat is still on.

Motley Fool contributor Rich Smith has no position in any stocks mentioned. The Motley Fool has no position in any of the stocks mentioned either.

CONTINUE READING…

Top Stock: Facebook Inc (NASDAQ FB) May Be Tracking Your Cell Conversations


Social Networking Giant, Facebook (NASDAQ FB) may well be tracking all your talks. And this might even be happening when the messenger App is apparently off. As the government spy apparatus can monitor cell phone conversations even when the cell is off – and the battery can’t be removed. This raises further questions about Privacy control from Facebook.

This follows a report on Fox News notes that the Federal Bureau of Investigations can track cell phone conversations even when the phone is turned off. Fox News reports that FBI officials say they use the method to track critical “mafia” conversations.

The answer, notes Fox News host Shepherd Smith, is to take the battery out of your cell phone. One element the report didn’t mention, oddly, is that on most modern cell phones it is now impossible to remove the battery. In other words a powerful spy tool has been created so the NSA and other government agencies can in some cases illegally track your every movement and monitor your every conversation and — it can’t be turned off.

 

Facebook Inc: Facebook Privacy Issues

This comes on top of reports that Facebook (NASDAQ FB) may be tracking your cell phone conversations. Facebook terms and conditions required to accept to install the Facebook Messenger application now say Facebook may turn on your microphone without your permission, take pictures and videos. This information can be passed to the US government, which is working to various degrees with different firms.

According to reports, Twitter is fighting government spying on its users, while Facebook seems to take a more cooperative response. A Facebook spokesperson did not comment. Many in the media continue to overlook the growing intrusive and illegal nature of government. For instance, the most significant issue in modern press era is the Edward Snowden defections. Recent revelations that the CIA spied on the US Senate are a critical piece to explaining why Snowden’s revelations are important – the misuse of excessive spying capabilities – most of the real issues seldom receive attention.

 

CONTINUE READING…

I RECEIVED THIS AS A COMMENT ON THE KY BLOG FROM SOMEONE NAMED "J" WHO SHALL REMAIN ANONYMOUS HERE:


I RECEIVED THIS AS A COMMENT ON THE KY BLOG FROM SOMEONE NAMED "J" WHO SHALL REMAIN ANONYMOUS HERE:

HERE IS THE LINK TO THE ARTICLE ON THE BLOG   http://usmjparty.wordpress.com/2014/07/01/facebook-totally-screwed-with-a-bunch-of-people-in-the-name-of-science/

BELOW IS HIS REPLY TO IT:

http://usmjparty.wordpress.com/2014/07/01/facebook-totally-screwed-with-a-bunch-of-people-in-the-name-of-science/#comments

J 4h

The State of Unclassified and Commercial Technology Capable of Some Electronic Mind Control Effects

Eleanor White, P.Eng. April 4, 2000 http://www.raven1.net/uncom.htm ..or.. http://www.bestnet.org/~raven1/uncom.htm

To help the reader appreciate the importance of this matter…

“We need a program of psychosurgery and political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated.  “The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective.

“Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday armies and generals will be controlled by electrical stimulation of the brain.”

Dr. Jose Delgado (MKULTRA experimenter who demonstrated a radio- controlled bull on CNN in1985) Director of Neuropsychiatry, Yale University Medical School

Congressional Record No. 26, Vol. 118, February 24, 1974

Monkeys in restraint, wires coming out of top of skull, left image “normal”, right image with electric current being fed into the monkey’s brain – note pupil sizes and clenched teeth! These images portray Dr. Delgado’s ruthless disregard for life, pain, and suffering!

CONTENTS

This document is organized so that a narrative article appears at the top, followed by appendices.

– BLACK = NARRATIVE ARTICLE

– BLUE = APPENDICES

I. LIMITATIONS… 3

II. INTRODUCTION…3

III. III. MIND CONTROL EFFECTS…4

IV. IV. MAJOR TECHNOLOGY CLASSES… 9

V. V. PULSED MICROWAVE……12

VI. VI. ULTRASOUND AND VOICE-FM… 15

VII. VII. THROUGH-WALL RADAR…19

VIII. VIII. THOUGHT READING…21

IX. IX. IMPLANTS…23

X. CONCLUSION… 25

XI. APPENDICES…27

PM1…..THE LIDA MACHINE……28

PM2…..DR. ALLAN FREY’S PAPER…… 32

PM3…..NASA ARTICLE…… 43

PM4…..SCIENCE & ENGINEERING ASSOCIATES/KOHN’S PROJECTS… 46

PM5…..BIOLOGICAL AMPLIFICATION (OF EM SIGNALS)…48

PM6…..DR. DON R. JUSTESEN’S REPORT: 1974 VOICE TO SKULL SUCCESS……. 52

PM7…..U.S. GOVT DOCUMENT RE: RUSSIAN MIND CONTROL… 54

PM8…..OAK RIDGE LABS AND OTHER BULLETINS…58

US1…..SILENT SOUND, BRITISH ITV & NEXUS MAGAZINE… 64

US2…..U/SONIC MIND CONTROL COMMON, UNCLASSIFIED, MENSA EDITOR FINDS… 76

US3…..U/SONIC U.S. ARMY WEAPONS DEVELOPMENT PROJECT…… 87

US4….SILENT HYPNOSIS, VOICE-FM COMMERCIAL METHOD… 88

US5….”ACOUSTIC SPOTLIGHT”, CAN TARGET ONE PERSON IN CROWD… 92

TWR1…THE LADS DEVICE…100

TWR2…THE RADAR FLASHLIGHT…. 102

TWR3…MILLIVISION THRU-CLOTHING/WALL RADAR… 103

TWR4…GROUND [**OR HOME/APT WALL**] PENETRATING RADAR… 104

TR1…COMMERCIALLY AVAILABLE THOUGHT- READING DEVICES… 108

TR2…IMPLANTED RATS CAN CONTROL DEVICES WITH THOUGHT… 112

TR3…..THOUGHT READING BY RADIO SIGNAL…. 114

TR4…..ELECTRONICS SEES WHAT A CAT SEES… 117

TR5….MIND SWITCH – THINK APPLIANCES ON, OFF, OR ADJUST… 120

IMP1….PROMOTION OF HUMAN IMPLANTATION  BY NIH… 123

IMP2….ITALIAN DOCTOR REPORTS HUMAN IMPLANTATION… 126

IMP3….IMPLANT TRANSMITS PHYSIO- AND PSYCHO- PARAMETERS BY RADIO… 127

IMP4….DR JOSE DELGADO’S “STIMOCEIVER”/HUMAN IMPLANT EXPERIMENTS…… 130

IMP5….UNCLASSIFIED SATELLITE TRACKING HUMAN IMPLANT SYSTEM…. 134

PS……POSTSCRIPT…136

I. LIMITATIONS

The author acknowledges that this article falls short of a rigorous academic paper. This is explained by the fact that all involuntary neuro-electromagnetic experimentees are kept in a sort of “barely alive” condition, with significant health problems, and either unable to work or just barely able to hold a job with limited earning potential. Furthermore, since the perpetrators constantly work to prevent the public from knowing anything about electronic mind control, evidence is obtainable with great difficulty, and often the only evidence is of lower quality than would be accepted for a scientific treatise. In short, everything in this article represents a struggle against immense odds. We ask readers to understand this and hope that those who are not under electronic attack and surveillance will try through independent channels to find better quality proof.

II. INTRODUCTION

Electronic mind control technology had its start in the 1950s, as an obscure branch of the CIA’s MKULTRA project group. Just as organized crime is not stopped by hearings and court cases, neither did this originally obscure branch of MKULTRA activity, when the institutional/ drug/child abuse phases were exposed by the U.S.

Senate’s Church- Inouye hearings in the late 1970s. No criminal proceedings followed, and only two civil law suits (Orlikow and Bonacci) have succeeded. This assembly of unclassified and commercial literature is to show investigators and concerned citizens that in spite of the tightest possible information blackout imposed in the early 1970s, enough of the classified mind control technology has leaked out to show that significant classified accomplishments are overwhelmingly likely, and in need of disclosure, here at the end of the 20th century. It is hoped that government and media, who have shied away from this topic for decades, preferring the warm fuzzy feelings that “this can’t be true”, will read about the unclassified and commercial devices and understand the implications of continued turning the other way.

