Revealed – Patent Office Weighs Patent Secrecy for “Economic Security”

In response to congressional direction, the U.S. Patent and Trademark Office is considering whether to expand the scope of patent secrecy orders — which prohibit the publication of affected patent applications — in order to enhance “economic security” and to protect newly developed inventions against exploitation by foreign competitors.

Currently, patent secrecy orders are applied only to patent applications whose disclosure could be “detrimental to national security” as prescribed by the Invention Secrecy Act of 1951.  At the end of Fiscal Year 2011, there were 5,241 such national security secrecy orders in effect.

But now the Patent Office is weighing the possibility of expanding national security patent secrecy into the “economic security” domain.

“The U.S. Patent and Trademark Office is seeking comments as to whether the United States should identify and bar from publication and issuance certain patent applications as detrimental to the nation’s economic security,” according to a notice that was published in the Federal Register on April 20.

That would be a mistake, I wrote in my own comments submitted to the Patent Office yesterday.

Economic security — which could conceivably implicate all new inventions — is not analogous to the more limited domain of national security-related inventions, “so the use of secrecy orders is inappropriate to protect economic security,” I suggested.

Instead, the existing option for an applicant to request nonpublication of his or her patent application up to the point that the patent is issued is a superior alternative to a mandatory secrecy order, I wrote.  “The inventor is likely to be better qualified than any third party to assess the economic significance of the invention, and is also likely to be best motivated to protect his or her own financial interests.”

“The USPTO has not taken a position” on these questions, the Patent Office said in its April 20 notice, “nor is it predisposed to any particular views.”

Stauffenberg: Operation Valkyrie – Full Movie

 

This program tells the true story of the life of Claus von Stauffenberg and the plot to kill Hitler on July 20, 1944

Confidential – Govt Appeals Court-Ordered Release of Classified Document

Government attorneys said yesterday that they would appeal an extraordinary judicial ruling that required the release of a classified document in response to a Freedom of Information Act request.

The document in question is a one-page position paper produced by the U.S. Trade Representative (USTR) concerning the U.S. negotiating position in free trade negotiations.  It was classified Confidential and was not supposed to be disclosed before 2013.

But immediate disclosure of the document could not plausibly cause damage to the national security, said DC District Judge Richard W. Roberts in a February 29, 2012 opinion, and so its continued classification, he said, is not “logical.”  He ordered the government to release the document to the Center for International Environmental Law, which had requested it under FOIA.  (Court Says Agency Classification Decision is Not ‘Logical’, Secrecy News, March 2, 2012.)

This kind of independent review of the validity of classification decisions, which is something that judges normally refrain from doing, offers one way to curb galloping overclassification.

While the substance of the USTR document is likely to be of little general interest, the court’s willingness to disregard the document’s ill-founded classification and to require its disclosure seems like a dream come true to critics of classification policy.  If the decision serves as a precedent and a spur to a more broadly skeptical judicial approach to classification matters, so much the better.

But what may be a dream to some is a nightmare to others.  The bare possibility of such an emerging challenge to executive classification authority was evidently intolerable to the Obama Administration, which will now seek to overturn Judge Roberts’ ruling in the DC Circuit Court of Appeals.

Sinking Hitler’s Supership – Full Movie

 

Unveiled – Cyber Intelligence Sharing and Protection Act

[House Report 112-445]
[From the U.S. Government Printing Office]


112th Congress                                                   Report
                        HOUSE OF REPRESENTATIVES
 2d Session                                                     112-445

======================================================================



 
             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

                                _______
                                

 April 17, 2012.--Committed to the Committee of the Whole House on the 
              State of the Union and ordered to be printed

                                _______
                                

    Mr. Rogers of Michigan, from the Permanent Select Committee on 
                 Intelligence, submitted the following

                              R E P O R T

                             together with

                             MINORITY VIEWS

                        [To accompany H.R. 3523]

      [Including cost estimate of the Congressional Budget Office]

    The Permanent Select Committee on Intelligence, to whom was 
referred the bill (H.R. 3523) to provide for the sharing of 
certain cyber threat intelligence and cyber threat information 
between the intelligence community and cybersecurity entities, 
and for other purposes, having considered the same, report 
favorably thereon with an amendment and recommend that the bill 
as amended do pass.
    The amendment is as follows:
  Strike all after the enacting clause and insert the 
following:

SECTION 1. SHORT TITLE.

  This Act may be cited as the ``Cyber Intelligence Sharing and 
Protection Act''.

SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING.

  (a) In General.--Title XI of the National Security Act of 1947 (50 
U.S.C. 442 et seq.) is amended by adding at the end the following new 
section:
          ``cyber threat intelligence and information sharing
  ``Sec. 1104.  (a) Intelligence Community Sharing of Cyber Threat 
Intelligence With Private Sector.--
          ``(1) In general.--The Director of National Intelligence 
        shall establish procedures to allow elements of the 
        intelligence community to share cyber threat intelligence with 
        private-sector entities and to encourage the sharing of such 
        intelligence.
          ``(2) Sharing and use of classified intelligence.--The 
        procedures established under paragraph (1) shall provide that 
        classified cyber threat intelligence may only be--
                  ``(A) shared by an element of the intelligence 
                community with--
                          ``(i) certified entities; or
                          ``(ii) a person with an appropriate security 
                        clearance to receive such cyber threat 
                        intelligence;
                  ``(B) shared consistent with the need to protect the 
                national security of the United States; and
                  ``(C) used by a certified entity in a manner which 
                protects such cyber threat intelligence from 
                unauthorized disclosure.
          ``(3) Security clearance approvals.--The Director of National 
        Intelligence shall issue guidelines providing that the head of 
        an element of the intelligence community may, as the head of 
        such element considers necessary to carry out this subsection--
                  ``(A) grant a security clearance on a temporary or 
                permanent basis to an employee or officer of a 
                certified entity;
                  ``(B) grant a security clearance on a temporary or 
                permanent basis to a certified entity and approval to 
                use appropriate facilities; and
                  ``(C) expedite the security clearance process for a 
                person or entity as the head of such element considers 
                necessary, consistent with the need to protect the 
                national security of the United States.
          ``(4) No right or benefit.--The provision of information to a 
        private-sector entity under this subsection shall not create a 
        right or benefit to similar information by such entity or any 
        other private-sector entity.
  ``(b) Private Sector Use of Cybersecurity Systems and Sharing of 
Cyber Threat Information.--
          ``(1) In general.--
                  ``(A) Cybersecurity providers.--Notwithstanding any 
                other provision of law, a cybersecurity provider, with 
                the express consent of a protected entity for which 
                such cybersecurity provider is providing goods or 
                services for cybersecurity purposes, may, for 
                cybersecurity purposes--
                          ``(i) use cybersecurity systems to identify 
                        and obtain cyber threat information to protect 
                        the rights and property of such protected 
                        entity; and
                          ``(ii) share such cyber threat information 
                        with any other entity designated by such 
                        protected entity, including, if specifically 
                        designated, the Federal Government.
                  ``(B) Self-protected entities.--Notwithstanding any 
                other provision of law, a self-protected entity may, 
                for cybersecurity purposes--
                          ``(i) use cybersecurity systems to identify 
                        and obtain cyber threat information to protect 
                        the rights and property of such self-protected 
                        entity; and
                          ``(ii) share such cyber threat information 
                        with any other entity, including the Federal 
                        Government.
          ``(2) Use and protection of information.--Cyber threat 
        information shared in accordance with paragraph (1)--
                  ``(A) shall only be shared in accordance with any 
                restrictions placed on the sharing of such information 
                by the protected entity or self-protected entity 
                authorizing such sharing, including appropriate 
                anonymization or minimization of such information;
                  ``(B) may not be used by an entity to gain an unfair 
                competitive advantage to the detriment of the protected 
                entity or the self-protected entity authorizing the 
                sharing of information; and
                  ``(C) if shared with the Federal Government--
                          ``(i) shall be exempt from disclosure under 
                        section 552 of title 5, United States Code;
                          ``(ii) shall be considered proprietary 
                        information and shall not be disclosed to an 
                        entity outside of the Federal Government except 
                        as authorized by the entity sharing such 
                        information; and
                          ``(iii) shall not be used by the Federal 
                        Government for regulatory purposes.
          ``(3) Exemption from liability.--No civil or criminal cause 
        of action shall lie or be maintained in Federal or State court 
        against a protected entity, self-protected entity, 
        cybersecurity provider, or an officer, employee, or agent of a 
        protected entity, self-protected entity, or cybersecurity 
        provider, acting in good faith--
                  ``(A) for using cybersecurity systems or sharing 
                information in accordance with this section; or
                  ``(B) for not acting on information obtained or 
                shared in accordance with this section.
          ``(4) Relationship to other laws requiring the disclosure of 
        information.--The submission of information under this 
        subsection to the Federal Government shall not satisfy or 
        affect any requirement under any other provision of law for a 
        person or entity to provide information to the Federal 
        Government.
  ``(c) Federal Government Use of Information.--
          ``(1) Limitation.--The Federal Government may use cyber 
        threat information shared with the Federal Government in 
        accordance with subsection (b) for any lawful purpose only if--
                  ``(A) the use of such information is not for a 
                regulatory purpose; and
                  ``(B) at least one significant purpose of the use of 
                such information is--
                          ``(i) a cybersecurity purpose; or
                          ``(ii) the protection of the national 
                        security of the United States.
          ``(2) Affirmative search restriction.--The Federal Government 
        may not affirmatively search cyber threat information shared 
        with the Federal Government under subsection (b) for a purpose 
        other than a purpose referred to in paragraph (1)(B).
          ``(3) Anti-tasking restriction.--Nothing in this section 
        shall be construed to permit the Federal Government to--
                  ``(A) require a private-sector entity to share 
                information with the Federal Government; or
                  ``(B) condition the sharing of cyber threat 
                intelligence with a private-sector entity on the 
                provision of cyber threat information to the Federal 
                Government.
  ``(d) Report on Information Sharing.--
          ``(1) Report.--The Inspector General of the Intelligence 
        Community shall annually submit to the congressional 
        intelligence committees a report containing a review of the use 
        of information shared with the Federal Government under this 
        section, including--
                  ``(A) a review of the use by the Federal Government 
                of such information for a purpose other than a 
                cybersecurity purpose;
                  ``(B) a review of the type of information shared with 
                the Federal Government under this section;
                  ``(C) a review of the actions taken by the Federal 
                Government based on such information;
                  ``(D) appropriate metrics to determine the impact of 
                the sharing of such information with the Federal 
                Government on privacy and civil liberties, if any; and
                  ``(E) any recommendations of the Inspector General 
                for improvements or modifications to the authorities 
                under this section.
          ``(2) Form.--Each report required under paragraph (1) shall 
        be submitted in unclassified form, but may include a classified 
        annex.
  ``(e) Federal Preemption.--This section supersedes any statute of a 
State or political subdivision of a State that restricts or otherwise 
expressly regulates an activity authorized under subsection (b).
  ``(f) Savings Clause.--Nothing in this section shall be construed to 
limit any other authority to use a cybersecurity system or to identify, 
obtain, or share cyber threat intelligence or cyber threat information.
  ``(g) Definitions.--In this section:
          ``(1) Certified entity.--The term `certified entity' means a 
        protected entity, self-protected entity, or cybersecurity 
        provider that--
                  ``(A) possesses or is eligible to obtain a security 
                clearance, as determined by the Director of National 
                Intelligence; and
                  ``(B) is able to demonstrate to the Director of 
                National Intelligence that such provider or such entity 
                can appropriately protect classified cyber threat 
                intelligence.
          ``(2) Cyber threat information.--The term `cyber threat 
        information' means information directly pertaining to a 
        vulnerability of, or threat to, a system or network of a 
        government or private entity, including information pertaining 
        to the protection of a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(3) Cyber threat intelligence.--The term `cyber threat 
        intelligence' means information in the possession of an element 
        of the intelligence community directly pertaining to a 
        vulnerability of, or threat to, a system or network of a 
        government or private entity, including information pertaining 
        to the protection of a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(4) Cybersecurity provider.--The term `cybersecurity 
        provider' means a non-governmental entity that provides goods 
        or services intended to be used for cybersecurity purposes.
          ``(5) Cybersecurity purpose.--The term `cybersecurity 
        purpose' means the purpose of ensuring the integrity, 
        confidentiality, or availability of, or safeguarding, a system 
        or network, including protecting a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(6) Cybersecurity system.--The term `cybersecurity system' 
        means a system designed or employed to ensure the integrity, 
        confidentiality, or availability of, or safeguard, a system or 
        network, including protecting a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(7) Protected entity.--The term `protected entity' means an 
        entity, other than an individual, that contracts with a 
        cybersecurity provider for goods or services to be used for 
        cybersecurity purposes.
          ``(8) Self-protected entity.--The term `self-protected 
        entity' means an entity, other than an individual, that 
        provides goods or services for cybersecurity purposes to 
        itself.''.
  (b) Procedures and Guidelines.--The Director of National Intelligence 
shall--
          (1) not later than 60 days after the date of the enactment of 
        this Act, establish procedures under paragraph (1) of section 
        1104(a) of the National Security Act of 1947, as added by 
        subsection (a) of this section, and issue guidelines under 
        paragraph (3) of such section 1104(a); and
          (2) following the establishment of such procedures and the 
        issuance of such guidelines, expeditiously distribute such 
        procedures and such guidelines to appropriate Federal 
        Government and private-sector entities.
  (c) Initial Report.--The first report required to be submitted under 
subsection (d) of section 1104 of the National Security Act of 1947, as 
added by subsection (a) of this section, shall be submitted not later 
than one year after the date of the enactment of this Act.
  (d) Table of Contents Amendment.--The table of contents in the first 
section of the National Security Act of 1947 is amended by adding at 
the end the following new item:

``Sec. 1104. Cyber threat intelligence and information sharing.''.

                                Purpose

    The purpose of H.R. 3523 is to provide for the sharing of 
certain cyber threat intelligence and cyber threat information 
between the intelligence community and cybersecurity entities, 
and other purposes.

                     Committee Statement and Views

    At the beginning of the 112th Congress, the Committee, 
under the direction of Chairman Rogers and Ranking Member 
Ruppersberger, began a bipartisan effort to examine the issue 
of cybersecurity.\1\ The goal of this effort was to better 
understand the threats facing the nation in cyberspace--with 
respect to both the government and in the private sector--and 
to determine what the Intelligence Community could do to help 
better protect the nation. The results of this review were 
stunning: a number of advanced nation-state actors are actively 
engaged in a series of wide-ranging, aggressive efforts to 
penetrate American computer systems and networks; these efforts 
extend well beyond government networks, and reach deep into 
nearly every sector of the American economy, including 
companies serving critical infrastructure needs.
---------------------------------------------------------------------------
    \1\This effort involved a series of briefings and hearings, 
including one open hearing, to inform Committee members and, where 
possible, the public, about the serious national security threat posed 
by nation-state actors and other adversaries in the cyber realm. These 
meetings, briefings, and hearings were in turn supported by numerous 
meetings and briefings conducted by Committee staff with agencies and 
individuals from the Executive Branch including, among others, the 
White House, the Department of Homeland Security, the Department of 
Justice, including the Federal Bureau of Investigation, the Department 
of Defense, including the National Security Agency, and with experts 
from the academic and think-tank communities. The Committee staff also 
held numerous meetings with private sector companies and trade groups 
in industries including technology, telecommunications, financial 
services, utilities, aerospace, and defense. And the Committee staff 
met with representatives of privacy and civil liberties organizations 
including the Center for Democracy and Technology, the American Civil 
Liberties Union, the Electronic Frontier Foundation, the Constitution 
Project, and the CATO Institute, among others. In total, the Committee 
members and staff met with dozens of organizations in conducting its 
review over a nearly one-year period.
---------------------------------------------------------------------------
    Perhaps most troubling, these efforts are targeted not only 
at sensitive national security and infrastructure information, 
but are also often aimed at stealing the corporate research and 
development information that forms the very lifeblood of the 
American economy. China, in particular, is engaged in an 
extensive, day-in, day-out effort to pillage American corporate 
and government information. There can be no question that in 
today's modern world, economic security is national security, 
and the government must help the private sector protect itself.
    The Committee's review also revealed that while the 
government is already doing much to provide support and 
assistance to the private sector to address this threat, in 
particular through DHS and the FBI, more can and should be done 
in the immediate future. In particular, the Committee 
determined that the Intelligence Community is currently in 
possession of tremendously valuable intelligence and strategic 
insights derived from its extensive overseas intelligence 
collection efforts that can and should be provided--in both 
classified and unclassified form (when possible)--to the 
private sector in order to help the owners and operators of the 
vast majority of America's information infrastructure better 
protect themselves. The Committee believes that the recent 
Defense Industrial Base Pilot project (``DIB Pilot'') is a good 
model for demonstrating how sensitive government threat 
intelligence can be shared with the private sector in an 
operationally usable manner. Under the DIB Pilot, the 
government provides classified threat intelligence to key 
Internet Service Providers, who use the information to protect 
a limited number of companies in the defense industrial base, 
all on a voluntary basis.
    The Committee's review also determined that while much 
cybersecurity monitoring and threat information sharing takes 
place today within the private sector, real and perceived legal 
barriers substantially hamper the efforts of the private sector 
to protect itself. The Committee determined that these issues 
are best resolved in the first instance by providing clear, 
positive authority to permit the monitoring--by the private 
sector--of privately-owned and operated networks and systems 
for the purpose of detecting cybersecurity threats and to 
permit the voluntary sharing of information about those threats 
and vulnerabilities with others, including entities within the 
private sector and with the federal government.
    While some have suggested that the private sector needs 
more regulation or that the government ought to directly help 
defend certain portions of the private sector, the Committee's 
view is that the protection of the private sector is best left 
in private hands and that the government ought to provide as 
much intelligence as possible to the private sector before 
reaching for a regulatory ``stick.'' In the view of the 
Committee, such an approach--voluntary, private sector defense 
of private sector systems and networks informed by government 
intelligence information--best protects individual privacy and 
takes advantage of the natural incentives built into our 
economic system, including harnessing private sector drive and 
innovation.
    The Committee's review revealed that America's cyber 
infrastructure is distressingly vulnerable to espionage and 
attacks by nation-states and others with advanced capabilities. 
The Committee believes that immediate and serious action is 
necessary to staunch the bleeding of American corporate 
research and development information and to better protect our 
national security. In particular, the Committee believes that 
the Intelligence Community must take immediate and decisive 
action to provide intelligence to the private sector to help it 
better protect itself. In turn, the private sector must act 
aggressively to better monitor its own systems and to share 
information--both within the private sector and with the 
federal government on a purely voluntary basis. The Committee 
recognizes that because it focused on the issues within its 
jurisdiction, this legislation does not address many of the 
other issues facing the nation with respect to cybersecurity. 
At the same time, however, the Committee firmly believes that 
this legislation is an important first step in the effort to 
better protect the nation from advanced cyber threat actors.

               Committee Consideration and Rollcall Votes

    On December 1, 2011, the Committee met in open session and 
ordered the bill H.R. 3523 favorably reported, as amended.

                              OPEN SESSION

    In open session, the Committee considered the text of the 
bill H.R. 3523.
    Chairman Rogers offered an amendment. The amendment places 
additional restrictions on the use by the government of 
information obtained pursuant to the bill. The amendment was 
agreed to by voice vote.
    Mr. Thompson offered an amendment. The amendment requires 
an annual report by the Inspector General of the Intelligence 
Community reviewing the use of cyber threat information 
provided to the government pursuant to the bill. The amendment 
was agreed to by voice vote.
    Ms. Schakowsky offered an amendment providing that the 
Director of National Intelligence shall develop and 
periodically review policies and procedures governing the 
acquisition, retention, use, and disclosure of information 
obtained by the intelligence community pursuant to the bill. 
Subsequently, Ms. Schakowsky asked for and received unanimous 
consent to withdraw the amendment.
    The Committee then adopted a motion by the Chairman to 
favorably report the bill H.R. 3523 to the House, as amended. 
The motion was agreed to by a record vote of 17 ayes to 1 no:
    Voting Aye: Chairman Rogers, Mr. Thornberry, Mrs. Myrick, 
Mr. Miller, Mr. Conaway, Mr. King, Mr. LoBiondo, Mr. Nunes, Mr. 
Westmoreland, Mr. Rooney, Mr. Heck, Mr. Ruppersberger, Mr. 
Thompson, Mr. Langevin, Mr. Schiff, Mr. Boren, Mr. Chandler.
    Voting No: Ms. Schakowsky.

                      Section-by-Section Analysis


                         SECTION 1. SHORT TITLE

    The short title of the Act is the Cyber Intelligence 
Sharing and Protection Act.

      SECTION 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING

Section 2(a): In General

    This subsection of the Act amends Title XI of the National 
Security Act of 1947 by adding a new section, Section 1104.

Section 1104(a) of Title 50: Intelligence Community Sharing of Cyber 
        Threat Intelligence with Private Sector

    Subsection (a) of new Section 1104 provides for the sharing 
of cyber threat intelligence--both classified and 
unclassified--by elements of the Intelligence Community with 
entities in the private sector. It is the view of the Committee 
that the routine and fulsome sharing of such intelligence 
information with appropriate cleared entities and individuals 
within the private sector is critically important to protecting 
the nation from advanced cyber threats. It is critical that as 
much information as possible be shared at machine-speed, in 
real-time, and in a manner that the information--whether 
classified or not--is operationally usable by entities within 
the private sector.
    This subsection seeks to set forth a general framework and 
requires the establishment of specific procedures and 
guidelines to make such sharing happen in the immediate future 
and to permit such sharing to continue so long as the nation 
faces this significant threat to our national security. The 
Committee intends to engage in vigorous oversight of the 
Intelligence Community use of the authorities under this 
section and, in particular, the Office of the Director of 
National Intelligence (ODNI), which is charged with 
promulgating appropriate procedures and guidelines under this 
subsection. The Committee expects to be consulted by ODNI in 
the formulation of these procedures and guidelines to ensure 
that the Committee's intent is achieved by them.
    While the term ``private sector'' is not defined in the 
legislation, the Committee intends that term to be given the 
broadest possible meaning and specifically intends the term to 
include utilities, whether organized as public, private, or 
quasi-public entities, to ensure at the entities that provide 
Americans with access to power, water, gas, and other critical 
services are also provided with access to critical federal 
government intelligence regarding cyber threats.
    In addition, the Committee expects that private sector 
entities receiving classified intelligence pursuant to this 
subsection will use this information not only to protect their 
own systems and networks, but also, where they find appropriate 
as a business matter, to sell cybersecurity goods and services 
appropriately incorporating this information to protect other 
corporate customers.
            Paragraph 1: In General
    Paragraph (1) of subsection (a) requires the Director of 
National Intelligence to establish procedures to allow 
intelligence community elements to share cyber threat 
intelligence with the private sector and to encourage the 
sharing of such intelligence. The Committee intends the DNI's 
procedures to create a sea change in the current intelligence 
sharing practices of the Intelligence Community with respect to 
the private sector.
    First, the DNI's procedures should ensure that as much 
cyber threat intelligence as possible is downgraded to the 
lowest classification level possible, including 
declassification where appropriate, and made available to as 
broad an audience in the private sector as possible, consistent 
with the need to protect the national security.
    Second, the DNI's procedures should ensure that cyber 
threat intelligence, including classified information, is 
routinely and consistently provided out to entities and 
individuals in the private sector with the appropriate 
clearances.
            Paragraph 2: Sharing and Use of Classified Information
    Paragraph (2) of subsection (a) requires that the DNI's 
procedures with respect to classified cyber threat intelligence 
require that classified information only be shared with 
certified entities, as defined by the legislation, or with 
individuals who possess appropriate security clearances, and be 
consistent with the need to protect national security. 
Certified entities are cybersecurity providers, protected 
entities, or self-protected entities that possess or are 
eligible to obtain a security clearance and can demonstrate to 
the Director of National Intelligence that they are able to 
appropriately protect such classified cyber threat 
intelligence.
    Paragraph (2) also requires that the DNI's procedures 
provide that classified cyber threat intelligence only be used 
by certified entities in a manner that protects the classified 
information from unauthorized disclosure. This provision 
ensures that when certified entities employ classified 
intelligence to protect unclassified systems or networks, they 
do so in a way that does not reveal classified information 
directly or indirectly.
    The Committee expects that the DNI's procedures will be 
flexible in nature and will take account of private sector 
innovation and incorporate current and future information 
sharing and security best practices. As a result, the Committee 
expects the DNI to work closely with the private sector to 
establish these procedures, to work with the private sector to 
meet the requirements of the procedures, and to ensure that 
these procedures result in the routine and consistent sharing 
of operationally-usable cyber threat intelligence. The 
Committee also expects the DNI to review and revise these 
procedures on a regular basis, at least annually, and to 
conduct such review in cooperation with the private sector, as 
well as to account for new technologies developed by the 
private sector in each set of revised procedures. The DNI 
should also strongly consider the establishment of a private-
sector advisory committee composed of senior executives at key 
private companies to advise on these procedures on a regular 
basis.
            Paragraph (3): Security Clearance Approvals
    Paragraph (3) requires the DNI to issue guidelines allowing 
the head of intelligence community elements to grant temporary 
or permanent security clearances to certified entities and 
their employees and officers (including non-employee officers 
such as board members) in order to allow the government to 
share classified cyber security threat intelligence with those 
certified entities. The Committee's intent is that the 
intelligence community grant security clearances to entities 
that are involved in protecting their own and their corporate 
customers' networks from cyber threats and that the 
intelligence community share cyber threat intelligence to 
protect the nation from advanced cyber threat actors. In 
particular, the Committee wishes to ensure that the private 
sector be able to receive highly classified cyber threat 
intelligence, including at the Top Secret/Sensitive 
Compartmented Information level, as appropriate to protect 
national security. The Committee is concerned that certain 
industries and entities may currently lack sufficient 
clearances at the appropriate level.
    Paragraph (3) also requires the DNI's guidelines to allow 
intelligence community elements to grant approval for the use 
of appropriate facilities and to expedite security clearances 
as necessary, consistent with the need to protect national 
security. The Committee's intent is that the approval process 
for the granting of security clearances and the use of 
facilities for the handling of classified information be 
expedited and broadened by these provisions.
    Because additional security clearances or facility 
approvals may be necessary to effectuate the goals of this 
legislation, it is further the Committee's intent that the cost 
for these security clearances and facility approvals, as well 
as the underlying investigations and adjudications necessary to 
obtain and maintain them, be fully borne by the private sector. 
As noted above, it is the Committee's intent that private 
sector entities that become certified entities will be able to 
better protect themselves, as well as to sell cybersecurity 
goods and services appropriately incorporating this information 
to protect other corporate customers in the private sector. It 
is therefore the Committee's view that these entities should 
bear the full cost of obtaining access to the valuable cyber 
threat intelligence the government will provide under the 
legislation to certified entities. The Committee therefore 
expects that the DNI's guidelines authorized by the legislation 
will provide for full payment of such costs by the private 
sector entity obtaining the security clearances or facility 
approvals.
            Paragraph 4: No Right or Benefit
    Paragraph (4) makes clear that while the Committee expects 
the Intelligence Community to work with private sector entities 
to help them meet the requirements to serve as a certified 
entity, no private sector entity is entitled to receive cyber 
threat intelligence from the government and that no right or 
benefit to cyber threat intelligence is created by the 
provision of such intelligence to a particular private sector 
entity or group of entities.

Section 1104(b) of Title 50: Private Sector Use of Cybersecurity 
        Systems and Sharing of Cyber Threat Information

    Subsection (b) of new Section 1104 provides clear, positive 
authority, notwithstanding any other provision of law, to 
private sector entities to monitor their own systems and 
networks or those of their corporate customers through the use 
of cybersecurity systems to identify and obtain cyber threat 
information, and to mitigate threat or vulnerabilities to their 
own systems or networks or those of their corporate customers. 
The Committee intends the notwithstanding clauses contained in 
subsection (b), as applied to this authority, to have the 
effect of removing any prohibition, real or perceived, to the 
monitoring, for cybersecurity purposes, of private sector 
systems and networks by the private sector entities that own 
the systems or networks or by security companies contracted by 
the system or network owner to protect those networks and 
systems. Potential barriers to such cybersecurity monitoring 
include federal laws governing electronic surveillance.
    Subsection (b) also provides clear, positive authority, 
notwithstanding any other provision of law, for the private 
sector to share cyber threat information identified and 
obtained through such cybersecurity monitoring with other 
entities within the private sector, as well as with the Federal 
Government on a purely voluntary basis, at the discretion of 
the private sector entities whose systems or networks are being 
protected. The Committee intends the notwithstanding clauses 
contained in subsection (b), as applied to this authority, to 
have the effect of removing any prohibition, real or perceived, 
to the sharing of cyber threat information within the private 
sector, as well as with the Federal Government. Potential 
barriers to such sharing that would be addressed by this 
provision include, but are not limited to, provisions of 
federal antitrust law, which some believe may limit sharing of 
cyber threat information between competitors in the private 
sector, as well as provisions of other federal laws including 
the telecommunications laws. The Committee's intent in 
addressing antitrust issues, amongst others, is to permit 
information sharing about cyber threats that might be hampered 
by such laws, not to permit inappropriate and unlawful 
activity, such as the coordinated fixing of prices.
    The Committee notes that the protections related to the 
authorities provided in this section are fairly robust, even 
standing alone. First, as noted below, only cyber threat 
information--that is information about a threat to, or 
vulnerability of government or private systems or networks--may 
be identified, obtained, or shared. And any such monitoring or 
sharing may only take place for cybersecurity purposes. And 
finally, the liability protection provided in this subsection 
only applies when an entity is acting in good faith. These 
provisions, taken together and building on top of one another, 
in the Committee's view, are a strong step towards protecting 
the privacy and civil liberties of Americans.
            Paragraph 1: In General
    Paragraph (1) of subsection (b) provides the twin 
authorities discussed above to cybersecurity providers, who 
provide goods and services to their corporate customers for 
cybersecurity purposes and to self-protected entities, who 
provide such cybersecurity goods and services for themselves.
    In providing these authorities, the legislation makes clear 
that the monitoring and sharing of information either by a 
cybersecurity provider or a self-protected entity may only take 
place for cybersecurity purposes, a defined term that, as 
discussed below, limits the identification, obtaining, and 
sharing of cyber threat information to the protection of 
private or government systems or networks from threat to, or 
vulnerabilities, of those systems or networks.
    Similarly, the identification and obtaining of cyber threat 
information by a provider or a self-protected entity may only 
take place as part of an effort to protect the rights and 
properties of the provider's corporate customer or the self-
protected entity itself, as the case may be. In this context, 
it is the Committee's intent that the protection of the rights 
and property of a corporate entity includes, but is not limited 
to, the protection of the systems and networks that make up its 
own corporate internal and external information systems but 
also the systems and networks over which it provides services 
to its customers. For example, the Committee expects that an 
internet service provider or telecommunications company may 
seek to protect not only its own corporate networks but also 
the backbone communications systems and networks over which it 
provides services to its customers. Similarly, for example, the 
Committee expects that a utility may seek not only to protect 
its corporate network but may seek to protect the systems and 
networks over which it provides electricity, water, or gas 
services to its customers. The Committee specifically intends 
the authorities provided in subsection (b) to permit private 
sector entities to protect such systems and networks.
    Paragraph (1) also requires that a cybersecurity provider 
obtain the express consent, whether in writing, electronically, 
orally, or otherwise, of its corporate customer before 
conducting any cybersecurity monitoring or sharing under these 
authorities. It is the Committee's intent that express consent 
may be provided on a going-forward basis by a corporate 
customer to a provider for a specified period of time, to be 
determined by the corporate customer.
    In addition, paragraph (1) makes clear that the sharing of 
information either by a cybersecurity provider or a self-
protected entity is to be purely voluntary and at the 
discretion of the entity whose systems or networks are being 
protected. Moreover, the legislation requires that where a 
provider is doing the sharing on behalf of a corporate 
customer, the customer must designate the entities or group of 
entities it wishes to share information with, and that it must 
specifically designate the Federal Government if it wishes to 
share information with the government.
    It is the Committee's expectation that many entities will 
be able to take advantage of the authorities provided in 
paragraph (1) when acting both as a cybersecurity provider and 
as a self-protected entity. For example, an entity such as an 
internet service provider may act as a cybersecurity provider 
when providing managed security services to a corporate 
customer and may simultaneously be acting as a self-protected 
entity when protecting its own corporate systems and networks 
as well as the systems and networks over which it provides 
services to its customers. The Committee's intent is that 
private sector entities will be able to simultaneously take 
advantage of multiple authorities provided within the 
legislation.
            Paragraph 2: Use and Protection of Information
    Paragraph (2) of subsection (b) provides protections to 
promote the robust sharing of cyber threat information both 
within the private sector as well as from the private sector to 
the government on a purely voluntary basis.
    Paragraph (2) provides that cyber threat information shared 
pursuant to paragraph (1) may only be shared in accordance with 
restrictions placed upon such sharing by the protected entity 
or the self-protected entity whose systems and networks are 
being protected and who therefore authorized the sharing. 
Paragraph (2) further provides that these restrictions may 
include the appropriate anonymization or minimization as 
determined by the protected entity or self-protected entity 
authorizing the sharing.
    The Committee's intent is that through paragraph (1) and 
paragraph (2), a private sector entity choosing to share cyber 
threat information under these provisions has complete control 
over whom it shares with and what information it shares, 
including whether the information it shares is anonymized or 
minimized. The Committee believes that leaving the decision to 
share and the execution of desired anonymization and 
minimization in the hands of the private sector entities whose 
systems and networks are being protected, rather than in the 
hands of the party receiving the information, including the 
government, helps enhance privacy and civil liberties.
    Paragraph (2) also provides that information shared 
pursuant to paragraph (1) may not be used by a receiving entity 
to gain an unfair competitive advantage to the detriment of the 
entity sharing the information. The Committee intends this 
provision to highlight that cybersecurity is enhanced by robust 
threat information sharing within the private sector, both 
amongst partners and competitors, without fear that a 
competitor will use the cyber threat or vulnerability 
information to unfairly obtain greater market share rather than 
simply to protect itself. The situation the Committee intends 
this provision to address is best demonstrated by an example: 
Company A shares information about a cyber vulnerability in one 
of its products with Company B, a competitor in the same 
marketplace; Company B the next day puts out an advertisement 
saying, ``Don't buy Company A's product because it has the 
following vulnerability . . . instead, buy our product which 
doesn't have the same vulnerabilities.'' This example would, in 
the Committee's view, constitute gaining an unfair competitive 
advantage at the expense of the entity sharing the information. 
This provision does not prevent any company from obtaining a 
fair competitive advantage by, for example, using the shared 
information to build a better, more secure product that can be 
marketed without reference to a vulnerability shared by a 
particular entity.
    Paragraph (2) further provides that cyber threat 
information voluntarily shared with the Federal Government 
pursuant to paragraph (1) shall be exempt from disclosure under 
the Freedom of Information Act, shall be considered proprietary 
information, shall not be disclosed by the Federal Government 
to an entity outside the Federal Government except as 
authorized by the entity sharing the information, and shall not 
be used by the Federal Government for regulatory purposes. The 
Committee intends this provision to address the key concerns 
expressed by the private sector regarding the sharing of their 
sensitive information with the federal government: first, that 
the government might expose its most sensitive threat and 
vulnerability information to a wide audience either through 
FOIA or by publishing the information, thereby providing a 
roadmap for attacks by cyber threat actors; second, that the 
government might take the information provided by the private 
sector and use it to regulate or impose sanctions upon them.
    The Committee determined that the best way to address these 
concerns and incentivize the sharing of cyber threat 
information with the government was to explicitly and clearly 
protect the information provided in this cybersecurity channel 
from being disclosed under FOIA, to require the government to 
carefully protect the information, and finally, to prohibit the 
government from using information provided in this 
cybersecurity channel from being used for regulatory purposes.
    The Committee was cognizant of the fact that cyber threat 
information provided to the government under these authorities 
might also be required to be provided by certain private sector 
entities to their regulators and therefore provided elsewhere 
in the legislation that the mere classification of the 
information as cyber threat information or its provision to the 
government under this mechanism does not satisfy those 
regulatory requirements nor override any appropriate regulation 
that may take place based on the provision of such information 
to the government through other channels. Nor would these 
provisions prevent a third party from obtaining appropriate 
information through an otherwise appropriate FOIA request to a 
regulator who obtained the information under other regulatory 
authorities. Rather, the limitations here were designed to 
provide a safe harbor where private sector entities could 
provide real-time cyber threat information to the government 
without fear that that particular information would be used to 
regulate them directly or be exploited by bad actors.
            Paragraph 3: Exemption from Liability
    Paragraph (3) provides a bar to civil or criminal causes of 
action being brought or maintained in federal or state court 
against an entity or its officers, employees, or agents acting 
in good faith to use cybersecurity systems for monitoring to 
identify and obtain cyber threat information in accordance with 
the provisions of the legislation. The Committee's intent is to 
provide strong liability protection for private sector entities 
when they act to take advantage of the authorities provided 
under paragraph (1) of subsection (b) to do what the statute 
seeks to encourage them to do: robustly monitor their own 
systems and networks and those of their corporate customers and 
share information about threats and vulnerabilities to better 
protect their systems. Specifically, the Committee intends that 
civil or criminal actions based on the use of cybersecurity 
systems to monitor systems or networks to identify and obtain 
cyber threat information using the authorities of this statute 
shall be dismissed immediately by the courts and prior to 
significant discovery and extensive motion practice.
    Paragraph (3) also provides an identical bar to actions 
against such entities acting in good faith for not acting on 
information obtained or shared in accordance with the 
provisions of the legislation. The Committee's intent is 
likewise to provide strong liability protection to entities 
when they engage in robust cyber threat information sharing so 
that they are not held liable for not acting on every piece of 
cyber threat intelligence provided by the government or every 
piece of cyber threat information that they detect or receive 
from another private sector entity. The Committee believes that 
if information sharing does become truly robust, the amount of 
cyber threat information and the speed with which such 
information will be shared will make it nearly impossible to 
always protect against every threat in real-time and, as such, 
private sector entities ought not be held liable for such 
actions. Similarly, the Committee recognizes that particular 
entities may engage in a cost-benefit analysis with respect to 
implementing protections against particular threats and the 
Committee intends this provision to help ensure that a private 
sector entity making such a judgment not be held liable for 
making such reasonable determinations.
    At the same time, the Committee was fully cognizant of the 
concern that it not create a moral hazard by providing too 
broad a liability protection provision and that it not 
incentivize bad acts. As a result, Paragraph (3) requires that 
the entity be acting in good faith to obtain the benefits of 
this liability protection. That is, where an entity acts in bad 
faith, it does not receive the benefit of the strong liability 
protection provided by the legislation. Of course, where an 
entity is seeking to take advantage of specific statutory 
authority provided by Congress and where Congress is seeking to 
incentivize cybersecurity activities, as with government action 
taken pursuant to statutory authority and the presumption of 
regularity that attaches to such actions, the Committee expects 
that good faith will be presumed in the absence of substantial 
evidence to the contrary.
            Paragraph 4: Relationship to Other Laws Requiring the 
                    Disclosure of Information
    Paragraph (4) provides that the provision of cyber threat 
information to the government under the voluntary system 
established by this statute does not satisfy or affect any 
requirement under other provisions of law to provide 
information to the Federal Government. As noted briefly 
earlier, the Committee intends this provision to ensure that 
while information provided to the government under this 
legislation is protected from use by the government for 
regulatory purposes, that information otherwise required to be 
provided to the government must still be provided and that such 
information--required by other law to be provided to the 
government--may still be used for all lawful purposes, 
including, as required by law, for regulatory purposes.

