Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The  NSA - ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Thursday, January 28, 2010

'$hAdOw ElItE': DiD tHe $uPrEmE CoUrT TrA$h DeMoCrAcY aNd ThE FrEe MaRkEt???

Thursday, January 28, 2010 - Thanks goes out to "The Senator" for this link ;)

By Janine R. Wedel - Author of "Shadow Elite"

In a much-debated 5-4 decision, the Supreme Court voted to strike down regulations that stretch well back into the last century
(as well as a portion of the 2002 McCain-Feingold act) prohibiting corporations from using their general treasuries, without monetary limits, to finance ads that explicitly call for the victory or defeat of a candidate.

The vote, the balance of which was tipped by the
court's conservative majority, has been touted by some as a victory for principles of freedom. Far from it. The decision is poised to aid and abet the further intertwining of state and private power--the quintessence not of a "free market" but of a communist state. And the decision offers the shadow elite even more opportunities, sans government oversight or public input, to skew public policies to their own agendas. Through direct campaign contributions they are now more empowered than ever to use their corporate affiliations for greater leverage elsewhere.

The justices have laid the groundwork for an even stronger "Government Incorporated" Most of the work of the federal government today is performed not by government bureaucrats but by a vast off-the-books "shadow government"--the consulting firms, companies, nongovernmental organizations, and "Beltway Bandits" that occupy entire high-rise bastions in the Washington suburbs. Many contractors work solely or primarily for the government. For instance, the consulting giant Booz Allen Hamilton, with more than 13,000 employees in the Washington area alone and whose clients include the Department of Homeland Security, the Department of Defense, the Internal Revenue Service, and the Department of Health and Human Services, acquires the bulk of its $4.5 billion in annual revenue from government contracts. And more than 90 percent of the business of the now infamous Blackwater (renamed Xe), the private security contractor whose questionable activities in Iraq have done severe damage to America's reputation, is in government contracts. Contractors, of course, are not subject to the same rules as civil servants; contractor executives, unlike government leaders, are seldom dragged before congressional committees for hostile questioning when their activities come under fire.

By allowing companies to spend without limit on their pet candidates, the court's decision promises to further embed such contractors, enhance the entrenched culture of dependency, and make already cozy arrangements completely incestuous.

The shadow government knows little competition--the embodiment of a market system--but is instead born and bred on government largesse. The shadow labor force, which has grown dramatically in the last two decades, now comprises three-quarters of the people who work for the federal government. It has also grown up from supplying things like food service, printing, and landscaping to also routinely performing core government functions. Contractors today draft official documents, choose and oversee other contractors, run intelligence operations, control homeland security databases, execute military and occupying operations, and manage federal taxpayer monies doled out under stimulus plans and bailouts.

Competition in the free-market sense--adherence to the " Discipline Of The Market"--is not what drives the companies of the shadow government. Far-reaching legislative and policy changes instituted since the Clinton years have transformed contracting rules to make government contracting less "burdened" by competition and government oversight while also less transparent. The companies promote themselves through networking and politicking to "win" not-always-competed contracts and keep the largesse coming. It helps to enlist former government executives.

Thus Booz Allen Hamilton, which a former CIA deputy director dubbed "the shadow intelligence community," has employed at least three vice presidents who previously served as intelligence agency directors and has hired, or had on its board, a number of former defense and intelligence officials. Such efforts are richly rewarded. In the Pentagon alone, for instance, The Center for Public Integrity found that, over a period of six fiscal years, no-bid contracts accounted for more than 40 percent of its contracting--with $362 billion going to companies without competitive bidding. Some companies are, in fact, the only game in town and have no competitors. Today one firm has acquired a virtual monopoly on
electronic voting machines.

In the "blended" workforce of the shadow government, new forms of governance are being created that fuse the power of the state with the agendas of "private" companies. The public is familiar with the excesses of Xe (Blackwater), but companies such as Booz Allen, Accenture, Lockheed Martin, and Science Applications International Corporation (SAIC) that daily stand in for government and influence policy may be far more insidious (communism turned on its head). Many public priorities and decisions are driven by private companies instead of government officials and agencies that must answer to citizens, with officials only signing on the dotted line. In numerous reports, government investigators (such as the Government Accountability Office, the watchdog agency of Congress, and inspectors general of government agencies) have asked whether government has the information, expertise, institutional memory and personnel to manage contractors--or is it the other way around?