III. MIND CONTROL EFFECTS

Since government-backed electronic mind control is classified at the highest levels in all technologically capable governments, the description of effects is taken from the personal experiences of over 300 known involuntary experimentees. The experimentees without exception report that once the “testing” begins, the classified experiment specification apparently requires that the “testing” be continued for life. Many are young seniors, some in their 70s and 80s. Some have children and the children are often subjected to the same “testing” as their parent(s). The effects pattern: 

This article is about unclassified/commercial technologies which can produce some of the effects of the classified equipment, not testimonials, but this much has become clear over time: – All “testing” consists of unique, carefully engineered-unprovable events to produce psychological stress in the victim. There are no events which do not fit that apparent purpose. – In every series of stress event type, ONE introductory event of very high energy/effect is staged. The obvious purpose is to be certain the victim KNOWS this is external harassment, and not just “bad luck”. From that time forward, the experimenters appear to apply “Pavlovian training” so that they can get the victim to “jump” (or react in some way) to the same effect at a tiny fraction of the initial “introductory” event. – This type of testing started during the Cold War, and shows every characteristic of being for military and intelligence psychological warfare purposes. 

This type of testing all points to CONTROL of the test subject. Endlessly repeated words generated inescapably within the skull are just one hypnosis-like experience. Given that CONTROL is the likely ultimate purpose, INVOLUNTARY test subjects become a necessity. Thus, the phenomenon of people apparently being chosen at random for this “work”. – Given a requirement for INVOLUNTARY test subjects, the ONLY group with the necessary funds and legal powers is GOVERNMENT. Private contractors are no doubt the main perpetrators to keep the “work” well covered, but without secret complicity of GOVERNMENT, this expensive, extensive, and illegal atrocity simply could not happen.

The effect types categorized:

Here is a list of most of the common effects. It is not exhaustive, but is intended to show the reader how the perpetrators’ pallette of stress effects is broken down. Indent levels are used to show categories and sub-categories:

1. Invasive At-a-Distance Body Effects (including mind)

a. Sleep deprivation and fatigue

i. Silent but instantaneous application of “electronic caffeine” signal, forces awake and keeps awake

ii. Loud noise from neighbours, usually synchronized to attempts to fall asleep 

iii.Precision-to-the-second “allowed sleep” and “forced awakening”; far too precise and repeated to be natural iv. Daytime “fatigue attacks”, can force the victim to sleep and/or weaken the muscles to the point of collapse 

b. Audible Voice to Skull (V2S)

i. Delivered by apparent at a distance radio signal

ii. Made to appear as emanating from thin air

iii.Voices or sound effects only the victim can hear

c. Inaudible Voice to Skull (Silent Sound)

i. Delivered by apparent at a distance radio signal; manifested by sudden urges to do something/go somewhere you would not otherwise want to; silent (ultrasonic) hypnosis presumed

ii. Programming hypnotic “triggers” – i.e. specific phrases or other cues which cause specific involuntary actions

d. Violent muscle triggering (flailing of limbs)

i. Leg or arm jerks to violently force awake and keep awake

ii. Whole body jerks, as if body had been hit by large jolt of electricity

iii.Violent shaking of body; seemingly as if on a vibrating surface but where surface is in reality not vibrating

e. Precision manipulation of body parts (slow, specific purpose)

i. Manipulation of hands, forced to synchronize with closed-eyes but FULLY AWAKE vision of previous day; very powerful and coercive, not a dream

ii. Slow bending almost 90 degrees BACKWARDS of one toe at a time or one finger at a time

iii. Direct at-a-distance control of breathing and vocal cords; including involuntary speech

iv. Spot blanking of memory, long and short term

f. Reading said-silently-to-self thoughts

i. Engineered skits where your thoughts are spoken to you by strangers on street or events requiring knowledge of what you were thinking

ii. Real time reading subvocalized words, as while the victim reads a book, and BROADCASTING those words to nearby people who form an amazed audience around the victim

g. Direct application of pain to body parts

i. Hot-needles-deep-in-flesh sensation

ii. Electric shocks (no wires whatsoever applied)

iii.Powerful and unquenchable itching, often applied precisely when victim attempts to do something to expose this “work”

iv. “Artificial fever”, sudden, no illness present

v. Sudden racing heartbeat, relaxed situation

h. Surveillance and tracking

i. Thru wall radar and rapping under your feet as you move about your apartment, on ceiling of apartment below

ii. Thru wall radar used to monitor starting and stopping of your urination – water below turned on and off in sync with your urine stream

iii. Loud, raucous artificial bird calls everywhere the victim goes, even into the wilderness

2. Invasive Physical Effects at a Distance, non-body

a. Stoppage of power to appliances (temporary, breaker ON)

b. Manipulation of appliance settings

c. Temporary failures that “fix themselves”

d. Flinging of objects, including non-metallic

e. Precision manipulation of switches and controls

f. Forced, obviously premature failure of appliance or parts

3. External Stress-Generating “Skits”

a. Participation of strangers, neighbours, and in some cases close friends and family members in harassment

i. Rudeness for no cause

ii. Tradesmen always have “problems”, block your car, etc.

iii. Purchases delayed, spoiled, or lost at a high rate

iv. Unusually loud music, noise, far beyond normal

b. Break-ins/sabotage at home

i. Shredding of clothing

ii. Destruction of furniture

iii. Petty theft

iv. Engineered failures of utilities

c. Sabotage at work

i. Repetitive damage to furniture

ii. Deletion/corruption of computer files

iii. Planting viruses which could not have come from your computer usage pattern

iv. Delivered goods delayed, spoiled, or lost at a high rate

v. Spreading of rumors, sabotage to your working reputation

vi. Direct sabotage and theft of completed work; tradesmen often involved and showing obvious pleasure Illustration of the bodily effects

IV. MAJOR TECHNOLOGY CLASSES

These technology classes are for the UNclassified and commercial equipment which can emulate the “real” classified mind control equipment. Effect section 2, “Invasive Physical Effects at-a-Distance”, clearly establishes the existence of remote precision manipulation of objects which is far beyond the capabilities of unclassified and commercial equipment at the time of writing.

REMOTE PHYSICAL MANIPULATION is not covered in this article, but the reader should know that both NASA and IEEE have noted successes in creating very small antigravity effects (which are not due to simple magnetism.)

TRANSMISSION METHODS FOR NEURO- EFFECTIVE SIGNALS:

– Pulsed microwave (i.e. like radar signals)

– ultrasound and voice-FM (transmitted through the air) While transmission of speech, dating from the early 1970s, was the first use of pulsed microwave, neuro- effective signals can now cause many other nerve groups to become remotely actuated. At time of writing, that technology appears to be classified.