Section 1104(c) of Title 50: Federal Government Use of Information

    Subsection (c) of new Section 1104 provides certain 
limitations on the government's use of information provided by 
the private sector and ensures that the private sector's 
provision of information to the government is purely voluntary. 
The Committee intends these provisions, along with others in 
the legislation, to help protect the privacy and civil 
liberties of Americans.
            Paragraph (1): Limitation
    Paragraph (1) of subsection (c) limits the Federal 
Government's use of information shared with the government by 
the private sector by requiring at least one significant 
purpose of the government's use of such information to be 
either a cybersecurity purpose or the protection of the 
national security of the United States. As such, the Committee 
intends this provision not to create a wall between 
cybersecurity and national security uses of information on one 
hand and all other lawful government uses on the other, rather 
it intends this provision simply to ensure that the government 
is using the information at least for cybersecurity or national 
security, amongst the other uses it might make of the 
information.
            Paragraph (2): Affirmative Search Restriction
    Paragraph (2) limits the Federal Government's affirmative 
searching of data provided exclusively under this legislation 
to the government by the private sector to only conducting such 
searches for cybersecurity purposes or the protection of the 
national security. The Committee intends this provision to 
ensure that information provided under this authority not be 
affirmatively searched by the government for evidence of 
garden-variety crimes like tax evasion or money laundering.
            Paragraph 3: Anti-Tasking Restrictions
    Paragraph (3) makes clear that nothing in this legislation 
permits the government to require a private sector entity to 
share with the Federal Government nor to condition the sharing 
of cyber threat intelligence under subsection (a) on the 
provision of cyber threat information back to the Federal 
Government under subsection (b). The Committee intends this 
provision to ensure that cyber threat information sharing by 
the private sector with the Federal Government remains purely 
voluntary and that the government not attempt to compel such 
sharing by withholding valuable cyber threat intelligence. The 
Committee believes that this provision also prevents the 
government from ``tasking'' the collection of information as 
the government might do under appropriate criminal or foreign 
intelligence surveillance authority because it ensures that the 
private sector cannot be required to provide information back 
to the government.

Section 1104(d) of Title 50: Report on Information Sharing

    Subsection (d) of new Section 1104 requires the Inspector 
General of the Intelligence Community to report annually to the 
Congressional intelligence committees, in unclassified form 
accompanied by a classified annex as needed, on the use of the 
information shared with the Federal Government under this 
legislation. The report on the use of information shared with 
the Federal Government will include: (1) a review of the use of 
such information for purposes other than cybersecurity; (2) a 
review of the type of information shared with the Federal 
Government; (3) a review of the actions taken by the Federal 
Government based on the information shared; (4) appropriate 
metrics to determine the impact of such sharing on privacy and 
civil liberties, if any such impact exists; and (5) any 
recommendations of the Inspector General for improvements or 
modifications to the authorities provided under this 
legislation. It is the Committee's intent that this report 
provide the Committee with the information it needs to ensure 
that the privacy and civil liberties of Americans are being 
appropriately protected.

Section 1104(e) of Title 50: Federal Preemption

    Subsection (e) of new Section 1104 provides that the 
legislation supersedes any provision of state or local law that 
may prohibit the activities authorized by this legislation. The 
Committee's intent is to ensure, as with the federal provisions 
discussed above, that state and local law on wiretapping, 
antitrust, and public disclosure, to name but a few, do not 
stand as a bar to the kind of robust cyber threat intelligence 
and information sharing that the Committee hopes to engender 
through the process of legislation.

Section 1104(f) of Title 50: Savings Clause

    Subsection (f) of new Section 1104 makes clear that nothing 
in this legislation trumps existing laws or authorities 
permitting the use of cybersecurity systems or efforts to 
identify, obtain, or share cyber threat information. Many 
private sector entities today take advantage of certain 
provisions of federal law to conduct the limited monitoring for 
cybersecurity purposes. While this legislation provides much 
more robust authorities, the Committee believed it important to 
ensure that existing authorities remained in place and that 
those authorities could continue to be used by the appropriate 
government agencies and entities.

Section 1104(g) of Title 50: Definitions

    Subsection (g) of the new Section 1104 provides important 
definitions for the purpose of this legislation. The Committee 
notes that much of the work on limiting the scope and breadth 
of this legislation is done by the definitions and commends 
those interested in this legislation to carefully review these 
definitions in the context of the legislation.
            Paragraph 1: Certified Entity
    As noted briefly above, a certified entity is defined as a 
cybersecurity provider, a protected entity, or a self-protected 
entity that also possesses or is eligible to obtain a security 
clearance at the level appropriate to receive classified cyber 
threat intelligence, as determined by the DNI, and can 
demonstrate to the Director of National Intelligence that it 
can appropriately protect that classified information.
            Paragraph 2: Cyber Threat Information
    Cyber threat information is defined to mean information 
that directly pertains to a vulnerability of, or threat to, a 
system or network of a government or private entity. Such 
information includes, but is not limited to, information 
pertaining to the protection of a system or network from 
efforts to degrade, disrupt or destroy the network, as well as 
the protection of a system or network from the theft or 
misappropriation of private or government information, among 
other things.
            Paragraph 3: Cyber Threat Intelligence
    The definition of cyber threat intelligence is consistent 
with the definition of cyber threat information except that 
cyber threat intelligence is information that is originally in 
the possession of an element of the intelligence community. The 
Committee used different terms in this legislation with similar 
definitions in order to distinguish the origin of information. 
Cyber threat intelligence thus originates with the government 
while cyber threat information originates with the private 
sector.
            Paragraph 4: Cybersecurity Provider
    A cybersecurity provider is defined to be a non-
governmental entity that provides goods or services intended to 
be used for cybersecurity purposes. The Committee intentionally 
excluded governmental entities from this construct to avoid any 
concern that government agencies might serve as cybersecurity 
providers to private sector entities.
            Paragraph 5: Cybersecurity Purpose
    A cybersecurity purpose is defined as the purpose of 
ensuring the integrity, confidentiality, and availability of, 
or safeguarding, a system or network. This includes, but is not 
limited to, the protection of a system or network from efforts 
to degrade, disrupt or destroy the network, as well as the 
protection of a system or network from the theft or 
misappropriation of private or government information, among 
other things.
            Paragraph 6: Cybersecurity System
    A cybersecurity system is defined as a system designed or 
employed to ensure the integrity, confidentiality, and 
availability of, or safeguard, a system or network. This 
includes, but is not limited to, a system designed or employed 
to protect a system or network from efforts to degrade, disrupt 
or destroy the network, as well as a system designed or 
employed to protect a system or network from the theft or 
misappropriation of private or government information, among 
other things.
            Paragraph 7: Protected Entity
    A protected entity is defined as an entity, other than an 
individual, that contracts with a cybersecurity provider for 
goods or services to be used for cybersecurity purposes. The 
Committee intentionally excluded individuals from this 
definition so as to limit the direct scope of the legislation 
to the protection of corporate entities.
            Paragraph 8: Self-Protected Entity
    A self-protected entity is defined as an entity, other than 
an individual, that provides goods or services for 
cybersecurity purposes to itself. As with the definition of a 
protected entity, the Committee intentionally excluded 
individuals from this definition so as to limit the direct 
scope of the legislation to the protection of corporate 
entities.

Section 2(b): Procedures and Guidelines

    This subsection of the Act requires the DNI to establish 
the procedures for sharing of cyber threat intelligence and to 
issue the guidelines for granting security clearances within 60 
days of the date of enactment of the Act. This subsection of 
the Act also requires the DNI to expeditiously distribute the 
procedures and guidelines to appropriate federal government and 
private sector entities. The Committee intends to require the 
DNI to meet these deadlines and to broadly distribute the 
procedures and guidelines. As previously noted, the Committee 
expects the DNI to work closely with the private sector in 
developing these procedures and guidelines.

Section 2(c): Initial Report

    This subsection of the Act requires the first report to be 
provided to the Congressional intelligence committees by the 
Inspector General of the Intelligence Community under new 
subsection (d) of section 1104 to be provided no later than one 
year after the date of the enactment of this Act.

Section 2(d): Table of Contents Amendment

    This subsection of the Act provides for amendments to the 
table of contents of the National Security Act of 1947.

                 Oversight Findings and Recommendations

    With respect to clause 3(c)(1) of rule XIII of the Rules of 
the House of Representatives, the Committee held two closed 
hearings, one open hearing, and four informal meetings or 
briefings relating to the subject matter of the legislation. 
The bill, as reported by the Committee, reflects conclusions 
reached by the Committee in light of this oversight activity.

                General Performance Goals and Objectives

    In accordance with clause 3(c) of House rule XIII, the 
Committee's performance goals and objectives are reflected in 
the descriptive portions of this report.

                       Unfunded Mandate Statement

    Section 423 of the Congressional Budget and Impoundment 
Control Act (as amended by Section 101(a)(2) of the Unfunded 
Mandates Reform Act, P.L. 104-4) requires a statement of 
whether the provisions of the reported bill include unfunded 
mandates. In compliance with this requirement, the Committee 
has received a letter from the Congressional Budget Office 
included herein.

                  Statement on Congressional Earmarks

    Pursuant to clause 9 of rule XXI of the Rules of the House 
of Representatives, the Committee states that the bill as 
reported contains no congressional earmarks, limited tax 
benefits, or limited tariff benefits.

           Budget Authority and Congressional Budget Office 
                             Cost Estimate

    With respect to the requirements of clause 3(c)(2) of rule 
XIII of the Rules of the House of Representatives and section 
308(a) of the Congressional Budget Act of 1974 and with respect 
to requirements of 3(c)(3) of rule XIII of the Rules of the 
House of Representatives and section 402 of the Congressional 
Budget Act of 1974, the Committee has received the following 
cost estimate for H.R. 3523 from the Director of the 
Congressional Budget Office:

                                     U.S. Congress,
                               Congressional Budget Office,
                                 Washington, DC, December 16, 2011.
Hon. Mike Rogers,
Chairman, Permanent Select Committee on Intelligence,
House of Representatives, Washington, DC.
    Dear Mr. Chairman: The Congressional Budget Office has 
prepared the enclosed cost estimate for H.R. 3523, the Cyber 
Intelligence Sharing Act.
    If you wish further details on this estimate, we will be 
pleased to provide them. The CBO staff contact is Jason 
Wheelock.
            Sincerely,
                                              Douglas W. Elmendorf.
    Enclosure.

H.R. 3523--Cyber Intelligence Sharing Act

    H.R. 3523 would amend the National Security Act of 1947 to 
require the Director of National Intelligence (DNI) to 
establish procedures to promote the sharing of information 
about cyberthreats between intelligence agencies and the 
private sector. The DNI also would be directed to establish 
guidelines for granting security clearances to employees of the 
private-sector entities with which the government shares such 
information. CBO estimates that implementing the bill would 
have a discretionary cost of $15 million over the 2012-2016 
period, assuming appropriation of the necessary amounts. 
Enacting H.R. 3523 would not affect direct spending or 
revenues; therefore, pay-as-you-go procedures do not apply.
    CBO anticipates additional personnel would be needed to 
administer the program and to manage the exchange of 
information between intelligence agencies and the private 
sector. Based on information from the DNI and the Office of 
Personnel Management, CBO estimates that those activities would 
cost approximately $3 million annually over the 2012-2016 
period, assuming appropriation of the necessary amounts.
    The bill would impose intergovernmental and private-sector 
mandates, as defined in the Unfunded Mandates Reform Act 
(UMRA), by extending civil and criminal liability protection to 
entities and cybersecurity providers that share or use 
cyberthreat information. The bill also would impose additional 
intergovernmental mandates by preempting state laws. Because 
CBO is uncertain about the number of cases that would be 
limited and any forgone compensation that would result, CBO 
cannot determine whether the costs of the mandate would exceed 
the annual threshold established in UMRA for private-sector 
mandates ($142 million in 2011, adjusted annually for 
inflation). However, CBO estimates that the aggregate costs of 
the mandates on public entities would fall below the threshold 
for intergovernmental mandates ($71 million in 2011, adjusted 
annually for inflation).
    The CBO staff contacts for this estimate are Jason Wheelock 
(for federal costs), J'nell J. Blanco (for the 
intergovernmental impact), and Elizabeth Bass (for the private-
sector impact). This estimate was approved by Theresa Gullo, 
Deputy Assistant Director for Budget Analysis.

         Changes in Existing Law Made by the Bill, as Reported

  In compliance with clause 3(e) of rule XIII of the Rules of 
the House of Representatives, changes in existing law made by 
the bill, as reported, are shown as follows (new matter is 
printed in italic and existing law in which no change is 
proposed is shown in roman):

                     NATIONAL SECURITY ACT OF 1947


                              SHORT TITLE

  That this Act may be cited as the ``National Security Act of 
1947''.

                            TABLE OF CONTENTS

Sec. 2. Declaration of policy.
     * * * * * * *

                       TITLE XI--OTHER PROVISIONS

     * * * * * * *
Sec. 1104. Cyber threat intelligence and information sharing.

           *       *       *       *       *       *       *


TITLE XI--ADDITIONAL MISCELLANEOUS PROVISIONS

           *       *       *       *       *       *       *


           CYBER THREAT INTELLIGENCE AND INFORMATION SHARING

  Sec. 1104. (a) Intelligence Community Sharing of Cyber Threat 
Intelligence With Private Sector.--
          (1) In general.--The Director of National 
        Intelligence shall establish procedures to allow 
        elements of the intelligence community to share cyber 
        threat intelligence with private-sector entities and to 
        encourage the sharing of such intelligence.
          (2) Sharing and use of classified intelligence.--The 
        procedures established under paragraph (1) shall 
        provide that classified cyber threat intelligence may 
        only be--
                  (A) shared by an element of the intelligence 
                community with--
                          (i) certified entities; or
                          (ii) a person with an appropriate 
                        security clearance to receive such 
                        cyber threat intelligence;
                  (B) shared consistent with the need to 
                protect the national security of the United 
                States; and
                  (C) used by a certified entity in a manner 
                which protects such cyber threat intelligence 
                from unauthorized disclosure.
          (3) Security clearance approvals.--The Director of 
        National Intelligence shall issue guidelines providing 
        that the head of an element of the intelligence 
        community may, as the head of such element considers 
        necessary to carry out this subsection--
                  (A) grant a security clearance on a temporary 
                or permanent basis to an employee or officer of 
                a certified entity;
                  (B) grant a security clearance on a temporary 
                or permanent basis to a certified entity and 
                approval to use appropriate facilities; and
                  (C) expedite the security clearance process 
                for a person or entity as the head of such 
                element considers necessary, consistent with 
                the need to protect the national security of 
                the United States.
          (4) No right or benefit.--The provision of 
        information to a private-sector entity under this 
        subsection shall not create a right or benefit to 
        similar information by such entity or any other 
        private-sector entity.
  (b) Private Sector Use of Cybersecurity Systems and Sharing 
of Cyber Threat Information.--
          (1) In general.--
                  (A) Cybersecurity providers.--Notwithstanding 
                any other provision of law, a cybersecurity 
                provider, with the express consent of a 
                protected entity for which such cybersecurity 
                provider is providing goods or services for 
                cybersecurity purposes, may, for cybersecurity 
                purposes--
                          (i) use cybersecurity systems to 
                        identify and obtain cyber threat 
                        information to protect the rights and 
                        property of such protected entity; and
                          (ii) share such cyber threat 
                        information with any other entity 
                        designated by such protected entity, 
                        including, if specifically designated, 
                        the Federal Government.
                  (B) Self-protected entities.--Notwithstanding 
                any other provision of law, a self-protected 
                entity may, for cybersecurity purposes--
                          (i) use cybersecurity systems to 
                        identify and obtain cyber threat 
                        information to protect the rights and 
                        property of such self-protected entity; 
                        and
                          (ii) share such cyber threat 
                        information with any other entity, 
                        including the Federal Government.
          (2) Use and protection of information.--Cyber threat 
        information shared in accordance with paragraph (1)--
                  (A) shall only be shared in accordance with 
                any restrictions placed on the sharing of such 
                information by the protected entity or self-
                protected entity authorizing such sharing, 
                including appropriate anonymization or 
                minimization of such information;
                  (B) may not be used by an entity to gain an 
                unfair competitive advantage to the detriment 
                of the protected entity or the self-protected 
                entity authorizing the sharing of information; 
                and
                  (C) if shared with the Federal Government--
                          (i) shall be exempt from disclosure 
                        under section 552 of title 5, United 
                        States Code;
                          (ii) shall be considered proprietary 
                        information and shall not be disclosed 
                        to an entity outside of the Federal 
                        Government except as authorized by the 
                        entity sharing such information; and
                          (iii) shall not be used by the 
                        Federal Government for regulatory 
                        purposes.
          (3) Exemption from liability.--No civil or criminal 
        cause of action shall lie or be maintained in Federal 
        or State court against a protected entity, self-
        protected entity, cybersecurity provider, or an 
        officer, employee, or agent of a protected entity, 
        self-protected entity, or cybersecurity provider, 
        acting in good faith--
                  (A) for using cybersecurity systems or 
                sharing information in accordance with this 
                section; or
                  (B) for not acting on information obtained or 
                shared in accordance with this section.
          (4) Relationship to other laws requiring the 
        disclosure of information.--The submission of 
        information under this subsection to the Federal 
        Government shall not satisfy or affect any requirement 
        under any other provision of law for a person or entity 
        to provide information to the Federal Government.
  (c) Federal Government Use of Information.--
          (1) Limitation.--The Federal Government may use cyber 
        threat information shared with the Federal Government 
        in accordance with subsection (b) for any lawful 
        purpose only if--
                  (A) the use of such information is not for a 
                regulatory purpose; and
                  (B) at least one significant purpose of the 
                use of such information is--
                          (i) a cybersecurity purpose; or
                          (ii) the protection of the national 
                        security of the United States.
          (2) Affirmative search restriction.--The Federal 
        Government may not affirmatively search cyber threat 
        information shared with the Federal Government under 
        subsection (b) for a purpose other than a purpose 
        referred to in paragraph (1)(B).
          (3) Anti-tasking restriction.--Nothing in this 
        section shall be construed to permit the Federal 
        Government to--
                  (A) require a private-sector entity to share 
                information with the Federal Government; or
                  (B) condition the sharing of cyber threat 
                intelligence with a private-sector entity on 
                the provision of cyber threat information to 
                the Federal Government.
  (d) Report on Information Sharing.--
          (1) Report.--The Inspector General of the 
        Intelligence Community shall annually submit to the 
        congressional intelligence committees a report 
        containing a review of the use of information shared 
        with the Federal Government under this section, 
        including--
                  (A) a review of the use by the Federal 
                Government of such information for a purpose 
                other than a cybersecurity purpose;
                  (B) a review of the type of information 
                shared with the Federal Government under this 
                section;
                  (C) a review of the actions taken by the 
                Federal Government based on such information;
                  (D) appropriate metrics to determine the 
                impact of the sharing of such information with 
                the Federal Government on privacy and civil 
                liberties, if any; and
                  (E) any recommendations of the Inspector 
                General for improvements or modifications to 
                the authorities under this section.
          (2) Form.--Each report required under paragraph (1) 
        shall be submitted in unclassified form, but may 
        include a classified annex.
  (e) Federal Preemption.--This section supersedes any statute 
of a State or political subdivision of a State that restricts 
or otherwise expressly regulates an activity authorized under 
subsection (b).
  (f) Savings Clause.--Nothing in this section shall be 
construed to limit any other authority to use a cybersecurity 
system or to identify, obtain, or share cyber threat 
intelligence or cyber threat information.
  (g) Definitions.--In this section:
          (1) Certified entity.--The term ``certified entity'' 
        means a protected entity, self-protected entity, or 
        cybersecurity provider that--
                  (A) possesses or is eligible to obtain a 
                security clearance, as determined by the 
                Director of National Intelligence; and
                  (B) is able to demonstrate to the Director of 
                National Intelligence that such provider or 
                such entity can appropriately protect 
                classified cyber threat intelligence.
          (2) Cyber threat information.--The term ``cyber 
        threat information'' means information directly 
        pertaining to a vulnerability of, or threat to, a 
        system or network of a government or private entity, 
        including information pertaining to the protection of a 
        system or network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (3) Cyber threat intelligence.--The term ``cyber 
        threat intelligence'' means information in the 
        possession of an element of the intelligence community 
        directly pertaining to a vulnerability of, or threat 
        to, a system or network of a government or private 
        entity, including information pertaining to the 
        protection of a system or network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (4) Cybersecurity provider.--The term ``cybersecurity 
        provider'' means a non-governmental entity that 
        provides goods or services intended to be used for 
        cybersecurity purposes.
          (5) Cybersecurity purpose.--The term ``cybersecurity 
        purpose'' means the purpose of ensuring the integrity, 
        confidentiality, or availability of, or safeguarding, a 
        system or network, including protecting a system or 
        network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (6) Cybersecurity system.--The term ``cybersecurity 
        system'' means a system designed or employed to ensure 
        the integrity, confidentiality, or availability of, or 
        safeguard, a system or network, including protecting a 
        system or network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (7) Protected entity.--The term ``protected entity'' 
        means an entity, other than an individual, that 
        contracts with a cybersecurity provider for goods or 
        services to be used for cybersecurity purposes.
          (8) Self-protected entity.--The term ``self-protected 
        entity'' means an entity, other than an individual, 
        that provides goods or services for cybersecurity 
        purposes to itself.

                             MINORITY VIEWS

        Cyber Intelligence Sharing and Protection Act, H.R. 3523

    As members of the Intelligence Committee, it is our 
responsibility to ensure that intelligence support to the 
cybersecurity of our nation is focused and robust. The 
Intelligence Community's unique insight and knowledge of 
cyberspace are critical to our nation's ability to defend, not 
only U.S. Government information technology, but also our 
Critical Infrastructure and Defense Industrial Base.
    This Bill is the culmination of a strong bipartisan effort 
and provides an innovative, yet pragmatic, approach to 
cybersecurity. It leverages the Intelligence Community's 
expertise and incentivizes the private sector to share cyber 
threat information in order to build an enduring private-public 
partnership for this strategic threat to our nation's security. 
Specifically, the Cyber Intelligence Sharing and Protection Act 
provides the authority for the Intelligence Community to share 
classified cyber threat intelligence with properly-vetted 
industry partners and encourages the voluntary sharing of cyber 
threat information with the U.S. Government.
    It is the Minority's strong intent in supporting this Bill 
to facilitate this private-public sharing of information 
regarding malevolent cyber activity in a way that ensures that 
the privacy and civil liberties of U.S. persons are respected 
and protected. An equitable and ethical balance between 
flexible information sharing and privacy must be established, 
maintained and vigilantly reviewed.
    We express continued interest in working with the Majority 
to further address concerns raised by the Administration and 
civil liberties organizations.
    We believe that this Bill and its amendments strike this 
delicate balance by requiring that any shared information used 
by the Government meet a cybersecurity or national security 
threshold and by prohibiting the Government's use of shared 
information for regulatory purposes. Moreover, in recognition 
that this Bill is a pioneering effort, this Committee is fully 
committed to diligent oversight of the parties' conduct 
pursuant to this Bill.
    The Bill directs the Intelligence Community Inspector 
General to be alert to and review any U.S. Government activity 
or use of shared information that goes beyond the cybersecurity 
focus of this Bill. Should that oversight identify significant 
concerns or abuse, the Minority is committed to working with 
the Majority to take all appropriate and timely action to 
further enhance privacy protections.
    To repeat: the Minority supported this Bill in the 
expectation that, both the participating private companies and 
the Government, will appreciate and not abuse the flexibility 
and liability protection afforded by this Bill. With the 
dedicated support of both government and industry--overlaid 
with Congressional oversight--we are optimistic that this Bill 
will work as envisioned to strengthen cybersecurity in a manner 
that respects American values.

                                   C.A. Dutch Ruppersberger.
                                   Mike Thompson.
                                   Jim Langevin.
                                   Adam B. Schiff.
                                   Dan Boren.
                                   Ben Chandler.

                             MINORITY VIEWS

        Cyber Intelligence Sharing and Protection Act, H.R. 3523

    The intent of this Bill is to authorize the U.S. Government 
to share classified cybersecurity intelligence with the private 
sector in a secure manner and to enable the private sector to 
share cybersecurity information with the U.S. Government in 
real-time, without fear of liability if acting in good faith.
    I agree that we are facing serious cyber threats and that 
all Americans will benefit from strong cybersecurity 
protections for our critical infrastructure. However, I believe 
we need to balance those concerns with measures to protect the 
privacy and civil liberties that Americans also deserve. While 
I appreciate the efforts of authors of this bipartisan bill and 
its focus on cybersecurity, I believe that balance has not yet 
been achieved.
    Although the Bill includes adequate protections for 
classified information and corporate proprietary information, 
its language does not provide commensurate protection for the 
personal accounts of U.S. persons or personal identifiable 
information (PII). For example, the Bill's language does not 
restrict the nature or volume of the information that the 
private sector can share with the Government, does not provide 
for mandatory minimization of PII, does not significantly 
curtail the Government's use of shared information, and does 
not include most of the privacy protections recommended by the 
White House in its proposed cybersecurity legislation.
    I am also concerned that the new liability shield provided 
in the Bill is overly broad and is less protective of consumers 
than similar shields provided under many state laws. We should 
be very careful whenever we limit injured consumers' ability to 
seek legal redress. If a good faith requirement is to be used, 
it should be based on clear and objective criteria. In no 
event, however, should cybersecurity entities be protected if 
injuries are the result of neglect, recklessness or misconduct.
    Accordingly, while I strongly agree with the need to enact 
effective cybersecurity legislation, and commend the 
constructive bipartisan effort underlying this Bill, I 
respectively dissent because the Bill does not sufficiently 
protect individual privacy rights and civil liberties.
                                   Janice D. Schakowsky.

                                  







Rise Of The Fourth Reich – Full Movie

The officers of the SS, Hitler’s feared paramilitary unit, were the most notorious war criminals of WWII. Some were brought to justice after the war, but many were able to escape from Germany. A massive secret organization known as Odessa was reportedly formed to help them flee and rebuild a new Reich that would again rise to power. MysteryQuest will investigate by following the path of feared Nazis from Germany, to Austria, and Italy. The team will also travel to Paraguay where many of the Nazis reportedly hid while plotting their new rise.

TOP-SECRET – U.S. Army Regulation 525–13 Antiterrorism

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-Antiterrorism.png

 

This regulation establishes the Army Antiterrorism (AT) Program to protect personnel (Soldiers, members of other Services, Department of the Army (DA) civilian employees, Department of Defense (DOD) contractors and Family members of DOD employees), information, property, and facilities (including civil work and like projects) in all locations and situations against terrorism. It provides—

a. Department of the Army AT tasks
b. Department of the Army AT standards.
c. Implementing guidance for the execution of the AT standards.
d. Policies, procedures, and responsibilities for execution of the AT program.

5–21. Standard 20. Terrorism Incident Response Measures

a. Army standard 20. Commanders and heads of agencies/activities will include in AT plans terrorism incident response measures that prescribe appropriate actions for reporting terrorist threat information, responding to threats/actual attacks, and reporting terrorist incidents.

b. Implementing guidance.

(1) Terrorist incident response measures in AT plans will, at a minimum, address management of the FPCON system, implementation of all FPCON measures, and requirements for terrorist related reports. Plans will be affordable, effective, and attainable; tie security measures together; and integrate security efforts by assigning responsibilities, establishing procedures, and ensuring subordinate plans complement each other. At the garrison level, the plans must tie into other installation response plans.

(2) At garrison level, commanders will identify high risk targets (HRTs), mission essential vulnerable areas (MEVAs) and ensure planning provides for focus on these areas. Facility managers whose facility has been identified as a HRT will be informed, and will ensure facility security plans are formulated on this basis.

(3) Commanders will develop procedures to ensure periodic review, update, and coordination of response plans with appropriate responders.

(4) Commanders will ensure CBRNE, medical, fire, and police response procedures are integrated into consequence management/AT plans.

(5) Plans will include procedures for an attack warning system using a set of recognizable alarms and reactions for potential emergencies, as determined by the terrorist threat, criticality, and vulnerability assessments. Commanders will exercise the attack warning system and ensure personnel are trained and proficient in recognition. In conjunction with the alarm warning system, commanders will conduct drills on emergency evacuations/ movements to safe havens/shelters-in-place.

(6) CONUS commanders will—

(a) Notify the local FBI office concerning threat incidents occurring at Army installations, facilities, activities, and civil work projects or like activities.

(b) Take appropriate action to prevent loss of life and/or mitigate property damage before the FBI response force arrives. On-site elements or USACIDC elements will be utilized to safeguard evidence, witness testimony, and related aspects of the criminal investigation process pending arrival of the FBI response force. Command of U.S. Army elements will remain within military channels.

(c) If the FBI declines jurisdiction over a threat incident occurring in an area of exclusive or concurrent Federal jurisdiction, take appropriate action in conjunction with USACIDC elements to resolve the incident. In such cases, commanders will request advisory support from the local FBI office.

(d) If the FBI declines jurisdiction over a threat incident occurring in an area of concurrent or proprietary Federal jurisdiction, coordinate the military response with USACIDC elements, state and local law enforcement agencies, as appropriate. In such cases, commanders will request advisory support from the local FBI office.

(7) OCONUS commanders will—

(a) Where practicable, involve HN security and law enforcement agencies in AT reactive planning and request employment of HN police forces in response to terrorist attacks.

(b) Coordinate reactions to incidents of a political nature with the U.S. Embassy and the HN, subject to instructions issued by the combatant commander with geographical responsibility.

(c) In SIGNIFICANT and HIGH terrorist threat level areas, plans to respond to terrorist incidents will contain procedures for the notification of all DOD personnel and their dependents. Such plans will provide for enhanced security measures and/or possible evacuation of DOD personnel and their dependents.

(8) USACIDC will investigate threat incidents in accordance with paragraph 2–20d.

(9) AT plans, orders, SOPs, terrorism threat, criticality, and vulnerability assessments, and coordination measures will consider the potential threat use of WMD. Commanders will assess the vulnerability of installations, facilities, and personnel within their AOR to potential threat of terrorist using WMD and CBRNE weapons to include TIH. Clear command, control, and communication lines will be established between local, state, Federal, and HN emergency assistance agencies to detail support relationships and responsibilities. Response to WMD use by terrorists will be synchronized with other crisis management plans that deal with large-scale incident response and consequence management. Separate plans devoted only to terrorist use of WMD need not be published if existing crisis management plans covering similar events (such as accidental chemical spills) are sufficiently comprehensive.

 

 

Unveiled – Captured German War Films (1945)

Captured German War Films
Summary: POSTHUMOS AWARDS: CU, Swastika emblem, CUs, display of medals – men at attention. Sequence: Civilians receiving awards from Herman Goering. Karl Von Rumstedt, Admiral Erich Raeder and Herman Goering. Goering pays homage at dead soldier’s bier. MS, casket placed into mausoleum. HITLER VISITS WOUNDED VETS IN HOSPITAL: CU, Adolf Hitler arriving; with wounded vets, people cheer as he departs. MS, Hitler with officers in the field. MS, Heinrich Himmler, Joseph P Goebbels, Gen Guderian and others standing and talking in field. Review: Sequence – youthful officer inspecting and addressing company of German soldiers at attention, cut ins soldiers listening. VOLKSTURM ON PARADE: Sequence: Aged civilian members Of the Home Guard on parade. CU’s brassards with insignia typifying Volksturm. Parade scenes. U BOAT INSPECTION: Sequence: Aged civilian arriving at dock, touring interior of sub, at periscope (evidently U BOAT INVENTOR).

Department of Defense. Department of the Air Force. (09/26/1947 – )

ARC Identifier 64760 / Local Identifier 342-USAF-13034 and ARC Identifier 24043 / Local Identifier 111-ADC-10281. 1939-1945.

Hitler’s Death The Final Report – Operation Myth – Full Movie

 

The Hitler Family – Full Movie

 

Hitler’s Escape – Full Movie

According the official public record, Adolf Hitler committed suicide in his underground bunker as allied troops stormed Berlin at the end of World War II. But no one actually saw him die. No body was ever produced. No photographs were ever taken. Some believe Hitler managed to escape, and for years there were sightings of the former dictator in many parts of the world. Then, in the 1990s the Russians revealed secret evidence taken from Hitler’s bunker decades earlier that they said proved he had died there. Among the evidence is a piece of skull. MysteryQuest obtained access to this evidence for testing and the results are startling.

Global Transparency – Culture of secrecy around global land deals must be lifted

A new report today reveals how opening up the process around large-scale land deals in developing countries would benefit local communities, governments and business, and provides direction on how this can be achieved.

The report, Dealing with Disclosure, published by Global Witness, the International Land Coalition and the Oakland Institute, looks at why it is vital to transform the secretive culture behind large scale land  deals, and for the first time shows how it might be done. At present decisions are being made in secret, with basic information unavailable even to those affected. The report argues that all contractual information must be made publicly available unless investors or governments can prove that this would harm commercial competitiveness or public interest – a principle it calls “if in doubt, disclose”.

The rush for land in developing countries has rapidly intensified since 2008, but the sector remains largely unregulated. Concerns are growing over the impact of big, secretive deals between governments and investors on communities and the environment. As more and more land is taken away from local communities, growing numbers of people are losing access to the resources they have relied on for generations, and ecosystems are being destroyed.

Decisions and negotiations around land deals are frequently conducted in secret, without the knowledge, let alone consent, of affected communities.  Without access to basic information such as contract terms or pre-project impact assessment studies, local communities and other parties cannot make informed decisions about the suitability of proposed investments.

This lack of information hampers efforts to hold governments or investors to account, making human rights and environmental abuses more likely. It also undermines governance and democratic processes and fosters high-level corruption, discouraging companies willing to operate responsibly.

Megan MacInnes, Senior Land Campaigner at Global Witness said “Far too many people are being kept in the dark about massive land deals that could destroy their homes and livelihoods. That this needs to change is well understood, but how to change it is not. For the first time, this report sets out in detail what tools governments, companies and citizens can harness to remove the shroud of secrecy that surrounds land acquisition. It takes lessons from efforts to improve transparency in other sectors and looks at what is likely to work for land. Companies should have to prove they are doing no harm, rather than communities with little information or power having to prove that a land deal is negatively affecting them.”

But it’s not only communities who would benefit from the changes the report proposes, as Frederic Mousseau Policy Director at the Oakland Institute explains. “Evidence increasingly points to the significant benefits for governments and business from improved transparency and ongoing public consultation. Whilst investors would benefit from a level playing field as well as reduced risks of corruption and expensive and damaging conflicts with communities, greater transparency would enable governments to make more informed decisions and negotiate better deals when allocating commercial rights to land.”

 

Hitler’s Secret Science – Full Movie

Hitler’s Secret Science, how the war could have ended if these weapons would have been created

Unveiled – Chinese Wiretap Like World Leaders and Crooks

When Hu Jintao, China’s top leader, picked up the telephone last August to talk to a senior anticorruption official visiting Chongqing, special devices detected that he was being wiretapped — by local officials in that southwestern metropolis.

The discovery of that and other wiretapping led to an official investigation that helped topple Chongqing’s charismatic leader, Bo Xilai, in a political cataclysm that has yet to reach a conclusion.

Until now, the downfall of Mr. Bo has been cast largely as a tale of a populist who pursued his own agenda too aggressively for some top leaders in Beijing and was brought down by accusations that his wife had arranged the murder of Neil Heywood, a British consultant, after a business dispute. But the hidden wiretapping, previously alluded to only in internal Communist Party accounts of the scandal, appears to have provided another compelling reason for party leaders to turn on Mr. Bo.

The story of how China’s president was monitored also shows the level of mistrust among leaders in the one-party state. To maintain control over society, leaders have embraced enhanced surveillance technology. But some have turned it on one another — repeating patterns of intrigue that go back to the beginnings of Communist rule.

“This society has bred mistrust and violence,” said Roderick MacFarquhar, a historian of Communist China’s elite-level machinations over the past half century. “Leaders know you have to watch your back because you never know who will put a knife in it.”

Nearly a dozen people with party ties, speaking anonymously for fear of retribution, confirmed the wiretapping, as well as a widespread program of bugging across Chongqing. But the party’s public version of Mr. Bo’s fall omits it.

The official narrative and much foreign attention has focused on the more easily grasped death of Mr. Heywood in November. When Mr. Bo’s police chief, Wang Lijun, was stripped of his job and feared being implicated in Bo family affairs, he fled to the United States Consulate in Chengdu, where he spoke mostly about Mr. Heywood’s death.

The murder account is pivotal to the scandal, providing Mr. Bo’s opponents with an unassailable reason to have him removed. But party insiders say the wiretapping was seen as a direct challenge to central authorities. It revealed to them just how far Mr. Bo, who is now being investigated for serious disciplinary violations, was prepared to go in his efforts to grasp greater power in China. That compounded suspicions that Mr. Bo could not be trusted with a top slot in the party, which is due to reshuffle its senior leadership positions this fall.

“Everyone across China is improving their systems for the purposes of maintaining stability,” said one official with a central government media outlet, referring to surveillance tactics. “But not everyone dares to monitor party central leaders.”

According to senior party members, including editors, academics and people with ties to the military, Mr. Bo’s eavesdropping operations began several years ago as part of a state-financed surveillance buildup, ostensibly for the purposes of fighting crime and maintaining local political stability.

The architect was Mr. Wang, a nationally decorated crime fighter who had worked under Mr. Bo in the northeast province of Liaoning. Together they installed “a comprehensive package bugging system covering telecommunications to the Internet,” according to the government media official.

One of several noted cybersecurity experts they enlisted was Fang Binxing, president of Beijing University of Posts and Telecommunications, who is often called the father of China’s “Great Firewall,” the nation’s vast Internet censorship system. Most recently, Mr. Fang advised the city on a new police information center using cloud-based computing, according to state news media reports. Late last year, Mr. Wang was named a visiting professor at Mr. Fang’s university.

Together, Mr. Bo and Mr. Wang unleashed a drive to smash what they said were crime rings that controlled large portions of Chongqing’s economic life. In interviews, targets of the crackdown marveled at the scale and determination with which local police intercepted their communications.

“On the phone, we dared not mention Bo Xilai or Wang Lijun,” said Li Jun, a fugitive property developer who now lives in hiding abroad. Instead, he and fellow businessmen took to scribbling notes, removing their cellphone batteries and stocking up on unregistered SIM cards to thwart surveillance as the crackdown mounted, he said.

Li Zhuang, a lawyer from a powerfully connected Beijing law firm, recalled how some cousins of one client had presented him with a full stack of unregistered mobile phone SIM cards, warning him of local wiretapping. Despite these precautions, the Chongqing police ended up arresting Mr. Li on the outskirts of Beijing, about 900 miles away, after he called his client’s wife and arranged to visit her later that day at a hospital.

“They already were there lying in ambush,” Mr. Li said. He added that Wang Lijun, by reputation, was a “tapping freak.”

Political figures were targeted in addition to those suspected of being mobsters.

One political analyst with senior-level ties, citing information obtained from a colonel he recently dined with, said Mr. Bo had tried to tap the phones of virtually all high-ranking leaders who visited Chongqing in recent years, including Zhou Yongkang, the law-and-order czar who was said to have backed Mr. Bo as his potential successor.

“Bo wanted to be extremely clear about what leaders’ attitudes toward him were,” the analyst said.

In one other instance last year, two journalists said, operatives were caught intercepting a conversation between the office of Mr. Hu and Liu Guanglei, a top party law-and-order official whom Mr. Wang had replaced as police chief. Mr. Liu once served under Mr. Hu in the 1980s in Guizhou Province.

