Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]

Friday, June 13, 2015 - [[[[[[[[[[[[[[[[[[[[[[ National Whistleblower Center ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[[[ Project - N.N.O.M.Y ]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]

Monday, August 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[[ Project - Y.A.N:D ]]]]]]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ The National Network Opposing The Militarization of Youth ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]

Sunday, July 13, 2014 - [[[[[[[[[[[[[[[[[[[[[[ One Nation Under Surveillance ]]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The NSA - ]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[[[[[[[[[ Nullify The  NSA - ]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis - Income Tax Research ]]]]]]]]]]]]

Saturday, January 18, 2014 - [[[[[[[[[[[ Whatis - Income Tax Research ]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Stop Funding Criminal Government - Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[ The Lone Gladio By Sibel Edmonds ]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[ Bin Laden Worked With U.S. Government After 9/11 ]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]

Thursday, Sept 11, 2014 - [[[[[[ U.S. Government 'Directly Involved' In Terror Plots ]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]

Thursday, October 12, 2015 - [[[[[[[[[[[[[[ The Attacks Will Be Spectacular ]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ Disseminate Widely ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[ Reality Check More Americans Rethinking 9/11 ]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]

Thursday, Sept 11, 2014 - [[[[[[[[[[[[[[[[[[[[[[[[[ We Will N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]
[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[ N.E.V.E.R. Forget ]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]

Cost of War to the United States

Friday, September 16, 2011

Former Senator Bob Graham Urges Obama to Reopen Investigation into Saudi Role in 9/11 Attacks

By Juan Gonzalez and Amy Goodman - Posting #168

Former Florida governor and senator Bob Graham is calling on President Obama to reopen the investigation into the Sept. 11 attacks after new information has emerged about the possible role of prominent Saudis in the 9/11 plot.

Yea Bob - Sure: WTF! - Zelikow Appointed to Obama's Intelligence Advisory Board - WTF!

According to recent news reports, a wealthy young Saudi couple fled their home in a gated community in Sarasota, Florida, just a week or so before Sept. 11, 2001, leaving behind three cars and nearly all of their possessions. Indira Singh Testimony 2004

The FBI was tipped off about the couple but never passed the information on to the 9/11 Commission investigating the attacks, even though phone records showed the couple had ties to Mohamed Atta and at least 10 other al-Qaeda suspects. Graham joins us to discuss the news he’s called "the most important thing about 9/11 to surface in the last seven or eight years." As the former chair of the Senate Select Committee on Intelligence, a post he held on September 11, 2001, Graham chaired the Congressional Joint Inquiry into the attacks.

He’s just written a novel called "Keys to the Kingdom,” which follows a fictitious former senator and co-chair of the 9/11 congressional inquiry who is murdered near his Florida home after he uncovers an international conspiracy linking the Saudi Kingdom to Osama bin Laden and al-Qaeda. Graham says he chose to write the novel after his 2000 non-fiction book, "Intelligence Matters," was heavily censored.

"And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



Recently Deceased Crown Prince Sultan and his son Bandar “Bush” Epitomize Highly Questionable Saudi 9/11 Connections

Zelikow: 9/11 Master Criminal Appointed By Obama

Report: Intelligence Unit Told Before 9/11 to Stop Tracking Bin Laden

EXCLUSIVE: New Documents Claim Intelligence on Bin Laden, al-Qaeda Targets Withheld From Congress' 9/11 Probe

New Documents Suggest DoD Watchdog Covered Up Intelligence Unit's Work Tracking 9/11 Terrorists

New Documents Suggest DoD Watchdog Covered Up Intelligence Unit's Work Tracking 9/11 Terrorists

By Jeffrey Kaye and Jason Leopold - Posting #167

Senior Pentagon officials scrubbed key details about a top-secret military intelligence unit's efforts in tracking Osama bin Laden and al-Qaeda from official reports they prepared for a Congressional committee probing the 9/11 terrorist attacks, new documents obtained by Truthout reveal.