PAVLOVIAN HYPNOTIC TRIGGERS:

A [Pavlovian] hypnotic trigger is a phrase or any other sensory cue which the victim is programmed to involuntarily act on in a certain way. The 50s-70s MKULTRA survivors can still be triggered from programming done decades ago. A name “Manchurian candidate”, from a novel by John Marks, is used to describe a person who carries Pavlovian triggers. One of the main goals of the institutional/drug/child abuse phases of the CIA MKULTRA atrocities (1950′s through 1970′s) was to implant triggers using a “twilight state” (half-conscious) medication and tape recorded hypnosis. The ultimate goal was to have the acting out of Pavlovian triggers erased from the victim’s memory. Using one of the two transmission methods above, these triggers are now planted using either of the above two transmission methods, but with the words moved up just above (or near the top of) the audible frequency range. The result is that hypnotic triggers are planted without the subject being aware. This technology was used in the Gulf War and has a name: “Silent Sound”

THROUGH-WALL SURVEILLANCE METHODS:

So-called “millimeter wave” scanning. This method uses the very top end of the microwave radio signal spectrum just below infra-red. To view small objects or people clearly, the highest frequency that will penetrate non- conductive or poorly- conductive walls is used. Millimeter wave scanning radar can be used in two modes:

– Passive (no signal radiated, uses background radiation already in the area to be scanned, totally UNdetectable)

– Active (low power millimeter wave “flashlight” attached to the scanner just as a conventional light mounted on a camcorder), or, the use of archaeological ground penetrating radar

THOUGHT READING:

Thought reading can be classed as a “through wall surveillance” technology. Thought reading, in the unclassified/commercial realm, can be broken down as follows:

– Thru-skull microwave reading

– Magnetic skull-proximity reading

BRAIN ENTRAINMENT:

The reverse of biofeedback. Those low frequency electrical brain rhythms which are characteristics of various moods and states of sleep can not only be read out using biofeedback equipment or EEG machines, but using radio, sound, contact electrodes, or flashing lights, the moods and sleep states can be generated or at least encouraged using brain entrainment devices. Brain entrainment signals cannot carry voice, which is a much higher frequency range. Brain entrainment can, however, be used to “set up” a target to make him/her more susceptible to hypnosis. These major technology classes can produce some of the observed mind control effects, FROM HIDING AND UNDETECTABLY, with the exception of remote physical manipulation. IMPLANTATION is sometimes used to assist the above technologies but with current devices, implants are no longer required. Diagram showing the overall method, based entirely on unclassified 1974 technology, of how SILENT hypnosis may be transmitted to a target without the target’s being aware. This technique is probably the most insidious, because it allows months and years of programming and Pavlovian trigger-setting, while the target cannot resist.

V. PULSED MICROWAVE

Pulsed microwave voice-to-skull (or other-sound-to-skull) transmission was discovered during World War II by radar technicians who found they could hear the buzz of the train of pulses being transmitted by radar equipment they were working on. This phenomenon has been studied extensively by Dr. Allan Frey, whose work has been published in a number of reference books. What Dr. Frey found was that single pulses of microwave could be heard by some people as “pops” or “clicks”, while a train of uniform pulses could be heard as a buzz, without benefit of any type of receiver. Dr. Frey also found that a wide range of frequencies, as low as 125 MHz (well below microwave) worked for some combination of pulse power and pulse width. Detailed unclassified studies mapped out those frequencies and pulse characteristics which are optimum for generation of “microwave hearing”. Very significantly, when discussing electronic mind control, is the fact that the PEAK PULSE POWER required is modest – something like 0.3 watts per square centimeter of skull surface, and this power level is only applied for a very small percentage of each pulse’s cycle time. 0.3 watts/sq cm is about what you get under a 250 watt heat lamp at a distance of one meter. It is not a lot of power. When you take into account that the pulse train is OFF (no signal) for most of each cycle, the average power is so low as to be nearly undetectable. Frequencies that act as voice-to-skull carriers are not single frequencies, as, for example TV or cell phone channels are. Each sensitive frequency is actually a range or “band” of frequencies. A technology used to reduce both interference and detection is called “spread spectrum”. Spread spectrum signals have the carrier frequency “hop” around within a specified band. Unless a receiver “knows” the hop schedule in advance, there is virtually no chance of receiving or detecting a coherent readable signal. Spectrum analyzers, used for detection, are receivers with a screen. A spread spectrum signal received on a spectrum analyzer appears as just more “static” or noise. My organization was delighted to find the actual method of the first successful UNclassified voice to skull experiment in1974, by Dr. Joseph C. Sharp, then at the Walter Reed Army Institute of Research. 

Dr. Sharp’s basic method is shown in Appendix PM6, below. A Frey- type audible pulse was transmitted every time the voice waveform passed down through the zero axis, a technique easily duplicated by

ham radio operators who build their own equipment. A pattern seems to be repeated where researchwhich could be used for mind control starts working, the UNclassified researchers lose funding,and in some cases their notes have been confiscated, and no further information on that research track is heard in the unclassified press. Pulsed microwave voice-to-skull research is one such track. 

Illustration showing the principle behind pulsed microwave voice-to-skull

Appended articles:

PM1 http://www.raven1.net/lida.htm, photo and description of the Korean War LIDA machine, a radio frequency

BRAIN ENTRAINMENT

device developed by Soviet Russia and used in the Korean War onallied prisoners of war. BRAIN ENTRAINMENT IS INCLUDED IN THE RADIO FREQUENCY SECTION BECAUSE THE MOST INSIDIOUS METHOD OF BRAIN ENTRAINMENT IS SILENTLY, USING RADIO SIGNALS.

PM2 http://www.raven1.net/frey.htm , Human Auditory System Response

To Modulated Electromagnetic Energy, Allan H. Frey, General Electric Advanced Electronics Center, Cornell University, Ithaca, New York

PM3 http://www.raven1.net/v2s-nasa.htm , NASA technical report abstract stating that speech-to-skull is feasible 

PM4 http://www.raven1.net/v2s-kohn.htm , DOD/EPA small business initiative (SBIR) project to study the UNclassified use of voice-to- skull technology for military uses. (The recipient, Science and Engin- eering Associates, Albuquerque NM, would not provide me details on the telephone)

PM5 http://www.raven1.net/bioamp.htm , Excerpts,

Proceedings of Joint Symposium on Interactions of Electromagnetic Waves with Biological Systems, 22nd General Assembly of the International Union of Radio Science, Aug 25 – Sep 2, 1987, Tel Aviv, Israel SHOWS BIOLOGICAL AMPLIFICATION OF EM SIGNALS, pointing to relative ease with which neuro-electromagnetic signals can trigger effects

PM6 http://www.raven1.net/v2succes.htm , Excerpt,

Dr. Don R. Justesen, neuropsychological researcher, describes Dr. Joseph C. Sharp’s successful transmission of WORDS via a pulse-rate- modulated microwave transmitter of the Frey type.

PM7 http://www.raven1.net/russ.htm , FOIA article circulated among U.S. agencies describing the Russian TV program “Man and Law”, which gives a glimpse into the Russian mind control efforts.

(Dr. Igor Smirnov, a major player, was used as a consultant to the FBI at the Waco Branch Davidian standoff.)

VI. ULTRASOUND AND VOICE-FM

Ultrasound is vibration of the air, a liquid, or a solid, above the upper limit of human hearing which is roughly 15,000 Hz in adults. Voice-FM uses a tone at or near that upper limit, and the speaker’s voice VARIES the frequency slightly. Either a “tinnitus-like sound” or nothing is heard by the target. Ultrasound/voice-FM can be transmitted in these ways:

– Directly through the air using “air type transducers”

– Directly to the brain using a modulated microwave pulse train

– Through the air by piggybacking an ultrasound message on top of commercial radio or television

The use of commercial radio or television requires that the input signal at the transmitter be relatively powerful, since radio and TV receivers are not designed to pass on ultrasound messages. However, the average radio and TV receiver does not simply stop ultrasound, rather, the ability to pass ultrasound messages “rolls off”, i.e. degrades, as the frequency is increased. Today’s radios and TVs can carry enough ultrasound messaging to be “heard” by the human brain (though not the ear) to be effective in conveying hypnosis. This was proven by the U.S. military forces in the Gulf War.

Ultrasounds (and voice-FM’s) main advantage in mind control work is that it can carry VERBAL hypnosis, more potent than simple biorhythm entrainment. The brain CAN “hear” and understand this “inaudible voice”, while the ear cannot. Once you can convey hypnotic suggestion which cannot be consciously heard, you have eliminated a major barrier to the subject’s acceptance of the words being transmitted. In previous decades, “subliminal advertising” using voice and images at normal frequencies were “time sliced” into an apparently normal radio or TV broadcast. This apparently did not work well, and now voice-FM “subliminal learning tapes” commercially available have superseded the time slice method. Illustration showing the operation of “silent sound” with the human hearing system, using near-ultrasound, FREQUENCY MODULATED voice One method for projecting either audible voice or voice-FM over long distances, virtually undectable if line of sight, is the “acoustic heterodyne” or “HyperSonic Sound” system, patented by American Technologies Corporation, San Diego CA, http://www.atcsd.com Illustration showing the principle of an ultrasound projection system capable of true ventriloquism at a distance, by American Technologies Corporation (licensor), Akai Japan (licensee)

Appended articles:

US1 http://www.raven1.net/silsoun2.htm , ITV Silent Sound report with comments by Judy Wall, Editor, Resonance, newsletter of MENSA’s bioelectromagnetic special interest group.