Perhaps more worrisome to Mr. Bo and Mr. Wang, however, was the increased scrutiny from the party’s Central Commission for Discipline Inspection, which by the beginning of 2012 had stationed up to four separate teams in Chongqing, two undercover, according to the political analyst, who cited Discipline Inspection sources. One line of inquiry, according to several party academics, involved Mr. Wang’s possible role in a police bribery case that unfolded last year in a Liaoning city where he once was police chief.

Beyond making a routine inspection, it is not clear why the disciplinary official who telephoned Mr. Hu — Ma Wen, the minister of supervision — was in Chongqing. Her high-security land link to Mr. Hu from the state guesthouse in Chongqing was monitored on Mr. Bo’s orders. The topic of the call is unknown but was probably not vital. Most phones are so unsafe that important information is often conveyed only in person or in writing.

But Beijing was galled that Mr. Bo would wiretap Mr. Hu, whether intentionally or not, and turned central security and disciplinary investigators loose on his police chief, who bore the brunt of the scrutiny over the next couple of months.

“Bo wanted to push the responsibility onto Wang,” one senior party editor said. “Wang couldn’t dare say it was Bo’s doing.”

Yet at some point well before fleeing Chongqing, Mr. Wang filed a pair of complaints to the inspection commission, the first anonymously and the second under his own name, according to a party academic with ties to Mr. Bo.

Both complaints said Mr. Bo had “opposed party central” authorities, including ordering the wiretapping of central leaders. The requests to investigate Mr. Bo were turned down at the time. Mr. Bo, who learned of the charges at a later point, told the academic shortly before his dismissal that he thought he could withstand Mr. Wang’s charges.

Mr. Wang is not believed to have discussed wiretapping at the United States Consulate. Instead, he focused on the less self-incriminating allegations of Mr. Bo’s wife’s arranging the killing of Mr. Heywood.

But tensions between the two men crested, sources said, when Mr. Bo found that Mr. Wang had also wiretapped him and his wife. After Mr. Wang was arrested in February, Mr. Bo detained Mr. Wang’s wiretapping specialist from Liaoning, a district police chief named Wang Pengfei.

Internal party accounts suggest that the party views the wiretapping as one of Mr. Bo’s most serious crimes. One preliminary indictment in mid-March accused Bo of damaging party unity by collecting evidence on other leaders.

Party officials, however, say it would be far too damaging to make the wiretapping public. When Mr. Bo is finally charged, wiretapping is not expected to be mentioned. “The things that can be publicized are the economic problems and the killing,” according to the senior official at the government media outlet. “That’s enough to decide the matter in public.”

Lost Worlds – Hitlers Supercity – Full Movie

DoD Stability Operations Capabilities Assessment 2012 – SECRET

https://publicintelligence.net/wp-content/uploads/2012/04/DoD-StabilityOpsAssessment.png

 

This report provides an assessment of Department of Defense (DoD) efforts over the past two years to implement requirements set forth in the 2009 DoD Instruction 3000.05, Stability Operations. It highlights significant initiatives currently underway or planned throughout DoD and provides recommendations and key findings to achieve further progress.

The overarching theme of the report is that the Department must learn from previous hard-won experience in stability operations and institutionalize, enhance, and evolve the lessons learned and capabilities acquired by the U.S. military for current and future operations. As part of a risk -balanced strategy, one ofthe Pentagon’s top priorities should be to prepare for the predominant sources of conflict in the 21 5t Century, specifically fragile states and the irregular challenges that they spawn. Even if we anticipate participating more selectively in these operations in the future, the U.S. military should capitalize on the adaptation in thinking that occurred as a result of the experiences in Afghanistan and Iraq by preserving perishable expertise, and retaining key capabilities and the appropriate skill sets for these operations.

As U.S. defense strategy shifts from an emphasis on today’s wars to preparing for future challenges, the task of promoting stability in a volatile strategic environment remains one of our Nation’s top concerns. Emphasizing more effective non-military means and military-to-military cooperation can help to prevent instability from triggering conflicts, thereby reducing demand for large-scale stability operations aimed at bringing such conflicts to closure. As part of a prudent down-sizing of our posture, the U.S. military must be able to retain otherwise perishable skills, expertise and specialized capabilities acquired as a consequence of its hard-won experiences in Iraq and Afghanistan. Retaining these capabilities requires an enduring investment in people, the wherewithal to institutionalize lessons learned, and the retention of forces that can be quickly regenerated to meet future demands.

The Department of Defense (DoD) has taken positive steps since 2009 toward enhancing its stability operations capabilities. Joint doctrine is now on a firmer foundation; the Services have strengthened relevant proficiencies at the unit level; and investments in civil-military planning, exercising, field-level coordination and capacity-building are noteworthy. Even so, these gains are ad hoc and temporary for the most part and will be fleeting unless affirmative steps are taken to preserve stability operations capabilities in the years ahead.

To help achieve this goal, this report recommends the following specific steps:

• DoD should continue to emphasize stability operations as a core military capability in all of its key policy and strategy documents.
• DoD should continue to make refinements to existing doctrine as new lessons emerge and develop a process to fast-track doctrine that absorbs these lessons based on operational necessities.
• DoD should persist in its efforts to translate such lessons into stability operations-related training and education at all levels. To help sustain civil-military training capacities, it should consider ways of incentivizing U.S. whole-of-government training and exercises, possibly through a pooled funding approach. It could also consider combining multiple exercises into a single capstone event focused on interagency integration.
• In close coordination with interagency partners, DoD should mitigate the negative effects of predictable gaps in civilian capacity in uncertain and hostile operational environments by continuing to place emphasis upon preparing U.S. military forces for likely stability operations tasks. We should continue to advocate for increased civilian agency capacity and resources, while also promoting the development of civilian-military capacity of allies and other partners to address stability operations and related activities.
• As defense resources shift back from contingency funding to our base budget, DoD should continue to work with Department of State, interagency partners and the Congress to review the adequacy of legal authorities and funding for the full range of security assistance and coalition support programs requiring coordinated defense, diplomacy, and development efforts in the stability operations arena. Specifically, the Congressionally-mandated annual review of the Global Security Contingency Fund execution, and other resultant lessons learned documents, could help in mapping out possible legislative changes and in recommending interagency planning process improvements.

Unsolved Mysteries of the Second World War – Hitler’s Secret Weapons – Full Movie

This is the most amazing documentary to date covering the technologies and mysteries of the second world war. There is footage in this film that I have never seen before! Amazing, that’s all I can say.

truthseekertimes.ca

 

Unveiled – Central Intelligence Agency Office of Research and Development Technologies Used in U.S.

Citation: [Central Intelligence Agency Office of Research and Development Technologies Used in U.S.; Attached to Routing and Record Sheet; Includes Memoranda Entitled “Repeated Survey of ORD for Non-foreign Intelligence Activities”; “Contacts with Other U.S. Government Agencies Which Could or Have Resulted in Use of CIA-Developed Technology in Addressing Domestic Problems”; “Domestic Tests for Agency Research and Development Efforts”; “Survey of ORD for Non-foreign Intelligence Activities”; “[Excised] ORD Contacts with Domestic Council Agencies”; “Processing of Audio Tape for Bureau of Narcotics Dangerous Drug Division” [Two Versions]; “Assistance to Bureau of Narcotics: Enhancement of Noisy Audio Tape Recordings”; “Telecon This Morning concerning Any OSA Activities Which Could Put the Agency into an Embarrassing Situation”; “Correspondence Received by Chairman Hébert, House Armed Services Committee, concerning [Excised]”; and “Policy regarding Assistance to Agencies outside the Intelligence Community on Speech Processing Problems”; Heavily Excised]
Top Secret, Compendium, May 09, 1973, 41 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00022
Origin: United States. Central Intelligence Agency. Directorate of Science and Technology. Office of Research and Development
Individuals/
Organizations Named:
Aerospace Corporation; Colby, William E.; Colson, Charles W.; Halperin, Morton H.; Hébert, Felix E.; McMahon, John N.; National Institutes of Health (U.S.); Schlesinger, James R.; United States Intelligence Board. Technical Surveillance Countermeasures Committee; United States. Air Force; United States. Arms Control and Disarmament Agency; United States. Army; United States. Atomic Energy Commission; United States. Cabinet Committee on International Narcotics Control; United States. Central Intelligence Agency. Directorate of Intelligence. National Photographic Interpretation Center; United States. Central Intelligence Agency. Directorate of Intelligence. Office of Scientific Intelligence; United States. Central Intelligence Agency. Directorate of Science and Technology. Deputy Director; United States. Central Intelligence Agency. Directorate of Science and Technology. Office of Research and Development; United States. Coast Guard; United States. Congress. House. Committee on Armed Services; United States. Defense Intelligence Agency; United States. Department of Agriculture; United States. Department of Commerce; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Department of Justice. Law Enforcement Assistance Administration; United States. Department of State; United States. Department of the Interior; United States. Department of the Treasury; United States. Department of the Treasury. Customs Service; United States. Environmental Protection Agency; United States. Executive Office of the President; United States. Federal Aviation Administration; United States. Federal Bureau of Investigation; United States. Internal Revenue Service; United States. National Aeronautics and Space Administration; United States. National Security Agency; United States. Navy; United States. Office of Telecommunications Policy; United States. Secret Service
Subjects: Agricultural products | Communications interception | Counterintelligence | Defectors | Electronic surveillance | Hijacking | Human behavior experiments | Mexico-United States Border | Narcotics | Natural disasters | Natural resources | Nuclear reactors | Opium production | Photographic intelligence | Police assistance | Polygraph examinations | Psychological assessments | Research and development | Riot control | San Francisco (California) | Satellite reconnaissance | Surveillance countermeasures | Surveillance equipment | Telephone monitoring | U-2 Aircraft | Watergate Affair (1972-1974)
Abstract: Describes Central Intelligence Agency Office of Research and Development technology and assistance provided to or requested by military and law-enforcement organizations.
Full Text: Document – PDF – this link will open in a new window (1.5 MB)

Durable URL for this record

WWII In HD, Episode 10, End Game – Full Movie

Confidential – Individual Indicted in Connection with Machine Gun Attack on U.S. Embassy in Bosnia-Herzegovina in 2011

WASHINGTON—Mevlid Jasarevic, 23, a citizen of Serbia, was indicted today by a federal grand jury in the District of Columbia on charges of attempted murder and other violations in connection with his alleged machine gun attack on the U.S. Embassy in Sarajevo, Bosnia-Herzegovina on October 28, 2011.

The indictment was announced by Lisa Monaco, Assistant Attorney General for National Security; Ronald C. Machen, Jr., U.S. Attorney for the District of Columbia; and James W. McJunkin, Assistant Director in Charge of the FBI’s Washington Field Division.

The 10-count indictment charges Jasarevic with one count of attempt to murder U.S. officers or employees; one count of attempt to murder U.S. nationals within the special maritime and territorial jurisdiction of the United States (the U.S. Embassy); one count of assault with a dangerous weapon with intent to do bodily harm within the special maritime and territorial jurisdiction of the United States; one count of assaulting U.S. officers or employees with a deadly weapon; one count of destruction of property within the special maritime and territorial jurisdiction of the United States; and five counts of use of a firearm during a crime of violence.

Yesterday, authorities in Bosnia-Herzegovina brought charges against Jasaveric and two others in connection with the alleged attack on the U.S. Embassy. Jasaveric is in the custody of Bosnia-Herzegovina authorities. The United States has closely cooperated with Bosnia-Herzegovina authorities in their investigation of the U.S. Embassy attack and strongly supports their decision to charge and prosecute those allegedly involved. The United States will continue to cooperate fully with authorities in Bosnia-Herzegovina to bring to justice those involved.

The case is being investigated by the FBI Washington Field Office. The case is being prosecuted by Assistant U.S. Attorney Robert Bowman of the U.S. Attorney’s Office for the District of Columbia and Trial Attorney Joshua Larocca of the Counterterrorism Section of the Justice Department’s National Security Division. The Office of International Affairs in the Justice Department’s Criminal Division also provided assistance.

The attempted murder charges against Jasarevic, as well as the charges of assaulting U.S. officers and employees with a deadly weapon, and destruction of property each carry a maximum sentence of 20 years. Each charge of using a firearm during a crime of violence carries a mandatory minimum sentence of 30 years for use of a machine gun. The charge of assault with a dangerous weapon with intent to do bodily harm within the special maritime and territorial jurisdiction of the United States carries a maximum sentence of 10 years.

The public is reminded that an indictment contains mere allegations. Defendants are presumed innocent unless and until proven guilty in a court of law.

WWII In HD, Episode 9, Edge of the Abyss – Full Movie

TOP-SECRET – Fordow Nuclear Plant, Near Qom, Iran

https://i0.wp.com/cryptome.org/2012-info/pantex-birdseye-2.jpg

WWII In HD, Episode 8, Glory and Guts – Full Movie

TOP-SECRET from the FBI – Texas Federal Grand Jury Indicts Sinaloa Cartel Leaders

United States Attorney Robert Pitman, DEA Special Agent in Charge Joseph M. Arabit, FBI Special Agent in Charge Mark Morgan, and ATF Special Agent in Charge Robert Champion today announced the indictment of Joaquin Guzman Loera, aka “El Chapo”; Ismael Zambada Garcia aka “Mayo”; and 22 other individuals responsible for the operations and management of the Sinaloa Cartel (cartel) charging them with violating the Racketeer Influenced and Corrupt Organizations (RICO) Act.

The 14-count grand jury indictment, returned on April 11, 2012 and unsealed today charges conspiracy to violate the RICO statute; conspiracy to possess more than five kilograms of cocaine and over 1000 kilograms of marijuana; conspiracy to import more than five kilograms of cocaine and 1000 kilograms of marijuana; conspiracy to commit money laundering; conspiracy to possess firearms in furtherance of drug trafficking crimes; murder in furtherance of a continuing criminal enterprise (CCE) or drug trafficking; engaging in a CCE in furtherance of drug trafficking; conspiracy to kill in a foreign country; kidnapping; and violent crimes in aid of racketeering.

The other 22 defendants charged in this indictment include:

German (Last Name Unknown), aka “Paisa,” “German Olivares”; Mario Nunez-Meza, aka “Mayito,” “M-10”; Amado Nunez-Meza, aka “Flaco,” “M-11,” “El Flais”; Jose Antonio Torres Marrufo, aka “Jaguar,” “Tonin,” Catorce,” “14,” “Tono,” “El Uno”; Gabino Salas-Valenciano, aka “El Ingeniero”; Sergio Garduno-Escobedo, aka “Coma”; David Sanchez-Hernandez, aka “Christian”; Ivan Sanchez-Hernandez; Jesus Rodrigo Fierro-Ramirez, aka “Huichi,” “Pena”; Arturo Lozano-Mendez, aka “Garza”; Mario De La O Lopez aka “Flaco”; Arturo Shows Urquidi, aka “Chous”; Salvador Valdez, aka “Robles”; Daniel Franco Lopez, aka “Micha,” “Neon,” “Fer”; Luis Arellano-Romero, aka “Bichi,” Bichy,” “Helio”; Fernando Arellano-Romero, aka “Rayo,” “24,” “Gamma,” “Blue Demon”; Mario Alberto Iglesias-Villegas, aka “Dos,” “El 2,” “Delta,” “Parka,” “Grim Reaper,” “Daniel Cuellar Anchondo,” “Delfin”; Adrian Avila-Ramirez aka “Bam Bam,” “Tacuba,” “El 19”; Valentin Saenz De La Cruz aka “El Valle,” “Lic”; Emigdio Martinez, Jr., aka “Millo”; Carlos Flores, aka “Buffalo,” “Charly”; and, Jose (Last Name Unknown), aka “Toca,” “Tocayo,” “Pachi.”

According to the indictment, the purpose of the Sinaloa Cartel is to smuggle large quantities of marijuana and cocaine, as well as other drugs, into the United States for distribution. Laundered proceeds of drug trafficking activities are returned to cartel members and are used in part to purchase properties related to the daily functioning of the cartel, including real estate, firearms, ammunition, bulletproof vests, radios, telephones, uniforms, and vehicles. In an effort to maintain control of all aspects of their operations, the cartel and its associates, including members of the Gente Nueva (“New People”) and the Artistas Asesinos (“Murder artists”), kidnap, torture, and murder those who lose or steal assets belonging to, are disloyal to, or are enemies of the cartel. This includes the Juarez Cartel led by Vicente Carrillo Fuentes, a competing drug organization, as well as its enforcement arm known as La Linea and the Barrio Aztecas. Often, murders committed by the cartel involve brutal acts of violence as well the public display of the victim along with banners bearing written warnings to those who would cross the cartel.

“Murder, kidnapping, money laundering, and drug trafficking are the four corners of this organization’s foundation,” stated U.S. Attorney Robert Pitman. “For years, their violence, ruthlessness, and complete disregard for human life and the rule of law have greatly impacted the citizens of the Republic of Mexico and the United States. They must be held accountable for their criminal actions.”

This investigation resulted in the seizure of hundreds of kilograms of cocaine and thousands of pounds of marijuana in cities throughout the United States. Law enforcement also took possession of millions of dollars in drug proceeds that were destined to be returned to the cartel in Mexico. Agents and officers likewise seized hundreds of weapons and thousands of rounds of ammunition intended to be smuggled into Mexico to assist the cartel’s battle to take control of one of the key drug trafficking corridors used to bring drugs into the United States.

“This indictment is the result of a complex, long-term investigation by DEA and our law enforcement partners in the U.S. and Mexico, targeting the Sinaloa Cartel at its highest levels. In addition to violations relating to the trafficking of huge quantities of cocaine and marijuana, the charges encompass money laundering, weapons smuggling, kidnappings, and murders employed by the cartel to fund, expand and protect its far-reaching criminal enterprise. These charges are an important step in bringing to justice those responsible for supplying a large portion of the illegal drugs flowing into communities in the United States through the El Paso area, as well as much of the violence that has ravaged neighboring Ciudad Juarez,” said Joseph M. Arabit, Special Agent in Charge, Drug Enforcement Administration-El Paso Division.

The indictment references two acts of violence allegedly committed by members of the cartel. First, the indictment alleges that in September 2009, Jose Antonio Torres Marrufo, Gabino Salas-Valenciano, Fernando Arellano-Romero, and Mario Iglesias-Villegas, under the leadership of Joaquin Guzman and Ismael Zambada, conspired to kidnap and murder a Horizon City Texas, resident. Specifically, Jose Antonio Torres Marrufo ordered the kidnapping of the victim to answer for the loss of a 670-pound load of marijuana seized by Border Patrol at the Sierra Blanca checkpoint on August 5, 2009. After the kidnapping, the victim was taken to Juarez, where Torres Marrufo interrogated him and ordered that he be killed. On September 8, 2009, the victim’s mutilated body was discovered in Juarez.

Second, the indictment alleges that on May 7, 2010, Jose Torres Marrufo, Fernando Arellano-Romero, and Mario Iglesias-Villegas, under the leadership of Joaquin Guzman and Ismael Zambada, conspired to kidnap and murder an American citizen and two members of his family. Specifically, Torres Marrufo caused an individual in El Paso to travel to a wedding ceremony in Juarez to confirm the identity of a target. The target was the groom, a United States citizen and a resident of Columbus, New Mexico. Under Torres Marrufo’s orders, the groom, his brother and his uncle were all kidnapped during the wedding ceremony and subsequently tortured and murdered. Their bodies were discovered by Juarez police a few days later in the bed of an abandoned pickup truck. Additionally, a fourth person was killed during the kidnapping at the wedding ceremony.

“This indictment has been years in the making, the focus being to dismantle the Sinaloa Cartel by focusing on its upper echelon. The indictment represents the unwavering commitment and collaboration among the law enforcement community to bring justice to those who have inflicted unconscionable violence on so many citizens on both sides of the border. We are sending a clear message that we will continue our relentless pursuit of drug trafficking organizations responsible for such widespread devastation within our communities,” stated FBI Special Agent in Charge Mark Morgan.

“This highly cooperative investigation shows that law enforcement can make significant inroads into drug trafficking organizations and that the major players are not immune from prosecution. This also relates to the illegal firearm traffickers who support such organizations and are responsible for the violence and bloodshed that is occurring,” stated ATF Special Agent in Charge Robert Champion.

This investigation was conducted by the Drug Enforcement Administration; Federal Bureau of Investigation; and the Bureau of Alcohol, Tobacco, Firearms, and Explosives, together with the Immigration and Customs Enforcement-Homeland Security Investigations, United States Border Patrol, Customs and Border Protection, United States Marshals Service, El Paso Police Department, El Paso Sheriff’s Office, and Texas Department of Public Safety. United States Attorney Robert Pitman also expresses his appreciation to New Mexico United States Attorney Ken Gonzalez and his attorneys, Attorney General of Mexico Marisela Morales and her attorneys, and to law enforcement authorities in Mexico for their assistance.

Upon conviction, the defendants face up to life in federal prison. Three of the 14 counts (seven, 11, and 14)—which involve the kidnapping and murder of a resident of Horizon City and three members of a wedding party in Juarez—may result in the imposition of the death penalty upon conviction.

It is important to note that an indictment is merely a charge and should not be considered as evidence of guilt. The defendant is presumed innocent until proven guilty in a court of law.

WWII In HD, Episode 7, Striking Distance – Full Movie

 

SECRET – FBI Motorcycle Gang Trademarks Logo to Prevent Undercover Infiltration

https://publicintelligence.net/wp-content/uploads/2012/04/FBI-VagosTM.png

 

(U//LES) Trademarking of Vagos Outlaw Motorcycle Gang “Cuts” to prevent penetration by undercover Law Enforcement operations.

(U//LES) As of 2 May 2011, the International Chapter of the Vagos Outlaw Motorcycle Gang (Vagos) trademarked their “cuts” – the patches which identify their OMG affiliation – in an effort to prevent law enforcement agencies from inserting undercover officers into their organization.

(U//LES) The Vagos added the ® symbol to the bottom center of the large back patch as shown in photo 1. There are only about 20 of these new patches which are currently being worn by members. It is believed that the new patches will be given out to new members as they are vetted by the Vagos leadership. By doing this, the Vagos believe they will have exclusive rights to the Vagos patch and no one, including undercover officers, would be able to wear the patch without the consent of the International Vagos OMG leadership.

(U//FOUO) Research within the United States Patent and Trademark Office was conducted which indicated the Vagos International Motorcycle Club Corporation California, 780 N. Diamond Bar Blvd., #B12, Diamond Bar California, 91765, filed to make the Vagos name and symbol a registered trademark on July 2, 2010, Serial Number 85076951. Changes and requests by the Vagos Corporation were submitted as recently as May 2, 2011 to the Patent and Trademark Office.

 

https://publicintelligence.net/wp-content/uploads/2012/04/vagos-tm.png

WWII In HD, Episode 6, Point Of No Return – Full Movie

 

The most important international Book about the STASI

http://bks3.books.google.se/books?id=LLZJk4FrqwwC&printsec=frontcover&img=1&zoom=1&edge=curl&imgtk=AFLRE70e6Nq3p1tcJn_Lbr8L0HfZPzI4eV1PEPEt9i00tzbbJJVEv69yY6XFAWSIlvbeTTw9xds_wXSWLUgakwjhxqirz1XzP2ytczsm0rBAJmRVKCAqxOpHswYMBd1TtBhMcZviH2iE

Seduced by Secrets:

Inside the Stasi’s Spy-Tech World
More fascinating than fiction, Seduced by Secrets takes the reader inside the real world of one of the most effective and feared spy agencies in history. The book reveals, for the first time, the secret technical methods and sources of the Stasi (East German Ministry for State Security) as it stole secrets from abroad and developed gadgets at home, employing universal, highly guarded techniques often used by other spy and security agencies. Seduced by Secrets draws on secret files from the Stasi archives, including CIA-acquired material, interviews and friendships, court documents, and unusual visits to spy sites, including “breaking into” a prison, to demonstrate that the Stasi overestimated the power of secrets to solve problems and created an insular spy culture more intent on securing its power than protecting national security. It recreates the Stasi’s secret world of technology through biographies of agents, defectors, and officers and by visualizing James Bond-like techniques and gadgets. In this highly original book, Kristie Macrakis adds a new dimension to our understanding of the East German Ministry for State Security by bringing the topic into the realm of espionage history and exiting the political domain.
Of all the books on the Stasi, this is fairly unique as it covers their technical espionage and technology procurement programs. Highly recommended.
DOWNLOAD THE E-BOOK HERE

WWII In HD, Episode 5, Day of Days – Full Movie

WWII In HD, Episode 4, Battle Stations – Full Movie

The Truth about the Iranian UAV

Iranian Ababil UAV
Iranian Ababil UAV

Israel is trying to discover the extent to which the Iranian announcement regarding the development of a new UAV named “Shaparak” is true.

According to the Iranians, the UAV has a take-off weight of 100 kg and can carry a payload weighing up to 8 kg. In addition, the statement says that the UAV has an endurance of 3.5 hours in altitudes of up to 4 km.

In recent years, Iran has invested considerable efforts in developing UAVs. However, Israel is assessing that its achievements are few.

Currently, Iran is exploiting situations in other countries in order to garner operational experience with their UAVs. As was previously revealed in IsraelDefense, there is proof that Iran has operated UAVs on behalf of the Syrian regime.

According to reports from sources following Iran’s involvement in the Syrian Civil War, an Iranian Pahpad UAV was sighted in the past few weeks in the skies near Homs, Syria, which is considered the most advanced in Syria’s arsenal.

In the past, Tehran has claimed that the UAV possesses stealth qualities. While Western elements doubt this claim, they say that it is undoubtedly an advanced UAV, at least with regards to its aerodynamic configuration.

Iran has previously supplied Hezbollah with self-produced UAVs, and the country has previously developed various basic UAVs as well, including the Ra’ad and Nazir. Four years ago, Iran’s defense minister claimed that his country successfully developed a UAV with a flight range of approximately 1,000 km.

Israel has experience with simple Iranian UAVs launched from southern Lebanon by Hezbollah towards Israel’s northern region. In June 2006, the IAF intercepted a suicide UAV carrying a payload of explosives. The Ababil UAV is a copy of a Russian UAV that is produced in Iran. It first breached Israel’s borders on November 7, 2004, and circled for five minutes over the region of Nahariya, photographing the area with a basic photographic system installed onboard. The Ababil UAV has a flight speed of nearly 300 km/h and has a maximum range of 240 km.

Israel is assessing that advanced Iranian UAVs have already been transferred to Hezbollah. The operation of the Iranian UAV in Syria is part of Tehran’s assistance fo Assad’s regime, as well as an Iranian opportunity to operate it in real conditions.

Source: Israel Defense

WWII In HD, Episode 3, Bloody Resolve – Full Movie

Confidential – Senate Review of CIA Interrogation Program “Nearing Completion”

The Senate Intelligence Committee has been reviewing the post-9/11 detention and interrogation practices of the Central Intelligence Agency for four years and is still not finished.  But the end appears to be in sight.

“The review itself is nearing completion — before the end of summer — but is not over yet,” a spokesperson for the Committee said.  “The release date should be not too far thereafter, but is not set.”

“This review is the only comprehensive in-depth look at the facts and documents pertaining to the creation, management, and effectiveness of the CIA detention and interrogation program,” according to Sen. Jay Rockefeller, who was chairman of the Intelligence Committee when the review began in 2008.

Committee staff are said to have reviewed millions of pages of classified documents pertaining to the CIA program.

In newly published questions for the record following his confirmation hearing last year to be Director of the CIA, Gen. David Petraeus was asked by Senator Rockefeller if he would cooperate with the Committee review.

“I believe that a holistic and comprehensive review of the United States Government’s detention and interrogation programs can lead to valuable lessons that might inform future policies,” Petraeus replied.

“The best way to gain a common set of facts would be to reach out to the intelligence and military communities responsible for detentions and interrogations and for implementing future policies,” he added.  “[T]o gain the proper insights from a series of actions or decisions, we cannot separate the review process from the public servants undertaking the actions,” he said.

Gen. Petraeus also responded to questions concerning interrogation in the “ticking time bomb” scenario (he says “research is required now”), and the applicability of official U.S. government statements on the use of drones to CIA operations (which he declined to confirm), among other topics.

His responses to these questions were published earlier this month in the record of his June 23, 2011 confirmation hearing.

Sen. Dianne Feinstein, the current chair of the Senate Intelligence Committee, provided a preview of the Committee’s findings on CIA interrogation practices in a November 29, 2011 floor statement during the debate on the FY2012 defense authorization act (also noted by Jeffrey Kaye in The Public Record).

“As chairman of the Select Committee on Intelligence, I can say that we are nearing the completion a comprehensive review of the CIA’s former interrogation and detention program, and I can assure the Senate and the Nation that coercive and abusive treatment of detainees in U.S. custody was far more systematic and widespread than we thought,” Sen. Feinstein said.

“Moreover, the abuse stemmed not from the isolated acts of a few bad apples but from fact that the line was blurred between what is permissible and impermissible conduct, putting U.S. personnel in an untenable position with their superiors and the law.”

World War 2 in HD – The History Channel – “Darkness Falls”,”Hard Way Back” – Full Movies

The FBI – San Marino Man Sentenced to Over 10 Years in Federal Prison in $9 Million Mortgage Fraud and Tax Evasion Scheme

LOS ANGELES—A San Marino man has been sentenced to 121 months in federal prison for defrauding banks and other lenders by using “straw borrowers” and bogus documents to obtain millions of dollars in loans for houses and high-end vehicles that included Ferraris and Lamborghinis.

Scott Dority, 54, was sentenced last Monday by United States District Judge R. Gary Klausner. The sentencing hearing was under seal, and the United States Attorney’s Office learned today that the matter had been unsealed.

Dority pleaded guilty on March 14, 2011 to wire fraud, conspiracy, aggravated identity theft, and two counts of tax evasion. When he pleaded guilty, he admitted that his fraudulent conduct caused at least $4 million in losses to financial institutions that issued mortgages and approximately $5 million in losses to institutions that issue loans for the sports cars and recreational vehicles.

Dority also admitted in court that he failed to file tax returns for 2005 and 2006, even though he had hundreds of thousands of dollars in income in each of those years.

According to a now-unsealed court document, Dority, along with others, recruited individuals with good credit to act as straw buyers to purchase residential homes or expensive vehicles. Dority created a package of materials—including fake bank statements, fake pay stubs, and bogus fake tax returns—to make it appear that these straw buyers had sufficient assets and income to pay back loans used to purchase the real estate and vehicles. These fake documents were then submitted to lenders, who relied upon them to issue more than $9 million in mortgage and vehicle loans.

As part of the 121-month prison sentence, Dority received a mandatory two-year prison term for aggravated identity theft.

The investigation into this scheme was conducted jointly by the Federal Bureau of Investigation, IRS-Criminal Investigation, and the United States Secret Service.

Report – Obama Bans Electronic Aid to Iran and Syria — Executive Order 13606

http://www.whitehouse.gov/the-press-office/2012/04/23/executive-order-blocking-property-and-suspending-
entry-united-states-cer

EXECUTIVE ORDER
13606

– – – – – – –

BLOCKING THE PROPERTY AND SUSPENDING ENTRY INTO THE

UNITED STATES OF CERTAIN PERSONS WITH RESPECT TO GRAVE

HUMAN RIGHTS ABUSES BY THE GOVERNMENTS OF IRAN AND SYRIA

VIA INFORMATION TECHNOLOGY

 

By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), section 212(f) of the Immigration and Nationality Act of 1952, as amended (8 U.S.C. 1182(f)), and section 301 of title 3, United States Code,

I, BARACK OBAMA, President of the United States of America, hereby determine that the commission of serious human rights abuses against the people of Iran and Syria by their governments, facilitated by computer and network disruption, monitoring, and tracking by those governments, and abetted by entities in Iran and Syria that are complicit in their governments’ malign use of technology for those purposes, threaten the national security and foreign policy of the United States. The Governments of Iran and Syria are endeavoring to rapidly upgrade their technological ability to conduct such activities. Cognizant of the vital importance of providing technology that enables the Iranian and Syrian people to freely communicate with each other and the outside world, as well as the preservation, to the extent possible, of global telecommunications supply chains for essential products and services to enable the free flow of information, the measures in this order are designed primarily to address the need to prevent entities located in whole or in part in Iran and Syria from facilitating or committing serious human rights abuses. In order to take additional steps with respect to the national emergencies declared in Executive Order 12957 of March 15, 1995, as relied upon for additional steps in subsequent Executive Orders, and in Executive Order 13338 of May 11, 2004, as modified in scope and relied upon for additional steps in subsequent Executive Orders, and to address the situation described above, I hereby order:

Section 1.

(a) All property and interests in property that are in the United States, that hereafter come within the United States, or that are or hereafter come within the possession or control of any United States person, including any foreign branch, of the following persons are blocked and may not be transferred, paid, exported, withdrawn, or otherwise dealt in:

(i) the persons listed in the Annex to this order; and(ii) any person determined by the Secretary of the Treasury, in consultation with or at the recommendation of the Secretary of State:

(A) to have operated, or to have directed the operation of, information and communications technology that facilitates computer or network disruption, monitoring, or tracking that could assist in or enable serious human rights abuses by or on behalf of the Government of Iran or the Government of Syria;(B) to have sold, leased, or otherwise provided, directly or indirectly, goods, services, or technology to Iran or Syria likely to be used to facilitate computer or network disruption, monitoring, or tracking that could assist in or enable serious human rights abuses by or on behalf of the Government of Iran or the Government of Syria;

(C) to have materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of, the activities described in subsections (a)(ii)(A) and (B) of this section or any person whose property and interests in property are blocked pursuant to this order; or

(D) to be owned or controlled by, or to have acted or purported to act for or on behalf of, directly or indirectly, any person whose property and interests in property are blocked pursuant to this order.

(b) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted prior to the effective date of this order.

Sec. 2. I hereby determine that the making of donations of the type of articles specified in section 203(b)(2) of IEEPA (50 U.S.C. 1702(b)(2)) by, to, or for the benefit of any person whose property and interests in property are blocked pursuant to this order would seriously impair my ability to deal with the two national emergencies identified in the preamble to this order, and I hereby prohibit such donations as provided by section 1 of this order.

Sec. 3. The prohibitions in section 1 of this order include but are not limited to:

(a) the making of any contribution or provision of funds, goods, or services by, to, or for the benefit of any person whose property and interests in property are blocked pursuant to this order; and(b) the receipt of any contribution or provision of funds, goods, or services from any such person.

Sec. 4. I hereby find that the unrestricted immigrant and nonimmigrant entry into the United States of aliens who meet one or more of the criteria in section 1 of this order would be detrimental to the interests of the United States, and I hereby suspend the entry into the United States, as immigrants or nonimmigrants, of such persons. Such persons shall be treated as persons covered by section 1 of Proclamation 8693 of July 24, 2011 (Suspension of Entry of Aliens Subject to United Nations Security Council Travel Bans and International Emergency Economic Powers Act Sanctions).

Sec. 5.

(a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate any of the prohibitions set forth in this order is prohibited.(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.

Sec. 6. Nothing in section 1 of this order shall prohibit transactions for the conduct of the official business of the United States Government by employees, grantees, or contractors thereof.

Sec. 7. For the purposes of this order:

(a) the term “person” means an individual or entity;(b) the term “information and communications technology” means any hardware, software, or other product or service primarily intended to fulfill or enable the function of information processing and communication by electronic means, including transmission and display, including via the Internet;

(c) the term “entity” means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization;

(d) the term “United States person” means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States;

(e) the term “Government of Iran” means the Government of Iran, any political subdivision, agency, or instrumentality thereof, including the Central Bank of Iran, and any person owned or controlled by, or acting for or on behalf of, the Government of Iran; and

(f) the term “Government of Syria” means the Government of the Syrian Arab Republic, its agencies, instrumentalities, and controlled entities.

Sec. 8. For those persons whose property and interests in property are blocked pursuant to this order who might have a constitutional presence in the United States, I find that because of the ability to transfer funds or other assets instantaneously, prior notice to such persons of measures to be taken pursuant to this order would render those measures ineffectual. I therefore determine that for these measures to be effective in addressing the two national emergencies identified in the preamble to this order, there need be no prior notice of a listing or determination made pursuant to section 1 of this order.

Sec. 9. The Secretary of the Treasury, in consultation with the Secretary of State, is hereby authorized to take such actions, including the promulgation of rules and regulations, and to employ all powers granted to the President by IEEPA as may be necessary to carry out the purposes of this order. The Secretary of the Treasury may redelegate any of these functions to other officers and agencies of the United States Government consistent with applicable law. All agencies of the United States Government are hereby directed to take all appropriate measures within their authority to carry out the provisions of this order.

Sec. 10. The Secretary of the Treasury, in consultation with the Secretary of State, is hereby authorized to determine that circumstances no longer warrant the blocking of the property and interests in property of a person listed in the Annex to this order and to take necessary action to give effect to that determination.

Sec. 11. This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

Sec. 12. The measures taken pursuant to this order with respect to Iran are in response to actions of the Government of Iran occurring after the conclusion of the 1981 Algiers Accords, and are intended solely as a response to those later actions.

Sec. 13. This order is effective at 12:01 a.m. eastern daylight time on April 23, 2012.

BARACK OBAMA

__________________

ANNEX

Individual

1. Ali MAMLUK [director of the Syrian General Intelligence Directorate, born 1947]

Entities

1. Syrian General Intelligence Directorate2. Syriatel

3. Islamic Revolutionary Guard Corps

4. Iranian Ministry of Intelligence and Security

5. Law Enforcement Forces of the Islamic Republic of Iran

6. Datak Telecom

__________

Annex from Federal Register:

http://www.ofr.gov/OFRUpload/OFRData/2012-09933_PI.pdf

[FR Doc. 2012-10034 Filed 04/23/2012 at 11:15 am; Publication Date: 04/24/2012]

TOP-SECRET – Photos from the Fodor Nuclear Plant, Near Qom, Iran

[Image]
[Image]
[Image]
Bunker Portals September 2011

[Image]

Site in March 2005

[Image]

Site in September 2009[Image]
Site in July 2011[Image]
Site in September 2011, Missile Protection Site at Upper Right and Below
[Image]
Site in September 2011[Image]
Site in September 2011[Image]
Site in September 2011[Image]
Missile Protection Site in September 2011[Image]

 

The Secrets of the CIA – Full Movie

 

Confidential – FBI High Value Detainee Interrogation Group “Advance the Science of Interrogation” Contract Announcement

https://publicintelligence.net/wp-content/uploads/2012/04/FBI-HIG-BAA.png

 

The purpose of research supported by the HIG is to advance the science and practice of intelligence interviewing and interrogation. Offerors will conduct research for the HIG in their facilities. The HIG has defined several areas for long-range study and advisory support. These research areas include but are not limited to:

  • Field observations of military and strategic interrogators, intelligence interviewers and debriefers in order to document strategies, methods and outcomes;
  • Surveys and structured interviews of interrogators, intelligence interviewers and debriefers specified by the Government in order to document what these operational personnel think works and does not work and the development of operationally-based best practices which may be later investigated via laboratory or field studies;
  • Development, testing and evaluation of metrics for assessing the efficacies of interrogations, intelligence interviews and debriefs and of the use of particular interrogation, intelligence interview and debrief strategies and methods;
  • Field quasi-experimental studies to evaluate the efficacy of new evidence-based interrogation, intelligence interview and debrief strategies and methods;
  • Laboratory studies to test and/or discover new interrogation, intelligence interview and debrief methods;
  • Laboratory or field studies to assess the validity of evidence-based interviewing, deception detection, and other relevant principles and/or methods across non-U.S. populations both with and without the use of interpreters;
  • Laboratory or field studies on fundamental psychological processes (to include but not be limited to decision-making, emotion, motivation, memory, persuasion, social identities and social development) as these are relevant to interrogations, intelligence interviews and debriefs;
  • Laboratory or field studies of interpersonal processes (e.g., social influence, persuasion, negotiation, conflict resolution and management), with particular attention to cultural and intercultural issues; and
  • Topics considered out of scope for this BAA include the development of technologies for credibility assessment or other performance support aids, methods relying exclusively on case studies, and language training.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

FBI-HIG-BAA

CIA – The Hidden Operations – Full Movie

 

The CIA, the right hand tool, of the Military-Industrial Complex, involvement in every diabolical, evil endeavor on the face of the earth.

