A MYRIAD OF NEW PEOPLE WITH SIMILAR EMAIL ADDRESSES ARE JOINING PATRIOT MEETUPS- SUSPICIOUS ID DATA FOLLOWS THIS ARTICLE
Army embeds PSYOPS soldiers at local TV stations
A LARGE NUMBER OF NEW PEOPLE, WITH SIMILAR EMAIL ADDRESSES, JOINED NEARLY EVERY PATRIOT MEETUP, WITHIN THE LAST FEW WEEKS.
Salt Lake City, UT Hill Air Force Base
Miami Beach, FL Patrick AFB
Providence, RI Hanscom Air Force Base
Bangor, ME Dow Air Force Base
Hillsborough, NH Grenier Air Force Base
Ohio Tamara Kline <email@example.com> ;
Columbus, OH Rickenbacker Air Force Base
Dodge City, KS vance air force base
California, Los Angeles Gillian Martin <firstname.lastname@example.org>;
Los Angeles, CA Los Angeles, CA AFB
Lubbock, TX Reese Air Force Base
California Shannon Van Nystrom <email@example.com
This member chose not to make their Meetup membership information public... SO WE GOT THEM ANYWAY.
PROFILE FOR OREGON: http://www.meetup.com/members/
MEETUPS JOINED WITH OREGON PROFILE:
WASHINGTON STATE Cruise Carter <ronpaulrevolution1776@yahoo.
PROFILE FOR WASHINGTON STATEhttp://www.meetup.com/members/
MEETUPS JOINED WITH THIS PROFILE:
Fairbanks, AK Eielson Air Force Base
Madison, WI US Air Force Base Exchange Service
2709 Sloan Blvd, Madison, WI 53704 (608) 249-5229
Dane County Air National Guard Base (RAP), Madison, WI, USA
Springfield, IL Scott AFB
Terre Haute, IN Hulman Field (ANGB IAP Terre Haute), Terre Haute, IN, USA
Wyoming Jen Madison <firstname.lastname@example.org> ;
Casper, WY Warren Air Force Base
Delaware Alexa Rivas
Missouri: Melanie Leverette
Columbia, MO Whiteman AFB
New Mexico Natalie Harper
Albuquerque, NM Kirtland Air Force Base
Wallingford, VT Plattsburgh Air Force Base CLOSED
Delaware Idaho Mississippi Hawaii
by Mike Masnick
Fri, Feb 18th 2011 11:02am
More HBGary Federal Fallout: The Government Wants To Buy Software To Fake Online Grassroots Social Media Campaigns
from the ipropaganda dept
The latest in the long line of revelations from the HBGary Federal email leak, is that HBGary Federal wanted to create software that could make it easy for staffers to create and maintain a massive number of fake online social network personas, allowing them to control virtual armies of totally fake people, whose only mission is to spy on others and spew paid-for propaganda. But, what's even more amazing is that not only did the emails reveal HBGary Federal employees talking about building a platform for letting people more easily manage an army of fake personas, but that the US government put out a request for exactly that kind of software last June, with its request for "Persona Management Software."
Software will allow 10 personas per user, replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user's situational awareness by displaying real-time local information.
Of course, once again we're seeing HBGary Federal in the middle of a plot that sounds like the script of a bad movie. Still, the question remains: are these kinds of actions par for the course, or did HBGary Federal's boss spend way too much time watching crazy SciFi movies and using them for inspiration?
By Erik Sherman | February 18, 2011
Bad enough that spammers are creating fake Facebook accounts that acquire connections with unsuspecting people, then inundate them with crap. Now, though, the U.S. military is looking for software and services to manage upwards of 500 fake online personas designed to interact with social media, presumably including such sites as Facebook and Twitter. Last year, the U.S. Air Force created the document, which resides in the federal government’s contract database:
Software will allow 10 personas per user, replete with background , history, supporting details, and cyber presences that are technically, culturally and geographacilly consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user’s situational awareness by displaying real-time local information.
Offer an outlet to disseminate propaganda as though it were the opinions of disinterested individuals.