Moreover, in what appears to be an attempt to cover up the military unit's intelligence work on al-Qaeda and Bin Laden prior to 9/11, a September 2008 Defense Department (DoD) Inspector General's (IG) report that probed complaints lodged by the former deputy chief of the military unit in question, the Asymmetrical Threats Division of Joint Forces Intelligence Command (JFIC), also known as DO5, about the crucial information withheld from Congress, claimed "the tracking of Usama Bin Ladin did not fall within JFIC's mission."

But the IG's assertion is untrue, according to the documents obtained by Truthout, and the discrepancy undercuts the official narrative about who knew what and when in the months leading up to 9/11.

Much of JFIC's work on al-Qaeda and Bin Laden remains shrouded in secrecy and has not been cited in media reports revolving around pre-9/11 intelligence, which has focused heavily over the past decade on CIA and FBI "intelligence failures." Only a few details about the military intelligence unit have surfaced since then, notably in two previous reports published recently by Truthout.

JFIC was the intelligence component of United States Joint Forces Command (JFCOM). In 2005, it was renamed the Joint Intelligence Command for Intelligence. Last month, JFCOM was shuttered, reportedly the victim of Pentagon budget cuts, and as a subcommand, JFIC was believed to have been disbanded along with it.

Truthout had previously reported that the deputy chief of the Asymmetrical Threats Division, who is identified in government documents by the code name "Iron Man," alleged his unit was told to stop tracking Bin Laden as well as suspected al-Qaeda terrorists and members of the Taliban some months prior to 9/11.

Iron Man, whose unit developed original intelligence on al-Qaeda targets, which included the World Trade Center and the Pentagon, documents show, further claimed that the orders his unit received, as well as the work it conducted, was knowingly withheld from investigators working for the House and Senate Intelligence Committees, who were tasked with probing the circumstances behind the 9/11 attacks.

When the DoD prepared its report based on Iron Man's complaints, the IG concluded Iron Man's most explosive allegations were unfounded. But a close look at the report reveals numerous flaws.

Although the IG did confirm that Asymmetrical Threats Division analysts were told to stop tracking Bin Laden, suspected al-Qaeda terrorists and members of the Taliban, the watchdog determined that the Asymmetrical Threat Division had "not completed original intelligence reporting" and that "JFIC did not" specifically have a "mission to track Usama bin Ladin or predict imminent US targets." (Emphasis added.)

Furthermore, the appendices in the IG's report shows significant changes were made to JFIC's original responses to Congressional investigators about its pre-9/11 intelligence work on al-Qaeda, the Taliban and Bin Laden. The information regarding the military unit's work turned over to Congress described a substantially attenuated picture of JFIC's operations.

The report also determined "operational information in response to the 9/11 Commission" about Asymmetrical Threats Division had not been withheld. Yet, Iron Man had charged the information was withheld from Congressional investigators probing the 9/11 attacks, not the independent 9/11 commission. The IG's report repeatedly confused the two investigative bodies.

A Pentagon spokesman and officials who helped prepare the report did not return calls for comment.

New Documents Challenge Watchdog's Conclusions

Iron Man, who requested anonymity in order to protect his family's privacy, filed a Freedom of Information Act (FOIA) request in 2006 seeking a copy of the complaint he filed with the IG and other documents pertaining to JFIC's duties. He received a copy of his complaint in April, just a few weeks prior to the death of Bin Laden. That document, as well as the IG's findings, formed the basis of Truthout's two previous reports on JFIC's activities. But over the past month, Iron Man provided Truthout with documents he received in March 2010 in response to his FOIA request that shed additional light into JFIC's work and called into question the veracity of the IG's investigation into the charges he leveled.