Verschlusssache Waffenbrüder – Die Straftaten der Sowjetarmee – Ganzer Film

Beinahe 50 Jahre gehörten die Sowjetsoldaten zum Alltag in Ostdeutschland. Laut verkündet wurden die offiziellen Parolen vom festen Bruderbund. Verschwiegen wurde, dass die “Freunde” auch Täter waren. Jahr für Jahr begingen die Armeeangehörigen mehr als 2000 Straftaten. Doch offiziell darüber geredet wurde nicht. Verbrechen sowjetischer Soldaten in der DDR waren tabu. Das tatsächliche Ausmaß dieses dunklen Kapitels der “Waffen- und Klassenbrüderschaft” wurde erst nach dem Abzug der sowjetischen Streitkräfte bekannt. Von 1976 bis 1989 wurden 27.505 kriminelle Vorgänge erfasst: Verkehrs- und Schießunfälle, Diebstähle, Körperverletzungen, Vergewaltigungen und Mord. So ist ein Film entstanden, der erstmalig anhand konkreter Fälle das Problem der Straftaten sowjetischer Soldaten in der DDR dokumentarisch aufarbeitet. Im Mittelpunkt stehen die Opfer und ihre Angehörigen. Zu Wort kommen auch DDR-Militärstaatsanwälte und Angehörige der Kriminalpolizei. Es werden einzelne Straftaten rekonstruiert und der Umgang damit von Seiten der DDR-Behörden geschildert.

Die “DDR” und Kuba – Zement gegen Südfrüchte

Die DDR und Kuba
Auf den ersten Blick gab es nur Gegensätze zwischen diesen beiden Ländern des real existierenden Sozialismus: Hier mausgrau, dort grellbunt, hier bierernst, dort ausgelassen und lebensfroh. Eines jedoch verband Castros Kuba und Honeckers DDR über alle Jahrzehnte hinweg: die Verwaltung des Mangels. Ostberlin schickte klapprige Zementfabriken und sogar Rum aus zweifelhafter Destillation über den Atlantik, Havanna revanchierte sich mit Orangen, die nicht schmeckten, und Arbeiterkolonnen, die den unersättlichen Planstellenhunger der DDR-Staatswirtschaft nur ansatzweise stillen konnten. Im Schatten Moskaus entstand so eine zarte Bande gegenseitiger Abhängigkeiten, nach außen selbstverständlich propagiert als “unverbrüchliche Freundschaft zweier Bruderstaaten”. Seit Castros Machtantritt im Jahr 1959 gab es bei den Genossen in Ostberlin nicht nur ein wirtschaftliches Interesse an dem exotischen “Ostblock”-Staat. So konnte man seinem bald eingemauerten Volk zumindest auf dem Papier einen Urlaub in der Karibik in Aussicht stellen. Umgekehrt war für Castro die DDR das sozialistische “Musterländle” im fernen Europa: Fleiß, Ordnungssinn und Know-How der Ostdeutschen beeindruckten den Revolutionär. Anders als dem sowjetischen “Herren”-Gebaren konnte auch der einfache Kubaner dem immer etwas ungelenken Auftritt der Ostdeutschen Sympathie entgegenbringen. Hinter der offiziellen Propaganda wuchsen so viele menschliche Beziehungen, die oft bis heute lebendig blieben.

Unveiled – Kabul attacks shows failure of intelligence

 

Kabul attacks show intel failures in Afghanistan. Dozens, possibly hundreds of people would have been involved in training, equipping and then infiltrating into the heart of Kabul the large number of insurgents who were prepared to fight to a certain death in the Afghan capital last Sunday. Yet neither Afghan nor foreign intelligence operatives appeared to have any idea that an unprecedented wave of attacks was about to engulf both Kabul and several other key locations around the country. So it seems that Afghan President Hamid Karzai may have a point when he says that the “infiltration in Kabul and other provinces is an intelligence failure for us and especially for NATO and should be seriously investigated”.
►►Report claims China spies on US space technology. China is stealing US military and civilian space technology in an effort to disrupt US access to intelligence, navigation and communications satellites, according to a report authored by the State and Defense Departments. The report (.pdf) argues China should be excluded from recommendations made to the US government to ease restrictions on exports of communications and remote-sensing satellites and equipment. Chinese officials have denied the report’s allegations, calling it a “Cold War ghost”.
►►The long and sordid history of sex and espionage. Using seduction to extract valuable information is as old as the Old Testament —literally— Whether from conviction or for profit, women —and men— have traded sex for secrets for centuries. The Cold War provided plenty of opportunities for so-called “honey-pot” scandals. Perhaps the most dramatic case of seduction in recent times involved Israeli nuclear technician Mordechai Vanunu. In 1986 he visited London and provided The Sunday Times with dozens of photographs of Israel’s alleged nuclear weapons program. But Mossad was on his trail and a female agent —Cheryl Ben Tov— befriended him (reportedly bumping into him at a cigarette kiosk in London’s Leicester Square). She lured him to Rome for a weekend, where he was drugged and spirited to Israel.

Die Mauer – Fluchten und Tragödien – Ganzer Film

Die Mauer – Fluchten und Tragödien Unter Lebensgefahr in die Freiheit

In den frühen Morgenstunden des 13. August 1961 beginnt die “Abriegelung” West-Berlins durch DDR-Grenztruppen — die Geburtsstunde der Mauer. Fast drei Jahrzehnte teilt der “antifaschistische Schutzwall” Deutschland in zwei Hälften, und ca. 200 Menschen bezahlen den Versuch, aus der DDR in den Westen zu fliehen, mit dem Leben. Tausenden gelingt die “Republikflucht”, zum Teil auf abenteuerliche Weise: mit Ballons, durch selbst gegrabene Tunnel, im Kofferraum oder mit Tauchausrüstung durch die Ostsee. Der Film blickt zurück auf ein unmenschliches Bollwerk und die vielen Versuche, es zu überwinden. Wie viele Menschen genau ihr Leben bei einem Fluchtversuch über die Grenze der DDR verloren haben, ist auch heute noch ungewiss. Die SED-Führung versuchte nach Kräften, Todesfälle zu verschleiern. Die Abriegelung Westberlins war unblutig verlaufen, wenige Tage später aber erließ das SED-Politbüro einen ersten, noch verklausulierten Schießbefehl an die Grenztruppen. Am 24. August 1961, wenige Wochen nach Ulbrichts Befehl zur “Grenzschließung”, wurde der 24jährige Günter Litwin bei einem Fluchtversuch durch einen gezielten Kopfschuss getötet.

Unveiled – Ex-MI6 Charles Farr Out of Shadows

A sends:

http://www.thesundaytimes.co.uk/sto/comment/profiles/article1021573.ece [Subscription required]

Chief snooper pops out of the shadows

David Leppard

Sunday Times, 22/4/12, p23 main section

When the embattled Theresa May appears before a committee of MPs on Tuesday to give evidence about her work as home secretary she will be accompanied by one of Whitehall’s most powerful, controversial and secretive mandarins. Charles Farr, the Home Office’s top “securocrat”, is set to emerge from the shadows for the first time as he is asked to defend the coalition’s plans to monitor the Internet use and digital communications of everyone in Britain…

He joined MI6 some time in the 19802, serving in South Africa and Jordan. Farr is understood to have come to prominence, as one contemporary recalled, “flying around Afghanistan in a helicopter with thousands of dollars in bundles, doing deals with farmers to not grow opium. Bad policy as it turned out, but he did it very well…”

Farr’s critics say he still carries the legacy of his MI6 heyday — a mindset they claim is inappropriate for his job at the heart of Whitehall security policy. “When you are an MI6 officer out in the field, trying to stop people getting nuclear weapons in, say, Kazakhstan, you have to be very independently minded and very confident in your own judgement. There’s not a lot of ministerial control or public accountability,” says an admirer who knows him well. “Charles feels very uncomfortable in the world of domestic politics and doesn’t read it very well.”

A former Home Office official went further: “When you’re suddenly flung into a top position with management and policy responsibility in the Home Office, you can’t go on behaving like you are in the Tora Bora caves doing deals with warlords. Your job is to advise ministers who decide policy. You can’t go around thinking you are a player in your own right. It’s a constitutional concern…”

It’s no secret in Whitehall that the grandiosely titled communications capabilities development programme was Farr’s “policy baby”. In fact, it was a rehash of an earlier attempt by Farr in 2009 to persuade the then Labour home secretary to build a giant database where the government could hold details of all emails and telephone calls. It obviously needed sensitive handling, but its delivery was bungled by Farr’s office and it was dumped by Labour after an uproar. When a new government was elected he tried to resurrect the plan — with similar results.

A similar lack of deftness befell Farr’s efforts to develop “Prevent”, a controversial plank of the government’s counterterrorism policy that aimed to identify and thwart thousands of young Muslim men who might be vulnerable to violent extremism… “It was a blurring of the policy of surveillance with a different policy of community engagement and building a civil society,” said a former Home Office official. “But if, like Charles Farr, you are a career spook you just don’t get that. You see everything as an opportunity for surveillance and you see everybody as potentially sinister…”

Another former official, who had a showdown with Farr over policy, recalls: “He’s almost messianic. He’s like he’s on a mission to protect the nation. When you disagree with him he gets very emotional. He’s one of these guys who goes white and shakes when he loses his temper…”

“He has on occasions adopted a style that could be considered inappropriate,” said a former official. “He’s a very uncivil servant.”

STASI auf dem Schulhof

Annette Baumeister zeigt beschädigte Seelen, in denen das Gift der Staatssicherheit bis heute fortwirkt. Tausende Betroffene leben in Deutschland, kaum einer traut sich, darüber zu sprechen. Zu groß ist die Angst, stigmatisiert zu werden.

Am Ende der DDR waren ungefähr 8.000 Kinder und Jugendliche so genannte “inoffizielle Mitarbeiter” der Staatssicherheit. Sie wurden in Jugendclubs, in Kirchen und an den Schulen angesprochen. Sie sollten ihre Freunde aushorchen oder über ihre Eltern berichten.

Marko ist 17 Jahre alt, als ihn die Staatssicherheit über seine Dresdner Schule kontaktiert. Kerstin und Elvira besuchen in den 70er Jahren das Internat Wickersdorf für angehende Russischlehrer. Auch sie sind minderjährig, als sie ins Direktorenzimmer bestellt werden und dort auf Männer von der Staatssicherheit treffen. “Ich hatte das Gefühl, die wissen alles über mich”, sagt Kerstin heute über das Anwerbegespräch als damals 16-Jährige im Büro des Schuldirektors. “Ich hatte auch die Befürchtung, wenn ich da nicht mitmache, dass ich dann auch mein Abitur nicht machen kann.” Unter Druck gesetzt, unterschreibt sie die Verpflichtung, niemandem davon zu erzählen, auch den Eltern nicht.

Das Ministerium für Staatssicherheit will wissen, was die Kinder und Jugendlichen denken und fühlen, will ihnen “unter die Haut kriechen und ins Herz schauen”, schließlich hängt von ihnen die Zukunft des Sozialismus ab. Stasiminister Erich Mielke befahl schon 1966, Minderjährige anzuwerben und zu Spitzeln zu machen. Und an der “Juristischen Hochschule” der Staatssicherheit in Potsdam lernen die Führungsoffiziere, wie das geht und welche Jugendlichen besonders dazu zu drängen sind.

Der Film rekonstruiert das Schicksal von Marko, Kerstin und Elvira und zeigt, wie die Stasi vorging, um Jugendliche zu Spitzeldiensten zu pressen. “Stasi auf dem Schulhof” schenkt drei Betroffenen von damals Gehör. Erstmals erzählen sie ihre Geschichte und reflektieren ihre damalige Lebenssituation, ihre Naivität, ihre Verzweiflung, die Einsamkeit, ihre Schuldgefühle. Daneben erzählt der ehemalige Schuldirektor, welche Rolle er bei der Anwerbung spielte, beschreibt ein ehemaliger Führungsoffizier, mit welchem Geschick er die Jugendlichen anwarb und wie die Treffen mit ihnen abliefen.

Ein Film von Annette Baumeister

The Hunt For Gollum – Lord of the Rings Prequel – Full Movie

Award winning unofficial prequel to The Lord Of The Rings dramatising Aragorn & Gandalf’s long search for Gollum directed by British filmmaker Chris Bouchard. Based faithfully on the appendices of the books this is a non-profit, serious homage to the writing of J.R.R Tolkien and the films of Peter Jackson. It was shot on locations in England and Snowdonia with a team of over a hundred people working over the Internet. It took two years to make and was released as a non-profit Internet-only video by agreement with Tolkien Enterprizes. This Youtube version is slightly extended with 1 scene added back in. http://www.thehuntforgollum.com http://www.ioniafilms.com

Born of Hope – Full Movie

Born of Hope is an independent feature film inspired by the Lord of the Rings and produced by Actors at Work Productions in the UK.
http://www.bornofhope.com

Thanks to Chris Bouchard and the H4G team for putting the film here. For more films by the makers of this and BoH extras please visit.
ActorsatWork
http://www.youtube.com/actorsatwork

Check them out for more videos regarding the film including the audio commentary.
http://www.youtube.com/watch?v=elt_l8zisik

A scattered people, the descendants of storied sea kings of the ancient West, struggle to survive in a lonely wilderness as a dark force relentlessly bends its will toward their destruction. Yet amidst these valiant, desperate people, hope remains. A royal house endures unbroken from father to son.

This 70 minute original drama is set in the time before the War of the Ring and tells the story of the Dúnedain, the Rangers of the North, before the return of the King. Inspired by only a couple of paragraphs written by Tolkien in the appendices of the Lord of the Rings we follow Arathorn and Gilraen, the parents of Aragorn, from their first meeting through a turbulent time in their people’s history.

The STASI in West-Berlin – Die STASI in West-Berlin – Full Movie – Ganzer Film

Das Ministerium für Staatssicherheit der DDR (kurz MfS oder Stasi, abwertend auch SSD) war der Inlands- und Auslandsgeheimdienst der DDR und zugleich Ermittlungsbehörde (Untersuchungsorgan) für „politische Straftaten”. Das MfS war innenpolitisch vor allem ein Unterdrückungs- und Überwachungsinstrument der SED („Schild und Schwert der Partei”) gegenüber der DDR-Bevölkerung, das dem Machterhalt diente. Dabei setzte es als Mittel Überwachung, Einschüchterung, Terror und die so genannte Zersetzung gegen Oppositionelle und Regimekritiker („feindlich-negative Personen”) ein.

Das MfS wurde am 8. Februar 1950 gegründet. Der Sprachgebrauch der SED, der das MfS als „Schild und Schwert der Partei” bezeichnete, beschreibt die ihm zugedachte Funktion im politisch-ideologischen System der DDR.

Neben dem MfS gab es auch einen weiteren Nachrichtendienst in der DDR, die Militärische Aufklärung der Nationalen Volksarmee (militärischer Aufklärungsdienst) mit Sitz in Berlin-Treptow. Die Verwaltung Aufklärung wurde ebenso wie die Grenztruppen und die restliche NVA durch die Hauptabteilung I (MfS-Militärabwehr oder Verwaltung 2000) kontrolliert („abgesichert”).

TOP-SECRET – The CIA Crown Jewels – The Watergare Case

Citation: DDCI Statement about the Watergate Case
[Central Intelligence Agency Employee Bulletin Containing Vernon Walter’s Statement on CIA Involvement in Watergate; Best Available Copy] , [Classification Unknown], Newsletter, 359, May 21, 1973, 3 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00031
Origin: United States. Central Intelligence Agency
Individuals/
Organizations Named:
Cushman, Robert E., Jr.; Dean, John Wesley III; Democratic National Committee (U.S.); Ehrlichman, John D.; Gray, L. Patrick; Haldeman, H.R.; Helms, Richard M.; Hunt, E. Howard; Nixon, Richard M.; Schlesinger, James R.; United States. Department of Justice; United States. Federal Bureau of Investigation; United States. White House; Walters, Vernon A.
Subjects: Congressional hearings | Covert operations | Government appropriations and expenditures | Mexico | Watergate Affair (1972-1974)
Abstract: Disseminates Vernon Walter’s statement to congressional committee about his communications with John Dean and Patrick Gray on Central Intelligence Agency involvement in Watergate and CIA’s issuance of equipment to Howard Hunt.
Full Text: Document – PDF – this link will open in a new window (156 KB)

Durable URL for this record

Hitler’s Warriors – Wilhelm Keitel – Full Movie

 

From the series “Hitler’s Warriors”.

Wilhelm Bodewin Gustav Keitel (22 September 1882 — 16 October 1946) was a German field marshal (Generalfeldmarschall). As head of the Oberkommando der Wehrmacht (Supreme Command of the Armed Forces) and de facto war minister, he was one of Germany’s most senior military leaders during World War II. At the Allied court at Nuremberg he was tried, sentenced to death and hanged as a war criminal.

TOP-SECRET from the FBI – Eleven Individuals of the Genovese Organized Crime Family Indicted

An 18-count indictment was unsealed in federal court in Brooklyn this morning charging 11 individuals, including several made members and associates of the Genovese organized crime family of La Cosa Nostra (the “Genovese family”), variously with racketeering conspiracy, extortion, illegal gambling, union embezzlement, and obstruction of justice. The defendants will make their initial appearance later today before United States Magistrate Judge Marilyn D. Go at the U.S. Courthouse at 225 Cadman Plaza East in Brooklyn, New York.

The case was announced by Loretta E. Lynch, United States Attorney for the Eastern District of New York; Janice K. Fedarcyk, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office; Robert Panella, Special Agent in Charge, U.S. Department of Labor, Office of Inspector General, Office of Labor Racketeering and Fraud Investigations, New York Region; Raymond W. Kelly, Commissioner, New York City Police Department; and Rose Gill Hearn, Commissioner, New York City Department of Investigation (DOI).

As alleged in the indictment and a detention memorandum filed by the government today, Conrad Ianniello is a captain in the Genovese family. James Bernardone, the Secretary Treasurer of Local 124 of the International Union of Journeymen and Allied Trades (IUJAT), and Salvester Zarzana, the former President of Local 926 of the United Brotherhood of Carpenters and Joiners, are both soldiers in the Genovese family. Ryan Ellis, Paul Gasparrini, William Panzera, and Robert Scalza, the Secretary Treasurer of IUJAT Local 713, are associates of the Genovese family. Also named as defendants are Robert Fiorello, Rodney Johnson, Felice Masullo, and John Squitieri.

Ianniello is charged with, among other crimes, racketeering conspiracy, including predicate acts of illegal gambling; conspiring to extort vendors at the annual Feast of San Gennaro held in Little Italy, New York in 2008; and, along with Scalza and Ellis, conspiring to extort a labor union between April 2008 and May 2008 in order to induce the union to cease its efforts to organize workers at a company on Long Island. Based on their threats, the defendants allegedly hoped to pave the way for Scalza’s union, IUJAT Local 713, to unionize the company instead.

The indictment charges Bernardone and Gasparrini with racketeering conspiracy, including predicate acts of conspiring to extort a subcontractor related to work performed at construction sites in Manhattan, Queens, and Brooklyn from approximately 2006 to 2009, including work performed at a Hampton Inn located on Ditmars Boulevard in Queens. Zarzana is also charged with extortion related to one of those construction sites. In addition, the indictment alleges that in 2008, Squitieri embezzled money from employee pension and annuity funds of Local 7-Tile, Marble, and Terrazzo of the Bricklayers and Allied Craftworkers union by providing non-union laborers to perform tile-related work during a renovation at the Paramount Hotel in Manhattan, thereby avoiding paying into Local 7’s employee pension benefit plans. Johnson, a project manager at the Paramount Hotel renovation, is charged with obstruction of justice in connection with his efforts to impede a federal grand jury investigation conducted in this district that ultimately resulted in the charges brought in the indictment unsealed today.

Finally, Panzera and Fiorello are charged with crimes related to their involvement in loansharking and the extortionate collection of money from a victim.

“This indictment is the most recent chapter in this office’s continued fight against organized crime’s efforts to infiltrate unions and businesses operating in New York City. Where others saw a city festival, urban renewal, and job growth, these defendants allegedly saw only a chance to line their pockets at the expense of hard working individuals. And when law enforcement began to probe their actions, one defendant allegedly went so far as to try to block that investigation,” stated United States Attorney Lynch. “Organized crime figures and union officials who seek to earn money by corrupting legitimate industry will be investigated and prosecuted to the full extent of the law.”

FBI Assistant Director in Charge Fedarcyk stated, “Today’s charges highlight not only the ongoing vigilance of the FBI in policing the corrupt conduct of La Cosa Nostra, but also the necessity of such vigilance. Even as mob families seek and discover new ways to make money by illegitimate means, they continue to rely on tried-and-true schemes like extortion and gambling. The mob’s purpose is making money, and how is less important than how much.”

Special Agent in Charge Panella, U.S. Department of Labor, Office of Inspector General, stated, “The RICO indictment and today’s arrests reflect our strong commitment to combat the infiltration of unions by organized crime members and associates for their personal enrichment. The defendants allegedly utilized their organized crime influence to corrupt businesses and advance various illegal schemes. The Office of Inspector General will continue to work with our law enforcement partners to vigorously investigate labor racketeering in the nation’s unions.”

NYPD Commissioner Kelly stated, “As alleged in the indictment, the defendants’ extortion knew no bounds—in fact, one of the defendants allegedly even used the feast of San Gennaro to extort money from vendors involved in the celebration of the saint’s life. I commend the U.S. Attorney’s Office and the federal agents and New York City detectives for this successful investigation.”

DOI Commissioner Gill Hearn stated, “The charges underscore the determination of federal and city investigators to curtail organized crime’s influence in New York City, including the Feast of San Gennaro in Little Italy. DOI was pleased to assist its federal partners on this significant indictment.”

The defendants face maximum sentences ranging from five to 20 years of imprisonment on each count of conviction.

The government’s case is being prosecuted by Assistant United States Attorneys Nicole Argentieri, Jacquelyn Kasulis, and Amanda Hector.

The Defendants

Name Age Residence
Conrad Ianniello 68 Staten Island, New York
James Bernardone 44 Bronx, New York
Ryan Ellis 30 Queens, New York
Rober Fiorello 62 Jackson, New Jersey
Paul Gasparrini 39 Yonkers, New York
Rodney Johnson 49 Edgewater, New Jersey
Felice Masullo 40 Queens, New York
William Panzera 39 North Haledon, New Jersey
Robert Scalza 66 Long Island, New York
John Squitieri 55 Rockland County, New York
Salvester Zarzana 48 Brooklyn, New York

The Crow – Full Movie

A man brutally murdered comes back to life as an undead avenger of his and his fiancée’s murder.

Revealed – Kony 2012 Campaign Loses Couch Potatoes

https://s3.amazonaws.com/disinfo/wp-content/uploads/2012/04/InvisibleChildrenDickheads.jpg

 

Linking to a video on Facebook is one thing. Getting off the couch is quite another.

Viral internet sensation Kony 2012 found the campaign’s youthful army of ”clicktivists” largely unwilling to actually get up, go outside and put up posters.

Judging by the mood online, many had decided the whole meme was, like, so 10 minutes ago.

Participants in the campaign’s Cover the Night event on Friday were asked to form into teams, volunteer for their community for a few hours by picking up rubbish or washing cars, then spend the evening plastering walls, pavements and windows with promotional material.

But amazing things generally failed to happen. In New York, barely 5000 people had pledged on Facebook to join in. The event’s page didn’t specify a location, and Twitter revealed only a handful of groups heading to places such as Times Square, where a big video screen showed a Kony 2012 trailer every half hour just above a Foot Locker store.

Apocalypto – Full Movie by Mel Gibson

 

Secret – Canada Integrated Terrorism Assessment Centre (ITAC) Occupy Wall Street Bulletins

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy-2.png

 

The following Integrated Terrorism Assessment Centre (ITAC) bulletins were obtained via an information request from the Canadian Security Intelligence Service (CSIS) by Paroxysms.  Most of the documents were also simultaneously released to the Globe and Mail, though the collection released to Paroxysms is more complete and contains several additional bulletins that are not included in the other collection.

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE

ITAC-Occupy

JFK – HD Full Film Movie by Oliver Stone – Starring Kevin Costner

Stalin – Full Movie – Starring Robert Duvall

 

Stalin is a 1992 television film, produced for HBO, starring Robert Duvall portraying Soviet leader Joseph Stalin.

SECRET – Thirty Arrested in Connection with Narcotics Trafficking

OKLAHOMA CITY—James E. Finch, Special Agent in Charge of the FBI Oklahoma City Division announces the arrest of 30 individuals for violation of federal narcotic laws. In addition to the 30 individuals arrested yesterday, law enforcement in Oklahoma is looking for two additional individuals.

Yesterday’s event is a culmination of a three-year investigation into narcotics trafficking from California to Oklahoma. Arrests took place in Oklahoma City; Del City; Norman; Tulsa; Sacramento, California; Stockton, California; and San Francisco, California. These arrests stem from two indictments returned by the federal grand jury in the Western District of Oklahoma.

Law enforcement in Oklahoma is still searching for two individuals who have not been located. Those individuals are Tyrone Tanner, 31, from Tulsa, Oklahoma; and Darnell Banks, 26, from Oklahoma City, Oklahoma. Their photos can be seen below.

This investigation and yesterday’s arrests would not have been possible without the assistance of the Homeland Security Investigation, U.S. Marshals Service, Internal Revenue Service, Oklahoma City Police Department, Del City Police Department, Norman Police Department, Tulsa County Sheriff’s Office, Drug Enforcement Administration (DEA)-Stockton, FBI-Stockton, Stockton Police Department, FBI-Sacramento, DEA-Sacramento, FBI-San Francisco, and DEA-San Francisco.

Anyone with information regarding the whereabouts of any of the individuals listed above is urged to immediately contact the Oklahoma City Division of the FBI at (405) 290-7770 (24 hour number). You may remain anonymous.

Escape from Sobibor

Escape from Sobibor tells the story of the Jews who could escape from the most secret camp of the German during WW II: Sobibor

Playing For Time – Full Movie

Eichmann (2007) – Full Movie

Adolf Eichmann was a German Nazi and SS-Obersturmbannführer (Lieutenant Colonel) and one of the major organizers of the Holocaust. Because of his organizational talents and ideological reliability, Eichmann was charged by Obergruppenführer (General) Reinhard Heydrich with the task of facilitating and managing the logistics of mass deportation of Jews to ghettos and extermination camps in German-occupied Eastern Europe.

Read the rest at Wikipedia http://en.wikipedia.org/wiki/Adolf_Eichmann

Crpytome unveils – OWS Protestors Get 1A Camp at National Memorial

Notice of Temporary Change

Federal Hall National Memorial is announcing a temporary change to how the public will access the building. Taking this action affords visitors safe access to the site without interfering with those participating in 1st amendment activities at the site.

[Image]

17 April 2012

Occupy Wall Street 17 April 2012

The steps of Federal Hall National Memorial have replaced the sidewalks for the Occupy Wall Street
encampment. Located across Wall Street from the New York Stock Exchange, it is one of the most
popular tourist stops in NYC.

The protest is described by OWS as training for a worldwide General Strike on 1 May 2012. More:

Tidalhttp://occupytheory.org

http://occupiedmedia.us

Cryptome Protest Series: http://cryptome.org/protest-series.htm

 


 

Occupy Wall Street 17 April 2012

[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. April 17, 2012. Cryptome

[Image]

[Image][Image]

US National Park Service (USNPS) police, which guard national Memorials such as the Statue of Liberty,
are monitoring the protest along with NYPD. An attempt by USNPS police to move the protestors to one
side of the steps was resisted by the protestor above while Cryptome photos and a video were made.
In answer to an inquiry about the resistance, the USNPS officer answered every question with
“they are exercising free speech.”

[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. As temperatures warm, members of the global protest movement have reasserted their commitment to finding a permanent presence in the financial district following their eviction from Zucotti Park last November in a dramatic police raid. Getty
[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. As temperatures warm, members of the global protest movement have reasserted their commitment to finding a permanent presence in the financial district following their eviction from Zucotti Park last November in a dramatic police raid. Getty
[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. As temperatures warm, members of the global protest movement have reasserted their commitment to finding a permanent presence in the financial district following their eviction from Zucotti Park last November in a dramatic police raid. Getty
Following photos taken by Cryptome between 11:30 and 13:30, 17 April 2012.
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]US National Park Service police SWAT members. Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome

[Image]

[Image]

Senior Park Service police overheard discussing how to corral the protestors without provoking resistance. 17 April 2012. Cryptome

[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
 

Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome

[Image]Side wall of Federal Hall National Memorial where OWS protestors slept overnight until evicted by NYPD. 17 April 2012. Cryptome
[Image]Sidewalk across from Federal Hall National Memorial where OWS protestors slept overnight until evicted by NYPD. 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]School children were led in a protest chant by their teacher.

 


	

Confidential – Soros Open Society Institute Tax Report 2010

 

The Open Society Institute (OSI), renamed in 2011 to Open Society Foundations, is a private operating and grantmaking foundation started by George Soros, aimed to shape public policy to promote democratic governance, human rights, and economic, legal, and social reform. On a local level, OSF implements a range of initiatives to support the rule of law, education, public health, and independent media. At the same time, OSF works to build alliances across borders and continents on issues such as combating corruption and rights abuses.

One of the aims of the OSF is the development of civil society organizations (e.g., charities, community groups and trade unions) to encourage participation in democracy and society.

Open Society Institute was created in 1993 by investor George Soros to support his foundations in Central and Eastern Europe and the former Soviet Union. On May 28, 1984 Soros signed the contract between the Soros Foundation (New York) and the Hungarian Academy of Sciences, the founding document of the Soros Foundation Budapest.[1]This was followed by several foundations in the region to help countries move away from communism. In August 2010, Open Society Initiative changed its name to Open Society Foundations to better reflect its role as funder for civil society groups around the world. OSF has expanded the activities of the Soros Foundations network to other areas of the world where the transition to democracy is of particular concern. The Soros Foundations network has nodes in more than 60 countries, including the United States. OSF projects include the National Security and Human Rights Campaign that opposes detention of unprivileged combatants and the Lindesmith Center and others dealing with drug reform.

Related initiatives include the Open Society Initiative for West Africa (OSIWA) and the Open Society Initiative for Southern Africa (OSISA). Recent efforts have included those that have met with controversy, including an effort in East Africa aimed at spreading human rights awareness among prostitutes in Uganda and other East African nations, which was not received well by the Ugandan authorities, who considered it an effort to legalize and legitimize prostitution.[2] Other initiatives includes: AfriMAP; Arts & Culture Program; Americas Quarterly; Burma Project/Southeast Asia Initiative; Central Eurasia Project; Central Eurasia Project; Closing the Addiction Treatment Gap; Documentary Photography Project; Soros Documentary Fund (SDF);[3] Early Childhood Program; East East Program: Partnership Beyond Borders; Education Support Program; EUMAP; Global Drug Policy Program; Information Program; International Higher Education Support Program; Latin America Program; Local Government & Public Service Reform Initiative; Media Program; Middle East & North Africa Initiative; Open Society Fellowship; OSI-Baltimore; OSI-Brussels; OSI-Washington, D.C.; Public Health Program; Roma Initiatives; Scholarship Programs; Special Initiatives; Think Tank Fund[4]; Turkmenistan Project; U.S. Programs; International Women’s Program; the Youth Initiative[5]; the International Migration Initiative; Policy Matters Ohio and the Open Society Justice Initiative.

According to the 2009 OSF expenditures report[6], Africa region (outside of the South Africa) was the key area of funded activities: about $51,000,000 were spent on civil society support, human rights, education, justice, media, public health, transparency, and other activities there.

Among other regions, activities in five counties received the most funding (excluding funds provided by non-OSI parties): Ukraine ($8.47M; mostly in civil society support, human rights, public health), South Africa ($7.23M; human rights, civil society, information and media and other), Russia ($6,29M; almost solely civil society support), Serbia ($5,04M; mostly civil society, education and youth, human rights, transparency), Georgia ($4.84M; media, human rights, civil society, administration, transparency, public health and other).

6 out of 10 countries with most activities of the Institute in 2009 are post-Soviet states. Another 3 are situated Eastern Europe.

https://en.wikipedia.org/wiki/Open_Society_Institute

DOWNLOAD THE ORIGINAL DOCUMENT HERE

osi-tax-2010

Uncensored – FEMEN Ring Bells at St Sophia cathedral

Femen Ring Bells at St Sophia cathedral to protest the antiabortion law against women rights.Femen провели акцию протеста на колокольне Софийского собора

Пятеро активисток женской организации FEMEN забрались на колокольню Софийского собора в центре

Confidential – U.S. Air Force Small Unmanned Aircraft Systems (SUAS) Airpower Lessons from Iraq and Afghanistan

https://publicintelligence.net/wp-content/uploads/2012/04/USAF-SUAS-LL.png

 

 

“Enduring Airpower Lessons from Operation ENDURING FREEDOM (OEF) and Operation IRAQI FREEDOM (OIF)” is one of three lessons learned (L2) focus areas directed by the Chief of Staff of the Air Force (CSAF) at CORONA Top 2008. This report is the third and last in a series of Unmanned Aircraft Systems (UAS) L2 reports produced for fiscal year 2009 and focuses on Small UAS (SUAS) capabilities and issues.

Five key observations provide insight into SUAS issues:

OBSERVATION 1: Insufficient analysis and education exist on the capabilities of SUAS and how they could be effectively employed by the USAF.

OBSERVATION 2: The USAF does not have a comprehensive strategy for the acquisition, sustainment and development of SUAS capabilities; and the USAF has not properly funded SUAS programs.

OBSERVATION 3: HQ AFSOC received funding and has developed the first Air Force SUAS Formal Training Unit (FTU).

OBSERVATION 4: There are no full-time, dedicated professional uniformed Group 2 and 3 UAS operators and maintainers.

OBSERVATION 5: Frequency and bandwidth management, communications infrastructure and datalinks will only be more stressed with the proliferation of SUAS; and SUAS Ground Control Station (GCS) frequencies are unencrypted and unprotected.

OBSERVATION 5: Frequency and bandwidth management, communications infrastructure and datalinks will only be more stressed with the proliferation of SUAS; and SUAS GCS frequencies are unencrypted and unprotected.

Discussion: With the proliferation of SUAS on the battlefield of the near future, the current SUAS GCS proprietary datalinks are not flexible and sustainable. Many of the current SUAS use datalink equipment that is not interoperable with other datalinks or tunable to other frequencies. In fact, the number of available proprietary SUAS frequencies is so limited US military SUAS operations are threatened by interference from other operations. Additionally, SUAS datalinks are unencrypted and are thus susceptible to enemy exploitation. Since datalinks are also unprotected, GCS are jammable and locations can even be triangulated and possibly physically attacked.

Not all Group 2 and 3 UAS are Cursor on Target (CoT) capable. Among other capabilities, CoT enables users to communicate from a common set of applications to various datalinks such as Link-16 and Situational Awareness Data Link (SADL). Any GCS standards must deliver CoT compatibility to enable existing CoT systems to seamlessly integrate, thereby decreasing integration costs and simplifying transition.

Given that SUAS datalink frequencies are not tunable, they may be prohibited from operating in other regions and countries of the world. This limitation is due to the potentiality of interfering with host-nation communications frequencies. Additionally, SUAS datalinks are not interoperable with manpack radios, burdening operators to transport multiple pieces of communications hardware on the battlefield.

Effective 1 October 2009, Assistant Secretary of Defense (Networks and Information Integration) (ASD (NII)) mandated the use of Common Data Link (CDL) for all UAS greater than 30 lbs. As it was originally designed and fielded in the late 1970s, CDL was adequate. According to HQ AFSOC, CDL is not small enough for Group 1 SUAS operations, but will be leveraged on Group 2 and 3 systems. However, the continued proliferation of CDL enabled airborne assets has already reached a tipping point. CDL is a huge and inefficient frequency space consumer. This dated, yet capable, waveform needs modernization, to include “dial-a-rate” speeds, more efficient error correction coding, multiple encoding rates, expanded frequency band alternatives (e.g., into L, S, C and extended Ku) and importability to software defined radios. Such modifications could improve UAS density 3 to 15 times what it is today. As it stands, failure to modernize the CDL waveform will limit the number of participants that can operate within a region (or suffer degraded video quality) and require strict frequency deconfliction.
Lessons Identified:

  • Develop tunable, interoperable, and unrestricted SUAS GCS frequencies since available radio frequency spectrum is an essential enabler for UAS operations.
  • Secure and protect SUAS GCS frequencies.
  • Develop SUAS GCS datalinks capable of Voice-Over Internet Protocol (VoIP), video and data multicast.
  • Make all Group 2 and 3 UAS CoT capable.
  • Develop digital SUAS GCS datalinks that are interoperable with field radios.
  • Modernize CDL waveform.

Die Gesichter des Bösen – Hitlers Henker – SPIEGEL TV – Ganzer Film

Argumente gegen Holocaustleugner
http://www.h-ref.de/
Die Dokumentation zeichnet die Wege der Täter nach, die die unbeschreiblichen Verbrechen im “Dritten Reich” erst möglich machten.
Heinrich Himmler organisierte für seinen Führer die brutale Verfolgung politischer Gegner in einem System von Konzentrationslagern. Der fanatische Nationalsozialist und Antisemit plante die Vernichtung der europäischen Juden. Im Holocaust wurden schließlich über sechs Millionen Menschen ermordet.

Der berüchtigte SS-Arzt Josef Mengele gehörte zu den grausamsten Tätern der Nazidiktatur. 40.000 unschuldige Opfer schickte er ins Gas, benutzte Kinder für Menschenversuche. Nach dem Krieg gelang ihm die Flucht, er wurde weltweit verfolgt – aber nie gefasst. Adolf Eichmann, der berüchtigte Organisator des Holocaust war jedoch nicht der einzige, dem schließlich der Prozess gemacht wurde. Der ehemalige SS-Hauptsturmführer Erich Priebke ist der Mitwirkung an besonders grausamen Morden angeklagt worden. Das Massaker in den ardeatinischen Höhlen, an dem er als Offizier beteiligt war, gilt als das schlimmste Kriegsverbrechen, das die Deutschen im besetzten Italien begangen haben.

Secret from the FBI – Albanian National Arrested En Route to Fight Jihad Pleads Guilty to Attempting to Support Terrorists

Agron Hasbajrami, an Albanian citizen and resident of Brooklyn, pled guilty today in United States District Court for the Eastern District of New York before the Honorable John Gleeson to attempting to provide material support to terrorists. At sentencing, Hasbajrami faces up to 15 years in prison. As a condition of his plea, Hasbarjrami has agreed to be deported from the United States.

The guilty plea was announced by Loretta E. Lynch, United States Attorney for the Eastern District of New York; Janice K. Fedarcyk, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office; and Raymond W. Kelly, Commissioner, New York City Police Department.

According to court documents, Hasbajrami attempted to travel to the Federally Administered Tribal Areas of Pakistan (the FATA) for the purpose of joining a radical jihadist insurgent group. In addition, Hasbajrami sent over $1,000 in multiple wire transfers abroad to support terrorist activities in Pakistan and Afghanistan. In pursuing his goal of fighting jihad, Hasbajrami exchanged e-mail messages with an individual in Pakistan who told him that he was a member of an armed group that had murdered American soldiers. In order to preserve the secrecy of their communications, Hasbajrami and the individual used multiple e-mail addresses to disguise their correspondence. In one e-mail message, Hasbajrami stated that it was difficult to ask for money from fellow Muslims because they became apprehensive “when they hear it is for jihad.” In another e-mail, Hasbajrami stated that he wished to travel abroad to “marry with the girls in paradise,” using jihadist rhetoric to describe his desire to die as a martyr.