Keep tabs on what military personnel do online.
What makes this story more complex is that one of the vendors interested in the contract was HBGary Federal, a division of HBGary allegedly hired by the U.S. Chamber of Commerce to attack Chamber critics, as my BNET colleague Alain Sherter writes. Bank of America (BAC) allegedly also hired HBGary Federal to develop plans to attack WikiLeaks, which had rumored to be readying a release of internal BoA documents.
- U.S. Call for “Internet Freedom” Could Rebound on Google, Facebook
- Chinese Hack Global Oil Industry and Other Business; What Else Is New?
- Bank of America Vainly Tries To Head Off WikiLeaks at the URL Pass
- WikiLeaks Cyberwar! Business Is a Target — and Also Collateral Damage
Spying on U.S Citizens — Uncle Sam turns his multi-billion dollar espionage network on U.S Citizens. Massive spike in domestic spy operations, Over 12,000 “special ops” personnel deployed daily, 100′s of Thousands of secret surveillance requests rubber stamped by crooked judges, secret illegal spy operations conducted in over 75 countries and over $11 billion spent annually to cover it all up. And this is only the tip of the iceberg that the feds were willing to declassify through various Freedom of Information Request. Much more still remains classified in the interest of National Security.
A series of previously classified documents obtained by The Federation of American Scientists Project on Government Secrecy reveals that spy operation against U.S citizens here in the homeland have spiked massively over the last year and so has the government’s cost to cover up their plethora of illegal activities.
But first a little background to explain how America has arrived to this point in the first place.
The Executive Branch of the US Government has found a loophole in the legal system that has effectively abolished the constitution by allowing our entire bill of rights to be suspended at will. This probably best explains it.
Understanding Enemy Combatant Status and the Military Commissions Act, Part I. Enemy Combatant Status: No More Pernicious Doctrine
The Hamdi Decision: A Defeat and Deadly Precedent
The 2004 Supreme Court decision in the case of Yasir Hamdi has been touted by many, including the ACLU, human rights organizations, and the mainstream press, as a victory for civil rights, the Constitution, and the rule of law. It is nothing of the sort. While the Hamdi majority paid lip service to limits on the executive in time of war and to “due process,” it joined Bush as a willing accomplice in his current attempt to murder the Bill of Rights.
Apologists for the Court point out that Bush did not get all that he wanted. That is true. Bush wanted absolute and plenary power to designate anyone, citizen or not, an “enemy combatant” and do as he pleased with them – detaining, interrogating, even torturing and executing them if he saw fit – with no judicial interference at all. Instead, the Court insisted that there be some manner of a deferential administrative hearing before Bush got to do as he wished. That is the only difference of any substance.
Rather than insisting that Hamdi, a U.S. citizen, receive all of the protections of the accused which are his due under the Bill of Rights, the Court breathed new life and legitimacy into this destructive doctrine that had lain around unused and nearly forgotten, like a dusty, but still dangerous “loaded weapon,” since the World War II Ex Parte Quirin decision (1942). The Hamdi Court, citing Quirin, stated unequivocally that “[t]here is no bar to this Nation’s holding one of its own citizens as an enemy combatant.” According to the majority on the Court, the mere labeling of a person as an “enemy combatant” removes the shield of the Bill of Rights and replaces it with a new judge-created system of minimal administrative process to “challenge” that designation.
Under this system, the accused will have none of the procedural protections of our Bill of Rights: No Grand Jury indictment; no trial by jury with its requirement of a unanimous verdict of twelve of one’s peers; no possibility of an unreviewable acquittal and immunity from further prosecution; and no protection against compelled self incrimination. The presumption of innocence is gone, as is the requirement of a showing of guilt beyond a reasonable doubt. Instead, the government will enjoy a presumption that its allegations are accurate. The accused will have the burden of proving his innocence, but will have no right to compulsory process of witnesses and no right to confront the secret evidence and witnesses against him.