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"


Love "Light" and Energy


[Clearstream Banking]

''Shadow Elite'' - Criminals in Washington

Sunday, January 24, 2010

U.$./NWO CoNtRoL mAtRiX - $yNtHeTiC eNViRoNmEnT $iMuLaTiOn$ ($w$)

Sunday, January 24, 2010 - ThE eLiTe$ EnD-GaMe NoW bEiNg ImPlEmEnTeD!

A technologically mature “posthuman civilization" would have enormous computing power. Based on this empirical fact, the simulation argument shows that at least one of the following propositions is true: (1) The fraction of human-level civilizations that reach a posthuman stage is very close to zero; (2) The fraction of posthuman civilizations that are interested in running ancestor-simulations is very close to zero; (3) The fraction of all people with our kind of experiences that are living in a simulation is very close to one.

If (1) is true, then we will almost certainly go extinct before reaching posthumanity. If (2) is true, then there must be a strong convergence among the courses of advanced civilizations so that virtually none contains any relatively wealthy individuals who desire to run ancestor-simulations and are free to do so. If (3) is true, then we almost certainly live in a simulation. In the dark forest of our current ignorance, it seems sensible to apportion one’s credence roughly evenly between (1), (2), and (3).

Unless we are now living in a simulation, our descendants will almost certainly never run an ancestor-simulation.


Purdue University's Synthetic Environment for Analysis and Simulations, or SEAS, is currently being used by Homeland Security and the US Defense Department to simulate crises on the US mainland. SEAS "enables researchers and organizations to try out their models or techniques in a publicly known, realistically detailed environment. It is now capable of running real-time simulations for up to 62 nations, including Iraq, Afghanistan, and China. The simulations gobble up breaking news, census data, economic indicators, and climactic events in the real world, along with proprietary information such as military intelligence. [...] The Iraq and Afghanistan computer models are the most highly developed and complex of the 62 available to JFCOM-J9. Each has about five million individual nodes representing things such as hospitals, mosques, pipelines, and people.

SEAS was developed to help Fortune 500 companies with strategic planning. Then it was used to help "recruiting commanders to strategize ways to improve recruiting potential soldiers". In 2004 SEAS was evaluated for its ability to help simulate "the non-kinetic aspects of combat, things like the diplomatic, economic, political, infrastructure and social issues".

Sentient World Simulation is the name given to the current vision of making SEAS a continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action.

The Sentient World Simulation project (SWS) is to be based on SEAS. The ultimate goal envisioned by Alok R. Chaturvedi on March 10, 2006 was for SWS to be a continuously running, continually updated mirror model of the real world that can be used to predict and evaluate future events and courses of action. SWS will react to actual events that occur anywhere in the world and incorporate newly sensed data from the real world. [...] As the models influence each other and the shared synthetic environment, behaviors and trends emerge in the synthetic world as they do in the real world. Analysis can be performed on the trends in the synthetic world to validate alternate worldviews. [...] Information can be easily displayed and readily transitioned from one focus to another using detailed modeling, such as engineering level modeling, to aggregated strategic, theater, or campaign-level modeling.

Simulex Inc.’s Synthetic Environments for Analysis and Simulation system is almost certainly how the priests of the technocracy are now maintaining “normal” operations, and, more importantly, how They plan to kill most of us off.

The system allows for terra scale datasets with granularity of results down to one node (individual). It has a physics engine for tracking any number of people (or other elements) in virtual cities or spaces. It can correlate any amount of social, economic, political, environmental or other data with the behavior of groups or individuals on the ground. The U.S. Government, and some of the most powerful corporations on the planet are using the SEAS system.

When U.S. Army theorist Ralph Peters said, “Statistically, we win,” he wasn’t kidding. If you’ve read about the Club of Rome , wondered how the scientific application of fascism would work, or how kill off will be planned, simulated and executed, friend, you’ve come to the right place.