On September 5, 2011, Hasbajrami purchased a one-way airline ticket to travel to Turkey the following day. Based on Hasbajrami’s e-mail communications, he intended to travel from Turkey to the FATA to join a jihadist group. On September 6, 2011, Hasbajrami was arrested at an international departures terminal at John F. Kennedy International Airport in Queens, New York. At the time of his arrest, Hasbajrami was carrying a tent, boots, and cold-weather gear. Following his arrest, a search of Hasbajrami’s residence revealed, among other items, a note reading, “Do not wait for invasion, the time is martyrdom time.”

“The defendant reached across the ocean from Brooklyn to Pakistan, seeking out terrorists in the hopes of becoming one. Once he found what he sought, he pledged his money, his energy, and the end of his own life to the goal of spreading terror abroad. As this case demonstrates yet again, law enforcement in New York and across the United States has the vigilance, capability, and skill to catch terrorists before they strike,” stated United States Attorney Lynch. “We will continue to bring to justice those who intend to harm Americans and hold them accountable for their actions.”

FBI Assistant Director in Charge Fedarcyk stated, “The defendant has admitted to attempting to provide material support to terrorists, but this entailed much more than the money he wired overseas. If not for his arrest, he would have traveled to Pakistan to wage jihad and aim to kill American soldiers. Our mission includes not only preventing acts of terrorism here but also preventing would-be terrorists from going abroad to harm Americans.”

“The plea demonstrates that Brooklyn is no place from which to launch terrorist aspirations without the good chance of being captured and prosecuted,” Police Commissioner Kelly said. “Vigilance paid dividends again.”

The government’s case is being prosecuted by Assistant United States Attorneys Seth D. DuCharme and Matthew S. Amatruda, with assistance provided by Trial Attorney Courtney Sullivan of the DOJ Counterterrorism Section.

Mengeles Erben – Menschenexperimente im Kalten Krieg – Ganzer Film

Die Erprobung von Giftstoffen für staatliche Mordaufträge und tödliche Experimente mit Lagerinsassen verbindet man mit dem systematischen Massenmord der Nazis. Josef Mengele ist der bekannteste Vertreter dieser “Wissenschaft ohne Gewissen”.

Die Geschichte der Menschenversuche im Auftrag des Staates beginnt in den 20er Jahren im “Labor 12” des sowjetischen Geheimdienstes. Dort wurden tödliche Gifte an “Volksfeinden” erprobt. Die Existenz dieses Labors wurde nur durch einen Zufall Anfang der 90er Jahre bekannt, denn Russland hält die Akten über Menschenversuche bis heute geheim. Das “Labor 12” allerdings gibt es unter anderem Namen bis heute.

Nach den Massenmorden während des Zweiten Weltkrieges handelten einige der schlimmsten Kriegsverbrecher mit den Siegermächten Straffreiheit gegen Übergabe der Versuchsergebnisse aus. So arbeitete der japanische General Ishii Shiro, der für den Tod von über 300.000 Menschen verantwortlich war, nach dem Krieg für die USA. Dort waren Militär und Geheimdienste angetan von den Ergebnissen echter Menschenexperimente mit Pest, Anthrax und Tularämie, Unterkühlung, Unterdruck und neuartigen Bomben. Bislang konnten die Militärs nur auf Daten aus Tierversuchen zurückgreifen. Keiner der mindestens 10.000 Verbrecher von Ishiis Todesimperium wurde in den USA bestraft. Einige beendeten ihre wissenschaftlichen Karrieren als Manager großer japanischer Pharma- und Medizinunternehmen. Es störte die Sieger angesichts des Rüstungswettlaufes im Kalten Krieg nicht einmal, dass Ishiis Untergebene auch mit US-Kriegsgefangenen experimentiert hatten. “Mengeles Erben” haben den Zweiten Weltkrieg überlebt, indem sie neuen Herren dienten. Sie waren weiter im Staatsauftrag aktiv. In Nordkorea gibt es nach Zeugenaussagen sogar bis in die Gegenwart Gaskammern, in denen Massenvernichtungsmittel an Häftlingen erprobt werden. In vielen ehemals kommunistischen Staaten verläuft die Aufarbeitung der finsteren Vergangenheit schleppend. Auch die ehemalige CSSR experimentierte mit Verhördrogen und Giften. Die Versuche und Ergebnisse sind bis heute geheim und werden vertuscht. Vielleicht, weil sich wie nach dem Zweiten Weltkrieg erneut interessierte Abnehmer für Spezialkenntnisse finden.

Über einige der bisher kaum erforschten systematischen medizinischen Experimente an Menschen berichtet der Dokumentarfilm “Mengeles Erben” weltweit zum ersten Mal im Fernsehen.

THE CIA CROWN JEWELS

Citation: “Family Jewels”
[Central Intelligence Agency Activities; Attached to Routing and Record Sheet; Includes Memoranda Entitled “Family Jewels”; “Johnny Roselli”; “Project Mockingbird”; “Yuriy Ivanovich Nosenko”; “Material Requisitioned From Logistics By Security For Issuance to Local Police”; “Audio Countermeasures Support to the United States Secret Service”; “Identification of Activities with Embarrassment Potential for the Agency”; and “[Excised] Equipment Test, Miami, Florida, August 1971”; Memorandum on Surveillance and Police Support Activities; and News Articles Entitled “6 Attempts to Kill Castro Laid to CIA” and “Castro Stalker Worked for the CIA”; Heavily Excised], Secret, Memorandum, May 16, 1973, 37 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00001
Origin: United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security. Director
From: Osborn, Howard J.
To: United States. Central Intelligence Agency. Management Committee. Executive Secretary
Individuals/
Organizations Named:
Agnew, Spiro T.; Anderson, Jack; Arlington County (Virginia). Police Department; Bissell, Richard M., Jr.; Carroll, Joseph F.; Carter, Marshall S.; Castro Ruz, Fidel; Dulles, Allen W.; Edwards, Sheffield; Fairfax County (Virginia). Police Department; Getler, Michael; Giancana, Momo Salvatore (“Sam”); Golitsyn, Anatolii [Codename Aeladle]; Harvey, William K.; Helms, Richard M.; Houston, Laurence R.; Hume, Brit; Kennedy, Robert F.; King, J.C.; Kirkpatrick, Lyman B., Jr.; Maheu, Robert A.; Marchetti, Victor; McCone, John A.; McGuire, Phyllis; McNamara, Robert S.; Miami (Florida). Police Department; Montgomery County (Maryland). Police Department; Morgan, Edward P.; New York City (New York). Police Department; Nosenko, Yurii; O’Connell, James; Orta, Juan; Rosselli, John (“Johnny”); Rowan, Dan; San Francisco (California). Police Department; Soviet Union. Committee for State Security; Spear, Joseph C.; Taylor, Rufus L.; Trafficante, Santos, Jr.; United States. Central Intelligence Agency. Deputy Director; United States. Central Intelligence Agency. Director; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security; United States. Central Intelligence Agency. Directorate of Operations. Soviet/East European Division; United States. Central Intelligence Agency. Directorate of Operations. Technical Services Division; United States. Central Intelligence Agency. Directorate of Plans. Western Hemisphere Division; United States. Central Intelligence Agency. Executive Director-Comptroller; United States. Central Intelligence Agency. General Counsel; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Federal Bureau of Investigation; United States. Secret Service; Varona Loredo, Manuel Antonio de; Waddin, Thomas; Washington (D.C.) Metropolitan Police Department; Whitten, Les
Subjects: Castro Ruz, Fidel Assassination Plots | Congress members | Cuban exiles | Defectors | Democratic National Convention (1968) | Detention | Domestic intelligence | Gambling | Illegal entry | Information leaks | Interagency cooperation | JMWAVE Intelligence Station (Miami, Florida) | Journalists | Mail opening | Miami (Florida) | National Security Act (1947) | News media | Organized crime | Police assistance | Political activists | Project Butane | Project Celotex I | Project Celotex II | Project Merrimac | Project Mockingbird | Project Redface I | Project SRPOINTER | Republican National Convention (1968) | Safe houses | Soviet Union | Surveillance countermeasures | Surveillance equipment | Vietnamese Conflict protest movements | Washington Post | Wiretapping
Abstract: Describes Central Intelligence Agency Office of Security activities “representing a possible potential threat or embarrassment to the Agency,” including contacts with organized crime members, support to local police forces, domestic surveillance, and plots to assassinate Fidel Castro.
Full Text: Document – PDF – this link will open in a new window (1.2 MB)

Durable URL for this record

Geheimdienst – Gründung der STASI – STASILAND

Am 8. Februar 1950 wurde in der DDR offiziell die Bildung eines Ministeriums für Staatssicherheit (MfS) beschlossen. Es war die Geburtsstunde der Stasi, die sich im Laufe der folgenden Jahre zu einem gewaltigen Geheimdienstapparat entwickelte

Discussion – Günter Grass, Israel and the crime of poetry

Günter Grass identifies Israel as a threat to world peace in his poem, ‘What Must Be Said’ [GALLO/GETTY]

New York, NY – On Wednesday, April 4, 2012, the German newspaper Süddeutsche Zeitung published Nobel laureate Günter Grass’ poem (the German original) that has created quite a stir not only in Germany, Israel and Iran, but also across the globe. As a result Israeli interior minister Eli Yishai has banned the Nobel laureate from entering Israel.

In this poem, Günter Grass breaks a long standing German taboo and publicly criticises Israel for aggressive warmongering against Iran, identifies the Jewish state as a threat to world peace, accuses “the West” of hypocrisy and denounces his own government for providing nuclear submarines to Israel:

… Because we – as Germans burdened enough –
Could be the suppliers to a crime
That is foreseeable, wherefore our complicity
Could not be redeemed through any of the usual excuses.

The poem drew much appreciation from those opposing yet another pending war in the region by pointing to the big elephant in the room, but also widespread condemnation by Jewish and non-Jewish groups and public figures in Germany, igniting the irritable Israeli Prime Minister Binyamin Netanyahu, in effect corroborating Günter Grass’ own assessment that his silence so far had to do with the concern that he would be accused of anti-Semitism. He was accused of anti-Semitism.

But has the charge of anti-Semitism really silenced the critics of Israel – as Günter Grass suggests in this poem? Not really – or perhaps only so in Germany, for obvious reasons, but certainly not around the globe. The only people who are afraid of being called anti-Semites are the anti-Semites. Yes certain segments of pro-Israeli Zionists, by no means all, hurtle that accusation to silence their opponents. But by no stretch of the imagination has that charge silenced anyone but the anti-Semites – and they better remain silent.

In the European and by extension North American birthplace of anti-Semitism, anti-Semitism is either perfectly alive and well, or transformed into Islamophobia, or camouflaged into Evangelical Zionism, or else abused by some Zionists to silence any opposition coming towards Israel – certainly to no avail.

To be sure, the condition in Germany is perhaps different – as indeed it should be. But by overcoming that false fear, Günter Grass can no longer be accused of anti-Semitism – and thus the significance of his poem is not in the straw man he constructs to shoot down (perhaps rhetorically, for after all, we are talking about a poem). It is somewhere else. 

Tomorrow may be too late

In the body of the poem itself, titled “What Must Be Said”, Günter Grass, 84, says that he risks the danger of being called an anti-Semite because:

Aged and with my last ink,
That the nuclear power of Israel endangers
The already fragile world peace?
Because it must be said
What even tomorrow may be too late to say…

Remaining silent at these dire circumstances is irresponsible and dangerous:

I am silent no longer
Because I am tired of the hypocrisy
Of the West…

Now that is good enough a reason to break the silence – and you need not invoke fear of being called an anti-Semite. Günter Grass expresses fear of a pending war that “could erase the Iranian people”. He pulls no punches as to the facts that we all know:

Yet why do I forbid myself
To name that other country
In which, for years, even if secretly,
There has been a growing nuclear potential at hand
But beyond control, because no testing is available?

He then points finger at his own country:

Now, though, because in my country
Which from time to time has sought and confronted
The very crime
That is without compare
In turn on a purely commercial basis, if also
With nimble lips calling it a reparation, declares
A further U-boat should be delivered to Israel,
Whose specialty consists of guiding all-destroying warheads to where the existence
Of a single atomic bomb is unproven,
But through fear of what may be conclusive,
I say what must be said.

Setting the dubious fear of being accused of anti-Semitism aside, Günter Grass provides ample reasons – European hypocrisy, German complacency, American barefaced double-standards, Ahmadinejad’s buffoonery and Israeli warmongering – for his poem to assume the global significance that it has. But the importance of the poem is not in stating the obvious – it is in revealing the repressed. 

European colonialism and Jewish Holocaust 

Given the history that culminated in the Jewish Holocaust, Jews around the globe, including Israel, have every right to get agitated with a prominent German public intellectual lecturing them about violence. But Zionism is chiefly responsible for having wasted the moral authority of the Jewish Holocaust – through what Norman Finkelstein has aptly called “the Holocaust Industry” – on establishing a racist apartheid state called “Israel” – a colonial settlement as a haven for the victims of a whole history of European anti-Semitism, on the broken back of a people who had nothing to do with that travesty.

With a leading German public intellectual openly criticising Israel, pointing to European hypocrisy, and blaming his own country for aiding and abetting in the aggressive militarisation of the Jewish state – a gushing wound is opened that implicates both Europe and the colonial settlement that in more than one sense is its own creation. In two specific terms, both as a haven for the victims of the Jewish Holocaust and as the legacy of European colonialism, Israel reflects back on its European pedigree. It is here that Grass’ poem reveals more than meets the eye.

For over 60 years, Palestinians have paid with their lives, liberties and homeland for a European crime with which they had absolutely nothing to do.

The Zionist project precedes the European Jewish Holocaust -that ghastly crime against humanity following the horrid history of European anti-Semitism expressed and manifested in systematic pogroms over many long and dark centuries. Palestine was colonised by the victims of European anti-Semitism – as a haven against Jewish persecution. That paradox remains at the heart of a Jewish state that cannot forget the truth of its own founding myth.

There is a link between the Jewish Holocaust and the history of European colonialism, of which Zionism (perhaps paradoxically, perhaps not) is a continued contemporary extension.

It was Aimé Césaire who in his Discourse sur le colonialisme/Discourse on Colonialism (1955) argued that the Jewish Holocaust was not an aberration in European history. Rather, Europeans actually perpetrated similar crimes against humanity on the colonised world at large.

With German atrocities during the Holocaust, Europeans tasted a concentrated dose of the structural violence they had perpetrated upon the world at large. Colonialism and the Holocaust were thus the two sides of the same coin: the aggressive transmutation of defenceless human beings into instruments of power – into disposable “things”. Long before the Jewish Holocaust, the world Europeans had conquered and colonised was the testing ground of that barbaric violence they had termed the “civilising mission of the white man”.

European guilt about the Holocaust is absolutely necessary and healthy – it is an ennobling guilt. It makes them better human beings, for them to remember what they did to European Jewry. But, and there is the rub, they are, with a supreme hypocrisy that Günter Grass notes in his poem, spending that guilt (when not redirecting it into Islamophobia) on sustaining a colonial settlement, an extension of their own colonial legacy, in supporting Israeli colonialism in the Arab and Muslim world – as a garrison state that further facilitates their renewed imperial interests in the region. Europeans are turning their legitimate guilt into an illegitimate instrument of their sustained imperial designs on the globe, from whom Americans then take their cues.

European logic of colonialism

Israel is a European colonial settlement, the last astonishingly barefaced remnant of European colonialism in a world that calls itself “postcolonial”.

The same people who are with perfect justification enraged by the foolish Ahmadinejad (when he denies the Holocaust) are evidently entirely undisturbed when their Prime Minister Golda Meir or their favourite presidential candidate Newt Gingrich denies the existence of Palestinians.

The daring imagination of Günter Grass’ poem – a heroically tragic act precisely because the poet is implicated in the moral outrage of his own poem – is significant precisely because it captures this German and by extension European logic/madness of colonial conquest and moral cannibalism. A German intellectual exposing the structural link between Zionism and colonialism marks the even more innate link between the Holocaust and colonialism – precisely at the moment of warning against the regional warmongering of Zionism as the post/colonial extension of European colonialism.

What Prime Minister Netanyahu’s reaction to Günter Grass’ poem, and many others like him, do not recognise is that precisely when they accuse the German poet of anti-Semitism they are in fact acknowledging the colonial provenance of the Jewish state. The harder they object to Günter Grass, the clearer becomes the fact that the Jewish state is the rhetorical articulation of the very logic of European global colonialism, of which the Jewish Holocaust, as Aimé Césaire rightly recognised, was a local overdose.

There is one, and only one, definitive resolution for that paradoxical consistency to come to an end: the one state solution for the Israeli-Palestinian dilemma. It is only in that basic, simple, elegant, humane, non-violent, enduring and just resolution that the paradox of Zionism as colonialism, and the structural link between the Jewish Holocaust and European colonialism, can once and for all be resolved.

The fact and the inevitability of that solution, delivering both Israelis and Palestinians from their mutual (however asymmetrical) sufferings, has been staring the world in the eye from day one – and yet the belligerent politics of despair has caused an intentional blindness that prevents that simple vision. So, yes, Günter Grass is right – and in this revelation he could no longer possibly be an anti-Semite:

Only this way are all, the Israelis and Palestinians,
Even more, all people, that in this
Region occupied by mania
Live cheek by jowl among enemies,
In the end also to help us.

Hamid Dabashi is Hagop Kevorkian Professor of Iranian Studies and Comparative Literature at Columbia University in New York.  His forthcoming book, The Arab Spring:  The End of Postcolonialism (Zed, 2012) is scheduled for publication in May 2012. 

The views expressed in this article are the author’s own and do not necessarily reflect Al Jazeera’s editorial policy.

Geheimsache Mauer – Ganzer Film

Es gab einmal die Vision einer perfekten Grenze – modern, unsichtbar, ohne Tote. Hightech statt Schuss-waffen, Sperrzaun und Beton. Ihre Erfinder nannten sie “Mauer 2000”. Doch diese Vision wurde nie in die Realität umgesetzt.

Am 13. August 2011 jährt sich zum 50. Mal der Tag, an dem mit der Teilung Berlins die Spaltung Deutschlands und Europas vollendet und für mehr als zweieinhalb Jahrzehnte zementiert wurde. Erzählt wird die Geschichte der Berliner Mauer aus einer neuen Perspektive, aus der Sicht derer, die sie geplant, erbaut und bewacht haben. Dabei offenbart das Doku-Drama einen tiefen Einblick hinter die Kulissen, in das “betonierte” Denken und berechnende Kalkül der Mauerstrategen, in ihre geheimen Pläne, die tödliche Grenze immer weiter zu perfektionieren.

Erzählt wird aber auch, wie ganz unterschiedliche Menschen die Mauer persönlich erlebten, wie sie für sie arbeiteten, in ihrem Schatten lebten und versuchten, sie zu überwinden. So berichtet zum ersten Mal ein ehemaliger DDR-Grenzer in diesem Zusammenhang über seine Gefühle in dem Moment, als er an der Mauer schoss. Erstmals berichtet ein Oberbefehls- haber der Grenztruppen über strategische Überlegungen und von den geheimen Sitzungen des Grenzkommandos. Im Gegensatz dazu erzählen Flüchtlinge, wie sie in gefährlichen Fluchtversuchen ihr Leben für die Freiheit jenseits der Grenze riskierten.

Der Fall X : Wie die DDR Westberlin erobern wollte – Ganzer Film

Die Führung der DDR hat bis kurz vor der Wiedervereinigung Pläne für eine Eroberung West-Berlins entwickelt und wiederholt in Manövern geübt. Zu diesem Schluss kommen die beiden Historiker und Filmemacher Hans Sparschuh und Rainer Burmeister in ihrer spannenden Dokumentation. Die Historiker Hans Sparschuh und Rainer Burmeister liefern zahlreiche Beweise wie Karten und Aktennotizen, eine sogar von Erich Mielke. Die DDR hat Pläne entwickelt, West-Berlin zu erobern. Nach spätestens drei Tagen sollte alles vorbei sein. Binnen weniger Stunden sollte die zahlenmässig haushoch überlegene NVA die Truppen der Alliierten überrennen. Mitarbeiter der Staatssicherheit sollten dann damit beginnen, hochrangige West-Berliner Polizeibeamte, Politiker, Journalisten und Beamte zu verhaften und in Lagern festsetzen. Der Verhaftungslisten waren bereits getippt. Die DDR-Führung plante, nach drei Tagen die Eroberung abzuschliessen, um dem Westen möglichst wenig Zeit zur Reaktion zu geben. Die im Osten verhasste D-Mark sollte anschliessend abgeschafft und durch eine Kriegswährung ersetzt werden. Ein weitverbreitetes Relikt aus der DDR-Ära: Plattenbauten. Die aus Betonfertigteilen hergestellten Häuser sollten die Wohnungsknappheit nach dem Krieg bekämpfen. Zur Zeit ihrer Entstehung waren sie begehrt, da die Wohnungen im Gegensatz zu Altbauwohnungen mit fliessendem warmen und kaltem Wasser und Zentralheizung ausgestattet waren. Der Palast der Republik beherbergte die Volkskammer der DDR und wurde als Kulturhaus genutzt. Hier traten nationale und internationale Künstler wie Udo Lindenberg, Harry Belafonte, Mireille Mathieu oder Katja Ebstein auf. Das asbestverseuchte Gebäude wurde von Februar 2006 bis Dezember 2008 schrittweise abgerissen. Der Berliner Fernsehturm ist mit 368 Metern das höchste Bauwerk Deutschlands. Mit dem Bau wurde 1965 begonnen. Wenn die Sonne die Kugel der Blechprismen aus rostfreiem Stahl anstrahlt, erscheint eine Reflexion in Form eines Kreuzes. In Anspielung auf die atheistische Grundeinstellung der sozialistischen Regierung bezeichneten Berliner dieses leuchtende Kreuz als “Rache des Papstes”. In ihrer Dokumentation liefern die Historiker umfassende Belege für ihre Thesen. An knapp 60 Stellen in der Stadt wollten Soldaten die Mauer durchbrechen. Aus Kartenmaterial und Aktennotizen geht hervor, dass zuerst alle Brücken der Stadt besetzt werden sollten. Damit wollte die DDR-Spitze verhindern, dass sich die alliierten Besatzer zu einem Verband vereinigen konnten. Dann sollten die Flughäfen der Stadt erobert und besetzt werden, um West-Berlin dauerhaft zu isolieren. Die Pläne wurden nach Recherchen der Historiker ab dem Jahr 1969 konkret. Auch eine Notiz von Erich Mielke soll dies beweisen. In zahlreichen Manövern sei der Überfall immer wieder geübt worden. Noch im Jahr 1988 gab es den Recherchen zufolge ein grosses Manöver in Magdeburg, bei dem die Eroberung einer Stadt trainiert wurde.

STASILAND GERMANY – Full Movie

Everyone knows about the Nazis camps of Auschwitz and Dachau. But few are aware of the systemic oppression that went on under the Stasis. Now some ex-Stasis agents are trying to re-write history.

“I won’t apologise for anything. I can only apologise for not having worked more efficiently”, states former Stasi spy Peter Wolter. He maintains that the thousands of people tortured and imprisoned were; “quite rightly punished”. Along with other ex-agents, Wolter is campaigning to have a museum documenting the suffering of prisoners in Stasi prisons closed. As Anna Funder, author of ‘Stasiland’ states; “these were people writing doctoral theses on how to destroy a soul”. Now thousands of ordinary Germans who had their lives destroyed by the Stasis fear their suffering will be negated.

Editorial – The New (Conservative) Liberalism by Charles Davis

Charles Davis, on liberalism in America, and how it fails to provide systemic solutions to the problems faced in an increasingly conservative world. Via Al Jazeera:

Once upon a time — say, three years ago — your average Democrat appeared to care about issues of war and peace. When the man dropping the bombs spoke with an affected Texas twang, the moral and fiscal costs of empire were the subject of numerous protests and earnest panel discussions, the issue not just a banal matter of policy upon which reasonable people could disagree, but a matter of the nation’s very soul.

Then the guy in the White House changed.

Now, if the Democratic rank and file haven’t necessarily learned to love the bomb – though many certainly have — they have at least learned to stop worrying about it. Barack Obama may have dramatically expanded the war in Afghanistan, launched twice as many drone strikes in Pakistan as his predecessor and dropped women-and-children killing cluster bombs in Yemen, but peruse a liberal magazine or blog and you’re more likely to find a strongly worded denunciation of Rush Limbaugh than the president. War isn’t over, but one could be forgiven for thinking that it is.

Given the lamentable state of liberal affairs, Drift, a new book from MSNBC’s Rachel Maddow, is refreshing. Most left-of-centre pundits long ago relegated the issue of killing poor foreigners in unjustifiable wars of aggression to the status of a niche concern, somewhere between Mitt Romney’s family dog and the search results for “Santorum” in terms of national importance. So in that sense, it’s nice to see a prominent progressive at least trying to grapple with the evils of militarism and rise of the US empire. It’s just a shame the book isn’t very good…

 

Die Akte Gysi – Ganzer Film

“Die Akte Gysi” zeigt, wie aus einem willigen Helfer des DDR-Systems ein populärer, gesamtdeutscher Politiker wurde. Und wie er trotz aller Stasi-Vorwürfe immer noch als Stimme der Benachteiligten und Unterdrückten hofiert wird.

Gregor Gysi kennen alle. Denn er spielt viele Rollen: als charismatischer Politiker, als Stimme der Linkspartei und als gern gesehener Talkshow-Gast, egal zu welchem Thema. Seine Markenzeichen: emotionale Empörung, populistische Parolen. Die mediale und politische Omnipräsenz provoziert aber immer wieder eine Frage: Gibt es einen anderen Gysi, einen, der früher mit der DDR-Stasi gekungelt hat? Er bestreitet das energisch, seine Anwälte versorgen allzu wissbegierige Journalisten mit entsprechenden Schriftsätzen und Gerichtsprozessen.

“Die Akte Gysi” zeigt, wie aus einem willigen Helfer des DDR-Systems ein populärer, gesamtdeutscher Politiker wurde. Und wie er trotz aller Stasi-Vorwürfe immer noch als Stimme der Benachteiligten und Unterdrückten hofiert wird. Der Film von Hans-Jürgen Börner und Silke König zeigt die Biographie eines Mannes im Spannungsfeld von inszenierten Auftritten und bedrückenden Stasi-Akten. Gregor Gysis Karriere begann, fernab von Fernsehkameras, als Rechtsanwalt in der Deutschen Demokratischen Republik. Gysi wuchs als Funktionärskind eines prominenten Vaters, des Botschafters und Staatssekretärs für Kirchenfragen, Klaus Gysi, auf. Sohn Gregor war der jüngste Rechtsanwalt der Republik. Und hatte viele prominente Mandanten wie Rudolf Bahro und Robert Havemann.

Er hatte beste Kontakte ins ZK der SED und auch zur Staatssicherheit. Original-Akten, die über das Wirken des Rechtsanwalts Gysi Auskunft geben könnten, wurden nach der Wende offenbar größtenteils vernichtet. Aber in den Akten seiner ehemaligen Mandanten finden sich die Kopien von Stasi-Berichten. Die Dokumentation liefert den politischen und biographischen Zusammenhang, befragt ehemalige Mandanten und präsentiert Akten über das Wirken des Gregor Gysi. Der Film berichtet u. a. über die Tragödie eines Vaters, dessen Sohn von der Stasi ermordet wurde. Vom Schicksal der Bürgerrechtlerin Vera Lengsfeld, ihren quälenden Stunden in Untersuchungshaft. Vom Schriftsteller Lutz Rathenow, dessen Unterhaltung auf einem Empfang belauscht wurden. Und von dem Berliner Künstler Thomas Klingenstein, dessen Gesprächsinhalte einer Autofahrt bei der Stasi landeten. Viele Schicksale, aber immer eine Hauptperson: Gregor Gysi. Viele Opfer, die vor der Kamera reden. Und einer, der lieber schweigt: Gregor Gysi.
Wo bitte ist unser”Rechtsstaat”???

SECRET from the FBI – Russian National Charged in $1 Million Trading Account Hack

A Russian national living in New York has been charged for his alleged role in a ring that stole approximately $1 million by hacking into retail brokerage accounts and executing sham trades.

Petr Murmylyuk, aka “Dmitry Tokar,” 31, of Brooklyn, has been charged with one count of conspiracy to commit wire fraud, unauthorized access to computers, and securities fraud.

According to a criminal complaint, beginning in late 2010, Murmylyuk worked with others to steal from online trading accounts. Members of the ring first gained unauthorized access to the online accounts and then changed the phone numbers and e-mail addresses. Once the hackers controlled the accounts, they used stolen identities to open additional accounts at other brokerage houses. They then caused the victims’ accounts to make unprofitable and illogical securities trades with the new accounts that benefitted the hackers.

The affected brokerage houses have reported combined losses to date of approximately $1 million as a result of the fraudulent schemes.

Story Background:

NEWARK, NJ—A Russian national living in New York has been charged for his alleged role in a ring that stole approximately $1 million by hacking into retail brokerage accounts and executing sham trades, U.S. Attorney for the District of New Jersey Paul J. Fishman announced today.

Petr Murmylyuk, aka “Dmitry Tokar,” 31, of Brooklyn, New York, has been charged by complaint with one count of conspiracy to commit wire fraud, unauthorized access to computers, and securities fraud. The U.S. Securities and Exchange Commission (SEC) is also filing a parallel civil action. Murmylyuk is currently in state custody facing charges arising out of a separate investigation conducted by the Manhattan District Attorney’s Office and will appear in Newark federal court to face the conspiracy charge on a date to be determined.

“Hackers continue to find new and advanced ways to steal from the financial sector,” said First Assistant U.S. Attorney J. Gilmore Childers. “Through the illusion of legitimacy, these alleged hackers controlled both sides of securities transactions to game the market and drain their victims’ accounts. Those who use their computer skills for fraud underestimate the combined resolve of law enforcement and the financial services industry to detect and stop these crimes.”

“This investigation highlights the level of sophistication reached by individuals involved in computer intrusions and hacking activities in furtherance of complex economic and financial crimes,” said FBI Newark Division Assistant Special Agent in Charge David Velazquez. “The same level of sophistication must be maintained by federal investigators and prosecutors, together with private sector partners, to stay one step ahead of these individuals.”

According to the complaint unsealed today in Newark federal court:

Beginning in late 2010, Murmylyuk worked with others to steal from online trading accounts at Scottrade, E*Trade, Fidelity, Schwab, and other brokerage firms. Members of the ring first gained unauthorized access to the online accounts and changed the phone numbers and e-mail addresses on file to prevent notice of unauthorized trading from going to the victims.

Once the hackers controlled the accounts, they used stolen identities to open additional accounts at other brokerage houses. They then caused the victims’ accounts to make unprofitable and illogical securities trades with the new accounts—referred to in the complaint as the “profit accounts”—that benefitted the hackers.

One version of the fraud involved causing the victims’ accounts to sell options contracts to the profit accounts, then to purchase the same contracts back minutes later for up to nine times the price. In another version of the fraud, they used the profit accounts to offer short sales of securities at prices well over market price and to force the victim accounts to make irrational purchases. (A short sale is a sale of stock that an investor does not own but rather borrows from a stock lender and must eventually return.)

Murmylyuk and a conspirator recruited foreign nationals visiting, studying, and living in the United States—including Russian nationals and Houston residents Anton Mezentsev, Galina Korelina, Mikhail Shatov, and others—to open bank accounts into which illegal proceeds could be deposited. Murmylyuk and the conspirator then caused the proceeds of the sham trades to be transferred from the profit accounts into those accounts, where the stolen money could be withdrawn.

Fidelity, Scottrade, E*Trade, and Schwab have reported combined losses to date of approximately $1 million as a result of the fraudulent schemes.

Murmylyuk is also accused of placing a telephone call to Trade Station Securities in which he claimed to be “Dmitry Tokar,” through whose brokerage account the ring placed approximately $200,000 in fraudulent securities trades. Murmylyuk was arrested in Brooklyn on November 3, 2011, in possession of a laptop that evidenced the fraud.

Mezentsev, Korelina, and Shatov were previously charged in the District of New Jersey and convicted of conspiracy to commit wire fraud based on their agreement to receive stolen money in the accounts in their names. U.S. District Judge Esther Salas sentenced Mezentsev, Korelina, and Shatov to 27 months, 14 months, and 14 months in prison, respectively, earlier this year.

If convicted, Murmylyuk faces a maximum potential penalty of five years in prison and a $250,000 fine.

U.S. Attorney Fishman praised special agents of the FBI, under the direction of Special Agent in Charge for the Newark Division Michael B. Ward; Immigration and Customs Enforcement-Homeland Security Investigations, under the direction of New Jersey Special Agent in Charge Andrew McLees; and Internal Revenue Service-Criminal Investigations, New York Field Office, under the direction of Acting Special Agent in Charge Victor W. Lessoff, for their work in the continuing investigation.

He also thanked special agents of the FBI in St. Louis and San Francisco and the U.S. Secret Service in Houston, as well as the Manhattan District Attorney’s Office, under the direction of District Attorney Cyrus R. Vance, Jr., for its contributions and cooperation in coordinating the parallel investigations. He also thanked the SEC’s Philadelphia Regional Office, under the leadership of its Regional Director Daniel M. Hawke, and the Justice Department’s Computer Crime and Intellectual Property Section for their assistance in the investigation.

The government is represented by Assistant U.S. Attorney Seth B. Kosto of the Computer Hacking and Intellectual Property Section of the U.S. Attorney’s Office for the District of New Jersey’s Economic Crimes Unit in Newark.

The charges and allegations in the complaint are merely accusations, and the defendant is considered innocent unless and until proven guilty.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency Financial Fraud Enforcement Task Force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes.

DDR – Die Bilder der STASI

TOP-SECRET- The NSA Operation REGAL: Berlin Tunnel

Operation code name: PBJOINTLY Product code name: REGAL

The Berlin Tunnel operation was not a unique type of operation that was only run in Berlin. Prior to the Berlin Tunnel, the British ran a number of successful tunnel cable-tap operations in Vienna,[1] which at the time of these operations, was still an occupied city, divided into four sectors just like Berlin. The British cable taps began in 1948, and ran until the occupation of Austria ended, restoring state sovereignty to the country in 1955. The Soviets had a tap near Potsdam on a cable that served the American Garrison in Berlin.[2]

What has made the Berlin Tunnel famous, while the cable-tap tunnels of Vienna and Potsdam have faded into obscurity is the paradox of intelligence operations which results in fame being a measure of failure and obscurity being a measure of success. The Berlin Tunnel’s true claim to fame, therefore, is that it gained front-page notoriety when the Soviets “discovered” it.

The Official CIA history of the tunnel (prepared in August 1967 and declassified in February 2007) theorizes that the amount of publicity given to the Berlin Tunnel was the result of chance rather than of a conscious decision on the part of the Soviet leadership. During the planning phase of the tunnel, a consensus assessment had been reached which postulated that in the event of the discovery of the tunnel, the Soviet reaction would be to “suppress knowledge” of its existence, so as to save face, rather than have to admit that the West had the capability to mount such an operation. The CIA history of the project suggests that this expectation was defeated because the Soviet Commandant of the Berlin Garrison (who would normally have handled an event of this nature) was away from post at the time, and his deputy found himself in the position of having to make a decision about the tunnel “without benefit of advice from Moscow.”[3]

In his academic history of the Berlin Tunnel (Spies Beneath Berlin), David Stafford of the University of Edinburgh points out that, even though the tunnel was a joint American-British project, the British did not share in the limelight of publicity with the Americans when the tunnel was discovered. This was due, he says, to the fact that Soviet First Secretary Khrushchev was on an official state visit to the U.K.. The visit’s culmination, a visit to Windsor Castle and a reception by the Queen, was scheduled for the day following the discovery of the Berlin Tunnel. British participation in the project was officially hushed up by both the British and the Soviets so as not to spoil the success of the state visit.[4] To this day British Intelligence Services are usually tight-lipped when it comes to discussions of the Berlin Tunnel, or any post-1945 intelligence operation for that matter,[5] while the Americans have declassified the in-house history of the project and authorized one of its participants to include a chapter about it in a book on the Intelligence war in Berlin written in cooperation with one of the KGB veterans of that period (Battleground Berlin).

The intelligence fame/obscurity paradox aside, the Berlin Tunnel operation was, in the words of Allen Dulles (then DCI), “one of the most valuable and daring projects ever undertaken” by the CIA.[6]

The Berlin Tunnel, unlike the Vienna tunnels, was a major engineering feat. It stretched 1476 feet/454[7] meters through sandy ground[8] to reach a cable only 27 inches/68.5 cm beneath the surface,[9] on the edge of a major highway. One of the most difficult engineering problems that had to be overcome in the course of the project was to dig up to the cable from the main tunnel shaft without dropping some truck passing over the highway above into the tunnel.[10] This task was handled by the British,[11] who had their experience of Vienna to fall back on.

The total cost of the tunnel project was over six and a half million[12] 1950s dollars, which in 2007 dollars would be over 51 and a quarter million.[13] By way of comparison, the development and delivery of the first six U-2 aircraft, a project contemporary with the Berlin Tunnel, cost 22 million total,[14] or 3.6 million each. That means that the tunnel cost roughly as much as two U-2s.

According to Murphey, Kondrashev and Bailey in Battleground Berlin, the tale of the tunnel began in early 1951, when Frank Rowlett told Bill Harvey how frustrated he was by the loss of intelligence due to the Soviet shift from radio to landline.[15] The assessment process that preceded target selection continued throughout 1952, the year that saw Harvey reassigned to Berlin. Test recordings of the kind of traffic available from the cables were made in the spring and summer of 1953.[16] By August of 1953, plans for the tunnel were being readied for presentation to the DCI, Allen Dulles.[17]

Dulles approved the terms of reference for cooperaton with the British on the Berlin Tunnel in December 1953.[18] The “go” was given to start the construction of the warehouse that would serve as the cover for the tunnel, and construction was completed in August. The American engineering team that actually dug the tunnel arrived to take control of the compound on 28 August. Digging began on 2 September, but, on 8 September, the miners struck water and which necessitated that pumps be brought in. The tunnel reached its distant end on 28 February 1955,[19] and the tap chamber took another month to complete. The complex process of tapping into the three target cables without alerting the Soviets to what was going on was a slow one. It lasted from 11 May through 2 August 1955.[20] Collection of intelligence from the taps, however, began as soon as the first circuits were brought on-line.

During the night of 21-22 April 1956, the Soviets “discovered” the tunnel, and collection ceased. That did not close the project, however. The take from the Berlin Tunnel during the time that it was operational (11 months and 11 days) was so great that processing of the backlog of material continued through the end of September 1958.[21]

The loss of this valuable source was, of course, a blow to US/UK intelligence efforts against the Soviets at the time, but this loss was somewhat compensated for by the prestige that the CIA won in the press following the tunnel’s discovery. The article on the tunnel in the issue of Time magazine (07 May 1956) that followed the tunnel’s discovery said “It’s the best publicity the U.S. has had in Berlin for a long time.”