US2 http://www.raven1.net/commsolo.htm , an article by Judy Wall outlining instances of UNclassified, openly-admitted- to, electronic mind control operations by government agencies.

US3 http://www.raven1.net/armyparw.htm , an SBIR (small business initiative contract) which clearly shows intent to use ultrasound as an anti-personnel weapon, including one-man portability and with power to kill.

US4 http://www.raven1.net/ssnz.htm , a commercial New Zealand company, Altered States Ltd., sells tapes which perform “suggestions” (i.e. hypnosis but not called such) using the Lowery patent voice-FM method, to hypnotize without the subject being aware. This is a key feature of neuro-electromagnetic involuntary experiments.

US5 http://www.raven1.net/acouspot.htm , a page originally from the MIT Media Lab’s acoustic engineer, Joseph Pompeii. Describes a similar technique under commercial and military development (American Technologies Corp., San Diego) under the trade name “Hypersonic Sound”. Shows that sound can be focused to the extent of targeting just one person in a crowd, acoustically, using ultrasound.

VII. THROUGH-WALL RADAR

When “millimeter wave” microwave signals are received, the waves are so small that they can display a two-dimensional outline of an object. Lower frequency radar can only show a “blip” which indicates an object’s presence or motion, but not its outline. A millimeter wave dish acts as a camera lens to focus incoming millimeter wave signals on to a plate with a two-dimensional array of elements sensitive to millimeter wave frequencies, in exactly the same way a camera focusses light on to a piece of film. Each of the sensitive elements is scanned in a definite order, just as with a TV camera and screen, and a picture showing the outline of an object is formed. If no signal is sent out by the scanner, it is called “passive” millimeter wave radar. If the subject is illuminated by a separate source of millimeter wave signals, it is an “active” scanner. Since passive systems can penetrate clothing and non-conductive walls UNDETECTABLY, it is obvious that with just a small millimeter wave “flashlight”, non-conductive walls can be scanned through and still very little detectable signal is present. Millimeter wave through-clothing, through-luggage is currently in use at airports. In addition to mind control experimental observation, millimeter wave scanners are ideal for stalkers and voyeurs, since the subject is portrayed in the nude. Millimeter wave scanners can be purchased from Millivision Corp., Northampton MA, info at http://www.millivision.com

Appended articles:

TWR1 http://www.raven1.net/lads.htm , LADS, Life Assessment Detector System, a product of VSE Corporation, can scan through more than a hundred feet of non-conductive or poorly- conductive material to detect a beating human heart

TWR2 http://www.raven1.net/nij_p44.htm , Prototype version of the “radar flashlight”, which is a more portable version of the LADS system above. Can also be used to illuminate a subject for use with a Millivision thru-clothing/thru-nonconductive wall scanner 

TWR3 http://www.raven1.net/millitec.htm , October 1995 blurb from Popular Mechanics, with photos showing hidden guns used for demo purposes (Millitech sold the rights to Millivision) 

TWR4 http://www.raven1.net/ptscradr.htm , March 22 text taken from Patriot Scientific Corporation’s web site, their ground-penetrating radar section. Patriot’s GPR overcomes the limitation of the Millivision passive radar, i.e. inability to penetrate partially conductive walls. 

VIII. THOUGHT READING

“Thought reading” appears to be one of the EASIER components of electronic mind control, given that commercial and unclassified thought reading devices are available and being actively developed. Thought reading is an enhanced version of computer speech recognition, with EEG waves being substituted for sound waves. The easiest “thought” reading is actually remote picking up of the electro- magnetic activity of the speech-control muscles. When we “say words to ourselves, silently”, or, read a book, we can actually FEEL the slight sensations of those words in our vocal muscles – all that is absent is the passage of air. Coordinated speech signals are relatively strong and relatively consistent. The other kind of “thought reading”, i.e. “MINING” someone’s brain for information from a distance is SPECULATIVE. We targetted individuals have no way to verify that is happening, however, we do know that we are “fed” hypnotic signals to force consistent “neutral” content (but of different character than prior to becoming test subjects,) DREAMS. These forced, neutral content (“bland” content) dreams occur every single night and may represent the experimenters’ efforts to have our experiences portray themselves in such dreams, in effect, MINING our experiences. Again, this is SPECULATION, but it seems very logical. 

Appendix TR4, referenced below, confirms the ability of current unclassified technology to actually see what a living animal sees, electronically. It is therefore extremely likely that these forced dreams can be displayed on the experimenters’ screens in an adjacent apartment or adjacent house, (which are made obvious to the involuntary experimentee.) Finally, among the 300 known neuro-electromagnetic experimentees, we often have strangers either tell us what we are thinking, say they can pick up our broadcast thoughts, or tell us about events inside our homes at times when they could not have seen from the outside. BUGS are not used, and they have been searched for.

Appended articles:

TR1 http://www.raven1.net/thotuncl.htm , Commercially available thought-reading devices, both implant-style and non-implant

TR2 http://www.raven1.net/ratrobot.htm , Implanted rats can control devices with their thoughts

TR3 http://www.raven1.net/ebrain.htm , from the July 1973 issue of Popular Electronics, a system to read EEG signals (the stuff of which thought reading is made) at a distance by passing a radio signal through the human head and analyzing the passed-through signal.

TR4 http://www.raven1.net/elecvisn.htm , an article describing electronically reading a cat’s brain waves and constructing a real-time image on screen from the EEG traces 

TR5 http://www.raven1.net/m_switch.htm , the text from a site describing a mind-controlled “switch”, which can not only turn appliances on or off, but also adjust controls like volume.

IX. IMPLANTS

Electronic implants are actually one of the older forms of electronic mind control technology. Implants can either receive instructions via radio signals, passing them to the brain, or, can be interrogated via external radio signals to read brain activity at a distance. Many of the about 300 known involuntary neuro- electromagnetic experimentees do not have implants, but have an aggressive and thorough regimen of mind control effects anyway. IMPLANTS ARE STILL SIGNIFICANT, though, for these reasons:

1. Their use, since World War II and continuing to the present day, associated with MKULTRA atrocities, is a crystal clear indication that a MOTIVE POOL of unethical researchers has existed through the late 1970s. The same people, none jailed, are still working, by and large. The reader can see that the existence of the same motive pool is overwhelmingly likely, given that no social changes have occurred which would prevent that.

2. The fact that to date (autumn 1999) no victim who has had implants removed has ever been able to get custody of the removed implant shows that research programmes using implants are still quite active and obviously quite important to someone. See http://www.morethanconquerors.simplenet.com/MCF/ , the Mind Control Forum for details on involuntary experimentees’ implantation and removal experiences.

3. The use of implants shows that, in the field of involuntary human experimentation, not every perpetrator group has access to the most sophisticated (implant-less) technology. Since implants for beneficial purposes are actively being promoted by NIH, it is obvious they will not disappear any time soon.

Appended articles:

IMP1 http://www.raven1.net/centneur.htm , an article showing that human implantation is being done and even encouraged by the U.S. NIH (National Institutes of Health). While this public information is for the public good, it is a small step to move from publicly known and VOLUNTARY implantation to CONCEALED implantation for INvoluntary and criminal purposes.

IMP2 http://www.raven1.net/italydoc.htm , a testimonial by an Italian psychiatrist who has been assisting involuntary experimentees; this doctor began by assisting [Satanic or other] ritual abuse victims. Apparently involuntary brain implantation is alive and well in Italy, why not elsewhere?