Indeed, one batch of documents Truthout obtained from Iron Man consists of a slide presentation for a briefing to be held for the head of counterintelligence and counterterrorism at the Naval Criminal Investigative Service (NCIS). The date of the meeting could not be confirmed, but appears to have taken place sometime in 2000 or earlier.

The slides, "NCIS Support to Joint Forces Intelligence Command and NCIS Field Office, Norfolk," describe the duties assigned to an NCIS transfer of one of its counterintelligence, counterterrorism (CT) agents, who was made deputy chief of JFIC's Asymmetric Threat Division. This slide appears to be a description of Iron Man's responsibilities.

Contradicting the IG's conclusion on JFIC's work, one of the slides explicitly states, "JFIC routinely supplements national agencies with original intelligence on UBL [Usama Bin Ladin] and Afghanistan." (Emphasis added.)

The slide presentation further notes that the Asymmetrical Threats Division has "primary division focus" on both counterterrorism and military "force protection." Moreover, the briefing slides state that JFIC's "Primary CT/force protection concerns" as "UBL [Usama Bin Ladin] and associated terrorist groups," adding that its goal was to determine when Bin Laden and other terrorists would strike, "How they will strike" and "Where they will strike."

According to the documents, Asymmetrical Threats Division personnel monitored open-source intelligence, national imagery data and sensitive compartmented intelligence, as well as worldwide counterterrorism and counterintelligence communications, including communications and electronic intelligence databases from the National Security Agency (NSA).

The information from the briefing backs up what Iron Man previously told Truthout: that Asymmetrical Threats Division "worked closely" with the counterterrorism office at the National Geospatial Intelligence Agency, which collects, analyzes and distributes geospatial intelligence related to national security, or that, "upon request," it provided information on terrorist movements to the CIA.

According to the slide briefing, the Asymmetrical Threats Division had what is known as "gamma" security clearance, indicating analysts had access to extremely sensitive classified information, according to a description of the classification level by Matthew Aid in an unrelated New York Times report.

Another document Iron Man turned over to Truthout is a January 2001 confidential "Point Paper" that describes the Asymmetrical Threats Division as having "prepared numerous assessments of those cities most likely to be targeted by international and domestic terrorists," confirming Iron Man's claims that part of his unit's work did consist of producing intelligence on domestic targets by terrorists.

Definition of "Hijackers"

In attempting to refute Iron Man's claims about JFIC's work, the IG's report stated, "the 9/11 Commission questions were very specific and asked for information which involved the 'imminent attack' or 'hijackers involved.' Evidence indicated that the JFIC did not have knowledge regarding imminent domestic targets prior to 9/11 or specific 9/11 hijacker operations."

Truthout has learned that the definition of "hijackers," as perceived by the military intelligence unit, was overly restrictive. The definition of "hijackers" only referred to the hijackers in the planes and not the alleged planners, such as Khalid Sheikh Mohammed, or Bin Laden.

In his complaint to the IG, Iron Man wrote that the Asymmetrical Threats Division had produced "numerous original reports, with original imagery, measurements & signatures intelligence, or electronic intelligence, identifying probably [sic] and possible movements and locations of Usama bin Ladin and Mullah Omar." The intelligence included "bin Ladin's likely residence in Qandahar ... evidently the house in which Khalid Shaykh Muhammed planned the 9/11 attacks."

In summer 2000, the Asymmetrical Threats Division briefed "a DIA senior intelligence officer" on "The Search (for UBL Usama Bin Ladin]) - A CINC [Commander-in-chief] Level View." According to the complaint letter to the IG, "The briefing provided numerous examples and suggestions of how UBL was being hunted by JFIC and could be hunted by the IC [intelligence community]."

Iron Man would not provide the names of the individuals that the Asymmetrical Threats Division briefed because that information is classified. But the personnel included intelligence officials from CIA, Defense Intelligence Agency, NCIS, NSA and high-level command officials at JFIC. The most senior official briefed appeared to be Vice Adm. Martin J. Meyer, the deputy commander-in-chief of Joint Forces Command.