An urban legend that persistently continues to associate itself with the Berlin Tunnel is that the idea for the tunnel came from Reinhard Gehlen (the German Abwehr-Ost general who surrendered to the Americans and later became the head of the West German BND). Murphy, Kondrashev and Bailey flatly reject this assertion in Battleground Berlin.[22] David Stafford argues credibly against the validity of this legend in his academic history of the Berlin Tunnel. He notes that there is no evidence to support this theory, and “those most closely in the know in the CIA have strenuously denied it,”[23] essentially repeating Murphy, Kondrashev and Bailey. Stafford’s most telling argument against Gehlen’s involvement is that no mention of the Berlin Tunnel is to be found in Gehlen’s memoirs (The Service: The Memoirs of General Reinhard Gehlen, New York: World Publishing, 1972). “Never a modest man,” says Stafford, Gehlen “would surely have bid for some of the credit had he been any way involved. In fact, he does not even refer to it.”[24]

In the section “Recapitulation of Intelligence Derived” from the Berlin Tunnel, the CIA History of the project says that the “REGAL operation provided the United States and the British with a unique source of current intelligence on the Soviet Orbit of a kind and quality which had not been available since 1948. Responsible officials considered PBJOINTLY, during its productive phase, to be the prime source of early warning concerning Soviet intentions in Europe, if not world-wide.”[25] The section goes on to list general types of political, ground-forces, air-force and naval intelligence that the tunnel provided, many of them with glowing comments from consumers.

The debate about the value of the information derived from the Berlin Tunnel has been raging since 1961, when it was discovered that PBJOINTLY was compromised to the Soviets by the British mole George Blake who attended the meeting on the Berlin Tunnel between the British and Americans in London in December 1953. Many widely read books and articles on the tunnel contended that the KGB had used the tunnel to feed the Americans and the British disinformation. Stafford, however, convincingly dispels all suspicions that the Berlin Tunnel was turned into a disinformation counter-intelligence operation by the KGB. Drawing on the information that came to light during the “Teufelsberg” Conference on Cold-War intelligence operations that brought intelligence professionals from both the CIA and the KGB together in Berlin in 1999, Stafford concludes that “[f]ar from using the tunnel for misinformation and deception, the KGB’s First Chief Directorate had taken a deliberate decision to conceal its existence from the Red Army and GRU, the main users of the cables being tapped. The reason for this extraordinary decision was to protect “Diomid”, their rare and brilliant source George Blake.”[26]

Stafford ends his discussion of the legitimacy of the material collected from the Berlin Tunnel with a quote from Blake, who was still living in Moscow at the time of the “Teufelsberg” Conference. “I’m sure 99.9% of the information obtained by the SIS and CIA from the tunnel was genuine.”[27]

By T.H.E. Hill

DOWNLOAD THE ORIGINAL NSA DOCUMENT HERE

nsa-operation-regal

MY NAME IS NOBODY – Full Movie by Sergio Leone – Starring Terrence Hill and Henry Fonda

 

Release date- June 1974 (USA)
Starring: Terence Hill, Henry Fonda and Jean Martin
A young, easygoing gunman (Hill) worships and competes with an old gunfighter (Fonda) who only wants to retire.

Confidential – Canada Integrated Terrorism Assessment Centre (ITAC) Occupy Wall Street Bulletins

The following Integrated Terrorism Assessment Centre (ITAC) bulletins were obtained via an information request from the Canadian Security Intelligence Service (CSIS) by Paroxysms.  Most of the documents were also simultaneously released to the Globe and Mail, though the collection released to Paroxysms is more complete and contains several additional bulletins that are not included in the other collection.

Integrated Terrorism Assessment Centre/Centre intégré d’évaluation du terrorisme

 

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy-2.png

THE OMEGA CODE 2 – FULL MOVIE 2001 – Starring Michael York

Hackers Takedown 02 – Full Movie

SECRET – U.S. Army Small Unmanned Aerial Vehicle (SUAV) Airspace Command and Control (A2C2) Handbook

https://publicintelligence.net/wp-content/uploads/2012/04/CALL-A2C2.png

 

The purpose of this handbook is to enhance understanding of Army airspace command and control (A2C2) to mitigate risks between small unit unmanned aerial vehicles (SUAVs) and rotary wing operations below the coordinating altitude. This handbook provides leaders at the brigade and below with guidelines in the form of airspace coordination techniques and procedures regarding SUAV mission planning and airspace deconfliction.

This handbook is the result of combining information from several sources, including Raven operators currently deployed in support of Operation Enduring Freedom and Operation Iraqi Freedom.

2. TYPES OF SEPARATION

There are three primary means of maintaining separation between manned and unmanned aircraft: lateral, time, and vertical separation. Beyond the need to ensure physical separation exists, leaders must plan for frequency separation between unmanned vehicles.

a. Lateral separation spaces aircraft that may be operating at the same altitude by not having them operate in the same geographic space. This can be done through the assignment of flight corridors, ROA/ROZ, and other graphic control measures such as phase lines and unit boundaries.

b. Time separation spaces aircraft that may be operating in the same geographic area or at the same operating altitudes by not allowing them to operate at the same time. Time separation may also be required when aircraft, manned and unmanned, must fly near indirect-fire trajectories or ordnance effects. The timing of surface fires must be coordinated with aircraft routing. This ensures that, even though aircraft and surface fires may occupy the same space, they do not do so at the same time.

c. Vertical separation spaces aircraft based on operating altitude or by assigning different operating altitudes to other aircraft that may be working in the same geographic area. Vertical separation is the least preferred method since SUAVs and rotary wing aircraft normally operate from the surface to 500 feet above ground level (AGL).

 

https://publicintelligence.net/wp-content/uploads/2012/04/raven-suav.png

 

Hackers – Full Movie

The Shabak Show Terrorists Returning to Terrorism

 

https://i0.wp.com/www.israeldefense.com/_Uploads/dbsarticles/_cut/SA0000_0244x0240x0072_000xFFFFFF_terrorsists%40jpg.jpg

Over the past few months since the conclusion of the Shalit exchange deal, the Shabak has been working to ensure that the prisoners released in the framework of the deal have not returned to terror activities. Two examples from recent months prove that not all of them have decided to abandon the path of terrorism, and have instead, returned to their previous terror activities.

Shabak announced that at the end of March 2012, the Judea Military Court sentenced Daoud Hilo, a Ramallah resident and one of the prisoners released in the Shalit deal, to 44 months in prison. Hilo was convicted based on his admission of guilt for attempting to trade war equipment in January 2012. This was a month after his December 8, 2011 release in the framework of the second phase of the Shalit deal.

Having been previously sentenced to 40 months in 2010 (for which he spent 23 months in prison), Hilo’s conviction cancelled the mitigation he received (approximately 17 months) in the framework of the Shalit deal, and now he will return to serve the entire duration of his sentence. Along with a fine of 2,000 NIS, Hilo was also sentenced to 12 months probation for three years from the day he is released, for the felony he was sentenced for in this case or any other firearms felony.

Another example of a Shalit deal prisoner returning to terrorism was found when the Shabak revealed the attempts of Omar Abu-Sneineh, a Hamas operative from Hebron, to recruit operatives in the Judea and Samaria region for the purpose of an abduction attack. Having been banished to the Gaza Strip in the framework of the deal, Abu-Sneineh’s planned abduction was intended for bargaining for the release of prisoners. A Fatah operative serving a life sentence for murder, he crossed the lines into the ranks of Hamas while in prison.

Abu-Sneineh, who was released in October 2011, sent a memory card to his family in the Judea and Samaria region that contained detailed instructions on how to carry out the abduction attack. His intent was to have it later reach the hands of the operatives he would recruit.

The memory card, which was obtained by Shabak, included, among other things, instructions for the operatives on how to behave after abducting an Israeli. The card contained instructions such as: “refrain from hiding (the abducted person) in abandoned areas, caves, or groves, unless it’s a body or the head of the abducted person. If dealing with a live person, which needs to be reached at least once a week in order to bring food and water, it’s best to hide him in a house, an agricultural farm, a work place, or someplace similar.” Abu-Sneineh also listed instructions for obtaining firearms and for recruiting operatives into the service of the terror organizations.

Shabak has stated that the organization “will continue its mission to foil intentions to carry out terror attacks against Israeli targets, And will do everything in its power to bring those involved in terrorism to justice. This includes all the prisoners released in the deal for the freeing of Gilad Shalit that have returned to terror activity.”

Report about Chinese “GoMopa”-allies: – Chinese hackers – No site is safe

 

Story Highlights:
* Chinese hackers claim to have broken into Pentagon’s system
* The hackers met with CNN on an island near a Chinese naval hub
* Hackers say Beijing secretly pays them at times, something the government denies
* Official: “The Chinese government does not do such a thing”

The story –
They operate from a bare apartment on a Chinese island. They are intelligent 20-somethings who seem harmless. But they are hard-core hackers who claim to have gained access to the world’s most sensitive sites, including the Pentagon.

In fact, they say they are sometimes paid secretly by the Chinese government — a claim the Beijing government denies.

“No Web site is one hundred percent safe. There are Web sites with high-level security, but there is always a weakness,” says Xiao Chen, the leader of this group.

Wie Bennewirtz für seine mutmasslichen “Partner” MEHRMALS NUR “GoMoPa”-kritische Artikel löschen lassen wollte

Subject:   Fwd: Request
From:   “P. Schmitz” <p.schmitz@deinguterruf.de>
Date:   Fri, July 8, 2011 11:24 am
To:   office@ebizz.tv
Priority:   Normal
Options:   View Full Header | View Printable Version  | Download this as a file
Dear madams, dear sirs,

unfortunately I did not receive a reply concerning my request from
July 1st from you yet. In this context I again want to point out the
major wish of our customer SJB seeing the name removed from the
entries mentioned below. It would be a great pleasure if you can
manage the removal according to the wish of our customer.

Thank you very much for your understanding.

Please do not hesitate contacting me for further discussion.

With kind regards,
P. Schmitz
Dein guter Ruf.de

---------- Forwarded message ----------
From: P. Schmitz <p.schmitz@deinguterruf.de>
Date: 2011/7/1
Subject: Request
To: office@ebizz.tv

Dear madams, dear sirs,

by order of our customer SJB Fonds Skyline OHG we are kindly asking you
to remove some entries on your website thetvnet.com. The
topicality and the
correctness of these entries are no longer up to date. It is a major
concern of our customer to see them removed:

immobilien-vertraulich.com/law/7279-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7277-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7268-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7264-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7262-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7224-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7223-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7217-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7212-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7210-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7203-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7200-opfer-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7189-opfer-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7120--klaus-maurischats-gomopa-cybermoerder-leichen-und-falschmeldungen-plastern-ihren-weg--nicht-nur-im-internet.html
immobilien-vertraulich.com/boerse-ipo-reit/7119--der-mehrfach-vorbestrafte-serienbetrueger-und-mutmassliche-paederast-klaus-maurischat-und-seine-neue-qwirecard-enteq.html

We hope you can manage the removal of these entries according to the wish
of our customer contemporarily. . These entries and similar ones cause
major problems for our customer.
We wanna thank you for your appreciation, for further information
please visit our website deinguterruf.de. (the english version is
still under construction).

In case you are not the right receipt for this request, it would be
very kind if you can name the correct person in charge.
If you have further questions concerning this case or our services in
general, please contact me.
It would be a great pleasure to receive a positive feedback.

With kind regards,

--
Mit freundlichen Grüßen,

P. Schmitz
DEIN GUTER RUF.DE

Ein Projekt der
MoveVision GmbH

Alfredstraße 341
45133 ESSEN
Tel: 0201-2489452
E-mail: p.schmitz (at) deinguterruf.de

MoveVision – GmbH - HRB 22121
Geschäftsführer: Martin Lux - Steuernummer: DE228746207

--
Mit freundlichen Grüßen,

P. Schmitz
DEIN GUTER RUF.DE

Ein Projekt der
MoveVision GmbH

Alfredstraße 341
45133 ESSEN
Tel: 0201-2489452
E-mail: p.schmitz (at) deinguterruf.de

MoveVision – GmbH - HRB 22121
Geschäftsführer: Martin Lux - Steuernummer: DE228746207
Subject: Request
From: “P. Schmitz” <p.schmitz@deinguterruf.de>
Date: Fri, July 1, 2011 12:18 pm
To: office@ebizz.tv
Priority: Normal
Options: View Full HeaderView Printable VersionDownload this as a file
Dear madams, dear sirs,

by order of our customer SJB Fonds Skyline OHG we are kindly asking you
to remove some entries on your website thetvnet.com. The
topicality and the
correctness of these entries are no longer up to date. It is a major
concern of our customer to see them removed:

immobilien-vertraulich.com/law/7279-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7277-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7268-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7264-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7262-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7224-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7223-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7217-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7212-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7210-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7203-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7200-opfer-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7189-opfer-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7120--klaus-maurischats-gomopa-cybermoerder-leichen-und-falschmeldungen-plastern-ihren-weg--nicht-nur-im-internet.html
immobilien-vertraulich.com/boerse-ipo-reit/7119--der-mehrfach-vorbestrafte-serienbetrueger-und-mutmassliche-paederast-klaus-maurischat-und-seine-neue-qwirecard-enteq.html

We hope you can manage the removal of these entries according to the wish
of our customer contemporarily.These entries and similar ones cause
major problems for our customer.
We wanna thank you for your appreciation, for further information
please visit our website deinguterruf.de. (the english version is
still under construction).

In case you are not the right receipt for this request, it would be
very kind if you can name the correct person in charge.
If you have further questions concerning this case or our services in
general, please contact me.
It would be a great pleasure to receive a positive feedback.

With kind regards,

--
Mit freundlichen Grüßen,

P. Schmitz
DEIN GUTER RUF.DE

Ein Projekt der
MoveVision GmbH

Alfredstraße 341
45133 ESSEN
Tel: 0201-2489452
E-mail: p.schmitz (at) deinguterruf.de

MoveVision – GmbH - HRB 22121
Geschäftsführer: Martin Lux - Steuernummer: DE228746207

INTERESSANT - BENEWIRTZ WOLLTE HIERMIT AUSSCHLIESSLICH "GoMoPa"-KRITISCHE ARTIKEL LÖSCHEN

Gerd Bennewirtz mutmassliche “Partner” – Die STASI-Stalker der “GoMoPa”

 

 

Die STASI und Ihr Tarnunternehmen in Neuss – die mutmasslichen STASI-Morde

 

DIE WELT BERICHTET:

Überhaupt sind es die zahlreichen, bis heute ungeklärten Todesfälle beim Bereich Kommerzielle Koordinierung (KoKo) und dessen Stasi-Firmen in Ost und West, die bei den Ermittlungen zu den Einsatzgruppenmorden eine zentrale Rolle spielen. Schon im 1994 vorgelegten Bericht des Bundestagsuntersuchungsausschusses, der sich mit den kriminellen Praktiken des von den Stasi-Offizieren im besonderen Einsatz (OibE) Alexander Schalck-Golodkowski und Manfred Seidel geführten DDR-Devisen-Beschaffungs-Imperium auseinander setzt, wurde konstatiert, dass die Todesfälle “wahrscheinlich einen nachrichtendienstlichen Hintergrund” hätten.

Ermittelt wird heute zu den bereits in dem Bericht aufgeführten Fällen der durch “Herzversagen” aus dem Leben geschiedenen Geschäftsführer der KoKo-Firmen Itema in Neuss, Karl-Heinz Noetzel und Fritz John Bruhn. Letzterer wurde im Ost-Berliner Hotel “Metropol” im August 1982 tot aufgefunden. Laut “Focus” hatte Bruhn nach Erkenntnissen des Verfassungsschutzes seit 1979 die westdeutsche Spionageabwehr über konspirative Geldtransfers für die DKP informiert. In Bruhns Verfassungsschutzakte findet sich das Abhörprotokoll einer brutalen Einschüchterung. So sagte im Januar 1981 das DKP-Mitglied Friedrich R. aus Bochum zu Bruhn: “Mach keinen Blödsinn, einen Kontakt zum Verfassungsschutz bekommt die Partei sowieso heraus. Die Folgen würdest du nicht überstehen.”

QUELLE: DIE WELT

http://www.welt.de/print-wams/article100912/Erschiessen-Erstechen-Verbrennen-Strangulieren.html

 

 

Karl-Heinz Nötzel, Geschäftsführer der DDR-Tarnfirma Intema in Neuss, erstickt am 8. September 1981 in einer Leipziger Hoteltoilette – angeblich an Speiseresten. Offizielle Todesursache: Herzversagen. Nötzel, der über die Intema Ostberlin Devisen beschaffte, stand bei der DDR-Staatssicherheit im Verdacht, ein Agent des Kölner Bundesamts für Verfassungsschutz (BfV) zu sein.

Fritz John Bruhn, 57, Nötzels Nachfolger bei der Parteifirma Intema, wird am 20. August 1982 leblos im Ostberliner Hotel „Metropol“ aufgefunden. Die Obduktion ergibt: Herzversagen.

FOCUS vorliegende Verfassungsschutz-Dossiers beweisen, dass Bruhn seit 1979 die westdeutsche Spionageabwehr über konspirative Geldtransporte der DDR und die Drahtzieher illegaler Ost-West-Geschäfte informierte. Eine BfV-Verschlussakte über die Geheimoperation mit dem Codenamen „Einkäufer“ schildert detalliert, wie Bruhn am 24. Januar 1981 von dem DKP-Mitglied Friedrich R. aus Bochum eingeschüchtert wurde: „Mach keinen Blödsinn“, so die Warnung laut Wortprotokoll, „einen Kontakt zum Verfassungsschutz bekommt die Partei sowieso heraus.“ R. dann massiv drohend zu Bruhn: „Die Folgen würdest du nicht überstehen.“


Deutschland: Die düstere Seite der DDR – weiter lesen auf FOCUS Online: http://www.focus.de/politik/deutschland/deutschland-die-duestere-seite-der-ddr_aid_194129.html

Global Witness – Sentencing of former Nigerian politician highlights role of British and US banks in money laundering

Global Witness calls for a thorough investigation into HSBC, Barclays, Citibank and Abbey National (now owned by Santander) for their roles in the laundering of millions of pounds by James Ibori, former governor of Nigeria’s oil-rich Delta State. Ibori pleaded guilty to ten counts of money laundering and fraud in relation to an estimated $250 million of stolen state assets on 27 February; today was the first day of his sentencing hearing.

“By doing business with Ibori and his associates, these banks facilitated his corrupt behaviour and allowed him to spend diverted state assets on a luxury lifestyle, including a private jet and expensive London houses, while many Nigerians continue to live in poverty,” said Robert Palmer, a campaigner with Global Witness.

Today, the prosecution provided an overview of Ibori’s crimes, and in particular any aggravating factors. The details of how Ibori and his accomplices stole government funds and moved them into the UK are only coming out now, as a reporting restriction was in place until his guilty plea. His wife, sister and mistress have already been convicted of money laundering as have a string of professional intermediaries including a lawyer, a fiduciary agent and a corporate financier.

Ibori, who was governor of Delta State from 1999 to 2007, inflated government contracts, accepted kickbacks and even directly stole funds from state coffers.

His official salary was £4,000 a year and his formal asset declaration stated that he had no cash or bank accounts outside of Nigeria. Despite this he managed to buy several houses around the world, including one in the UK valued at £2.2 million, luxury cars (a Bentley, Range Rover and Maybach) and a $20 million Challenger private jet.

According to the prosecutor, Sasha Wass QC, Ibori and his associates used multiple accounts at Barclays, HSBC, Citibank and Abbey National to launder funds. Millions of pounds passed through these accounts in total, some of which were used to purchase expensive London property.

In one case US$4.8 million was transferred from a Barclays account belonging to a company of which Ibori was formally a director to another account at Barclays controlled by Ibori’s lawyer, Badhresh Gohil. The funds passed through two Swiss accounts, including one at a branch of Schroders in Zurich, and were used as part payment for the private jet. In another case, Ibori and others were able to cream $37.8 million off from the sale of Delta state shares in the telecoms company V Mobile.

Ibori had numerous Barclays accounts. The prosecutor described how in one case between 1999 and 2006 Ibori deposited £1.5 million in a Knightsbridge branch of Barclays, much of this was in rolls of banknotes.

In America Ibori held two accounts at Citibank and ran up a $920,000 American Express credit bill between 2003 and 2006. He bought a $1.8 million house in Houston, as well as moving at least $500,000 through his lawyer’s client account at the now-defunct AIDT bank in Denver, Colorado.

Banks and lawyers have a legal obligation to identify their customers and carry out ongoing checks to identify any suspicious transactions which they have to report to the authorities. In particular, they are supposed to identify customers who are senior politicians or their family members and close associates, who could potentially represent a corruption risk, and do extra checks on their funds.

This case raises serious questions about the due diligence that Barclays and the other banks carried out on Ibori and his associates. What checks did these banks do to ensure that the funds they were handling were not the proceeds of corruption?

A 2011 review by the UK bank regulator, the Financial Services Authority (FSA), revealed that British banks were systematically failing to carry out the required anti-money laundering checks – particularly when dealing with senior foreign politicians. The FSA has said that it will take a tougher line in future and will start doing more intensive supervision. For example, last month Coutts bank was fined £8.75 million for failures uncovered during the regulator’s 2011 review. But compared to the £1.9 billion in profits made by Coutts’ parent bank RBS, this fine can be seen as simply a cost of doing business, especially as RBS has been fined more than once in the past for similar failures.

“It’s welcome that the FSA has said it will do more to target banks that fail to tackle financial crime. But unless they issue penalties that really hurt, nothing will change,” said Palmer. “And we now need an investigation into how Ibori was able to move so much money through these British banks for so long and whether or not sufficient checks were carried out.”

The case also shows how money launderers such as Ibori are able to use shell companies spread across different countries to move and conceal their assets. At present it can be incredibly difficult for law enforcement and others to identify the actual person who controls and benefits from a company. Global Witness is calling for all countries to use their company registers to publish details on the real, ‘beneficial’ owner of all companies.

Barclays and HSBC declined to comment on the specific allegations due to client confidentiality. They said they had robust anti-money laundering and anti-corruption policies that applied across their global holdings. Santander declined to comment.

/Ends

Contact: Robert Palmer on +44 (0)20 7492 5860 or +44 (0)7545 645406, rpalmer@globalwitness.org.

Notes to editors:

1. In 2010 Global Witness’s report International Thief Thief revealed that HSBC, Barclays, Natwest, RBS and UBS had accepted millions of pounds for two other Nigerian state governors who had been accepting bribes.

2. The FSA’s report from June 2011 was deeply critical of banks for the handling of corrupt risk, for example it found that a third of banks did not have information on the ultimate, or beneficial, owner, despite this being a legal requirement.

3. RBS was fined £5.6 million in 2010 for failing to check whether its customers were on the UK terrorist sanctions list and £750,000 in 2002 for inadequate customer due diligence procedures.

Cyrano De Bergerac – Full Movie

France, 1640: Cyrano, the charismatic swordsman-poet with the absurd nose, hopelessly loves the beauteous Roxane; she, in turn, confesses to Cyrano her love for the handsome but tongue-tied Christian. The chivalrous Cyrano sets up with Christian an innocent deception, with tragic results.

Confidential – The Evolving Missions of the Secret Service, and More from CRS

hough it does not mention anything about Secret Service agents hiring prostitutes in Colombia last week, a newly updated report from the Congressional Research Service provides a timely discussion of The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions, April 16, 2012

Some other new or newly updated CRS reports obtained by Secrecy News include the following.

An Overview of Tax Provisions Expiring in 2012, April 17, 2012

Private Health Insurance Market Reforms in the Patient Protection and Affordable Care Act (ACA), April 16, 2012

Pension Benefit Guaranty Corporation (PBGC): A Fact Sheet, April 16, 2012

Nanotechnology: A Policy Primer, April 13, 2012

Video – Anti-GoMoPa-Stalking – Opfer-Aufklärungs-Video

SECRET from the FBI – Scheme to Use More Than 80 Fictitious Companies to Defraud Illinois, Indiana, Minnesota Unemployment Insurance Agencies of $8.7 Million

CHICAGO—A suburban Chicago woman who owned a South Side tax preparation business allegedly schemed to falsely claim more than $1 million in federal tax refunds and, together with 14 co-defendants, allegedly engaged in a related scheme using other individuals’ identities, including some tax service clients and some stolen, to fraudulently obtain more than $8.7 million from state unemployment insurance agencies in Illinois, Indiana, and Minnesota. The defendants allegedly registered approximately 80 fictitious employers with the states’ unemployment insurance agencies and used the sham employers to fraudulently collect unemployment insurance benefits. The Illinois Department of Employment Security was allegedly defrauded of at least $5.95 million, the Indiana Department of Workforce Development was allegedly cheated of at least $2.4 million, and the Minnesota Department of Employment and Economic Development lost at least $342,000 as a result of the alleged fraud scheme.

The lead defendant, Jacqueline Kennedy, owned and managed ATAP Financial Enterprises Inc., ATAP Tax & Business Solutions Inc., and ATAP Tax Services Inc., (collectively, ATAP), all tax preparation businesses located at one time at 1757 West 95th St. in Chicago. Kennedy, 39, of Country Club Hills, was charged with 14 counts of mail and wire fraud, six counts of filing false claims for tax refunds, and one count of aggravated identity theft.

Kennedy and 14 co-defendants were indicted together on various tax, fraud, and identity theft charges in a 60-count indictment returned yesterday by a federal grand jury, Patrick J. Fitzgerald, United States Attorney for the Northern District of Illinois, announced today. All 15 defendants will be ordered to appear for arraignment at a later date in U.S. District Court in Chicago.

“This indictment highlights the determination of the Labor Department’s Office of Inspector General to investigate fraud against the unemployment insurance program. The defendants allegedly schemed to illegally obtain approximately $8.7 million in unemployment benefits. We will continue to work with our law enforcement partners and our colleagues in the Illinois, Indiana, and Minnesota state workforce agencies to aggressively investigate allegations of fraudulent activities to obtain unemployment insurance benefits,” said James Vanderberg, Special Agent in Charge of the Chicago Regional Office of the U.S. Department of Labor, Office of Inspector General, Office of Labor Racketeering and Fraud Investigations.

Mr. Fitzgerald and Mr. Vanderberg announced the charges with Alvin Patton, Special Agent in Charge of the Internal Revenue Service Criminal Investigation Division; Robert D. Grant, Special Agent in Charge of the Chicago Office of Federal Bureau of Investigation; and Thomas P. Brady, Inspector in Charge of the U.S. Postal Inspection Service in Chicago. The Social Security Administration Office of Inspector General also assisted in the investigation.

Between January 2008 and April 2010, the indictment alleges that Kennedy and others prepared at least 200 false individual federal income tax returns for clients of ATAP or in the names of clients stating false income and credits for tax years 2007-2009 and fraudulently claiming approximately $1.025 million in tax refunds. Kennedy allegedly inflated certain ATAP clients’ tax refunds by manufacturing false Forms W-2 from companies for which the clients did not work and from companies for which the clients worked but did not earn the inflated wages reported.

As part of the alleged unemployment insurance fraud scheme, Kennedy and others allegedly used personal identifying information of numerous individuals, both ATAP tax clients, including names, Social Security numbers, and dates of birth, to file retroactive wage reports and subsequent claims for benefits, according to the indictment. At times, Kennedy and others stole the identities of ATAP clients and others and used the identifiers to file fraudulent claims for unemployment insurance benefits. At other times, they agreed with ATAP clients and others to file fraudulent claims on their behalf in exchange for a share of the proceeds, the indictment alleges.

Kennedy and co-defendant Tara Cox, 32, of Blue Island, who was charged with 15 counts of mail and wire fraud and one count of aggravated identity theft, allegedly created the 80-some fictitious companies and registered them with the state unemployment agencies, knowing that the vast majority of employers existed only for the purpose of drawing unemployment insurance benefits on behalf of purported employees. According to the indictment, they allegedly filed false quarterly wage reports on behalf of these fictitious employers, knowing that these companies, in fact, did not employ any workers. Kennedy and Cox then filed or caused others to file fraudulent claims for unemployment insurance benefits by claiming to be employees of the fictitious companies who were terminated without fault. During the course of the alleged scheme between February 2009 and October 2011, Kennedy, Cox, and others allegedly filed at least 900 false unemployment insurance claims before the scheme was detected and payments were stopped.

In Illinois and Minnesota, unemployment insurance claimants could chose to have their benefits directly deposited into a bank account or have the state agency issue them a debit card, while Indiana claimants received a debit card through the mail. The indictment alleges that Kennedy and Cox caused fraudulent unemployment insurance payments to be made to debit cards for the benefit of themselves and the following co-defendants: Cox’s mother, Rowena Pughsley, 60, also of Blue Island, charged with six counts of mail fraud, one count of aggravated identity theft, and two counts of filing false income tax returns; April Blanchard, 37, of Chicago, charged with 10 counts of mail and wire fraud; Orvin Hurst, 35, of Chicago, charged with nine counts of mail and wire fraud; Marcel Mason, 38, whose last known address was in Beecher, charged with four counts of mail and wire fraud; Lantz Roberts, 39, of Chicago, charged with four counts of mail fraud; Jocklyn Batey, 64, of Chicago, charged with two counts of mail fraud; Shawn Ray, 49, of Chicago, charged with two counts of mail fraud; Ashlee Petermon, 25, of Chicago, charged with one count of mail fraud; Eboni Coppage, 26, of Bloomington, charged with two counts of mail fraud; Tameka Thompson, 31, of Park Forest, charged with one count of mail fraud; Charles Williams, 37, of Sauk Village, charged with two counts of mail and wire fraud; and Anise McGill, 26, of Alsip, charged with one count of mail fraud.

At times, Kennedy, Cox, Pughsley, and Blanchard allegedly paid or caused to be paid unemployment payroll tax contributions on behalf of the fictitious employers to create the false impression that the employers were legitimate businesses with actual employees. In addition, Cox and others allegedly purchased Social Security numbers for filing bogus claims for unemployment insurance benefits. Ten of the defendants, including Orvin Hurst’s brother, Marlin Hurst, 39, of Chicago, who was charged with five counts of mail fraud, caused unemployment insurance debit cards to be delivered to their home and other addresses with which they were associated, knowing that the cards were fraudulently obtained, the indictment alleges. Fourteen of the defendants allegedly withdrew funds from bank automated teller machines using unemployment insurance debit cards in the names of purported employees of fictitious employers knowing they were not entitled to those funds.

Kennedy, Pughsley, Cox, Blanchard, Mason, and others allegedly falsely certified fraudulent unemployment insurance claims, including representing to the state agencies that the claimants were entitled to unemployment insurance benefits, had been available and able to work, and actively sought work during the certification period.

Pughsley alone was charged with two counts of filing false individual federal income tax returns for 2009 and 2010 for allegedly under-reporting her total income as $196,414 in 2009 and $70,538 in 2010, when she knew that her gross income and total income were substantially greater.

The indictment seeks forfeiture of approximately $8.7 million in alleged fraud proceeds from Kennedy, Cox, Pughsley, and seven other defendants.

The charges in the indictment carry the following maximum penalties on each count: mail and wire fraud—20 years in prison; filing false claims for tax refunds—five years; aggravated identity theft—mandatory two years consecutive to any other sentence imposed and a maximum fine of $250,000 on each count, or an alternate fine on the fraud counts totaling twice the loss or twice the gain, whichever is greater. In addition, restitution is mandatory. Each count of filing a false income tax return carries a three-year maximum sentence and a $250,000 fine. In addition, defendants convicted of tax offenses must pay the costs of prosecution and remain liable for any and all back taxes, as well as a potential civil fraud penalty of 75 percent of the underpayment plus interest. If convicted, the court must impose a reasonable sentence under federal statutes and the advisory United States Sentencing Guidelines.

The government is being represented by Assistant U.S. Attorneys Andrianna D. Kastanek and Mark E. Schneider.

The public is reminded that an indictment is not evidence of guilt. The defendants are presumed innocent and are entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.

TOP-SECRET from Crpytome – Nuclear Power Plant Onsite Emergency Response Capabilities