IMP3 http://www.raven1.net/telectro.htm , a project abstract by AF, awarded to perform unclassified research and development of human implants which can read both physio- and PSYCHO- parameters.

IMP4 http://www.raven1.net/stimocvr.htm , an excerpt describing human implantation for purposes of two-way communication with the brain by way of implants and FM VHF radio. Blows away any doubts that human implantation has not been done, and even more, that the U.S. military are involved.

IMP5 http://www.raven1.net/sattrack.htm , describes an unclassified human implant satellite tracking system, ostensibly for benevolent use. (No method for avoiding unethical uses is described.) Applied Digital Solutions, Inc., Palm Beach, Florida. 

X. CONCLUSION

Conclusion? While the documentary evidence in this report does not exactly “prove” we are being targeted by intelligence/defense contractors using classified electronic weapons, it certainly eliminates the argument that such devices are impossible, don’t exist, or that government has “no interest” in them, or that the “were tried years ago but didn’t work”. Add in the experiences of victims of the Tuskegee untreated syphilis experiments, the feeding of radioactive food to uninformed U.S. citizens, and the atrocities perpetrated under the institutional/drug/child abuse phases of the CIA’s MKULTRA programmes, and you have more than enough grounds to petition for an independent, open investigation. No doubt there were citizens of ancient Pompeii who argued that Vesuvius could not possibly erupt in their lifetimes. Faced with all the evidence, no honest government can afford to take the risk that electronic mind control activity may be happening, controlled from their own “back rooms”.

Eleanor White

If any doubts as to the importance of this issue remain, please see below what the U.S. NSA (National Security Agency) says would be the result of releasing information on electronic mind control:

XI. APPENDICES

UP TO THIS PAGE, THIS REPORT HAS BEEN A NARRATIVE AUTHORED BY ELEANOR WHITE. THE APPENDICES ARE A COLLECTION OF THE BEST QUALITY FACTUAL MATERIAL FROM OFFICIAL SOURCES OUTSIDE THE INVOLUNTARY ELECTROMAGNETIC EXPERIMENTEE GROUP. THIS MATERIAL MAY BE INDEPENDENTLY VERIFIED FROM REFERENCES PROVIDED.

APPENDIX PM1 … THE LIDA MACHINE

Associated Press (Exact date not shown on copy but tests took place 1982/83) Loma Linda (Veterans Hospital research unit) San Bernardino County a Soviet device that bombards brains with low- frequency  (Eleanor White’s note: More likely radio frequency )carrier which is modulated or pulsed at brain-entrainment rates] radio waves may be a replacement for tranquilizers and their unwanted side effects, says a researcher, but it’s use on humans poses ethical and political questions. The machine, known as the LIDA, is on loan to the Jerry L. Pettis Memorial Veterans Hospital through a medical exchange program between the Soviet Union and the United States. Hospital researchers have found in changes behaviour in animals. “It looks as though instead of taking a valium when you want to relax yourself it would be possible to achieve a similar result, probably in a safer way, by the use of a radio field that will relax you” said Dr. Ross Adey, chief of research at the hospital. [Missing one line on the photocopy] … manual shows it being used on a human in a clinical setting, Adey said. The manual says it is a “distant pulse treating apparatus” for psychological problems, including sleeplessness, hyper- tension and neurotic disturbances. The device has not been approved for use with humans in this country, although the Russians have done so since at least 1960, Adey Said. Low frequency radio waves simulate the brain’s own electromagnetic current and produce a trance-like state. Adey said he put a cat in a box and turned on the LIDA. “Within a matter of two or three minutes it is sitting there very quietly … it stays almost as though it were transfixed” he said. The hospital’s experiment with the machine has been underway for three months and should be completed within a year, Adey said. Eleanor White’s comments (Dr. Byrd’s statement follows):

1. Heavy “fatigue attacks” are a very common experience among involuntary neuro-electromagnetic experimentees. The LIDA device could, right out of the box, be used as a fatigue attack weapon, FROM HIDING, thru non- or semi-conductive walls. 

2. If the LIDA machine is tuned for tranquilizing effect, then it might also be tuned for “force awake” and other effects too. This device is a psychotronic weapon, AS IS. A TV documentary stated the Russian medical establishment considers this 1950s device obsolete. (Wonder what has taken it’s place?)

Below is a statement from Dr. Eldon Byrd, U.S. psychotronic researcher who funded Dr. Adey’s work with the LIDA machine:

“The LIDA machine was made in the 1950′s by the Soviets. The CIA purchased one through a Canadian front for Dr. Ross Adey, but didn’t give him any funds to evaluate it. “I provided those funds from my project in 1981, and he determined that the LIDA would put rabbits into a stupor at a distance and make cats go into REM. “The Soviets included a picture with the device that showed an entire auditorium full of people asleep with the LIDA on the podium. The LIDA put out an electric field, a magnetic field, light, heat, and sound (of course light and heat are electromagnetic waves, but at a much higher frequency than the low frequencies of the electric and magnetic fields mentioned above). “The purported purpose of the LIDA was for medical treatments; however, the North Koreans used it as a brain washing device during the Korean War. The big question is: what did they do with the technology? It could have been improved and/or made smaller. It is unlikely that they abandoned something that worked. “Direct communication with Ross Adey: While he was testing the LIDA 4, an electrician was walking by and asked him where he got the “North Korean brain washing machine”. Ross told him that is was a Russian medical device. “The guy said he had been brain-washed by a device like that when he was in a POW camp. They placed the vertical plates alongside his head and read questions and answers to him. He said he felt like he was in a dream. Later when the Red Cross came and asked questions, he responded with what had been read to him while under the influence of the device. He said he seemed to have no control over the answers.

“The LIDA is PATENTED IN THE US. Why? They are not sold in the US–the only one I know that exists is the one that was at Loma Linda Medical Center where Adey used to work. Eldon”

**Involuntary neuro-experimentation activist Cheryl Welsh, Davis CA, sent in this clipping from an article by Dr. Ross Adey but without complete bibliographic references: “Soviet investigators have also developed a therapeutic device utilizing low frequency square wave modulation of a radiofrequency field. This instrument known as the Lida was developed by L. Rabichev and his colleagues in Soviet Armenia, and is designed for “the treatment of neuropsychic and somatic disorders, such as neuroses, psychoses, insomnia, hypertension, stammering, bronchia asthma, and asthenic and reactive disturbances”. It is covered by U.S. Patent # 3,773,049. In addition to the pulsed RF field, the device also delivers pulsed light, pulsed sound, and pulsed heat. Each stimulus train can be independently adjusted in intensity and frequency. The radiofrequency field has a nominal carrier frequency of 40 MHz and a maximum output of approximately 40 Watts.

The E- field is applied to the patient on the sides of the neck through two disc electrodes approximately 10 cm in diameter. The electrodes are located at a distance of 2-4 cm from the skin. [Eleanor White’s comment: The fact that Dr. Ross Adey mentioned an "audience" being put to sleep by the LIDA suggests that the "E-field" electrodes may not play an essential role. The radio signal appears to be the primary cause of the sleep/trance effect.] Optimal repetition frequencies are said to lie in the range from 40 to 80 pulses per minute. Pulse duration is typically 0.2 sec. In an 8 year trial period, the instrument was tested on 740 patients, including adults and children. Positive therapeutic effects were claimed in more…”

APPENDIX PM2 – FREY’S PAPER

Human Auditory System Response to Modulated Electromagnetic Energy

ALLAN H. FREY

General Electric Advanced Electronics Center Cornell University Ithaca, New York TRANSCRIPTION, Courtesy of MindNet Archives, Mike Coyle posted at http://www.morethanconquerors.simplenet.com/MCF/

Frey, Allan H., Human Auditory system response to modulated electromagnetic energy. J. Appl. Physiol. 17(4): 689-692. 1962.

(*) Asterisks indicate unreadable characters in the original copy.