Vice Admiral Meyer, as Truthout previously reported, told Maj. Gen. Larry Arnold, the commander of the Continental United States North American Aerospace Defense Command Region (CONR) and other high-level CONR staffers two weeks before the 9/11 attacks that "their concern about Osama bin Laden as a possible threat to America was unfounded and that, to repeat, 'If everyone would just turn off CNN, there wouldn't be a threat from Osama bin Laden.'"

Since Meyer was specifically briefed on al-Qaeda's interest in attacking targets in the United States and in particular New York and the Pentagon, it is difficult to understand why he would call threats related to Bin Laden as "unfounded."

Significant Changes Made to JFIC's Official Response

Perhaps the most salient issue with the IG's report is that it completely conceals the information that was withheld from Congressional investigators.

According to the report, on March 11, 2002, the Director of the Defense Intelligence Agency, Vice Adm. Thomas R. Wilson tasked JFCOM to provide it with information concerning its activities "in support of the 9/11 Commission." As the IG's report points out, the public law creating the 9/11 Commission was not effective until November 2002, so Vice Admiral Wilson can only be responding to a request from the Congressional joint inquiry and not the 9/11 Commission.

The IG's report indicates JFCOM sent a "tasker" to JFIC two days later, indicating it was an urgent matter and the 13 items "derived from the original DIA [Defense Intelligence Agency] tasker" were due by March 22.

A "JFIC senior naval officer," the report states, gathered the information from the different departments within the military unit. The responses were then returned to JFCOM, where the Intelligence Director "reviewed the JFIC's input prior to release" to the DIA Congressional Affairs Office on March 25, 2002.

The original JFIC response was scanned and printed as Appendix B of the IG report. According to the IG, the "original questions and answers to 13 questions that USJFCOM [United States Joint Forces Command] forwarded" to the Defense Intelligence Agency were also scanned and are printed as the report's Appendix C. The scanned questions and answers that ultimately were sent to the Defense Intelligence Agency's Congressional Affairs Office and presumably on to Congressional investigators, are preceded by ten pages of superfluous material relating to JFIC actions taken after 9/11.

But the original questions and answers JFIC officials produced prior to March 22 (Appendix B) are not the same as the edited version that was sent to the Defense Intelligence Agency and Congress (Appendix C). Four questions and answers from Appendix C were deleted and one subsection and some of the other responses were scrubbed.

The IG report failed to highlight the difference and, indeed, the report still maintains the JFCOM version has "13 questions," though four questions were omitted after another "review."

There is no indication the scanned documents were redacted, which would have helped explain the omission, since the original material that was deleted and/or rewritten shows up unredacted in Appendix B.

According to the executive summary of the IG's report, JFIC's replies "were accurate and substantiated by our extensive review of available documentation and our 14 personnel interviews at all levels of Joint Forces Intelligence Command. We concluded that the Joint Forces Intelligence Command provided a timely and accurate reply in response to the 9/11 Commission. The United States Joint Forces Command forwarded the response to the Defense Intelligence Agency's Congressional Affairs Office."

JFlC's original responses "were forwarded to the USJFCOM [United States Joint Forces Command]. The USJFCOM Intelligence Director reviewed the JFIC's input prior to release to the DIA [Defense Intelligence Agency]."

The report, however, fails to note that the JFCOM review removed substantial portions of JFIC's replies to Congress.

What Was Missing

The missing portions largely relate to aspects of JFIC's mission that had to do with the breadth and depth of its anti-terrorism work. For instance, in item one, JFCOM deleted the original JFIC reply that it conducted "in depth discussions about potential terrorist attacks since Dec. 00."