There’s really no way to know how many ways this system is already being used against us. I tried to think about it for a few minutes and it’s mind boggling. “How isn’t it being used?” is probably a more interesting question. If the Architect was interested in tools that could help him more effectively run the Matrix, he’d have Simulex reps on the phone ASAP.

Perhaps your real life is so rich you don't have time for another.

Even so, the US Department of Defense (DOD) may already be creating a copy of you in an alternate reality to see how long you can go without food or water, or how you will respond to televised propaganda.

The DOD is developing a parallel to Planet Earth, with billions of individual "nodes" to reflect every man, woman, and child this side of the dividing line between reality and AR.

Called the Sentient World Simulation (SWS), it will be a "synthetic mirror of the real world with automated continuous calibration with respect to current real-world information", according to a concept paper for the project.

"SWS provides an environment for testing Psychological Operations (PSYOP)," the paper reads, so that military leaders can "develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners".

SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.

The Need For Uninhibited Raw Personel Data That Populates The Torture Matrix

The FBI and telecom companies collaborated to routinely violate federal wiretapping laws for four years, as agents got access to reporters’ and citizens’ phone records using fake emergency declarations or simply asking for them.

The Justice Department Inspector General’s internal audit, released Wednesday, harshly criticized how the Federal Bureau of Investigation’s Communications Analysis Unit a counterterrorism section founded after 9/11 — relied on so-called “exigent” letters to get carriers to turn over phone records immediately. The letters were a hangover from the investigation into the 9/11 attacks in New York and promised telecoms, falsely, that subpoenas would follow shortly.

The FBI illegally collected more than 2,000 U.S. telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records, according to internal bureau memos and interviews. FBI officials issued approvals after the fact to justify their actions.

E-mails obtained by The Washington Post detail how counterterrorism officials inside FBI headquarters did not follow their own procedures that were put in place to protect civil liberties. The stream of urgent requests for phone records also overwhelmed the FBI communications analysis unit with work that ultimately was not connected to imminent threats.

A Justice Department inspector general's report due out this month is expected to conclude that the FBI frequently violated the law with its emergency requests, bureau officials confirmed.

The F.B.I. cast a much wider net in its terrorism investigations than it has previously acknowledged by relying on telecommunications companies to analyze phone-call patterns of the associates of Americans who had come under suspicion, according to newly obtained bureau records.

The documents indicate that the Federal Bureau of Investigation used secret demands for records to obtain data not only on individuals it saw as targets but also details on their “community of interest” — the network of people that the target was in contact with. The bureau stopped the practice early this year in part because of broader questions raised about its aggressive use of the records demands, which are known as national security letters, officials said.

The community of interest data sought by the F.B.I. is central to a data-mining technique intelligence officials call link analysis. Since the attacks of Sept. 11, 2001, American counterterrorism officials have turned more frequently to the technique, using communications patterns and other data to identify suspects who may not have any other known links to extremists.
NSA Spying/Data Mining

[Google To Enlsit NSA To Help It Ward Off Cyberattacks]

News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans’ phone calls and Internet communications. Those news reports, plus a USA Today story in May 2006 and the statements of several members of Congress, revealed that the NSA is also receiving wholesale copies of their telephone and other communications records.

All of these surveillance activities are in violation of the privacy safeguards established by Congress and the U.S. Constitution.

What does the Chronology of Data Breaches contain?

The data breaches noted have been reported because the personal information compromised includes data elements useful to identity thieves, such as Social Security numbers, account numbers, and driver's license numbers. Some breaches that do NOT expose such sensitive information have been included in order to underscore the variety and frequency of data breaches. However, we have not included the number of records involved in such breaches in the total because we want this compilation to reflect breaches that expose individuals to identity theft as well as breaches that qualify for disclosure under state laws. The breaches posted below include only those reported in the United States. They donot include incidents in other countries.

FACEBOOK: Federal Human Data Mining Program

[Report: HIV patients canceled by insurer] Used Math Algorithm To Target HIV Positive Patients...More Why!