NOTE: In 1962, frequencies were expressed as kiloCYCLES, megaCYCLES, etc., with abbreviations being kc, mc

–The intent of this paper is to bring a new phenomena to the attention of physiologists. Using extremely low average power densities of electromagnetic energy, the perception of sounds was induced in normal and deaf humans. The effect was induced several hundred feet from the antenna the instant the transmitter was turned on, and is a function of carrier frequency and modulation. Attempts were made to match the sounds induced by electromagnetic energy and acoustic energy. The closest match occurred when the acoustic amplifier was driven by the rf transmitter’s modulator. Peak power density is a critical factor and, with acoustic noise of approximately 80 db, a peak power density of approximately 275 mw / rf is needed to induce the perception at carrier frequencies 125 mc and 1,310 mc. The average power density can be at rf as low as 400 _u_w/cm2. The evidence for the various positive sites of the electromagnetic energy sensor are discussed and locations peripheral to the cochlea are ruled out.

Received for publication 29 September 1961.

A significant amount of research has been conducted with the effects of radio-frequency (rf) energy on organisms (electro- magnetic energy between 1 kc and ** Gc). Typically, this work has been concerned with determining damage resulting from body temperature increase. The average power densities used have been on the order of 0.1-t w/cm2 used over many minutes to several hours. In contrast, using average power densities measured in microwatts per square centimeter, we have found that ****r effects which are transient, can be induced with rf energy. Further, these effects occur the instant the transmitter is turned on. With appropriate modulation, the perception of different sounds can be induced in physically deaf, as well as normal, in human subjects at a distance of inches up to thousands of feet from the transmitter. With somewhat different transmission parameters, you can induce the perception of severe buffeting of the head, without such apparent vestibular symptoms as dizziness or nausea. Changing transmitter parameters down, one can induce a “pins-and- needles” sensation. Experimental work with these phenomena may yield information on auditory system functioning and, more generally, in the nervous system function. For example, this energy could possibly be used as a tool to explore nervous system coding, possibly using Neider and Neff’s procedures (1), and for stimulating the nervous system without the damage caused by electrodes. Since most of our data have been obtained of the “rf sound” and only the visual system has previously been shown to respond to electromagnetic energy, this paper will be concerned only with the auditory effects data. As a further restriction, only data from human subjects will be reported, since only this data can be discussed meaningfully at the present time. The long series of studies we performed to ascertain that we were dealing with a biological significant phenomena (rather than broadcasts from sources such as loose fillings in the teeth) are summarized in another paper (2), which also reports on the measuring instruments used in this work. The intent of this paper is to bring this new phenomenon to the attention of physiologists. The data reported are intended to suggest numerous lines of experimentation and indicate necessary experimental controls. Since we are dealing with a significant phenomenon, we decided to explore the effects of a wide range of transmitter parameters to build up the body of knowledge which would allow us to generate hypotheses and determine what experimental controls would be necessary. Thus, the numbers given are conservative; they should not be considered precise, since the transmitters were never located in ideal laboratory environments. Within the limits of our measurements, the orientation of the subject in the rf field was of little consequence. Most of the transmitters used to date in the experimentation have been pulse modulated with no information placed on the signal. The rf sound has been described as being a buzz, clicking, hiss, or knocking, depending on several transmitter parameters, i.e., pulse width and pulse-repetition rate (PRF). The apparent source of these sounds is localized by the subjects as being within, or immediately behind the head. The sound always seems to come from within or immediately behind the head no matter how the subjects twists or rotates in the rf field. Our early experimentation, performed using transmitters with very short square pulses and high pulse-repetition rates, seemed to indicate that we were dealing with harmonics of the PRF. However, our later work has indicated that this is not the case; rather, the rf sound appears to be incidental modulation envelope on each pulse, as shown in Fig 1.

Some difficulty was experienced when the subjects tried to match the rf sound to ordinary audio. They reported that it was not possible to satisfactorily match the rf sound to a sine wave or to white noise. An audio amplifier was connected to a variable bypass filter and pulsed by the transmitter pulsing mechanism. The subjects, when allowed to control the filter, reported a fairly satisfactory match. The subjects were fairly well satisfied with all frequencies below 5-kc audio were eliminated and the high- frequency audio was extended as much as possible. There was, however, always a demand for more high-frequency components. Since our tweeter has a rather good high-frequency response, it is possible that we have shown an analogue of visual phenomenon in which people see farther into the ultraviolet range when the lenses is eliminated from the eye. In other words, this may be a demonstration that the mechanical transmission system of the ossicles cannot respond to as high a frequency as the rest of the auditory system. Since the rf bypasses the ossicle system and the audio given the subject for matching does not, this may explain the dissatisfaction of our subjects in the matching. 

FIG. 1. Oscilloscope representation of transmitter output over time (pulse-modulated).

TRANSMITTER ELECTRONIC NOISE

|–(INCIDENTAL MODULATION)

|

\/

:.:.:.: :.:.:.:

| | | |

| | | |

| | | |

— ————— ———–

ON OFF ON OFF

FIG. 2. Audiogram of deaf subject (otosclerosis) who had a “normal” rf sound threshold.

-10|—-|—-|—-|–|–|–|–|–|–|–|–|

| | | | | | | | | | | |

0|—-|—-|—-|–|–|–|–|–|–|–|–| A = RIGHT BONE

| | A | | | | | | | | |

|—-|—-B—-A–|–|–|–|–|–|–|–| B = LEFT BONE

| | | B | A | | | | | | |

LOSS(db) 20|—-|—-|—-B–B–AB-B–B–B–AB-|–| C =

LEFT AIR

| | | | | | | A | | | |

|—-|—-|—-|–|–|–|–|–|–|–|–| D = RIGHT AIR

| | | | | | | | | | | C

40|—-|—-|—-|–|–|–|–|–|–|–C–|

| | C C C | | | | | C | |

|—-C—-|—-D–|–C–C–C–|–D–D–D

| | D | D | | D | | | |

60|—-D—-|—-|–|–D–|–|–|–|–|–|

| | | | | | | | | | | |

|—-|—-|—-|–|–|–|–|–|–|–|–|

| | | | | | | | | | | |

80|—-|—-|—-|–|–|–|–|–|–|–|–|

| | | | | | | | | | | |

|—-|—-|—-|–|–|–|–|–|–|–|–|

| | | | | | | | | | | |

100|—-|—-|—-|–|–|–|–|–|–|–|–|

125 250 500 1000 2000 4000 8000

FREQUENCY (cps)

TABLE 1. Transmitter parameters

Trans- Frequency, Wave- Pulse Width, Pulses Sec.

Duty Cy.

mitter mc length, cm _u_sec

A 1,310 22.9 6 244 .0015

B 2,982 10.4 1 400 .0004

C 425 70.6 125 27 .0038

D 425 70.6 250 27 .007

E 425 70.6 500 27 .014

F 425 70.6 1000 27 .028

G 425 70.6 2000 27 .056

H 8,900 3.4 2.5 400 .001

FIG. 3. Attenuation of ambient sound with Flent antinoise stopples (collated from Zwislocki (3) and Von Gierke (4).

|—-|—|–|–|-|-|-|||—-|—|–|-|||

| | | | | | | ||| | | | |||

|—-|—|–|–|-|-|-|||—-|—|–|-||| A = FLENTS

| | | | | | | ||| | | | |||

10|—-|—|–|–|-|-|-|||—-|—|–|-||| B = THEORETICAL LIMIT

| | | | | | | ||| | | | ||| OF ATTENUATION BY

FUNCTION(db) |—-|—|–|–|-|-|-|||—-|—|–|-||| EAR

PROTECTORS

A | | | | | | ||| | | | |||

|—-A—|–|–|-|-|-|||—-|—|–|-|||

B | A A A | A AAA A| | | |||

|—-B—B–|–|-A-|-|||—-A—|–|-|||

| | | | B | | ||| | A | | |||

30|—-|—|–|–|-|-|-B||—-|—A–|-A||

| | | | | | | ||| | | A |A|

|—-|—|–|–|-|-|-|||B—|—|–|-||A

| | | | | | | ||| B | | | |||

|—-|—|–|–|-|-|-|||—-|—|–|-||B

| | | | | | | ||| B | | B||

|—-|—|–|–|-|-|-|||—-|—|-B|-|||

| | | | | | | ||| | B | | |||

50|—-|—|–|–|-|-|-|||—-|—|–|-|||

| | | | | | | ||| | | | |||

|—-|—|–|–|-|-|-|||—-|—|–|-|||

| | | | | | | ||| | | | |||

|—-|—|–|–|-|-|-|||—-|—|–|-|||

100 1000 10000

FREQUENCY

TABLE 2. Theshold for perception of rf sound (ambient noise level 70- 90 db).