The second item in the inquiry asked whether JFIC had information prior to 9/11 about "international terrorist cells operating in the United States." While JFIC answered this question in the negative, in their original response JFIC indicated they maintained "global situational awareness for areas such as CONUS [Continental United States] outside of the USJFCOM [United States Joint Forces Command] AOR [area of responsibility.]" They briefed pertinent information" at morning briefings, "but we did not track it." JFIC indicated the information "generally consisted of CIA and NSA reports."

In the altered version of the response sent to Congress, the words "such as CONUS" are deleted, as is the reference to CIA and NSA reports. The edited version completely eliminates the fact that JFIC was keeping track of NSA and CIA reports of terrorist activity as it related to the United States. Indeed, later in the report, the fact that JFIC also maintained a "24-hour watch floor," whose responsibility included monitoring of "worldwide events and terrorist issues," was also deleted.

According to the original JFIC response, after 9/11, it officially did take on responsibility for tracking "potential threats to CONUS." "As far as we know," the JFIC original responses state, "JFIC is one of the few DoD entities attempting to track potential terrorist activities within CONUS."

One of the missing items in the version of the JFIC answers sent to Congress concerned the names and positions of JFIC counterterror personnel. This was not redacted for classification purposes, as they appear in the IG report, Appendix B. Instead, back in 2002, the lack of any such names meant there was no one identifiable from JFIC to call as a witness.

At other points in the edited version of the JFIC responses, descriptions of the unit's analytic work, in particular aspects that seem pertinent to Asymmetrical Threats Division's work, are left out. It is noteworthy that even in the original JFIC response to the questionnaire, the mission Joint Forces Command was given was distorted.

According to the original inquiry response (and left out of the final version), "Prior to Sept. 11, JFIC did not have a robust counter-terrorism mission. We did do some analysis, but since it did not directly support Joint Forces Command's AOR [area of responsibility], the analysts were directed to stop. As a result of this and normal military rotation, we did not have a large counter-terrorism analysis base to build on" after 9/11. (Emphasis added.)

Yet, in another portion of the original JFIC response and also deleted in the final version of the response, JFIC discusses its "process." According to JFIC, while they do "not conduct unilateral collection" of intelligence in the United States, nor liaison with "foreign counterparts," they do receive reports from "other agencies." "JFIC's process is to fuse all of the information that we have visibility on into one all-source threat picture," the questionnaire stated, noting JFIC reviewed 2,275 messages daily from intelligence and military sources.

Subsequently, JFIC personnel decide what to do with this information, noting that sometimes they may "try to do further analysis (connect the dots, possibly produces a special analytic product), or ... follow-up with the reporting agency."

In a section erased from the JFIC response to Question 12 from Congressional investigators, JFIC describes their process as one of fusing "all of the information that we have visibility on into one all-source threat picture." This is similar to Iron Man's description of the Asymmetrical Threats Division in his complaint to the IG, when he described his former unit as "a forerunner of current all-source fusion centers.... able to develop and use all-source, original analysis in a manner probably then unprecedented within the intelligence community."

If the report's narrative sequence can be trusted, the JFCOM director either directly, or under his or her supervision, significantly altered the reply to Congressional Joint Inquiry investigators. Furthermore, due to the fact that items 7, 9, 11 and 13 are missing from the final document sent to the Defense Intelligence Agency it would have had to be apparent to the individual(s) reading that a chunk of information was missing.

While Congressional investigators were not provided with this intelligence on JFIC's work, there were still other opportunities to pass the information along. In Spring 2002, a colleague informed Iron Man that none of the documents that could verify Asymmetrical Threats Division's work was being sent to Congress.

The former deputy chief and later "Acting Chief" of Asymmetrical Threats Division contacted the Defense Intelligence Agency's Congressional Affairs Office himself and offered to personally send the documentation, including the slides and "point paper."

Those materials were instead sent to the Defense Intelligence Agency. Whether it made its way to Congress is unknown. The December 2002 unclassified Congressional Joint Inquiry report never mentions US Joint Forces Command, JFIC, or Asymmetrical Threats Division or their work, nor does the 9/11 Commission Report published several years later.