[Federal Register Volume 77, Number 75 (Wednesday, April 18, 2012)] [Proposed Rules] [Pages 23161-23166] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2012-9336] ======================================================================== Proposed Rules Federal Register ________________________________________________________________________ This section of the FEDERAL REGISTER contains notices to the public of the proposed issuance of rules and regulations. The purpose of these notices is to give interested persons an opportunity to participate in the rule making prior to the adoption of the final rules. ======================================================================== Federal Register / Vol. 77, No. 75 / Wednesday, April 18, 2012 / Proposed Rules [[Page 23161]] NUCLEAR REGULATORY COMMISSION 10 CFR Parts 50 and 52 [NRC-2012-0031] RIN 3150-AJ11 Onsite Emergency Response Capabilities AGENCY: Nuclear Regulatory Commission. ACTION: Advance notice of proposed rulemaking. ———————————————————————– SUMMARY: The U.S. Nuclear Regulatory Commission (NRC or the Commission) is issuing this Advance Notice of Proposed Rulemaking (ANPR) to begin the process of potentially amending its regulations to strengthen and integrate onsite emergency response capabilities. The NRC seeks public comment on specific questions and issues with respect to possible revision to the NRC’s requirements for onsite emergency response capabilities, and development of both new requirements and the supporting regulatory basis. This regulatory action is one of the actions stemming from the NRC’s lessons-learned efforts associated with the March 2011 Fukushima Dai-ichi Nuclear Power Plant accident in Japan. DATES: Submit comments by June 18, 2012. Comments received after this date will be considered if it is practical to do so, but the NRC is only able to ensure consideration of comments received on or before this date. ADDRESSES: You may access information and comment submissions related to this document, which the NRC possesses and is publicly available, by searching on http://www.regulations.gov under Docket ID NRC-2012-0031. You may submit comments by any of the following methods: Federal Rulemaking Web Site: Go to http://www.regulations.gov and search for Docket ID NRC-2012-0031. Address questions about NRC dockets to Carol Gallagher; telephone: 301-492- 3668; email: Carol.Gallagher@nrc.gov. Email comments to: Rulemaking.Comments@nrc.gov. If you do not receive an automatic email reply confirming receipt, contact us directly at 301-415-1677. Fax comments to: Secretary, U.S. Nuclear Regulatory Commission at 301-415-1101. Mail comments to: Secretary, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001, Attn: Rulemakings and Adjudications Staff. Hand deliver comments to: 11555 Rockville Pike, Rockville, Maryland 20852, between 7:30 a.m. and 4:15 p.m. (Eastern time) Federal workdays; telephone: 301-415-1677. For additional direction on accessing information and submitting comments, see “Accessing Information and Submitting Comments” in the SUPPLEMENTARY INFORMATION section of this document. FOR FURTHER INFORMATION CONTACT: Robert H. Beall, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001; telephone: 301-415-3874; email: Robert.Beall@nrc.gov. SUPPLEMENTARY INFORMATION: I. Accessing Information and Submitting Comments II. Background: Fukushima Dai-ichi and the NRC Regulatory Response III. Background: Onsite Emergency Response Capabilities A. Emergency Operating Procedures B. Severe Accident Management Guidelines C. Extensive Damage Mitigation Guidelines D. Onsite Emergency Response Capabilities Versus Emergency Preparedness IV. Discussion and Request for Public Comment A. ANPR Purpose B. Rulemaking Objectives/Success Criteria C. Applicability to NRC Licenses and Approvals D. Relationship Between Recommendation 8 and Other Near-Term Task Force Recommendations E. Interim Regulatory Actions V. Public Meeting VI. Rulemaking Process and Schedule VII. Related Petition for Rulemaking Actions VIII. Available Supporting Documents I. Accessing Information and Submitting Comments A. Accessing Information Please refer to Docket ID NRC-2012-0031 when contacting the NRC about the availability of information for this notice. You may access information related to this ANPR, which the NRC possesses and is publicly available, by the following methods: Federal Rulemaking Web Site: Go to http://www.regulations.gov and search for Docket ID NRC-2012-0031. NRC’s Agencywide Documents Access and Management System (ADAMS): You may access publicly available documents online in the NRC Library at http://www.nrc.gov/reading-rm/adams.html. To begin the search, select “ADAMS Public Documents” and then select “Begin Web- based ADAMS Search.” For problems with ADAMS, please contact the NRC’s Public Document Room (PDR) reference staff at 1-800-397-4209, 301-415- 4737, or by email to PDR.Resource@nrc.gov. The ADAMS accession number for each document referenced in this notice (if that document is available in ADAMS) is provided the first time that a document is referenced. A table listing documents that provide additional background and supporting information is in Section VIII of this document. NRC’s PDR: You may examine and purchase copies of public documents at the NRC’s PDR, Room O1-F21, One White Flint North, 11555 Rockville Pike, Rockville, Maryland 20852. B. Submitting Comments Please include Docket ID NRC-2012-0031 in the subject line of your comment submission, in order to ensure that the NRC is able to make your comment submission available to the public in this docket. The NRC cautions you not to include identifying or contact information in comment submissions that you do not want to be publicly disclosed. The NRC posts all comment submissions at http://www. regulations.gov as well as enters the comment submissions into ADAMS. The NRC does not edit comment submissions to remove identifying or contact information. If you are requesting or aggregating comments from other persons for submission to the NRC, then you should inform those persons not to include identifying or contact information in their comment submissions that they do not want to be publicly disclosed. Your request should state that the NRC will not edit comment submissions to remove such information before making the comment submissions available to the public or entering the comment submissions into ADAMS. [[Page 23162]] II. Background: Fukushima Dai-ichi and the NRC Regulatory Response On March 11, 2011, a magnitude 9.0 earthquake struck off the coast of the Japanese island of Honshu. The earthquake precipitated a large tsunami that is estimated to have exceeded 14 meters (45 feet) in height at the Fukushima Dai-ichi Nuclear Power Plant site (hereinafter referred to as the site or the facility). The earthquake and tsunami produced widespread devastation across northeastern Japan, resulting in approximately 25,000 people dead or missing, displacing tens of thousands of people, and significantly impacting the infrastructure and industry in the northeastern coastal areas of Japan. At the time of the earthquake, Fukushima Dai-ichi Units 1, 2, and 3 were in operation. Units 4, 5, and 6 had been shut down for routine refueling and maintenance activities, and the Unit 4 reactor fuel had been offloaded to the Unit 4 spent fuel pool. As a result of the earthquake, the three operating units at the site automatically shut down, and offsite power was lost to the entire facility. The emergency diesel generators started at all six units, providing alternating current (AC) electrical power to critical systems; overall, the facility response to the seismic event appears to have been normal. Approximately 40 minutes after shutdown of the operating units, the first large tsunami wave inundated the site, followed by multiple additional waves. The tsunami resulted in extensive damage to site facilities and a complete loss of AC electrical power at Units 1 through 5, a condition known as station blackout (SBO). One diesel generator remained functional on Unit 6. Despite the actions of the operators following the earthquake and tsunami, cooling was lost to the fuel in the Unit 1 reactor after several hours, in the Unit 2 reactor after about 70 hours, and in the Unit 3 reactor after about 36 hours, resulting in damage to the nuclear fuel shortly after the loss of cooling. In the days following the Fukushima Dai-ichi nuclear accident, the NRC Chairman directed the NRC staff to establish a senior-level agency task force to conduct a methodical and systematic review of the NRC’s processes and regulations to determine whether, in light of the events in Japan, the agency should make additional improvements to its regulatory system, and to make recommendations to the Commission for its policy direction. This direction was provided in a tasking memorandum dated March 23, 2011, from the NRC Chairman to the NRC Executive Director for Operations (COMGBJ-11-0002) (ADAMS Accession No. ML110950110). In SECY-11-0093, “Near-Term Report and Recommendations for Agency Actions Following the Events in Japan” (ADAMS Accession No. ML11186A959), dated July 12, 2011, the Near-Term Task Force (NTTF) provided its recommendations to the Commission. The staff requirements memorandum (SRM) for SECY-11-0093 (ADAMS Accession No. ML112310021), dated August 19, 2011, directed the NRC staff to identify and make “recommendations regarding any Task Force recommendations that can, and in the staff’s judgment, should be implemented, in part or in whole, without unnecessary delay.” In SECY-11-0124, “Recommended Actions To Be Taken Without Delay from the Near-Term Task Force Report” (ADAMS Accession No. ML11245A127), the NRC staff provided recommendations to the Commission on actions that, in the staff’s judgment, should be initiated without unnecessary delay, and requested that the Commission provide direction for moving forward on these recommendation (subsequently referred to as “Tier 1” recommendations). The Commission approved the staff’s proposed actions in the SRM for SECY-11-0124 (ADAMS Accession No. ML112911571), dated October 18, 2011. In SECY-11-0137, “Prioritization of Recommended Actions to Be Taken in Response to Fukushima Lessons Learned” (ADAMS Accession No. ML11269A204), the NRC staff requested that the Commission approve the staff’s prioritization of the NTTF recommendations. In the SRM for SECY-11-0137 (ADAMS Accession No. ML113490055), dated December 15, 2011, the Commission approved the staff’s proposed prioritization of the NTTF recommendations and supported action on the Tier 1 recommendations, subject to the direction in the SRM. With respect to regulatory action regarding onsite emergency response capabilities, the Commission directed the NRC staff to initiate a rulemaking on NTTF Recommendation 8, in the form of an ANPR. This document responds to that Commission direction. In November 2011, the Institute of Nuclear Power Operations (INPO) issued INPO-11-005, “Special Report on the Nuclear Accident at the Fukushima Dai-ichi Nuclear Power Station” (ADAMS Accession No. ML11347A454). In the SRM for SECY-11-0137, the Commission directed NRC staff to consider INPO-11-005 in its development of the technical bases for any proposed regulatory changes. III. Background: Onsite Emergency Response Capabilities A. Emergency Operating Procedures Emergency Operating Procedures (EOPs) are required procedures designed to mitigate the effects of a design basis accident and place the plant in a safe shutdown condition. The EOPs are required by Title 10 of the Code of Federal Regulations (10 CFR) Part 50, Appendix B, Criterion V, “Instructions, Procedures, and Drawings,” and are included in the administrative control sections of licensee’s technical specifications. Licensed operators are trained and evaluated in the implementation of EOPs through initial license training. The NRC evaluates licensed operator candidates’ knowledge of EOPs during an initial written examination, as required by 10 CFR 55.41 and 55.43, and an initial operating test, as required by 10 CFR 55.45. For proficiency, licensed operator requalification training programs, required by 10 CFR 55.59, routinely train and evaluate licensed operators on their knowledge and ability to implement the EOPs. B. Severe Accident Management Guidelines During the 1990s, the nuclear industry developed Severe Accident Management Guidelines (SAMGs) as a voluntary industry initiative in response to Generic Letter 88-20, Supplement 2, “Accident Management Strategies for Consideration in the Individual Plant Examination Process,” dated April 4, 1990 (ADAMS Accession No. ML031200551). SAMGs provide guidance to operators and Technical Support Center (TSC) staff in the event of an accident that progresses beyond a plant’s design basis (and therefore beyond the scope of the EOPs). The nuclear power industry owners’ groups (i.e., industry organizations with representatives from the various nuclear plant owners that provide industry oversight for various plant designs) developed generic guidelines specific to the individual plant designs. Given the voluntary nature of the initiative for SAMGs, their implementation throughout the industry has been varied, as noted by NRC inspection results for Temporary Instruction 2515/184, “Availability and Readiness Inspection of Severe Accident Management Guidelines (SAMGs)” (ADAMS Accession No. ML11115A053). The guidelines themselves were implemented by individual licensees, [[Page 23163]] but because the NRC has not developed a regulatory requirement for SAMGs, the training, evaluation, and procedure control requirements for SAMGs vary from plant to plant. C. Extensive Damage Mitigation Guidelines Following the terrorist events of September 11, 2001, the NRC ordered licensees to develop and implement specific guidance and strategies to maintain or restore core cooling, containment, and spent fuel pool cooling capabilities using existing or readily available resources that can be effectively implemented under the circumstances associated with loss of large areas of the plant due to explosions or fire. These requirements were subsequently imposed as license conditions for individual licensees and formalized in the Power Reactor Security Requirements final rule (74 FR 13926; March 27, 2009) in 10 CFR 50.54(hh)(2). As a result, Extensive Damage Mitigation Guidelines (EDMGs) were developed in order to provide guidance to operating crews and TSC personnel on the implementation of the strategies developed to address these large area events. The events at the Fukushima Dai-ichi Nuclear Power Station following the March 11, 2011, earthquake and tsunami highlighted the continued potential benefits of these strategies in mitigating the effects of prolonged SBOs and other events that challenge key safety functions. The NRC has not developed a specific regulatory requirement for training on EDMGs. D. Onsite Emergency Response Capabilities Versus Emergency Preparedness This ANPR focuses on the effectiveness of accident mitigating procedures and the training and exercises associated with these procedures. When using the term “accident mitigating procedures” in this document, the NRC is referring to EOPs, SAMGs, and EDMGs. The licensee’s emergency preparedness plan and implementing procedures, which are required by 10 CFR 50.47 and 50.54(q) and Appendix E to 10 CFR part 50, are being evaluated through other NTTF recommendations, and the associated efforts are referred to in the questions in Section IV.D. However, the licensee’s emergency preparedness plan and implementing procedures are not the subject of this ANPR. IV. Discussion and Request for Public Comment A. ANPR Purpose In SECY-11-0124, the NRC staff recommended that the agency engage stakeholders during rulemaking activities “so that the regulatory action and licensee actions taken effectively resolve the identified issues and implementation challenges are identified in advance.” The NRC staff proposed interaction with stakeholders to support development of the regulatory basis, a proposed rule, and implementing guidance for strengthening and integrating the onsite emergency response capabilities. In the SRM for SECY-11-0124, the Commission directed the NRC staff to issue an ANPR prior to developing the regulatory basis for a proposed rule. Accordingly, the NRC’s objective in this ANPR is to solicit external stakeholder feedback to inform the NRC staff’s efforts to evaluate regulatory approaches for strengthening the current onsite emergency response capability requirements. In the SRM for SECY-11-0124, the Commission also encouraged NRC staff to develop recommendations that continue to realize the strengths of a performance-based system as a guiding principle. The Commission indicated that, to be effective, approaches should be flexible and able to accommodate a diverse range of circumstances and conditions. The Commission stated that for “consideration of events beyond the design basis, a regulatory approach founded on performance-based requirements will foster development of the most effective and efficient, site- specific mitigation strategies, similar to how the agency approached the approval of licensee response strategies for the `loss of large area’ event” addressed in 10 CFR 50.54(hh)(2). Consistent with the Commission’s direction in the SRM for SECY-11- 0124, the NRC is open to flexible, performance-based strategies to address onsite emergency response capability requirements. This ANPR is structured around questions intended to solicit information that (1) supports development of such a framework and (2) supports assembling a complete and adequate regulatory basis that enables rulemaking to be successful. In this context, commenters should feel free to provide feedback on any aspects of onsite emergency response capability that would support this ANPR’s regulatory objective, whether or not in response to a stated ANPR question. B. Rulemaking Objectives/Success Criteria The NRC is considering development of a proposed rule that would amend the current onsite emergency response capability requirements. Currently, the regulatory and industry approaches to onsite emergency response capability are fragmented into the separate strategies that were discussed in Section III of this document. By promulgation of an onsite emergency response capability rule, the NRC would be able to establish regulations that, when implemented by licensees, would strengthen and integrate the various onsite emergency response strategies. Specifically, the proposed requirements for onsite emergency response capability would strive to accomplish the following goals: 1. Ensure that effective transitions are developed between the various accident mitigating procedures (EOPs, SAMGs, and EDMGs) so that overall strategies are coherent and comprehensive. 2. Ensure that command and control strategies for large scale events are based on the best understanding of severe accident progression and effective mitigation strategies, and well defined in order to promote effective decision-making at all levels and develop organizational flexibility to respond to unforeseen events. 3. Ensure that the key personnel relied upon to implement these procedures and strategies are trained, qualified, and evaluated in their accident mitigation roles. 4. Ensure that accident mitigating procedures, training, and exercises are appropriately standardized throughout the industry and are adequately documented and maintained. The NRC is seeking stakeholders’ views on the following specific regulatory objectives: 1. What is the preferred regulatory approach to addressing NTTF Recommendation 8? For example: a. Should the NRC develop a new rule, or could the requirements that would provide for a more strengthened and integrated response capability be accomplished by a method other than a rulemaking? Provide a discussion that supports your position. b. If a new rule is developed, what type of supporting document would be most effective for providing guidance on the new requirements? Provide a discussion that supports your position. 2. The NTTF recommendation for emergency response procedures stressed that the EOP guidelines should be revised to establish effective transitions between EOPs, SAMGs, and EDMGs in [[Page 23164]] an effort to promote a more integrated approach to onsite emergency response. The NRC is interested in stakeholder opinions on the best course of action for revising and maintaining these procedures to accomplish this objective. For example: a. Should the SAMGs be standardized throughout the industry? If so, describe how the procedures should be developed, and discuss what level of regulatory review would be appropriate. Should there be two sets of standard SAMGs, one applicable to pressurized water reactors (PWRs) and one applicable to boiling water reactors (BWRs), or should SAMGs be developed for the various plant designs in a manner similar to EOPs? Provide a discussion that supports your position. b. What is the best approach to ensure that procedural guidance for beyond design basis events is based on sound science, coherent, and integrated? What is the most effective strategy for linking the EOPs with the SAMGs and EDMGs? Should the transition from EOPs to SAMGs be based on key safety functions, or should the SAMGs be developed in a manner that addresses a series of events that are beyond a plant’s design basis? Provide a discussion that supports your position. c. The NTTF Recommendation 8 strongly advised that the plant owners’ groups should undertake revision of the accident mitigating procedures to avoid having each licensee develop its own approach. Is this the best course of action? What additional scenarios or accident plans should be considered for addition to SAMG technical guidelines as a result of the lessons learned in Japan? Provide a discussion that supports your position. d. In the SRM for SECY-11-0137, the Commission directed the NRC staff to consider the November 2011 INPO report, INPO-11-005, in the development of the technical bases for Recommendation 8. How should this document be used by industry in developing SAMGs and the NRC in developing any proposed regulatory changes? Provide a discussion that supports your position. e. Should there be a requirement for the SAMGs and EDMGs to be maintained as controlled procedures in accordance with licensee quality assurance programs? Provide a discussion that supports your position. f. Should the SAMGs and EDMGs be added to the “Administrative Controls” section of licensee technical specifications? Provide a discussion that supports your position. g. In a letter dated October 13, 2011 (ML11284A136), the Advisory Committee on Reactor Safeguards (ACRS) recommended that Recommendation 8 be expanded to include fire response procedures. In their letter, ACRS stated that some plant-specific fire response procedures can direct operators to perform actions that may be inconsistent with the EOPs, and that experience has shown that parallel execution of fire response procedures, abnormal operating procedures, and EOPs can be difficult and complex. Should efforts to integrate the EOPs, SAMGs, and EDMGs include fire response procedures? Are there other procedures that should be included in the scope of this work? Provide a discussion that supports your position. h. What level of effort, in terms of time and financial commitment, will be required by the industry to upgrade the accident mitigating procedures? If possible, please include estimated milestones and PWR/ BWR cost estimates. 3. The NTTF established the identification of clear command and control strategies as an essential aspect of Recommendation 8. What methodology would be best for ensuring that command and control for beyond design basis events is well defined? For example: a. Should separate procedures be developed that clearly establish the command and control structures for large-scale events? Should defined roles and responsibilities be included in technical specifications along with associated training and qualification requirements? Provide a discussion that supports your position. b. Should the command and control approach be standardized throughout the industry or left for individual licensees to define? Provide a discussion that supports your position. c. What level of effort, in terms of time and financial commitment, will be required by the industry to develop these command and control strategies? If possible, please include estimated milestones and PWR/ BWR cost estimates. 4. As the guidelines for accident mitigating procedures are revised and the command and control strategies are developed, personnel who will be implementing these procedures must be adequately trained, qualified, and evaluated. What would be the best approach for ensuring that the personnel relied upon to implement the revised procedures are proficient in the use of the procedures, maintain adequate knowledge of the systems referenced in these procedures, and can effectively make decisions, establish priorities, and direct actions in an emergency situation? For example: a. Should a systems approach to training be developed to identify key tasks that would be performed by the various roles identified in the new strategies? Provide a discussion that supports your position. b. Should the current emergency drill and exercise requirements be revised to ensure that the strategies developed as a result of this ANPR will be evaluated in greater depth? Provide a discussion that supports your position. c. Should the revised accident mitigating procedures, specifically SAMGs and EDMGs, be added to the knowledge and abilities catalogs for initial reactor operator licenses? Provide a discussion that supports your position. d. What level of plant expertise should be demonstrated by the personnel assigned to key positions outlined by the accident mitigation guidelines and command and control strategy? Should these personnel be required to be licensed or certified on the plant design? Provide a discussion that supports your position. e. What training requirements should be developed to ensure emergency directors and other key decision-makers have the command and control skills needed to effectively implement an accident mitigation strategy? Provide a discussion that supports your position. f. What should the qualification process entail for key personnel identified in the new strategies? How would this qualification process ensure proficiency? Provide a discussion that supports your position. g. What level of effort, in terms of time and financial commitment, will be required by the industry to develop and implement these training, qualification, and evaluation requirements? If possible, please include estimated milestones and PWR/BWR cost estimates. C. Applicability to NRC Licenses and Approvals The NRC would apply the new onsite emergency response capability requirements to power reactors, both currently operating and new reactors, and would like stakeholder feedback. Accordingly, the NRC envisions that the requirements would apply to the following: Nuclear power plants currently licensed under 10 CFR part 50; Nuclear power plants currently being constructed under construction permits issued under 10 CFR part 50, or whose construction permits may be reinstated; [[Page 23165]] Future nuclear power plants whose construction permits and operating licenses are issued under 10 CFR part 50; and Current and future nuclear power plants licensed under 10 CFR part 52. D. Relationship Between Recommendation 8 and Other Near-Term Task Force Recommendations The NRC notes that there is a close relationship between the onsite emergency response capability requirements under consideration in this ANPR effort and several other near-term actions stemming from the NTTF report (and identified in SECY-11-0124 and SECY-11-0137). Regulatory actions taken in response to these other activities might impact efforts to amend onsite accident mitigating procedures and training. In this regard: 1. What is the best regulatory structure for integrating the onsite emergency response capability requirements with other post-Fukushima regulatory actions, such that there is a full, coherent integration of the requirements? 2. Recommendations 4.1 and 4.2 address SBO regulatory actions and mitigation strategies for beyond design basis external events, respectively. The implementation strategies developed in response to Recommendations 4.1 and 4.2 will require corresponding procedures. The NRC recognizes the need for coordinating efforts under Recommendations 4.1, 4.2, and 8. What is the best way to integrate these three regulatory efforts to ensure that they account for the others’ requirements, yet do not unduly overlap or inadvertently introduce redundancy, inconsistency, or incoherency? 3. Recommendation 9.3 addresses staffing during a multiunit event with an SBO. Should staffing levels change as a result of a revised onsite emergency response capability or should these duties be assigned to existing staff? 4. Recommendation 10.2 addresses command and control structure and qualifications for the licensee’s decision-makers for beyond design basis events. Should this recommendation be addressed concurrently with Recommendation 8? E. Interim Regulatory Actions The NRC recognizes that implementation of multiple post-Fukushima requirements could be a challenge for licensees and requests feedback on how best to implement multiple requirements, specifically onsite emergency response capability requirements, without adversely impacting licensees’ effectiveness and efficiency. It will take several years to issue a final rule. Should the NRC use other regulatory vehicles (such as commitment letters or confirmatory action letters) to put in place interim coping strategies for onsite emergency response capabilities while rulemaking proceeds? V. Public Meeting The NRC plans to hold a category 3 public meeting with stakeholders during the ANPR public comment period. The public meeting is intended as a forum to discuss the ANPR with external stakeholders and provide information on the feedback requested in the ANPR to support development of onsite emergency response capability requirements. The meeting is not intended to solicit comment. Instead, the NRC will encourage stakeholders at the meeting to provide feedback in written form during the ANPR comment period. To support full participation of stakeholders, the NRC staff plans to provide teleconferencing and Webinar access for the public meeting. Since the intent of the meeting is not to solicit or accept comments, the meeting will not be transcribed. The NRC will issue the public meeting notice 10 calendar days before the public meeting. Stakeholders should monitor the NRC’s public meeting Web site for information about the public meeting: http://www.nrc.gov/public involve/public-meetings/index.cfm. VI. Rulemaking Process and Schedule Stakeholders should recognize that the NRC is not obligated to provide detailed comment responses to feedback provided in response to this ANPR. If the NRC develops a regulatory basis sufficient to support a proposed rule, there will be an opportunity for additional public comment when the regulatory basis and the proposed rule are published. If supporting guidance is developed for the proposed rule, stakeholders will have an opportunity to provide feedback on the implementing guidance. VII. Related Petition for Rulemaking Action The NTTF report provided a specific proposal for onsite emergency actions that was subsequently endorsed by the National Resources Defense Council (NRDC) in a petition for rulemaking (PRM), PRM-50-102 (76 FR 58165; September 20, 2011), as a way to address licensee training and exercises. In connection with NTTF Recommendation 8.4, “Onsite emergency actions,” the NRDC requested in its petition that the NRC “institute a rulemaking proceeding applicable to nuclear facilities licensed under 10 CFR 50, 52, and other applicable regulations to require more realistic, hands-on training and exercises on Severe Accident Mitigation [sic] Guidelines (SAMGs) and Extreme Damage Mitigation Guidelines (EDMGs) for licensee staff expected to implement the strategies and those licensee staff expected to make decisions during emergencies, including emergency coordinators and emergency directors.” The Commission has established a process for addressing a number of the recommendations in the NTTF Report, and the NRC determined that the issues raised in PRM-50-102 are appropriate for consideration and will be considered in this Recommendation 8 rulemaking. Persons interested in the NRC’s actions on PRM-50-102 may follow the NRC’s activities at www.regulations.gov by searching on Docket ID NRC-2012-0031. VIII. Available Supporting Documents The following documents provide additional background and supporting information regarding this activity and corresponding technical basis. The documents can be found in ADAMS. Instructions for accessing ADAMS are in the ADDRESSES section of this document. ———————————————————————— ADAMS Accession Number/Federal Date Document Register Citation ———————————————————————— April 4, 1990…………….. Generic Letter 88-20, ML031200551 Supplement 2, “Accident Management Strategies for Consideration in the Individual Plant Examination Process”. August 28, 2007…………… Appendix A to 10 CFR 72 FR 49505 part 50–General Design Criteria for Nuclear Power Plants. August 28, 2007…………… Final Rule: Licenses, 72 FR 49352 Certifications, and Approvals for Nuclear Power Plants. March 27, 2009……………. Final Rule: Power 74 FR 13926 Reactor Security Requirements. [[Page 23166]] March 23, 2011……………. Memorandum from ML110950110 Chairman Jaczko on Tasking Memorandum- COMGBJ-11-0002–NRC Actions Following the Events in Japan. April 29, 2011……………. Temporary Instruction ML11115A053 2515/184, Availability and Readiness Inspection of Severe Accident Management Guidelines (SAMGs). May 26, 2011……………… Completion of ML111470264 Temporary Instruction 2515/184, Availability and Readiness Inspection of Severe Accident Mitigation Guidelines (SAMGs), at Region IV Reactor Facilities. May 27, 2011……………… Region I Completion of ML111470361 Temporary Instruction (TI)-184, Availability and Readiness Inspection of Severe Accident Mitigation Guidelines (SAMGs). June 1, 2011……………… Completion of ML111520396 Temporary Instruction (TI) 2515/184, Availability and Readiness Inspection of Severe Accident Management Guidelines (SAMGs) at Region III Sites–Revision. June 2, 2011……………… Completion of ML111530328 Temporary Instruction (TI) 184, Availability and Readiness Inspection of Severe Accident Mitigation Guidelines (SAMGS) at Region II Facilities–Revision. July 12, 2011…………….. SECY-11-0093–“The ML11186A959 Near-Term Task Force ML111861807 Review of Insights (Enclosure) from the Fukushima Dai-ichi Accident”. August 19, 2011…………… SRM-SECY-11-0093–Near- ML112310021 Term Report and Recommendations for Agency Actions Following the Events in Japan. September 9, 2011…………. SECY-11-0124, ML11245A127 “Recommended Actions ML11245A144 to be Taken Without (Enclosure) Delay from the Near- Term Task Force Report.”. October 3, 2011…………… SECY-11-0137, ML11269A204 “Prioritization of ML11272A203 Recommended Actions (Enclosure) to be Taken in Response to Fukushima Lessons Learned.”. October 18, 2011………….. Staff Requirements ML112911571 Memorandum–SECY-11-0 124–Recommended Actions to be Taken Without Delay From The Near-Term Task Force Report. July 26, 2011…………….. NRDC’s Petition for ML11216A242 Rulemaking to Require More Realistic Training on Severe Accident Mitigation Guidelines (PRM 50- 102). September 14, 2011………… Letter to Geoffrey H. ML112700269 Fettus, Natural Resources Defense Council, Inc. from Annette Vietti-Cook, In Regards to the NRC Will Not Be Instituting a Public Comment Period for PRM-50-97, PRM-50-98, PRM-50-99, PRM-50- 100, PRM-50-101, and PRM-50-102. October 13, 2011………….. Initial ACRS Review ML11284A136 of: (1) The NRC Near- Term Task Force Report on Fukushima and (2) Staff’s Recommended Actions to be Taken Without Delay. November 30, 2011…………. INPO-11-005, Special ML11347A454 Report on the Nuclear Accident at the Fukushima Dai-ichi Nuclear Power Station. December 15, 2011…………. Staff Requirements ML113490055 Memorandum–SECY-11-0 137–Prioritization of Recommended Actions to be Taken in Response to the Fukushima Lessons- Learned. March 14, 2012……………. Summary of the Public ML12073A283 Meeting to Discuss Implementation of Near-Term Task Force Recommendation 8, Strengthening and Integration of Onsite Emergency Response Capabilities Such As EOPS, SAMGS, and EDMGS, Related to the Fukushima Dai-ichi Power Plant Accident. ———————————————————————— Dated at Rockville, Maryland, this 4th day of April 2012. For the Nuclear Regulatory Commission. Michael F. Weber, Acting Executive Director for Operations. [FR Doc. 2012-9336 Filed 4-17-12; 8:45 am] BILLING CODE 7590-01-P

Don’t Look In the Basement – Full Feature

One of the first of several horror films with “Don’t” leading the title, this gory low-budget thriller takes place in an experimental hospital for the criminally insane, where the pioneering director allows several patients to act out their twisted fantasies (which involve necrophilia, paranoia and popsicles). When a new staffer shows up, things start to go haywire — beginning with the bloody axe-murder of the doctor himself and leading to a total takeover of the asylum by its most dangerous inmates. The acting is horrendous, the sound is incoherent and the color is so cheap-looking that some theaters were issued black-and-white prints… but somehow the intrinsic sleaziness generated by the threadbare production manages to lend it a remarkably suitable ambience. Instead of vanishing into obscurity, this quirky little potboiler became a staple on the early-70’s drive-in circuit, thanks to Hallmark Films’ frequent double-bill bookings with Wes Craven’s Last House on the Left (even borrowing the logline “Keep telling yourself: It’s only a movie…”) and Mario Bava’s Bay of Blood. Some video versions are missing most of the graphic violence from the original cut.

Secret – U.C. Davis Pepper Spray Incident Reynoso Task Force Report

Our overriding conclusion can be stated briefly and explicitly. The pepper spraying incident that took place on November 18, 2011 should and could have been prevented.

On November 18, 2011, University of California, Davis, police officers used pepper spray on students sitting in a line in the midst of a protest and “occupation” on the campus quad. Viral images of the incident triggered immediate and widespread condemnation of the police action.

To assist the Task Force with fact finding and the identification of best practices in policing, the University engaged Kroll, Inc., an internationally known risk management firm. Kroll completed the final draft of its report on Feb. 22, 2012 (the “Kroll Report”). The Kroll Report describes at length the events leading up to this incident. In brief, at approximately 3:00 p.m. on Thursday, November 17, 2011, tents were erected on the Quad at the Davis campus. The Administration decided to remove the tents, instructing police to do so at 3:00 p.m. on Friday, November 18, 2011. While attempting to remove tents, the police arrested several individuals. Subsequently, in the midst of a growing group of people, the police officers employed pepper spray to remove several students linking arms in a line across a walkway in the Quad.

The UC Davis protest focused on and drew strength from widespread discontent among students about the increase in tuition and fees at the University of California. The incident also took place against the backdrop of worldwide student protests, including demonstrations by the Occupy Wall Street movement, which triggered similar events across the nation. These protests presented challenges for all affected universities and municipalities in attempting to balance the goals of respecting freedom of speech, maintaining the safety of both protesters and non-protesters, and protecting the legitimate interests of government and the non-protesting public.

In the immediate aftermath of the UC Davis incident, University of California President Mark G. Yudof announced the appointment of former California Supreme Court Justice Cruz Reynoso to chair a Task Force to address the pepper spraying of UC Davis students. This was a result of a request from Chancellor Katehi for an independent investigation to review the incident and report findings and recommendations to enable peaceful and nonviolent protests. All Task Force members are either currently or were once affiliated with UC Davis and most were nominated by relevant campus organizations.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

UCD-ReynosoReport

Video – Julian Assange Describes Media Fears

http://www.dailymotion.com/video/xq5qjy_julian-assange-describes-media-fears_news?search_algo=1

Julian Assange, Wikileaks co-founder, describes the criteria behind choosing guests for his new program ‘The World Tomorrow”.
Powered by NewsLook.com

Eegah! – Full Cult Movie

While driving through the desert, a teenage girl is frightened by a seven-foot giant which appears in her path. After escaping, she returns to the site with her boyfriend and her father in an attempt to find the giant. They do, and it proceeds to terrorize them and the rest of Palm Springs, California.

Agency – Full Feature Film

 

 

Agency tackles the question of the efficiency of media manipulation. An unscrupulous advertising agency, in league with equally untrustworthy political campaign manager Robert Mitchum, plants subliminal messages in its TV commercials. Just as Vance Packard warned in the 1950s expose The Hidden Persuaders, these hidden messages persuade the viewers to vote for Mitchum’s candidate. Given the potency of the the film’s premise, it’s disappointing to watch director George Gaczender handle the material (based on a novel by Paul Gottleib) is so cut-and-dried a fashion. But Mitchum is good, as are his costars Valerie Perrine, Lee Majors, Saul Rubinek and Alexandra Stewart.

Cryptome unveils – Secret Service DoD Sexual Entrapment by CU/VZ

Odd that Cuba and/or Venezuela have not openly been accused of orchestrating the Secret Service/DOD Cartagena sexual honey pot — an entrapment long employed by spy services against the US and its allies, as well as by the US and its allies. Neither CU nor VZ took part in the Cartagena conference where the US failed to get approval for continued Cuba sanctions considered by Latin Americans to be US-Monroe Doctrine abusive.

Senator Collins has raised the possibility of a trap but will likely be briefed into silence. Neither Democrats or Republicans want to open this top secret Pandora’s Box (excuse the pun).

The Open Government Partnership conference in Brasilia which followed Cartagena also camouflaged with triple-crossing “openness” the legacy of Monroe Doctrine covert operations in Latin America to enforce hemispheric hegemony with stealth and bribery.

The chances are high that the sexual entrapment was a CU/VZ counterspy operation against the nest of spies operating in Cartagena, and that White House and Congressional investigations will perfectly cloak the dust-up as it has since President Monroe ordered the standard deception in 1823.

TOP-SECRET – Central Intelligence Agency Component and Activity

Citation: [Central Intelligence Agency Component and Activity]
Secret, Table of Contents, May 09, 1973, 1 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00039
Origin: United States. Central Intelligence Agency
Individuals/
Organizations Named:
International Police Academy; United States. Central Intelligence Agency. Directorate of Operations. Central Cover Staff; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff. Police Group; United States. Central Intelligence Agency. Directorate of Operations. Domestic Operations Division; United States. Central Intelligence Agency. Directorate of Operations. East Asia Division; United States. Central Intelligence Agency. Directorate of Operations. European Division; United States. Central Intelligence Agency. Directorate of Operations. Foreign Intelligence Staff; United States. Central Intelligence Agency. Directorate of Operations. Foreign Resources Division; United States. Central Intelligence Agency. Directorate of Operations. Narcotics Coordination Group; United States. Central Intelligence Agency. Directorate of Operations. Soviet Bloc Division; United States. Federal Bureau of Investigation; United States. Securities and Exchange Commission; Vesco, Robert L.
Subjects: Covert operations | Domestic intelligence | Interagency cooperation | Personnel management | Police assistance | Political activists | Project MHCHAOS [Codename CHAOS] | Recruitment | Wiretapping
Abstract: Lists topics of papers from Central Intelligence Agency divisions on domestic espionage activities and programs.
Full Text: Document – PDF – this link will open in a new window (20 KB)

Durable URL for this record

Junction – Full Movie

Michaela, a lost and lonely young woman, gets a mysterious message from the father she never knew, sending her on a journey to discover twisted family secrets. As she uncovers each piece of the puzzle, she descends even deeper into their warped world of pilgrims and pyromania. Dragged out to the desert, and pushed to the very edge, Michaela is forced to make a choice: preserve the delicate web that history has woven for her family, or strike out on her own and destroy the cycle of evil in her blood. That is, if she can survive the fire.

 

Secret – FBI International Expansion and Influence of US-Based Gangs

https://publicintelligence.net/wp-content/uploads/2012/04/FBI-InternationalGangs.png

 

The purpose of this assessment is to explore the expansion and influence of US-based gangs abroad and their illicit operations and associations with foreign criminal organizations. For the purpose of this assessment, the term “gang” encompasses both street gangs and outlaw motorcycle gangs. In addition to FBI and open source reporting, the following law enforcement agencies from the United States, Canada, Central America, the Netherlands, and United Kingdom were surveyed to obtain data for the assessment.

(U) Key Judgments

  • (U//LES) Several US-based gangs have expanded internationally, although their expansion appears to be limited and unsystematic. Major US-based gangs are operating in Australia, Asia, Canada, the Caribbean, Central America, Europe, Mexico, South America, and New Zealand. Most gang members abroad are not counterparts of US-based sets or cliques, but are homegrown or “wanna-be” gang members influenced by media and popular culture. Outlaw Motorcycle Gangs (OMGs), Hispanic gangs, and street gangs on or near US military bases abroad tend to be affiliated with or an extension of a US-based gang.
  • (U//LES) Many US-based gangs maintain some ties to foreign criminal organizations. Most criminal gangs involved in drug trafficking and distribution have alliances with Mexican, Colombian, or Nigerian drug cartels, or to organized crime or domestic terrorist groups. Such alliances could ultimately facilitate the gang’s expansion abroad and collaboration with foreign criminal organizations.
  • (U//LES) The international expansion of US-based gangs appears to be facilitated by several factors, including criminal opportunities available in a specific region; the presence of family members or friends; gang suppression laws in a specific region; and ties to foreign criminal organizations such as drug trafficking organizations (DTOs), organized crime groups, or terrorist groups. Gangs that are sophisticated and organized are more likely to have factions abroad. US-based gangs will continue to expand their operations abroad as long as conditions facilitating such expansion and a market for illicit goods are present.
  • (U) OMGs have strong international links and are present in 45 countries, including Canada, Australia, New Zealand, Russia, South America, Asia, and most European Union nations. Their expansion abroad is primarily driven by the illicit drug market and the search for international suppliers. Major OMGs are expanding faster overseas than they are in the United States, and expansion efforts are likely to continue.
  • (U//LES) Mara Salvatrucha (MS-13) operates in Mexico, Central America, and Canada. MS-13 members are allegedly involved in alien smuggling outside of the United States and are providing alien smuggling organizations with enforcement services for a fee. Although there is no evidence suggesting a link between MS-13 and any terrorist organizations, the gang’s propensity for alien smuggling and profit motivations may make them amenable to smuggling terrorists into the United States.
  • (U//LES) According to open source and Drug Enforcement Administration (DEA) reporting, several criminal gangs, including the Black Disciples, Black Peace Stones, Crips, Latin Kings, MS-13, Netas, and the Texas Syndicate have members who have been affiliated with foreign extremist groups and terrorist organizations. Furthermore, some of these gangs subscribe to radical Islam, making them more susceptible to recruitment by terrorist organizations and more likely to travel abroad to engage in criminal activity. The potential for terrorist recruitment of street gangs greatly increases in correctional institutions, where several associations between American gangs and international terrorists have been documented.
  • (U//LES) US law enforcement officials have suggested that US-based gangs migrate abroad and collaborate with questionable international interest groups for a profit-related purpose. Consequently, it is likely that several US-based gangs will augment their relationships with foreign criminal organizations and DTOs to obtain access to the illicit global market, should it serve their financial objectives.

Incomparable Pulitzer-Winning Middle East Correspondent Dies in Syria

democracynow.org – The Pulitzer Prize-winning New York Times foreign correspondent Anthony Shadid has died at the age of 43. Shadid died of an apparent asthma attack on Thursday while covering the conflict in Syria. An American of Lebanese descent who spoke fluent Arabic, Shadid captured dimensions of life in the Middle East that many others failed to see. His exceptional coverage won him a Pulitzer Prize in 2004 and 2010 for international reporting while covering the U.S. occupation of Iraq. Shadid has been a guest on Democracy Now! several times over the past decade reporting on Libya, Tunisia, Iraq and Lebanon. We air excerpts from our last interview with Shadid in April 2011, just after he returned home following his six-day capture in Libya by Col. Muammar Qaddafi’s forces.

To watch the complete daily, independent news hour, read the transcript, download the podcast, and for additional Democracy Now! reports, visit http://www.democracynow.org/

Public Intelligence – Lost-Links and Mid-Air Collisions: The Problems With Domestic Drones

https://publicintelligence.net/wp-content/uploads/2012/04/flight-route-airspace-chaos.png

A map of current military remotely piloted aircraft (RPA) operations as of 2011 is presented with an overlay of flight paths through the national airspace in a U.S. Air Force Chief Scientist presentation.

Public Intelligence

Most of the public discussion surrounding the use of drones both internationally and domestically has focused on issues of privacy or civilian casualties. Due to the technical complexity of drone operations, there has been little media examination of the practical feasibility of widespread domestic drone deployment. In February, the FAA Reauthorization Act of 2012 was signed into law clearing the way for more than 30,000 domestic drones by 2020. The law requires the FAA to create procedures for commercially-operated drones by 2015 and enables law enforcement agencies to operate small-scale drones at low altitudes. While this has a number of negative implications for the right to privacy, such as the lack of any laws governing the usage of data collected via drones, the thought of a future where U.S. skies are filled with an array of drones has a much larger, more practical problem: is it even logistically possible to operate thousands of pilot-less aircraft in the domestic airspace?

Lost-Links

The first set of problems that will likely plague any attempt at the widespread use of drones inside the U.S. relate to frequency allocation and electromagnetic interference (EMI). In order to be controlled from a remote location, drones must communicate via with a ground control station via some sort of data link. In order for this link to be maintained, there must be protection against electromagnetic interference that can disrupt the communications link. If the interference is sufficient in scale, it can lead to what is called a lost link event causing the drone to lose contact with its operator. Sometimes the link is reestablished and the pilot is able to maintain control of the drone. Sometimes the link cannot be reestablished and the drone is effectively turned into a zombie that can drift far from its intended target, as may have occurred recently with the RQ-170 captured by Iran in December 2011.

A U.S. Air Force Scientific Advisory Board report from April 2011 obtained by Public Intelligence warns of the potential vulnerabilities of communications links used for remotely piloted aircraft (RPAs): “Limited communications systems result in communications latency, link vulnerabilities, and lost-link events, which limits mission roles assigned to RPAs, operational flexibility, and resiliency in the face of unanticipated events.” The report notes that there are a “wide range of methods that a determined adversary can use for attacking RPA guidance and navigation systems” such as constructing “simple GPS noise jammers” that “can be easily constructed and employed by an unsophisticated adversary.”

https://publicintelligence.net/wp-content/uploads/2012/04/datalink-rf.png

A diagram of the data link between a drone and its ground data terminal (GDT). The data transmitted through the GDT is sent to a ground control station (GCS) where the drone pilot operates the unmanned aircraft.

Finding unallocated frequencies that can be used for drone aircraft can also be a difficult task. For example, when the Department of Defense’s Joint Spectrum Center analyzed the deployment of Predator B drones in 2004 along a section of the Mexico-Arizona border, they conducted extensive analysis of the potential for electromagnetic interference and other frequency disruptions. The report examines potential conflicts between Mexican fixed microwave links, National Science Foundation radio astronomy observatories and various other potential sources of interference. When several Predator drones were needed for tests at Creech Air Force Base in Nevada, the Joint Spectrum Center had to study the potential for interaction with residential indoor and industrial outdoor radio local area networks, outdoor video surveillance networks and other potential signals arising from a nearby residential community.

The issue of communications interference and lost-link events is “a major concern and failure of [common data link or CDL] communications due to EMI has resulted in numerous UAS accidents” according to a 2010 U.S. Army Command and General Staff College report. “The omnidirectional antennas the aircraft uses to establish the CDL leaves the system open to interference. Environmental EMI from communications systems produce sufficient energy to disrupt CDLs and are responsible for 15 percent of Army UAS accidents.”

To make matters worse, the data links used to communicate with many types of drones are completely unencrypted. In 2010, the Air Force produced a report on lessons learned from the use of small unmanned aircraft systems (SUAS) that argues the current communications systems used by smaller drones are vulnerable and unsustainable: “Many of the current SUAS use datalink equipment that is not interoperable with other datalinks or tunable to other frequencies. In fact, the number of available proprietary SUAS frequencies is so limited US military SUAS operations are threatened by interference from other operations. Additionally, SUAS datalinks are unencrypted and are thus susceptible to enemy exploitation. Since datalinks are also unprotected, GCS are jammable and locations can even be triangulated and possibly physically attacked.”

Mid-Air Collisions

The second set of problems facing domestic drones center around their ability to avoid collisions both in the air and with objects on the ground.  Current military drone operations in places like Afghanistan, Pakistan, Somalia and Yemen occur in an airspace environment that is relatively unoccupied.  There is not a tremendous amount of air traffic in Somalia, for example, or Yemen and the terrain is largely devoid of high-rise buildings and other grounded objects that could create impediments to small-scale drone operations.  Yet, even in these environments, avoiding collisions and deconflicting airspace is a major concern for drone operators.

A U.S. Army handbook designed to inform soldiers about airspace control details the complex procedures necessary for the safe and effective use of small unmanned aerial vehicles (SUAVs) in combat missions.  First a mission plan must be organized and approved before being submitted to an airspace control authority who analyzes the plan against other proposed mission plans for deconfliction.  If there are conflicts between the proposed mission and other activities occurring in the area, then the mission is adjusted to maintain safe control over the airspace. The handbook repeatedly warns that “Failure to conduct airspace coordination prior to SUAV operations may contribute to a mid-air collision resulting in severe injury or death to personnel.”

https://publicintelligence.net/wp-content/uploads/2012/04/suav-mission-flow.png

A diagram of the small unmanned aerial vehicle (SUAV) mission planning process as presented in a U.S. Army manual.

In fact, mid-air collisions have occurred in the course of combat operations. In May 2011, a RQ-7B Shadow and a C-130 cargo plane collided over Afghanistan. Though no one was injured, the C-130 was forced to make an emergency landing. In response to the incident, a FAA spokesperson told AOL Defense that there are several studies indicating that “you could not use TCAS to reliably have other aircraft detect the unmanned aircraft.”