Peak

Avg Peak Peak Magnetic

Power Power Electric Field

Trans- Frequency, Duty Cy. Density, Density Field

amp.

mitter mc mw, cm2 mw, cm2 v cm turns, m

A 1,310 .0015 0.4 267 14 4

B 2,982 .0004 2.1 5,250 63 17

C 425 .0038 1.0 263 15 4

D 425 .007 1.9 271 14 4

E 425 .014 3.2 229 13 3

F 425 .028 7.1 254 14 4

FIG. 4. Threshold energy as a function of frequency

of electromagnetic

energy (ambient noise level 70-90 db).

10000|———|————-|————–|

|———|————-|————–|

PEAK |———|————-|————–|

POWER |———|————-|————-*|

DENSITY |———|————-|————*-|

(mw/cm2) | | | * |

|———|————-|———*—-|

| | | * |

|———|————-|——*——-|

| | | * |

| | | * |

| | | * |

1000|———|————-*————–|

|———|———–*-|————–|

|———|———*—|————–|

| | * | |

|———|—–*——-|————–|

| * * * * * * * | |

|———|————-|————–|

| | | |

THE END

Facebook Manipulated 689,003 Users’ Emotions For Science


June 29: Updated with statement from Facebook.

Facebook is the best human research lab ever. There’s no need to get experiment participants to sign pesky consent forms as they’ve already agreed to the site’s data use policy. A team of Facebook data scientists are constantly coming up with new ways to study human behavior through the social network. When the team releases papers about what it’s learned from us, we often learn surprising things about Facebook — such as the fact that it can keep track of the status updates we never actually post. Facebook has played around with manipulating people before — getting 60,000 to rock the vote in 2012 that theoretically wouldn’t have otherwise — but a recent study shows Facebook playing a whole new level of mind gamery with its guinea pigs users. As first noted by Animal New York, Facebook’s data scientists manipulated the News Feeds of 689,003 users, removing either all of the positive posts or all of the negative posts to see how it affected their moods. If there was a week in January 2012 where you were only seeing photos of dead dogs or incredibly cute babies, you may have been part of the study. Now that the experiment is public, people’s mood about the study itself would best be described as “disturbed.”

The researchers, led by data scientist Adam Kramer, found that emotions were contagious. “When positive expressions were reduced, people produced fewer positive posts and more negative posts; when negative expressions were reduced, the opposite pattern occurred,” according to the paper published by the Facebook research team in the PNAS. “These results indicate that emotions expressed by others on Facebook influence our own emotions, constituting experimental evidence for massive-scale contagion via social networks.”

The experiment ran for a week — January 11–18, 2012 — during which the hundreds of thousands of Facebook users unknowingly participating may have felt either happier or more depressed than usual, as they saw either more of their friends posting ’15 Photos That Restore Our Faith In Humanity’ articles or despondent status updates about losing jobs, getting screwed over by X airline, and already failing to live up to New Year’s resolutions. “*Probably* nobody was driven to suicide,” tweeted one professor linking to the study, adding a “#jokingnotjoking” hashtag.

The researchers — who may not have been thinking about the optics of a “Facebook emotionally manipulates users” study — jauntily note that the study undermines people who claim that looking at our friends’ good lives on Facebook makes us feel depressed. “The fact that people were more emotionally positive in response to positive emotion updates from their friends stands in contrast to theories that suggest viewing positive posts by friends on Facebook may somehow affect us negatively,” they write.

They also note that when they took all of the emotional posts out of a person’s News Feed, that person became “less expressive,” i.e. wrote less status updates. So prepare to have Facebook curate your feed with the most emotional of your friends’ posts if they feel you’re not posting often enough.

So is it okay for Facebook to play mind games with us for science? It’s a cool finding but manipulating unknowing users’ emotional states to get there puts Facebook’s big toe on that creepy line. Facebook’s data use policy — that I’m sure you’ve all read — says  Facebookers’ information will be used “for internal operations, including troubleshooting, data analysis, testing, research and service improvement,” making all users potential experiment subjects. And users know that Facebook’s mysterious algorithms control what they see in their News Feed. But it may come as a surprise to users to see those two things combined like this. When universities conduct studies on people, they have to run them by an ethics board first to get approval — ethics boards that were created because scientists were getting too creepy in their experiments, getting subjects to think they were shocking someone to death in order to study obedience and letting men live with syphilis for study purposes. A 2012 profile of the Facebook data team noted, “ Unlike academic social scientists, Facebook’s employees have a short path from an idea to an experiment on hundreds of millions of people.” This study was partially funded by a government body — the Army Research Office — and via @ZLeeily, the PNAS editor on the article says this study did pass muster with an Institutional Review Board, but we’ll see if it passes muster with users.

In it’s initial response to the controversy around the study — a statement sent to me late Saturday night — Facebook doesn’t seem to really get what people are upset about, focusing on privacy and data use rather than the ethics of emotional manipulation and whether Facebook’s TOS lives up to the definition of “informed consent” usually required for academic studies like this. “This research was conducted for a single week in 2012 and none of the data used was associated with a specific person’s Facebook account,” says a Facebook spokesperson. “We do research to improve our services and to make the content people see on Facebook as relevant and engaging as possible. A big part of this is understanding how people respond to different types of content, whether it’s positive or negative in tone, news from friends, or information from pages they follow. We carefully consider what research we do and have a strong internal review process. There is no unnecessary collection of people’s data in connection with these research initiatives and all data is stored securely.”

Ideally, Facebook would have a consent process for willing study participants: a box to check somewhere saying you’re okay with being subjected to the occasional random psychological experiment that Facebook’s data team cooks up in the name of science. As opposed to the commonplace psychological manipulation cooked up advertisers trying to sell you stuff.

CONTINUE READING….

Lincoln, Kennedy & Obama’s "Warnings" (Whistle Blowers Corps & Secret Societies)


 

Lincoln, Kennedy & Obama’s "Warnings" ( Whistle Blowers Corps & Secret Societies )
Washington, Jefferson, Lincoln, Eisenhower, Kennedy, Obama and many more have openly said in public that Private Bankers, Corporations and Secret Societies like the Bilderbergs, Council On Foreign Relations and U.N. were the biggest threat to America. People just don’t what to listen, out of fear for the obvious. So they use defense mechanisms like displaced anger, Racism and they cling to the RED & Blue with a death grip. Meanwhile Campaign Contributions in Tax Havens like Ireland pay for, Outsourcing, Bank Fraud, Corporate Tax Fraud, Wars For Rothschild OPIC Profits and Wall Street Fraud. Meanwhile Corporation profits, Wall Street Profits, Taxes, Printing Money, Food Prices go up and American Citizens have less food on the table.
(People Need To Listen)
Whistle Blower Elected President Teddy Roosevelt "Warnings" Corporations : http://youtu.be/6FbQICYlwVo
Whistle Blower Elected President Kennedy "Warnings" Secret Society Speech : http://youtu.be/utYcFf93Srs
Whistle Blower Elected President Obama "Warnings" Secret Society Speech : http://youtu.be/wjssObygXaQ
Whistle Blower Ireland’s Parliament : http://youtu.be/CnJCvKA-oEU
Whistle Blower FBI : http://youtu.be/do_swOstGaI
Whistle Blower FED & World Bank : http://youtu.be/B1UwZIa9AFc
Whistle Blower CIA : http://youtu.be/fbVYF8gpNdo
Whistle Blower Economic Hit Man Killing US Jobs : http://youtu.be/wuxMcMwA3t8
Whistle Blowers TTP Outsourcing, SOPA Internet Regulation & Banker Deregulation : http://youtu.be/CS-x5SlcPPM
Whistle Blowers "Warnings" Private Banks, Corporations & Secret Societies : http://youtu.be/r4kmWZefTrQ
Whistle Blowers Confront Rothschild : http://youtu.be/6sCioKnpHdY
P.S. An election will only turn what could be a good man into a political puppet and put power into the wrong hands again.