Current and former lawmakers who worked on the Congressional committees probing the 9/11 attacks, including former Senator Bob Graham (D-Florida), did not respond to phone calls and emails seeking comment about whether they received any briefings about the military intelligence unit's counterterrorism work pertaining to al-Qaeda, Bin Laden, and the Taliban.

Iron Man told Truthout, however, that he and his colleagues would "damn sure comment" on JFIC's work if given the opportunity to speak with lawmakers.

But, Iron Man said, "the only manner in which any former DO5 [another name for JFIC] personnel could probably comment would be if requested by Congress/Congressional staff and permitted by DoD."

"And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy



IronMan Slides

IG Report

Intelligence on Bin Laden, al-Qaeda Targets Withheld From Congress'9/11 Probe

Dignitaries, brass to officially dissolve JFCOM today

Profile: Martin Mayer

Intelligence Unit Told Before 9/11 to Stop Tracking Bin Laden

Geospatial Intelligence

Sunday, September 4, 2011

Summary: ZDNet's USA PATRIOT Act series

By Zack Whittaker -- Posting #166 -- A little dated, but, good info :)

A summary of four extensively detailed posts, of how the Act can access data held outside the United States.

This executive summary recaps a series of posts and a year’s worth of research on how the USA PATRIOT ACT impacts cross-border clouds, and considers whether data is safe from the risk of interception or unwarranted searches by U.S. authorities; even European protected data.

Although this is a U.S.-oriented site and I am a British citizen, the issues I surface here affect all readers, whether living and working inside or outside the United States.

In short:

U.S. law enforcement could use the USA PATRIOT Act on a U.S.-based organizations – like Microsoft, Google, Intel or Amazon, for example — to force its local subsidiary companies across the world into handing over user data to U.S. authorities.

EU data once may have ‘had to stay in Europe’, but this is on the most part untrue. The Safe Harbor framework, designed to protect EU data in the United States, protects merely the transfer of data from Europe to U.S. soil. But as soon as it arrived on U.S. soil, Safe Harbor can be superseded by America’s counter-terrorism law.

U.S. corporations survive by having subsidiary or smaller companies in foreign locations, to communicate and collaborate with their clients on the ground in their locale. These subsidiary companies are wholly owned and controlled by their U.S. parent. If a U.S. parent company receives a request from the U.S. government to inspect data held by a subsidiary company in a foreign location, the subsidiary would therefore have no choice but to hand over the data to their U.S.-based parent.

As a result, universities, businesses and organizations which hold vast quantities of student and citizen data in the European cloud, are not protected against the U.S. counter-terrorism laws, which arguably infringe the freedoms and liberties of non-U.S. citizens.

No company or organisation can wholly guarantee that data in European data-centers will under no circumstances leave European soil. Until a company comes forward and unequivocally states otherwise, then this series of posts stands true.

The ‘cloud’ is an abstract concept to newcomers: Access is granted from any device anywhere in the world. It stores files under your name, from photos to video and work documents. But in reality, these files are on a server in a data-center — on sovereign territory, somewhere, where a government’s law applies.

Though the notion of ‘privacy’ in itself has become diluted with social networking settings and the loss or theft of mobile devices, privacy in itself relates directly back to the individual. As previously discussed, there is no such thing as “I have nothing to hide”.

More often than not, this will be the United States; even if you live elsewhere in the world. The vast majority of ordinary citizens will think nothing of this conundrum. They should start paying attention along with the businesses that control vast quantities of citizen data.

"And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy


References: Ten years later: IT and life lessons from the South Tower

Ten Years Later: Surveillance in the "Homeland"

Microsoft admits Patriot Act can access EU-based cloud data

Part 1: USA PATRIOT Act and the controversy of Canada
The controversy of Canada, cloud computing and an act of law which holds America’s closest neighbor to data protection ransom.