At most, according to the Hamdi majority, “a citizen held in the United States as an enemy combatant [will] be given a meaningful opportunity to contest the factual basis for that detention before a neutral decision maker” and access to counsel to assist (as best they can) in that hearing. The Court made clear that the definition of “a meaningful opportunity” will have to be fleshed out by subsequent courts, and a military tribunal may qualify as a “neutral decision maker” for that minimal, administrative hearing to determine status. And this is touted as a victory.
How did we get here? As war is the greatest engine of tyranny known to man, it should come as no surprise that like many such usurpations before it, this doctrine of absolute power was born in the fires of war.
Source: Dirt Rhodes Scholar
The United States government has effectively undermined the very foundation of our Nation’s democratic roots and has destroyed the republic and all that for which it stands. Simply by alleging you are a terrorist, treasonous or a threat to national security without any due process of law whatsoever you immediately no longer have any constitutional rights or protections granted there under. Effectively our government has become an evil chameleon acting under the facade of a freedom loving democratic nation and protector of human rights only to shape shift into a ruthless totalitarian dictatorship at will.
Several articles from the Federation of American Scientists (FAS) Project on Government Secrecy reveals some stunning revelations about how out of control America’s espionage network has become through information learned from a series of documents obtained through Freedom of Information Act requests.
The information reveals that the US Government has been approved for hundreds of thousands of surveillance requests by categorically labeling hundreds of thousands of US Citizens as suspected “terrorists”, ie enemy combatants. As we have seen over the years the Department of Homeland Security is amassing a massive database of all kinds of “threats to National Security” from you local activists protesting against fracking that pollutes drinking water of millions of people to those attending anti-nuclear rallies.
The method really is ingenious. In essence the United States has declare war against its very own citizens and all civil and constitutional rights are immediately abolished.
The reports reveal the massive spike in domestic spying of alleged “suspected terrorists” has increased massively under the Obama administration and comes along with a bill of over $11 billion dollars to cover up their illegal activities, I mean classify them.
The massive increase in secrecy spending is also coupled with new that over 12,000 “special ops” are deployed in various covert operations on a daily basis to over 75 countries around the world.
- Courts rubber stamped 1,579 applications for foreign intelligence purposes, along with 96 applications for access to business records and a whopping 24,287 “national security letter” requests to spy on 14,212 different U.S. persons.
- While Obama has stumped on the campaign trail with repeated promises of “transparency” a sharp rise in national security secrecy under his watch was matched by a sharp increase in the financial costs of the classification system, causing classification-related costs to a whopping $11.42 which was a new record high.
- The US Special Operations Command (SOCOM) has grown steadily by 3 to 5% every year since 9/11 bring the total number of special forces personal to over 60,000 with a total annual cost of $9.8 billion for 2011 and a requested budget of $10.5 billion for 2012.
- It was reported that on any given day last year in excess of 12,000 Special Operations Forces are deployed in action in more than 75 countries across the globe.
FAS reports that the Feds have increased domestic spy operations in every available arena that they were required to report on. It should be noted that these figures do not include numbers for the various methods of spying on US citizens the Government implements for which they need not receive permission, such as warrant-less wiretapping, GPS tracking and of course the various CIA and NSA spy operations which are considered “a matter of national security.
FAS first reports on applications granted through the Foreign Intelligence Surveillance Court.
“During calendar year 2010, the Government made 1,579 applications to the Foreign Intelligence Surveillance Court (hereinafter ‘FISC’) for authority to conduct electronic surveillance and/or physical searches for foreign intelligence purposes,” according to the new report (pdf). This compares to a reported 1,376 applications in 2009. (In 2008, however, the reported figure — 2,082 — was quite a bit higher.)
They then also highlight espionage applications which granted access to spy on business records.
And finally touch base on the astounding level of “national security level” requests granted to the FBI
In 2010, the FBI made 24,287 “national security letter” requests for information pertaining to 14,212 different U.S. persons, a substantial increase from the 2009 level of 14,788 NSL requests concerning 6,114 U.S. persons. (In 2008, the number of NSL requests was 24,744, pertaining to 7,225 persons.)
Finally they note that there is no indication that the Federal Governments oversight spying on U.S citizens has grown the amount of spying that is being done.