I Will Not Comply !!! : I’m done being passive, you can wallow in your Government Sponsored delusion and petty arguments. I’m not supporting Corruption, Outsourcing, Bank Thievery, Debasing our Currency or Corporate Oil Trade Wars and Washington’s High Treason anymore. Every entitlement, service or oath breaker I have paid taxes for or supported to this day has turned out to be a legal battle or a total rip off. I Will Not Comply any more the IRS and ObamaCare will be getting a "I Will Not Comply" return letter this year. I use cash, barter, trade and go tax free from now on. If this government spies on us I will spy on them back. If this government taxes us I will tax them back. If this government fines, warrants or attacks, American Citizens, American Citizens will attack them back. If this government targets us at our homes American Citizens will Target them at theirs back. We are American Citizens ! We will not be tread on by this treasonous and corrupt government any more. Kevlar and High Tech Toys will not mean shit if they cross my line in the sand.

Sign the Stop Indefinite Detention Petition


FOLLOW THIS LINK:  Rand2016 – NDAA.

Sign the Stop Indefinite Detention Petition

To Your Senators

Whereas:   The fight over the indefinite detention of American citizens in the National Defense Authorization Act (NDAA) strikes at the very heart of our fragile Republic; and
Whereas:   It effectively GUTS the 6th Amendment of the Constitution. It effectively places the freedom of every American citizen at the mercy of the federal government.; and
Whereas:   After the NSA spying scandals and the IRS targeting of conservative political organizations, Americans aren’t buying the argument any longer that our government won’t abuse its powers; and
Whereas:   The federal government shouldn’t have the power to lock American citizens up and throw away the key – all without trial;
Therefore: I urge you to take action to support Senator Paul’s amendment to strip indefinite detention out of the NDAA and restore the 6th Amendment.

Has U.S. started an Internet war?


By Bruce Schneier, Special to CNN

updated 10:46 AM EDT, Tue June 18, 2013

Editor’s note: Bruce Schneier is a security technologist and author of "Liars and Outliers: Enabling the Trust Society Needs to Survive."

(CNN) — Today, the United States is conducting offensive cyberwar actions around the world.

More than passively eavesdropping, we’re penetrating and damaging foreign networks for both espionage and to ready them for attack. We’re creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country’s electronic infrastructure on a moment’s notice.

This is much worse than what we’re accusing China of doing to us. We’re pursuing policies that are both expensive and destabilizing and aren’t making the Internet any safer. We’re reacting from fear, and causing other countries to counter-react from fear. We’re ignoring resilience in favor of offense.

Bruce Schneier

Bruce Schneier

Welcome to the cyberwar arms race, an arms race that will define the Internet in the 21st century.

Presidential Policy Directive 20, issued last October and released by Edward Snowden, outlines U.S. cyberwar policy. Most of it isn’t very interesting, but there are two paragraphs about

"Offensive Cyber Effect Operations," or OCEO, that are intriguing:

"OECO can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging. The development and sustainment of OCEO capabilities, however, may require considerable time and effort if access and tools for a specific target do not already exist.

"The United States Government shall identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power, establish and maintain OCEO capabilities integrated as appropriate with other U.S. offensive capabilities, and execute those capabilities in a manner consistent with the provisions of this directive."

Opinion: Cyber arms control? Forget about it

Obama: NSA programs are transparent

Releasing NSA leaks: A public service?

NSA fallout could be ‘harmful’

Could the NSA leaker defect to China?

These two paragraphs, and another paragraph about OCEO, are the only parts of the document classified "top secret." And that’s because what they’re saying is very dangerous.

Cyberattacks have the potential to be both immediate and devastating. They can disrupt communications systems, disable national infrastructure, or, as in the case of Stuxnet, destroy nuclear reactors; but only if they’ve been created and targeted beforehand. Before launching cyberattacks against another country, we have to go through several steps.

We have to study the details of the computer systems they’re running and determine the vulnerabilities of those systems. If we can’t find exploitable vulnerabilities, we need to create them: leaving "back doors" in hacker speak. Then we have to build new cyberweapons designed specifically to attack those systems.

Sometimes we have to embed the hostile code in those networks, these are called "logic bombs," to be unleashed in the future. And we have to keep penetrating those foreign networks, because computer systems always change and we need to ensure that the cyberweapons are still effective.

Like our nuclear arsenal during the Cold War, our cyberweapons arsenal must be pretargeted and ready to launch.

That’s what Obama directed the U.S. Cyber Command to do. We can see glimpses in how effective we are in Snowden’s allegations that the NSA is currently penetrating foreign networks around the world: "We hack network backbones — like huge Internet routers, basically — that give us access to the communications of hundreds of thousands of computers without having to hack every single one."

The NSA and the U.S. Cyber Command are basically the same thing. They’re both at Fort Meade in Maryland, and they’re both led by Gen. Keith Alexander. The same people who hack network backbones are also building weapons to destroy those backbones. At a March Senate briefing, Alexander boasted of creating more than a dozen offensive cyber units.

Longtime NSA watcher James Bamford reached the same conclusion in his recent profile of Alexander and the U.S. Cyber Command (written before the Snowden revelations). He discussed some of the many cyberweapons the U.S. purchases:

"According to Defense News’ C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients — agencies like Cyber Command, the NSA, the CIA, and British intelligence — a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what’s called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city — say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security’s No. 3 Research Institute, which is responsible for computer security — or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies — the equivalent of a back door left open…

"The buying and using of such a subscription by nation-states could be seen as an act of war. ‘If you are engaged in reconnaissance on an adversary’s systems, you are laying the electronic battlefield and preparing to use it’ wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. ‘In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.’ The question is, who else is on the secretive company’s client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. "It should be illegal,’ said the former senior intelligence official involved in cyberwarfare. ‘I knew about Endgame when I was in intelligence. The intelligence community didn’t like it, but they’re the largest consumer of that business.’"

That’s the key question: How much of what the United States is currently doing is an act of war by international definitions? Already we’re accusing China of penetrating our systems in order to map "military capabilities that could be exploited during a crisis." What PPD-20 and Snowden describe is much worse, and certainly China, and other countries, are doing the same.

All of this mapping of vulnerabilities and keeping them secret for offensive use makes the Internet less secure, and these pre-targeted, ready-to-unleash cyberweapons are destabalizing forces on international relationships. Rooting around other countries’ networks, analyzing vulnerabilities, creating back doors, and leaving logic bombs could easily be construed as an act of war. And all it takes is one over-achieving national leader for this all to tumble into actual war.

It’s time to stop the madness. Yes, our military needs to invest in cyberwar capabilities, but we also need international rules of cyberwar, more transparency from our own government on what we are and are not doing, international cooperation between governments and viable cyberweapons treaties. Yes, these are difficult. Yes, it’s a long slow process. Yes, there won’t be international consensus, certainly not in the beginning. But even with all of those problems, it’s a better path to go down than the one we’re on now.

We can start by taking most of the money we’re investing in offensive cyberwar capabilities and spend them on national cyberspace resilience. MAD, mutually assured destruction, made sense because there were two superpowers opposing each other. On the Internet there are all sorts of different powers, from nation-states to much less organized groups. An arsenal of cyberweapons begs to be used, and, as we learned from Stuxnet, there’s always collateral damage to innocents when they are. We’re much safer with a strong defense than with a counterbalancing offense.

Follow @CNNOpinion on Twitter.

Join us at Facebook/CNNOpinion.

The opinions expressed in this commentary are solely those of Bruce Schneier.

CONTINUE READING…