[Unsecured Wireless Networks Risk Being Framed for Crimes]
[EFF:Browser versions carry 10.5 bits of identifying information on average]
The Courts Reckless Abandonment For The Rule of Law

San Francisco - A federal judge has dismissed Jewel v. NSA, a case from the Electronic Frontier Foundation (EFF) on behalf of AT&T customers challenging the National Security Agency's mass surveillance of millions of ordinary Americans' phone calls and emails.

The alarming upshot of the court's decision is that so long as the government spies on all Americans, the courts have no power to review or halt such mass surveillance even when it is flatly illegal and unconstitutional," said EFF Senior Staff Attorney Kevin Bankston. "With new revelations of illegal spying being reported practically every other week -- just this week, we learned that the FBI has been unlawfully obtaining Americans' phone records using Post-It notes rather than proper legal process -- the need for judicial oversight when it comes to government surveillance has never been clearer.

Earlier this week, the DOJ’s Inspector General issued a heavily redacted report about the FBI’s Communications Analysis Unit (CAU), which found "shocking" violations, including embedded telecom employees providing customer phone records in response to post-it notes.

The report reveals that AT&T routinely provided the FBI with the "community of interest" profiles of its customers without any legal process. However, the DOJ redacted a large section of the report that discusses what a "community of interest" is, including an explanatory diagram. Yet, AT&T itself has published several research papers extensively discussing communities of interest. Basically, your community of interest includes the people you call and who call you, and the people with whom this group communicates. It is sometimes refined by frequency or by time period. AT&T even published the Hancock programming language, which AT&T designed to analyze communities of interest, and "sift calling card records, long distance calls, IP addresses and internet traffic dumps, and even track the physical movements of mobile phone customers as their signal moves from cell site to cell site." AT&T published this graphic, which illustrates AT&T using what they call "guilt by association" to determine fraud within a community of interest (the shaded boxes).

The improper NSL was issued at the direction of FBI headquarters, after the FBI already had the documents in hand pursuant to an earlier subpoena. While the matter received the personal attention of FBI Director Robert S. Mueller III, as well as officials with the FBI Office of the General Counsel, and was covered in news media, it was not formally reported until a short time before Inspector General Glenn Fine’s report on the (ab)use of NSLs was due before Congress. While the report identified dozens of instances in which National Security Letters may have violated laws and agency regulations and were not reported, this is the first time documents have that shown top FBI executives were aware of a misuse before it was officially reported.

Five members of the Supreme Court declared that a “corporation” is a person, not a “regular person” but one above all natural laws, subject to no God, no moral code but one with unlimited power over our lives, a power awarded by judges who seem themselves as grand inquisitors in an meant to hunt down all hertics who fail to serve their god, the god of money.

Their ruling has made it legal for foreign controlled corporations to flush unlimited money into our bloated political system to further corrupt something none of us trust and most of us fear. The “corporation/person” that the 5 judges, the “neocon” purists, have turned the United States over to isn’t even American. Our corporations, especially since our economic meltdown are owned by China, Russia and the oil sheiks along with a few foreign banks. They don’t vote, pay taxes, fight in wars, need dental care, breathe air, drive cars or send children to school. Anyone who thinks these things are people is insane. Anyone who would sell our government to them is a criminal and belongs in prison. There is nothing in the Constitution that makes this “gang of five” bribe sucking clowns above the law. There is nothing in the Constitution that even mentions corporations much less gives them status equal to or greater than the Executive, Legislative and Judicial branches of government.

Synthetic Environments for Analysis and Simulation - Testing The Science - DOD - DARPA - USFJCOM

Military Changes Tactical Thinking
By Maryann Lawlor

Experiment leads to major shift in strategic philosophy and technical requirements.

The U.S. military is revolutionizing the way it fights in urban environments. A tactical transformational concept that shifts the emphasis from the adversary to the local population has been fast-tracked to commanders operating in Afghanistan, and it is being supported by technology that originally was designed to help market toothpaste to China. The technology, along with some very innovative thinking, reveals both intended and unintended consequences of actions so decision-makers can anticipate the impact each will have in a particular situation.