Part 2: Safe Harbor: Why EU data needs ‘protecting’ from US law
An overview of the Safe Harbour principles, which allow data to flow freely between Europe and the US; but not without caution.

Part 3: Case study: How the USA PATRIOT Act can be used to access EU data
A case study examining how European universities, and organizations even further afield, are risking their students’ and customers security by outsourcing to the cloud.

Part 4: USA PATRIOT Act: The myth of a secure European cloud
Concluding thoughts of the consequences of the USA PATRIOT Act on EU cloud data.

Saturday, September 3, 2011

Pentagon Frets Over Wasted Billions (Ignores Missing Trillions)

By James Corbett - Global Research TV - Posting #165

An investigative committee released a report this week estimating that the US Government has lost as much as $60 billion to waste, fraud and corruption in Iraq and Afghanistan over the past decade.

The report is the work of the Wartime Contracting Commission, established by Congress in 2008 to investigate funds and contracts in support of US military operation. Rather than advocating a reduction in a ballooning military budget that has nearly doubled since the false flag terrorist incident of 9/11, however, the report makes the case that budget cuts to the Department of Defense will actually increase the wastage and instead argues that massive increases in spending need to be maintained.

Touted as a team of “independent investigators,” the report is being hailed as a serious attempt to get a handle on the budget of the government agency most notorious for waste, fraud and corruption.

What is not being noted is that the commission includes such members as Dov Zakheim, the comptroller of the Pentagon under the first George W. Bush administration when a DOD Inspector General report established that the Pentagon was unable to account for over 2.3 trillion dollars in transactions.

Zakheim was a member of the neocon Project for a New American Century and a signatory to their 2000 document, Rebuiding America’s Defenses, which called for a “new Pearl Harbor” to justify a transformation of the US military.

Prior to taking over the Pentagon’s finances, Zakheim was an executive at System Planning Corporation, a defense contractor which specialized in advanced technologies, including systems for remotely controlling aircraft.

Earlier this summer, Zakheim wrote an op-ed in Foreign Policy lamenting proposed defense spending cuts and arguing that any such cuts should be made to veteran’s health benefits and pensions.

Despite the fact that the Pentagon has been unable to account for trillions of dollars, it has not been subject to an audit by the Government Accountability Office in the modern era.

Donald Rumsfeld was asked about the status of the Pentagon’s missing trillions for the first time this year, not by a newspaper or television reporter, but by a group of citizen journalists who post their videos to YouTube.

The new report on the wasted billions blames the problem on corruption, bribery and profiteering, amongst other factors, and comes out just as a new investigation from The Center for Public Integrity has revealed that defense spending on no-bid contracts has tripled in the last 10 years. The Pentagon now spends over $140 billion a year on no-bid contracts to private contractors like KBR, compared to $50 billion in 2001.

The modern era of military contracting began in 1992, when then-Defense Secretary Dick Cheney offered Halliburton subsidiary KBR $9 million to conduct a study on the use of private companies to provide civil logistical support to the US military. KBR concluded that private contracting was in the US’ interest. Cheney awarded the first contract under the KBR study proposal to KBR itself, and three years later he became Halliburton’s CEO.

Cheney was also a signatory to the PNAC document calling for a new Pearl Harbor and was Vice President when that Pearl Harbor incident occurred on 9/11/2001. Subsequently, KBR was awarded 10s of billions of dollars in sweeping military contracts to provide civil logistics in Afghanistan and Iraq.

The US government is currently suing KBR (LOL) for $100 million for fraud and overspending related to these contracts.

"And Ye Shall Know The Truth And The Truth Shall Set You Free"


Love "Light" and Energy


References: TCR-Episode 198 – Further Down the 9/11 Money Trail

Halliburton Watch

Windfalls of War

Flight Termination System

Commission On Wartime Contracting

Federal Contracts

GSA Contract/GSA Schedule

Government RFPs & Bids

TOPs Blogger Role