A copy of the latest report to Congress, dated April 29, was released under the Freedom of Information Act.
A recent report from the Congressional Research Service addressed “Amendments to the Foreign Intelligence Surveillance Act (FISA) Set to Expire May 27, 2011 (pdf). FISA Amendments in the USA Patriot Act were discussed at a House Judiciary Committee hearing on “Reauthorization of the Patriot Act” (pdf) on March 9, 2011, the record of which has just been published. Related issues were discussed in another House Judiciary Committee hearing on “Permanent Provisions of the Patriot Act” (pdf) on March 30, 2011.
Next the FAS newsletter reveals the Federal governments tab to censor and cover up all of their illegal activities to maintain “national security” has grown over 15% since last year reach a staggering $11.42 billion for all “classification-related” expenses. They also reveal that over classification is one of the many contributing factors to the staggering increase in cost.
Ironically the costs for “classification” related expenses” did not include the costs for did not disclose security cost estimates for the large intelligence agencies — the Office of the Director of National Intelligence, the Central Intelligence Agency, the National Security Agency, the National Geospatial-Intelligence Agency, and the National Reconnaissance Office — because those costs are considered classified.
When pressed on why the costs of classification for the other agencies could be revealed the government responded because that is classified information. However, as FAS revealed the information is classified because somebody said it’s classified, not because it could demonstrably or even plausibly damage national security.
The rise in national security secrecy in the first year of the Obama Administration was matched by a sharp increase in the financial costs of the classification system, according to a new report to the President (pdf).
The estimated costs of the national security classification system grew by 15% last year to reach $10.17 billion, according to the Information Security Oversight Office (ISOO). It was the first time that annual secrecy costs in government were reported to exceed $10 billion.
An additional $1.25 billion was incurred within industry to protect classified information, for a grand total of $11.42 in classification-related costs, also a new record high.
Many factors contribute to the rise in secrecy costs, but one of them is widespread overclassification. Ironically, the new ISOO report provides a vivid illustration of the overclassification problem.
Secrecy News asked two security officials to articulate the damage to national security that could result from release of the security cost estimates for the intelligence agencies, but they were unable to do so. They said only that the classification of this information was consistent with intelligence community guidance. But this is a circular claim, not an explanation.
Finally the FAS newsletter touches base on the sharp increase in US special forces operations, nothing that special forces and the CIA worked hand in hand the reported assassination of Osama bin laden. Yes, “reported” is there words as well as mine. FAS reports the number of special operations personal has steadily risen 3-5% over the last several years. Over 12,000 Special Ops personnel are deployed to various missions on a daily basis with a budget that has increased from $2.1 billion in 2001 to $9.8 billion for the 2011 fiscal year and a request for $10.5 billion for the 2012 fiscal year.
U.S. Special Operations Forces continue to experience rapid post-9/11 growth, with swelling ranks, rising budgets and a new set of missions. Special operations forces were reportedly involved along with CIA personnel in the killing of Osama bin Laden in Pakistan on May 1.
“Special operations” are defined (pdf) as military operations that are “conducted in hostile, denied, or politically sensitive environments to achieve military, diplomatic, informational, and/or economic objectives employing military capabilities for which there is no broad conventional force requirement. These operations often require covert, clandestine, or low visibility capabilities…. Special operations differ from conventional operations in degree of physical and political risk, operational techniques, mode of employment, independence from friendly support, and dependence on detailed operational intelligence and indigenous assets.”
New doctrine (pdf) published last month for Special Operations lists 11 “core activities” versus 9 in the previous edition (2003), reflecting the addition of “security force assistance” — aiding the development of foreign security forces — and counterinsurgency. See “Special Operations,” Joint Publication 3-05, April 18, 2011.In addition to its core tasks, US SOCOM is also assigned by law (10 USC 167j) to perform “such other activities as may be specified by the President or the Secretary of Defense.” This is an open-ended category that is analogous to the statutory language used to authorize CIA covert actions, and it can be used to underwrite an almost unlimited variety of clandestine missions. But while there is a well-defined mechanism for congressional oversight of covert action, no similar process for congressional notification and review appears to exist for clandestine SOF missions.