TCAS or the Traffic Collision Avoidance System is the standard technology used by commercial aircraft around the world to help avoid mid-air collisions. The system, based on transponders that operate in each aircraft independent of air traffic control, reportedly has difficulties incorporating drones due to their lack of a pilot and often unpredictable flight patterns. A U.S. Air Force study conducted by MIT states that TCAS was “designed under the assumption that a pilot was on-board the aircraft to interpret displays and perform visual acquisition. The TCAS traffic display is intended to aid visual acquisition by indicating the proper sector to search out the cockpit, but does not by itself provide sufficient bearing or altitude rate accuracy to support avoidance maneuvers. The role of a TCAS traffic display in a UAV ground control station is therefore under debate.”

The FAA’s own website makes it clear that due to drones’ “inability to comply with ‘sense and avoid’ rules, a ground observer or an accompanying ‘chase’ aircraft must maintain visual contact with the UAS and serve as its ‘eyes’ when operating outside of airspace that is restricted from other users.” A 2011 presentation from the U.S. Air Force Chief Scientist acknowledges this need for increased integration of domestic drone operations into the national airspace, as well as improvement in collision avoidance systems capable of surviving “lost-link” events where the drone loses contact with its ground control station.

The potential for mid-air collisions has already caused problems for domestic drone operations in Hawaii, where the state purchased a $70,000 drone to monitor Honolulu Harbor without the knowledge that FAA approval would be required to operate the device.  When the FAA analyzed the case, they found that traffic from Honolulu International Airport and a nearby Air Force base made operating the drone too dangerous and denied the state’s request.  Situations like this will likely arise with greater frequency as the push toward domestic drone operations is continued in the U.S. and other Western countries.

PJ Media – Reporters Expose Leftists in the Department of Justice

PJ Media’s J. Christian Adams and Hans Von Spakovsky talk to Bill Whittle about the shady hiring practices at the Department of Justice, revelations that earned PJ Media a Pulitzer Prize nomination. From the failure to comply with the Freedom of Information requests, to the hiring of radical lawyers, Bill Whittle brings you the shocking truth about Obama’s Department of Justice. You don’t want to miss this interview.

For all of PJ Media’s Reports on the Depratment of Justice click here:
http://pjmedia.com/every-single-one-pj-medias-investigation-of-justice-depart..

Award – Tuscaloosa News Wins Pulitzer Prize

A year after the Pulitzer judges found no entry worthy of the prize for breaking news, The Tuscaloosa News of Alabama won the award for coverage of a deadly tornado, blending traditional reporting with the use of social media. (April 16)

TV – Pulitzer Prize Profile: The Philadelphia Inquirer’s Public Service Award

Announced Monday by Columbia University, The Philadelphia Inquirer won the Pulitzer Prize for public service for its “Assault on Learning” series that chronicled pervasive under-reported violence in the city’s public schools. Jeffrey Brown and The Inquirer’s Kristen Graham discuss the award and the series’ impact on the city.

Aufklärungswürdig: Die einstige SED kann € 560 Millionen in Immobilien investieren

Liebe Leser,

wie kann die ehemalige SED € 560 Millionen in Immobilien investieren ?

Ist die ehemalige SED, nunmehr “Die Linke” eine Milliardärspartei, wo sie doch die Interessen der “Werktätigen” vertritt ?

Und die gesamte deutsche Presse und erlauvben Sie mir dies pointiert zudeklarieren “die sogenante Immobilien-“FACHPRESSE”

schluckt diese Ankündigug des mutmasslichen STASI IM Gregor Gysi ohne mit der Wimper zu zucken ?

Mutmasslich Stümper oder korrumpierte Chargen…

Wo ist Deutschland im Jahre 2012 gelandet ?

In dem Parallel-Universum SED-STASI und hat es nicht gemerkt ?

Fragwürdig !

Herzlichst Ihr

Bernd Pulch, Magister Artium der Publizistik, Germanistik und Komparatistik

Confidential – FEMA National Level Exercise 2012 Overview Presentation

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-NLE2012.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-NLE2012-2.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-NLE2012-3.png

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-NLE2012-4.png

 

DOWNLOAD ORIGINAL THE DOCUMENT HERE

FEMA-NLE2012

 

Uncensored – FEMEN Bewegung in Ukrain

http://www.dailymotion.com/video/xnj95w_femen-bewegung-in-ukraine_sexy?search_algo=1

FEMEN Bewegung in Ukraine: Die Organisation tritt für die Selbstbestimmung des Menschen,
insbesondere der Frauen ein.

Sie ist international für Oben-ohne Proteste gegen Wahlfälschungen, Sextourismus, Sexismus, Wladimir Putin, geplante staatliche Verhaltensvorschriften während der Fußball-Europameisterschaft 2012 u.a. bekannt geworden

The Associated Press Wins Pulitzer for Stories on NYPD Spying

The Associated Press won a Pulitzer Prize for investigative reporting Monday for documenting the New York Police Department’s spying on Muslims. (April 17, 2012)

Cryptome unveils – Defense Support to Special Events like Cartagena

Defense Support to Special Events

 


[Federal Register Volume 77, Number 74 (Tuesday, April 17, 2012)]
[Rules and Regulations]
[Pages 22671-22676]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-9148]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

32 CFR Part 183

[DOD-2009-OS-0039; RIN 0790-AI55]


Defense Support to Special Events

AGENCY: Department of Defense.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This rule establishes procedures and assigns responsibilities 
for Special Events, sets forth procedural guidance for the execution of 
Special Events support when requested by civil authorities or 
qualifying entities and approved by the appropriate DoD authority, or 
as directed by the President, within the United States, including the 
District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin 
Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana 
Islands, and any other territory or possession of the United States or 
any political subdivision thereof and elsewhere if properly approved.

DATES: This rule is effective May 17, 2012.

FOR FURTHER INFORMATION CONTACT: Ms. Carol Corbin, 571-256-8319.

SUPPLEMENTARY INFORMATION: The Department of Defense published a 
proposed rule on November 26, 2010 (75 FR 72767-72771). One comment was 
received and addressed below:
    Comment: ``This comment pertains to Page 72770, Section A(iiii)G 
reference to DOD support to the ``National Boy Scout Jamboree''. 
Recommend that DOD not support this event. The Boy Scouts of America 
are an organization that discriminates based on sex, sexual 
orientation, and religion. DOD support is contrary to policies of state 
governments and the federal government. Material support is against the 
general principle of separation of church and state and the important 
elements of the constitution of the United States. DOD support 
essentially demonstrates an ``establishment of religion'' and is 
contrary to anti-discrimination policys [sic].''
    Response: The Department of Defense has valid statutory authority, 
10 U.S.C. 2554, for providing support to the Boy Scout jamboree.

Executive Order 12866, ``Regulatory Planning and Review'' and Executive 
Order 13563, ``Improving Regulation and Regulatory Review''

    It has been certified that 32 CFR Part 183 does not:
    (1) Have an annual effect on the economy of $100 million or more or 
adversely affect in a material way the economy, a section of the 
economy, productivity, competition, jobs, the environment, public 
health or safety, or State, local, or tribal governments or 
communities;
    (2) Create a serious inconsistency or otherwise interfere with an 
action taken or planned by another agency;
    (3) Materially alter the budgetary impact of entitlements, grants, 
user fees, or loan programs, or the rights and obligations of 
recipients thereof; or
    (4) Raise novel legal or policy issues arising out of legal 
mandates, the President's priorities, or the principles set forth in 
these Executive Orders.

Sec. 202, Pub. L. 104-4, ``Unfunded Mandates Reform Act''

    It has been certified that 32 CFR part 183 does not contain a 
Federal mandate that may result in the expenditure by State, local, and 
tribal governments, in aggregate, or by the private sector, of $100 
million or more in any one year.

Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601 et 
seq.)

    It has been certified that 32 CFR part 183 is not subject to the 
Regulatory Flexibility Act (5 U.S.C. 601 et seq.) because it would not, 
if promulgated, have a significant economic impact on a substantial 
number of small entities. This rule establishes procedures and assigns 
responsibilities within DoD for Special Events in support of civil and 
non-governmental entities; therefore, it is not expected that small 
entities will be affected because there will be no economically 
significant regulatory requirements placed upon them.

Public Law 96-511, ``Paperwork Reduction Act'' (44 U.S.C. Chapter 35)

    It has been certified that 32 CFR part 183 does not impose 
reporting or recordkeeping requirements under the Paperwork Reduction 
Act of 1995.

Executive Order 13132, ``Federalism''

    It has been certified that 32 CFR part 183 does not have federalism 
implications, as set forth in Executive Order 13132. This rule does not 
have substantial direct effects on:
    (1) The States;
    (2) The relationship between the national government and the 
States; or
    (3) The distribution of power and responsibilities among the 
various levels of government.

List of Subjects in 32 CFR Part 183

    Armed forces, Special events.

    Accordingly, 32 CFR part 183 is added to subchapter I to read as 
follows:

PART 183--DEFENSE SUPPORT OF SPECIAL EVENTS

Sec.
183.1 Purpose.
183.2 Applicability and scope.
183.3 Definitions.
183.4 Policy.
183.5 Responsibilities.
183.6 Procedures.

     Authority: 2 U.S.C. 1966, 2 U.S.C. 1970, 10 U.S.C. 372-374, 10 
U.S.C. 377, 10 U.S.C. 2012, 10 U.S.C. 2553-2555, 10 U.S.C. 2564, 18 
U.S.C. 1385, 18 U.S.C. 3056, 31 U.S.C. 1535-1536, 32 U.S.C. 502, 32 
U.S.C. 508, Pub. L. 94-524, and Section 5802 of Pub. L. 104-208, as 
amended.


Sec.  183.1.  Purpose.

    This part:

[[Page 22672]]

    (a) Establishes DoD policy, assigns responsibilities, and provides 
procedures for support of civil authorities and qualifying entities 
during the conduct of special events in accordance with the authority 
in DoD Directive (DoDD) 5111.1 (see http://www.dtic.mil/whs/directives/
corres/pdf/511101p.pdf) and the Deputy Secretary of Defense Memorandum, 
``Delegations of Authority,'' November 30, 2006 (available by written 
request to Deputy Secretary of Defense, 1010 Defense Pentagon, 
Washington, DC 20301-1010). This support will be referred to as 
``support of special events.''
    (b) Implements provisions of DoDD 5111.1; the Deputy Secretary of 
Defense Memorandum, ``Delegations of Authority,'' November 30, 2006; 
title 2, United States Code (U.S.C.), sections 1966 and 1970; title 10, 
U.S.C., sections 372-374, 377, 2012, 2553-2555, and 2564; title 18, 
U.S.C. sections 1385 and 3056; title 31, U.S.C., sections 1535-1536; 
title 32, U.S.C., sections 502 and 508; Public Law 94-524; Section 5802 
of Public Law 104-208, as amended; and title 32, Code of Federal 
Regulations (CFR) part 185, addressing matters pertaining to Defense 
Support of Civil Authorities (DSCA) for special events, including 
support for qualifying entities.


Sec.  183.2.  Applicability and scope.

    (a) Applies to the Office of the Secretary of Defense (OSD), the 
Military Departments, the Office of the Chairman of the Joint Chiefs of 
Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of 
the Inspector General of the Department of Defense, the Defense 
Agencies, the DoD Field Activities, National Guard personnel providing 
support of special events in title 32, U.S.C., status, and all other 
organizational entities in DoD (hereinafter referred to collectively as 
the ``DoD Components'').
    (b) Does not apply to installation commanders or Heads of DoD 
Components providing localized support to a special event solely under 
the auspices of community relations, public outreach, or recruitment 
efforts pursuant to DoDD 5410.18 (see http://www.dtic.mil/whs/directives/
corres/pdf/541018p.pdf) and DoD Instruction (DoDI) 5410.19 
(see http://www.dtic.mil/whs/directives/corres/pdf/541019p.pdf) or 
other similar authority.


Sec.  183.3.  Definitions.

    Unless otherwise noted, these terms and definitions are for the 
purpose of this part only.
    Civil Authorities. Defined in Joint Publication 1-02 (see http://www.
dtic.mil/doctrine/new_pubs/jp1_02.pdf.)
    Integrated Federal Support Overview (IFSO). A collaborative effort 
of the Special Events Working Group. The purpose of the IFSO is to 
inform the Secretary of Homeland Security and other appropriate senior 
Federal officials, including the Federal coordinator for the special 
event, of all the Federal activities and support in preparation for and 
execution of a special event. The IFSO facilitates the Federal 
coordinator's ability to lead a unified coordination group initially in 
case of an incident to support the Secretary of Homeland Security's 
incident management responsibilities. It also educates Federal 
interagency partners on Federal resources committed to the special 
event.
    National Special Security Event (NSSE). An event of national 
significance as determined by the Secretary of Homeland Security. These 
national or international events, occurrences, contests, activities, or 
meetings, which, by virtue of their profile or status, represent a 
significant target, and therefore warrant additional preparation, 
planning, and mitigation efforts. The USSS, FBI, and FEMA are the 
Federal agencies with lead responsibilities for NSSEs; other Federal 
agencies, including DoD, may provide support to the NSSE if authorized 
by law.
    NSSE Executive Steering Committee. Established when the Secretary 
of Homeland Security designates a specific event to be an NSSE. The 
group, led by the USSS, comprises Federal, State, and local public 
safety and security officials whose primary responsibility is to 
coordinate and develop a specific security plan for the designated 
NSSE.
    Qualifying entity. A non-governmental organization to which the 
Department of Defense may provide assistance by virtue of statute, 
regulation, policy, or other approval by the Secretary of Defense or 
his or her authorized designee.
    Special event. An international or domestic event, contest, 
activity, or meeting, which by its very nature, or by specific 
statutory or regulatory authority, may warrant security, safety, and 
other logistical support or assistance from the Department of Defense. 
Event status is not determined by the Department of Defense, and 
support may be requested by either civil authorities or non-
governmental entities. Support provided may be reimbursable.
    Special Event Working Group. A single forum designed to ensure 
comprehensive and coordinated Federal interagency awareness of, and 
appropriate support to, special events. The Special Event Working Group 
is co-chaired by representatives from DHS (including the USSS and FEMA) 
and the FBI, and comprises representatives from more than 40 Federal 
departments and agencies, including the Department of Defense, the 
Departments of Homeland Security, Justice, State, Energy, Labor, Health 
and Human Services, and Commerce, the Office of the Director of 
National Intelligence, and the Environmental Protection Agency. The 
Department of Defense representative on the Special Event Working Group 
is designated by the Assistant Secretary of Defense for Homeland 
Defense and Americas' Security Affairs (ASD(HD&ASA)).


Sec.  183.4.  Policy.

    It is DoD policy that:
    (a) DoD capabilities may be used to provide support for 
international and domestic special events as authorized by law and DoD 
policy. DoD resources in support of special events may be provided only 
after the resources of all other relevant governmental and non-
governmental entities are determined not to be available, unless there 
is a statutory exception or the Department of Defense is the only 
source of specialized capabilities. DoD support should not be provided 
if use of commercial enterprises would be more appropriate.
    (b) DoD Components shall provide support to civil authorities or 
qualifying entities for special events only as authorized in this part.
    (c) The Department of Defense may support such events with 
personnel, equipment, and services in accordance with applicable laws, 
regulations, and interagency agreements. Most support shall be provided 
on a non-interference basis, with careful consideration given to 
effects on readiness and current operations. Support for National 
Special Security Events (NSSEs) shall be in accordance with National 
Security Presidential Directive-46/Homeland Security Presidential 
Directive-15, Annex II.
    (d) DoD security and safety-related support for an event shall have 
priority over logistics assistance. However, logistics assistance may 
be provided if deemed appropriate and necessary, consistent with 
applicable statutes and policy guidance.
    (e) Funding for special events is subject to the following:
    (1) The Department of Defense may receive separate funding or 
authority to provide support to specific special events.

[[Page 22673]]

    (2) Support of special events for which the Department of Defense 
does not receive appropriations or for which DoD funds are not 
available for such support must be approved by the Secretary of Defense 
and must be provided on a reimbursable basis in accordance with title 
10, U.S.C., sections 377, 2553-2555, and 2564; title 31, U.S.C., 
sections 1535-1536; or other applicable statutes.
    (3) Reimbursement for DoD support provided to civilian law 
enforcement agencies during special events is required, in accordance 
with title 10 U.S.C. 377, unless the Secretary of Defense elects to 
waive reimbursement after determining that the support:
    (i) Is provided in the normal course of military training or 
operations; or
    (ii) Results in a benefit to the personnel providing the support 
that is substantially equivalent to that which would otherwise be 
obtained from military operations or training.
    (4) The DoD will provide support to NSSEs in accordance with HSPD 
15/NSPD 46, as authorized by law and policy.
    (5) Security and safety of special events are responsibilities 
shared by Federal, State, and local authorities. If Federal funds will 
be provided to State or local authorities to offset the costs of 
enhanced security and public safety for special events and if State or 
local officials request the employment of National Guard personnel in a 
Federal pay status, States shall be encouraged to use those funds to 
employ those National Guard personnel in a State pay status or to 
reimburse the Department of Defense for costs related to the employment 
of the National Guard personnel in a Federal pay status.
    (f) DoD support of special events that includes support to civilian 
law enforcement officials must comply with DoDD 5525.5 (see 
http://www.dtic.mil/whs/directives/corres/pdf/552505p.pdf).
    (g) DoD support of special events that includes support to civilian 
intelligence officials must comply with DoD 5240.1-R (see 
http://www.dtic.mil/whs/directives/corres/pdf/524001r.pdf).


Sec.  183.5.  Responsibilities.

    (a) The Under Secretary of Defense for Policy (USD(P)) shall 
establish policy for and facilitate the interagency coordination of 
special events with Federal, State, and local agencies, and qualifying 
entities and the DoD Components, as required.
    (b) The ASD(HD&ASA), under the authority, direction, and control of 
the USD(P), shall:
    (1) In coordination with the CJCS, oversee the management and 
coordination of DoD support of special events including events covered 
under title 10, U.S.C., section 2564.
    (2) Serve as the principal civilian advisor to the Secretary of 
Defense and the USD(P) on DoD support of special events.
    (3) In accordance with DoDD 5111.13 (see 
http://www.dtic.mil/whs/directives/corres/pdf/511113p.pdf), 
approve requests for assistance 
from civil authorities and qualifying entities for DoD support of 
special events. Such requests shall be coordinated with appropriate 
offices within OSD, with the CJCS, and with the heads of appropriate 
DoD Components. The ASD(HD&ASA) will immediately notify the Secretary 
of Defense and the USD(P) when this authority is exercised.
    (4) Coordinate, or consult on, special event support policy with 
other Federal departments and agencies (which may include the 
Department of Homeland Security (DHS), the Federal Bureau of 
Investigation (FBI), the U.S. Secret Service (USSS), and the Federal 
Emergency Management Agency (FEMA)) and with other qualifying entities 
as appropriate.
    (5) Develop, coordinate, and oversee the implementation of DoD 
support of special events.
    (6) Through the CJCS, monitor the activation, deployment, and 
employment of DoD personnel, facilities, and other resources involved 
in DoD support of special events.
    (7) Coordinate DoD support of special events with the General 
Counsel of the Department of Defense (GC, DoD) and the Under Secretary 
of Defense (Comptroller)/Chief Financial Officer, Department of Defense 
(USD(C)/CFO).
    (8) Coordinate with the Assistant Secretary of Defense for Public 
Affairs (ASD(PA)) to ensure that information relating to DoD support of 
special events receives appropriate dissemination using all approved 
media.
    (9) Represent the Department of Defense regarding special events to 
other Federal departments and agencies, State and local authorities, 
and qualifying entities, including designating the Department of 
Defense representatives for the working groups identified in Sec.  
183.6(b) of this part.
    (10) Manage, in conjunction with the USD(C)/CFO, the Support for 
International Sporting Competitions (SISC) Defense Account.
    (11) In accordance with section 5802 of Public Law 104-208, as 
amended, notify the congressional defense committees of DoD plans to 
obligate funds in the SISC Defense Account.
    (12) In accordance with title 10 U.S.C. 2564, submit an annual 
report to Congress, no later than January 30 of each year following a 
year in which the Department of Defense provides assistance under title 
10 U.S.C. 2564, detailing DoD support to certain sporting competitions.
    (c) The Under Secretary of Defense for Personnel and Readiness 
(USD(P&R)) shall coordinate on DoD support of special events and, in 
coordination with the CJCS, provide advice regarding the effect the 
requested support will have on readiness and military operations.
    (d) The USD(C)/CFO shall:
    (1) Coordinate on DoD support of special events, and provide advice 
regarding the effect on the DoD budget and on DoD financial resources.
    (2) Maintain the SISC Defense Account in conjunction with the 
ASD(HD&ASA).
    (e) The Under Secretary of Defense for Acquisition, Technology, and 
Logistics (USD(AT&L)) shall coordinate on DoD logistical support of 
special events.
    (f) The GC, DoD shall coordinate and provide legal counsel on DoD 
support of special events.
    (g) The ASD(PA) shall provide policy guidance and review, 
coordinate, and approve requests for ceremonial and entertainment 
support for special events covered by this part, in accordance with 
DoDD 5410.18 (see 
http://www.dtic.mil/whs/directives/corres/pdf/541018p.pdf), DoDI 5410.19 
(see http://www.dtic.mil/whs/directives/corres/pdf/541019p.pdf) and DoDD 
5122.05 (see http://www.dtic.mil/whs/directives/corres/pdf/512205p.pdf).
    (h) The Heads of the DoD Components shall:
    (1) Designate and maintain an office of primary responsibility 
(OPR) for special events or a special events coordinator, and provide 
that OPR designation and contact information to the CJCS within 60 days 
of the publication of this part. Changes to OPR designation and contact 
information shall be provided to the CJCS within 30 days of the change.
    (2) Provide personnel, equipment, and support of special events as 
directed.
    (3) Ensure that personnel supporting special events comply with 
applicable antiterrorism and force protection training and standards.
    (4) Provide other support of special events as directed.
    (i) The CJCS shall:
    (1) Provide planning guidance to DoD Components for all special 
events for which DoD support may require the employment of military 
forces or centralized command and control.
    (2) Review all requests for DoD support of special events and, in 
coordination with the USD(P&R),

[[Page 22674]]

provide advice on the effect that the requested support will have on 
readiness and military operations.
    (3) Prepare, staff, and issue orders and messages on DoD support of 
special events that has been approved by authorized DoD officials.
    (4) Issue guidance to the Combatant Commanders on the 
implementation of this part.
    (5) Process requests for DoD support of special events.
    (6) Maintain sufficient staff to manage the day-to-day operational 
aspects of DoD support of special events.
    (7) Manage and maintain equipment that is procured to support DoD 
special events.
    (i) Establish and operate a system for delivering DoD assets to 
authorized recipients and for recovering loaned assets at the 
conclusion of the event.
    (ii) Ensure the civil authorities and qualifying entities 
authorized to accept DoD assets provide a surety bond or other suitable 
insurance protection to cover the cost of lost, stolen, or damaged DoD 
property.
    (iii) Plan and program for the life-cycle replacement of special 
events equipment procured under title 10 U.S.C. 2553, 2554, and 2564.
    (iv) Procure goods and services through contracting, when necessary 
and authorized by law.
    (8) Administer the expenditure of appropriated funds, and ensure 
that the Department of Defense is reimbursed for its support of special 
events when required by law or DoD policy.
    (i) With the assistance of the DoD Components, provide cost 
estimates of DoD support to a special event that is under consideration 
for approval.
    (ii) Upon approval, administer the execution of funding for DoD 
support of special events.
    (iii) At the conclusion of DoD support to a special event, collect 
and provide a financial accounting for all DoD funds expended in 
support of that special event.
    (9) Establish and maintain effective liaison with DoD Components 
for the timely exchange of information about special event projects.
    (10) Provide other support of special events as directed.
    (j) The Chief, National Guard Bureau (NGB), under the authority, 
direction, and control of the Secretary of Defense through the 
Secretary of the Army and the Secretary of the Air Force, shall:
    (1) Serve as the channel of communications for all matters 
pertaining to the National Guard between DoD Components and the States 
in accordance with DoDD 5105.77 (see 
http://www.dtic.mil/whs/directives/corres/pdf/510577p.pdf).
    (2) Report National Guard special event support of civil 
authorities or qualifying entities when using Federal resources, 
equipment, or funding to the National Joint Operations and Intelligence 
Center.
    (3) Serve as an advisor to the Combatant Commanders on National 
Guard matters pertaining to the combatant command missions, and support 
planning and coordination for DoD support of special events as 
requested by the CJCS or the Combatant Commanders.
    (4) Ensure that National Guard appropriations are appropriately 
reimbursed for special event activities.
    (5) Advocate for needed special event capabilities.
    (6) Develop, in accordance with DoDD 5105.77 and in coordination 
with the Secretaries of the Army and Air Force and the ASD(HD&ASA), 
guidance regarding this part as it relates to National Guard matters.


Sec.  183.6.  Procedures.

    (a) General Provisions. (1) This section provides the basic 
procedures for DoD support to special events.
    (2) As appropriate, amplifying procedures regarding DoD support to 
special events shall be published separately and maintained by the 
Office of the ASD(HD&ASA) and released as needed in the most effective 
medium consistent with DoD Directive 8320.02 (see 
http://www.dtic.mil/whs/directives/corres/pdf/832002p.pdf).
    (b) Special Event Process. (1) Engagement. (i) Engagement may be 
initiated by the Department of Defense, civil authorities, or 
qualifying entities. If the initial engagement is not a written request 
for assistance (RFA), representatives of the ASD(HD&ASA) and the Joint 
Staff will confer to determine actual requirements.
    (ii) Engagement may involve informational briefings and meetings 
between DoD representatives and special event organizers, civil 
authorities, or qualifying entities. These informal engagements may 
result in non-DoD entities submitting an RFA to the DoD Executive 
Secretary, requesting DoD support for a special event.
    (iii) Once an RFA is received, it will be sent to the ASD(HD&ASA) 
and the CJCS simultaneously for staffing and recommendation. Additional 
engagement with the requestor may be required to quantify the scope and 
magnitude of the support requested.
    (2) Planning. (i) The direction and focus of DoD special-event 
planning will depend on the nature of the event and scope and magnitude 
of the support requested or anticipated. International events may 
require additional planning, procedures, and coordination with the 
government of the host country.
    (ii) For National Special Security Events (NSSEs) and events that 
may require the employment of military forces and centralized command 
and control, the CJCS will issue a planning order requesting a 
Combatant Commander to initiate planning and notify potential 
supporting commands or organizations and the Chief, NGB, as 
appropriate. When possible, established CJCS-directed planning 
procedures will be used for the Combatant Commander to provide an 
assessment and request for forces.
    (A) The NSSE designation process generally is initiated by a formal 
written request to the Secretary of Homeland Security by the State or 
local government hosting the event. In other situations where the event 
is federally sponsored, an appropriate Federal official will make the 
request.
    (B) Once the request is received by DHS, the USSS and the FBI will 
send an NSSE questionnaire to the responsible host official for 
completion. The request, completed questionnaires, and other supporting 
information are reviewed by the NSSE Working Group (which includes a 
non-voting DoD member), which provides a recommendation to the 
Secretary of Homeland Security regarding NSSE designation.
    (C) The Secretary of Homeland Security makes the final 
determination to designate an event as an NSSE pursuant to Homeland 
Security Presidential Directive 7 (see 
http://www.gpo.gov/fdsys/pkg/PPP-2003-book2/pdf/PPP-2003-book2-doc-pg1739.pdf).
    (iii) There are numerous events where DoD support should be 
anticipated and a planning order issued to the appropriate Combatant 
Commander. These include, but are not limited to:
    (A) The President's State of the Union Address or other addresses 
to a Joint Session of Congress.
    (B) Annual meetings of the United Nations General Assembly.
    (C) National Presidential nominating conventions.
    (D) Presidential inaugural activities.
    (E) International summits or meetings.
    (F) State funerals.
    (G) The National Boy Scout Jamboree.
    (H) Certain international or domestic sporting competitions.
    (iv) There are other events that the Department of Defense supports 
that do not involve the assignment of military forces or centralized 
command and control by Combatant Commanders, which include planning 
requirements

[[Page 22675]]

by the host organizations. These include, but are not limited to:
    (A) Military Department or Service-sponsored events, such as:
    (1) The Marine Corps Marathon.
    (2) The Army 10-Miler.
    (3) Navy Fleet Weeks.
    (4) Installation or Joint Service Open Houses.
    (5) Service or Joint Air Shows.
    (B) Community relations activities authorized in accordance with 
DoDI 5410.19.
    (v) The Department of Defense may provide support to certain 
sporting events that are included under subsection (c) of section 2564 
of title 10, U.S.C., by providing technical, contracting, and 
specialized equipment support. These events may be funded by the SISC 
Defense Account pursuant to title 10 U.S.C. 2564 and include:
    (A) The Special Olympics.
    (B) The Paralympics.
    (C) Sporting events sanctioned by the United States Olympic 
Committee (USOC) through the Paralympic Military Program.
    (D) Other international or domestic Paralympic sporting events that 
are held in the United States or its territories, governed by the 
International Paralympic Committee, and sanctioned by the USOC:
    (1) For which participation exceeds 100 amateur athletes.
    (2) In which at least 10 percent of the athletes participating in 
the sporting event are either members or former members of U.S. 
Military Services who are participating in the sporting event based 
upon an injury or wound incurred in the line of duty or veterans who 
are participating in the sporting event based upon a service-connected 
disability.
    (vi) Planning for DoD support to the Olympics and certain other 
sporting events requires additional considerations.
    (A) Subsections (a) and (b) of section 2564 of title 10, U.S.C., 
authorize the Secretary of Defense to provide assistance for the 
Olympics and certain other sporting events. Unless the event meets the 
specific requirements stated in paragraph (b)(2)(v) of this section, 
the Attorney General must certify that DoD security and safety 
assistance is necessary to meet essential security and safety needs of 
the event.
    (B) The Department of Defense, led by the ASD(HD&ASA), will 
collaborate with the CJCS, the Department of Justice, including the 
FBI, and other appropriate DoD Components and Federal departments or 
agencies, usually as part of a Joint Advisory Committee (JAC), to 
provide a recommendation to the Attorney General on what categories of 
support the Department of Defense may be able to provide to meet 
essential security and safety needs of the event.
    (C) Support other than safety and security may be authorized for 
sporting events, but only to the extent that:
    (1) Such needs cannot reasonably be met by a source other than the 
Department of Defense.
    (2) Such assistance does not adversely affect military 
preparedness.
    (3) The requestor of such assistance agrees to reimburse the 
Department of Defense, in accordance with the provisions of title 10 
U.S.C. 377, 2553-2555, and 2564; title 31 U.S.C. 1535-1536; and other 
applicable provisions of law.
    (vii) Types of support that the Department of Defense can provide 
include, but are not limited to:
    (A) Aviation.
    (B) Communications (e.g., radios, mobile telephones, signal 
integrators).
    (C) Security (e.g., magnetometers, closed-circuit televisions, 
perimeter alarm systems, undercarriage inspection devices).
    (D) Operations and Command Centers (e.g., design and configuration, 
video walls).
    (E) Explosive ordnance detection and disposal (technical advice, 
explosive ordnance disposal teams, explosive detector dog, dog teams).
    (F) Logistics (transportation, temporary facilities, food, 
lodging).
    (G) Ceremonial support (in coordination with the ASD(PA)).
    (H) Chemical, biological, radiological, and nuclear threat 
identification, reduction, and response capabilities.
    (I) Incident response capabilities (in coordination with the 
Department of Justice, DHS, the Department of Health and Human 
Services, and in consultation with appropriate State and local 
authorities).
    (viii) DoD personnel support of special events is provided using a 
total force sourcing solution that may include Active Duty and Reserve 
Component military personnel, DoD civilian personnel, and DoD 
contractor personnel. The Department of Defense also may decide to 
respond to requests for assistance by approving, with the consent of 
the Governor(s) concerned, National Guard forces performing duty 
pursuant to title 32 U.S.C. 502.
    (A) National Guard personnel conducting support of special events 
while on State active duty, at the direction of their Governor or 
Adjutant General, are not considered to be providing DoD support of 
special events.
    (B) This part does not limit or affect Department of Defense and 
National Guard personnel volunteering to support special events during 
their non-duty time. This volunteer support is not considered as part 
of DoD support of special events. Volunteers are prohibited from 
obligating or using DoD resources to support a special event while in a 
volunteer status except as authorized by separate statute or authority.
    (3) Coordination. (i) Coordination of DoD support of special events 
will likely take place simultaneously with engagement and planning; 
operate across the full spectrum of strategic, operational, and 
tactical levels; and occur internally among DoD Components and 
externally with supported civil authorities and qualifying entities.
    (A) Policy coordination at the departmental level between the 
Department of Defense and other Federal departments or agencies is the 
responsibility of the ASD(HD&ASA). Other DoD Components may send 
representatives to these meetings with the prior concurrence of the 
ASD(HD&ASA). Standing departmental-level special events coordination 
meetings include:
    (1) USSS-led NSSE Working Group.
    (2) DHS-led Special Events Working Group.
    (3) Department of State, Bureau of Diplomatic Security-led 
International Sporting Event Group.
    (B) Coordination within the Department of Defense is led by the 
ASD(HD&ASA) and is facilitated by the CJCS for the Combatant Commands 
and other joint commands and by other DoD Component Heads for their 
constituent elements.
    (C) The CJCS will work with the Military Service Chiefs, the Chief 
of the National Guard Bureau, and the Heads of DoD Components when 
subject matter expertise is needed for the event organizers. This will 
be based upon location and other criteria, as needed.
    (ii) Inputs to the DHS-produced Integrated Federal Support Overview 
(IFSO) will be solicited by the CJCS and sent to the ASD(HD&ASA) for 
consolidation and deconfliction prior to final submission to DHS. DoD 
Component Heads not tasked by the Joint Staff will submit their input 
directly to the ASD(HD&ASA).
    (iii) RFAs for DoD support will adhere to the following:
    (A) An RFA for DoD support to a special event may be made by 
Federal, State, or local civil authorities, or by qualifying entities.
    (B) RFAs will be in writing and addressed to the Secretary of 
Defense, the Deputy Secretary of Defense, or the

[[Page 22676]]

DoD Executive Secretary, 1000 Defense, Pentagon, Washington, DC 20301-
1000. DoD Components who receive RFAs directly from the requestor will 
immediately forward them to the DoD Executive Secretary for 
disposition, distribution, and tracking.
    (C) At a minimum, the RFA will be distributed to the ASD(HD&ASA) 
and the CJCS for staffing and recommendation. If the RFA is for a 
single capability for which a DoD Component is the OPR or serves as a 
DoD Executive Agent, the RFA is sent to that Component for action with 
an information copy provided to the ASD(HD&ASA) and the CJCS.
    (D) Vetting of RFAs will be in accordance with the DoD Global Force 
Management process and consistent with criteria published in DoD 
8260.03-M, Volume 2 (see 
http://www.dtic.mil/whs/directives/corres/pdf/826003m_vol2.pdf).
    (E) Heads of DoD Components will consult with the DoD Executive 
Secretary on which DoD official will communicate DoD special event 
support decisions to the requesting authorities.
    (4) Execution. Execution of DoD support of special events is a 
shared responsibility. The scope and magnitude of the support being 
provided will determine the OPR and level of execution.
    (i) When joint military forces or centralized command and control 
of DoD support to a special event are anticipated or required, a 
Combatant Commander may be identified as the supported commander in a 
properly approved order issued by the CJCS. The designated Combatant 
Command shall be the focal point for execution of DoD support to that 
special event with other DoD Components in support. Reporting 
requirements shall be in accordance with the properly approved order 
issued by the CJCS and standing business practices.
    (ii) When there are no joint military forces required and there is 
no need for centralized command and control, DoD support of special 
events shall be executed by the CJCS or the Head of a DoD Component, as 
designated in a properly approved order or message issued by the CJCS. 
Oversight of DoD support will be provided by the ASD(HD&ASA).
    (iii) As described in the Joint Action Plan for Developing Unity of 
Effort, when Federal military forces and State military forces are 
employed simultaneously in support of civil authorities in the United 
States, appointment of a dual-status commander is the usual and 
customary command and control arrangement. Appointment of a dual-status 
commander requires action by the President and the appropriate Governor 
(or their designees).
    (5) Recovery. (i) Durable, non-unit equipment procured by the 
Department of Defense to support a special event shall be retained by 
the CJCS for use during future events in accordance with Sec.  
183.5(i)(7) of this part.
    (ii) An after-action report shall be produced by the Combatant 
Command or OPR and sent to the ASD(HD&ASA) and the CJCS within 60 days 
of completion of the event.

    Dated: April 6, 2012.
Patricia L. Toppings,
OSD Federal Register Liaison Officer, Department of Defense.
[FR Doc. 2012-9148 Filed 4-16-12; 8:45 am]
BILLING CODE 5001-06-P


Alien Species – Full Movie

A fleet of UFOs is circling the Earth and a top scientist races to discover their true intentions for the planet. When the UFOs begin an attack on Earth, the scientist finds himself thrown in with a sheriff and his deputies transporting some prisoners to jail. The unlikely group is forced to seek shelter from the attack in a nearby cave, not knowing how significant the location is to the alien’s plans.

Frankenstein (1910) – Full Movie

Frankenstein is a 1910 film made by Edison Studios that was written and directed by J. Searle Dawley. It was the first motion picture adaptation of Mary Shelley’s Frankenstein. The unbilled cast included Augustus Phillips as Dr. Frankenstein, Charles Ogle as the Monster, and Mary Fuller as the doctor’s fiancée.

Shot in three days, it was filmed at the Edison Studios in the Bronx, New York City. Although some sources credit Thomas Edison as the producer, he in fact played no direct part in the activities of the motion picture company that bore his name.

Julian Assange – Wikileaks, Free Speech And Assange’s Message To Australia

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

Up-Date: Press Release against convicted serial criminals : Statement of Magister Bernd Pulch, heir of the family bible for himself and the Pulch family

Become a Patron!
True Information is the most valuable resource and we ask you to give back.

My name is Bernd Pulch, I have studied and acquired the title Master (Magister) according to the academic laws.
Link to my Master’s thesis
http://www.kepplinger.de/search/node/pulch
and
http://www.kepplinger.de/node/50

I am the heir of the family bible and can therefore represent our family based on this authority .

Our family has and had many members who work and worked successfully as entrepreneurs, secretaries of state, banker, lawyers, farmers, politicians and also journalists.

We will prevent that our family name is violated by convicted criminals, cybermurderers and Neo-Nazis as well as former Stasi-Agents like the notorious”GoMoPa” which leaders have and had numerous convictions and stayed many years in jail.
The cybermurderers were hired to fight for criminal fraudsters and to cover their fraud. Now they even copy our documents and the documents of Meridian Capital to confuse our readers.

This will not work.

In order to keep my family safe we will not publish any private data as we have evidence that these people did in fact execute a murder.

The German journalist Heinz Gerlach died several months ago under strange circumstances and we believe that it is very strange that this happened at the same time when he published his informations against “GoMoPa” and ther backers.

Furthermore there is significant evidence that the circumstances of his death and the methods of “GoMoPa” are connected to the former Eastern-German Communist Terror Organisation “Stasi” as many of their victims can witness.

See
http://sjb-fonds-opfer.com/?page_id=11764

I will therefore prosecute these criminals with no mercy until their very end..

.
Magister Bernd Pulch
London

Jean-Jacques Rousseau and Social Contract – Rey Ty

Become a Patron!
True Information is the most valuable resource and we ask you to give back.