Within months of the conclusion of Urban Resolve 2015 (UR 2015), an experiment that took place in three two-week segments late last year, lessons learned from the event were making their mark in the Global War on Terrorism. Executed by the U.S. Joint Forces Command (JFCOM), Norfolk, Virginia, the experiment demonstrated that the urban fighting challenge is not one of overcoming terrain obstacles but rather entails controlling the environment—all the infrastructure and systems that make up a city. This radical concept change, written in partnership with the U.S. Army and U.S. Marine Corps, was the first UR 2015 deliverable and led to overhauling the entire U.S. Defense Department master plan. And similar to a row of dominoes that falls when the first tile tips, the master plan overhaul is creating a cascade of newly needed capabilities.

13-May-2005 03:39 EDT

U.S. Secretary of Defense Donald Rumsfeld recently delegated technology transfer authority to U.S. Joint Forces Command (USJFCOM), allowing it to share technology with academia and industry for the purpose of research and development. While USJFCOM is not a national laboratory, the new authority gives the command many of the same authorities national laboratories use to structure partnerships with industry to exchange personnel and technical data, make technology assessments and collaborate on research and development efforts.

The Department of Defense’s (DoD) Unified Command Plan 08 assigns U.S Joint Forces Command (USJFCOM) responsibility for leading and coordinating joint concept development and experimentation (JCD&E) efforts of the services, the combatant commands (COCOM), and defense agencies.

USJFCOM’s JCD&E Directorate (J9) leads the development of emerging joint concepts, conducts and enables joint experimentation, and coordinates DoD JCD&E efforts in order to provide joint capabilities to support the current and future joint force commander in meeting security challenges.

USJFCOM J9 is also responsible for the integration of multinational and interagency experimentation efforts in support of future joint warfighting capabilities. It fulfills these responsibilities through.

During Urban Resolve 2015, U.S. Joint Forces Command and partners from across the services and the government are aiming to examine the challenges which come with operating in cities.

By Jim Garamone
American Forces Press Service

(WASHINGTON - Oct. 19, 2006) -- U.S. Joint Forces Command is in the midst of the most important and complex experiment the command has conducted since Millennium Challenge in 2002, officials said here yesterday.

The experiment is Urban Resolve 2015 and is designed to test solutions for that most complicated warfighting task: combat in cities.

Dave Ozolek, executive director of the Joint Futures Lab at the command, said the experiment is designed to examine solutions for current and future gaps in warfighting capabilities.

By MCC (SW/AW) Chris Hoffpauir
USJFCOM Public Affairs

(SUFFOLK, Va. - Sept. 13, 2006) -- 10 a.m.: Urban Resolve 2015 (UR2015) is a huge experiment, involving more than 1,000 participants at 19 locations around the world. Its purpose is to try out new tools and operating concepts for warfighters in urban environments. The scenario is set in the year 2015 in a fictional city.

As I sit here today, I'm going to try to give you as clear a picture as possible as to how this phase of what is a multiple event series of experiments.

The experiment runs from August to October and is broken into three human-in-the-loop (HITL) experiments which put human decision-makers into a scenario generated by supercomputers. HITL 1 took place in August and pitted a present-day force against an advanced enemy.

Synthetic Environments for Analysis and Simulation - Building The Science


Create a VV&A methodology for DARPA for the Conflict Modeling, Planning and Outcome Experimentation (COMPOEX) Program. COMPOEX is a large political, military, economic, social, information, and infrastructure (PMESII) simulation.

Simulations used to model operations where PMESII factors are relevant stretch the boundaries of scientific knowledge. Consequently verifying, validating and accrediting (VV&A) are difficult tasks.

Actual VV&A of PMESII models have been few and shallow.

Flexible Asymmetric Simulation Technologies (FAST) Toolbox


Hartley, Dean S., III (2004). FAST for the Warfighter: Test Strategy & Plan (Revision 3). DRC, Vienna, VA.
Hartley, Dean S., III (2005). MOOTW FAST Prototype Toolbox: FY04 Validation Strategy & Plan. DRC, Vienna, VA.
Hartley, Dean S., III (2005). MOOTW FAST Prototype Toolbox: FY05 Validation Strategy & Plan. DRC, Vienna, VA.
Senko, Robert M. (2005). Flexible Asymmetric Simulation Technologies (FAST) for the Warfighter: FY05 Final Verification

Test Report. DRC, Vienna, VA.