A U.S. SOCOM Factbook, dated November 2010, is available here (pdf).
Traditionally all male, Special Operations Forces are recognizing new roles for women, Adm. Olson said. “Our attached female Cultural Support Teams (CSTs) allow us to reach key elements of the population in some environments which was not previously possible. This concept of attaching females to SOF units is effective and long overdue; we are urging the Services to recognize the capabilities of CSTs as essential military skills.”
Curiously, Adm. Olson cited the Office of Strategic Services, the CIA precursor organization, as an exemplar of innovation for SOCOM to follow, suggesting that more contemporary models were hard to find. “Our efforts to become more innovative include studying the best practices of other organizations. For example, we are inspired by the ability of the World War II’s Office of Strategic Services to rapidly recruit specialized talent, develop and acquire new technologies and conduct effective global operations within the period of its relatively brief existence.”
Other referenced documents in the Special Ops report which were in text clipped removed from the excerpt
- 2011 SOCOM posture statement (pdf)
- BUDGET REQUESTS FROM THE U.S. CENTRAL COMMAND, U.S. SPECIAL OPERATIONS COMMAND, AND U.S. TRANSPORTATION
- U.S. Special Operations Forces: Background and Issues for Congress (pdf)
Why Does Any Of This Matter To Me?
So you just mind your own business, do the daily rat race, come home sit on the couch and watch the tube. Rinse, later and repeat. You have nothing to worry about right?
Wrong! Let us not forget history, lest we be bound to repeat the same mistakes.
First they came for the communists,
and I didn’t speak out because I wasn’t a communist.
Then they came for the trade unionists,
and I didn’t speak out because I wasn’t a trade unionist.
Then they came for the Jews,
and I didn’t speak out because I wasn’t a Jew.
Then they came for me
and there was no one left to speak out for me.
And they will come for you. In fact they already are.
First they tortured a U.S. citizen and gang member …
I remained silent;
I wasn’t a criminal
Then they tortured a U.S. citizen, whistleblower and navy veteran …
I remained silent;
I wasn’t a whistleblower
Then they locked up an attorney for representing accused criminals …
I remained silent;
I wasn’t a defense attorney
Then they arrested a young father walking with his son simply because he told Dick Cheney that he disagreed with his policies …
I remained silent;
I’ve never talked to an important politician
Then they said an entertainer should be killed because she questioned 9/11 …
I remained silent;
I wasn’t an entertainer
Then they arrested people for demanding that Congress hold the President to the Constitution …
I did not speak out;
I’ve never protested in Washington
Then they arrested a man for holding a sign …
I did not speak out;
I’ve never held that kind of sign
Then they broke a minister’s leg because he wanted to speak at a public event …
I remained silent;
I wasn’t a religious leader
Then they shot a student with a taser gun and arrested him for asking a question of a politician at a public event …
I remained silent;
I wasn’t a student
They they decided that they could assassinate U.S. citizens without trial …
I said nothing;
I assumed I wasn’t on any hit list
When they came for me,
Everyone was silent;
there was no one left to speak out.
Inspired by the poem First They Came by Martin Niemöller, which was written about the Nazis.
I originally wrote this poem in 2007. I have updated it with the additional verse about assassinations.
- Did The CIA Assassinate Matt Simmons For Blowing The Whistle On The BP Gulf Oil Spill?
- Obama’s DoJ: Constitutionalists, Survivalists Such As The Tea Party, Glen Beck, Sarah Palin And Ron Paul Are Potential Terrorists
- Department of Defense Turns Nazi – Buys And Burns Every Copy of Book Revealing Evidence Of 9/11 Cover Up
- 1st Amendment suspended; BP Gulf Oil Spill Coverup Now Violates US Constitution And Bill of Rights
- US And EU Nations In Secret Talks To Implement “Great Firewall Of Europe” To Censor Internet Just Like China
John Perna <JPerna@sc.rr.com> ;
The Obama Deception HQ Full length version
To be removed from my address book,