Analysis: broad but shallow

Synthetic Environment for Analysis and Simulation (SEAS)


Chaturvedi, Alok R. (2003). “SEAS-UV 2004: The Theoretical Foundation of a Comprehensive PMESII/DIME Agent-Based Synthetic Environment,” Simulex, Inc.

McDonald, C. S. (2006). Verification and Validation Report for the Synthetic Environment for Analysis and Simulation (SEAS). The Johns Hopkins University – Applied Physics Laboratory, Laurel, MD.

Sheldon, Bob (2006). “Memorandum for the Record: V&V Report for the Synthetic Environment for Analysis and Simulation (SEAS), 27 October 2006.”

Analysis: narrow and shallow

Conflict Modeling, Planning and Outcome Experimentation (COMPOEX) Program


Davis, D. F. (2006). “Consolidated Report Consisting of three Research and Development Project Summary Reports,” Contract #W15P7T-06-T-P238. Peace Operations Policy Program, George Mason University, Arlington, VA.

Analysis: very narrow (elements analyzed not included in COMPOEX) and medium depth (not all needed parts were available)

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"


Love "Light" and Energy



Thursday, January 21, 2010

$oMe Le$$On$ fRoM tHe At-T/FaCeBoOk $wItChErOo - OnLy In AmErIkA!

Thursday, January 21, 2010

by Peter Eckersley

Over the weekend, there was an odd story about people using AT&T's wireless network trying to log in to Facebook, and suddenly finding themselves logged in to somebody else's Facebook account. What could have caused such a strange phenomenon to occur? What does it tell us about the innards of the mobile web, and what lessons might it convey for network and application design?

Ars Technica had a good post documenting some of the possibilities, and AT&T has now made some public statements containing a few key clues about the problem. We have a few things to add.

[Warning - this post gets fairly technical]

1. Facebook. Facebook needs to start using HTTPS for everything! Without HTTPS and secure cookies, the private and sensitive information in their users' accounts is vulnerable to being mixed up by ISPs' proxy servers, logged, eavesdropped or pilfered by hackers.

1 Google now uses HTTPS by default for every interaction with Gmail, and there's no excuse for Facebook not to do the same.

2. AT&T. Here, the story is more complicated, but the short summary is that AT&T (and all other ISPs) really need to migrate away from using proxy and gateway servers to perform complicated software tasks.

The problem at the ISP's end appears to have been a manifestation of an engineering hangover from WAP 1.0, which was the first attempt to bring the Web to mobile phones. WAP made a number of design decisions intended to work around the limitations of 1990s-era cell phones, including tiny storage space, limited bandwidth, and small keypads. In retrospect, some of those design decisions appear to have been unwise. A relevant example was the decision to involve the wireless carrier in website authentication. Where the normal HTTP Web stores authentication cookies on users' computers, early versions of WAP specified that cookies should be stored on proxy servers called WAP gateways, operated by wireless carriers.2 Another practice was to try to avoid ever having to make the user type a username and password with only a numeric keypad, by circulating URLs that contained automatic authentication parameters.


There is a lot of engineering controversy about whether it's ever appropriate for complex application functions to be performed by proxies, gateways or transcoders operated by ISPs. One key argument is that if the ISPs pick a poor solution, or don't all implement exactly the same thing, then developers and users will be worse off than if the ISP had done nothing at all.

Whether or not this is true in all cases, it's clear, at the very least, that ISPs need to be extremely cautious in this space. They need to only deploy a proxy-type solution when it is certain that clients and servers can't solve the problem for themselves. They need to be transparent: follow well-established standards, clearly document their practices, and answer technical questions promptly. Lastly, they should offer users and application providers a standardised way to opt-out of the proxies if they might cause technical or security problems.

Even as mobile phones and mobile browsers are approaching the sophistication of desktop PCs, many mobile carriers are continuing to play strange and undocumented tricks with subscribers' data communications.

And AT&T in particular still has a way to go with respect to transparency. Their public statements indicated that they had deployed some new security measures in the wake of the Facebook affair. When we asked them what those measures were, their spokesperson's response was:


In terms of the new security measures AT&T has put into place, due to security sensitivity, we aren't providing specifics.

AT&T's disappointing response is to retreat to security through obscurity. But long experience teaches that security through obscurity is usually no security at all.


==snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"


Love "Light" and Energy


References: Implementing and Testing The U.S. Torture Matrix - More Of The How!

Saturday, January 16, 2010

ThE PrIvAtiZaTiOn Of $eCuRiTy AnD ThE MiLiTaRiZaTiOn Of $oCiEtY-PaRt I

Saturday, January 16, 2010

Yemen, Energy Crisis, & the Nigerian Crotch Bomber

By Dr. Nafeez Ahmed (@) Sibel Edmonds-Boiling Frogs

On Christmas Day, 2009, 23-year old Nigerian, Umar Farouk Abdulmutallab, allegedly tried to blow up a plane on route from Amsterdam to Detroit by detonating a device stitched to his underwear. Fortunately, in yet another example of the level of sophistication of the new league of violent extremists, Abdulmutallab succeeded only in setting fire to his own crotch, before being apprehended by fellow passengers.

Security officials now reveal that the attack was planned by an al-Qaeda network in Yemen, where Abdulmutallab was apparently radicalized and trained, although he had been originally recruited, they say, in London. During his stint in London as a student, Abdulmutallab had been President of the Islamic Society at University College London.

The incident has been described as a major intelligence failure exposing the ongoing weakness of US and British security infrastructures and procedures. According to President Barack Obama, intelligence agencies were unable to “connect and understand” separate strands of information that would have alerted them to the attempted attack. “What we have here is a situation in which the failings were individual, organizational, systemic and technological,” said one US official. “We ended up in a situation where a single point of failure in the system put our security at risk, where human error was compounded by systemic deficiencies in a way that we cannot allow to continue.”

More simply: no one is to blame.

===snipped===>British Security Surveillance

The problem is that the official narrative is already hopelessly littered with contradictions. Abdulmutallab was apparently first added to the UK Border Agency’s immigration watch list in May 2009 after failing to get a UK entry visa. “His refusal was not on national security grounds”, claimed an early BBC report rather earnestly, “but because he had been tagged as a potential illegal immigrant because he had applied to study at a bogus college… This would, in theory, have prevented him from entering the UK – but not from passing through the country, if he was in transit to another country.”

===snipped===>CIA and NSA

The narrative from the American side has now also taken shape. Security analyst Tom Burghardt provides a meticulous overview: Abdulmutallab was placed in a “catch-all” US terrorism watch list, the Terrorist Identities Datamart Environment (TIDE), containing 550,000 individuals. This by itself was not enough to put him on a no-fly list. But in September 2009, the National Security Agency (NSA) reportedly picked up intercepts among al-Qaeda leaders in Yemen planning an imminent terror plot by a Nigerian man. The intercepts were translated and disseminated “across classified computer networks”, including the National Counterterrorism Centre (NCTC) run by the Office of the Director of National Intelligence. Then in November, Abdulmutallab’s father, a former top Nigerian government official, provided detailed information to the US embassy in Nigeria warning that his son was a violent extremist.

“The father of terrorism suspect Umar Farouk AbdulMutallab talked about his son’s extremist views with someone from the CIA and a report was prepared, but the report was not circulated outside the agency”, reported CNN. The information supposedly sat in CIA headquarters in Langley, Virgina, for five weeks. Yet it is not actually clear whether this was indeed the case: “But an intelligence official said that the son’s name, passport number and possible connection to extremists were indeed disseminated”, CNN continued. “State Department spokesman Ian Kelly said department staff did what they were supposed to have done by sending a cable to the National Counterterrorism Center in Washington about the matter.”

“But officials did not revoke his two-year multiple-entry visa, which was issued in June 2008” added the BBC. “Instead, Mr Abdulmutallab’s file was marked for a full investigation should he ever reapply for a visa.”
And the State Department’s initial justification for this studious inaction? … (drum roll)… the information received contained “nothing specific” that would have alerted authorities to the attack.

===snipped===>"And Ye Shall Know The Truth and The Truth Will Set You Free"


Love "Light" and Energy



TOPs Blogger Role