Eva Braun dans l’intimité d’Hitler – TV

 

Eva Braun fut la maîtresse d’Adolf Hitler de 1932 à leur suicide commun en avril 1945. De 1937 à 1944, elle tourne des films amateurs au chalet d’Hitler, le Berghof, dans les Alpes Bavaroises, véritable centre de décision du nazisme, où il aimait recevoir son entourage. Des images en couleur qui nous font entrer dans l’intimité du Führer et les coulisses du IIIème Reich. Pour la première fois, ces documents historiques ont été réunis dans un documentaire qui porte un regard unique sur la vie privée et les crimes publics du dictateur allemand…

Nuremberg Trials – Full Movie

Relive the gripping events of the tribunal that gave birth to the trial procedure paradigm for decades of state criminal cases as rare archival materials and firsthand accounts combine to offer a compelling account of the historical Nuremburg trials. When former head of the Nazi Air Force Hermann Goring and other surviving members of the Nazi elite went on trial on November 20, 1945, the world watched with bated breath to witness the outcome of the groundbreaking case. Charged with the murder of millions of innocent civilians and set before the world to face judgment, the Nuremburg Trials offered a brief glimmer of justice to those lives had been affected by Hitler’s atrocities, and in this release history buffs are afforded a closer look than ever before at the trial that held the attention of an entire planet.

 

TOP-SECRET from the FBI – Former BP Engineer Arrested for Obstruction of Justice in Connection with the Deepwater Horizon Criminal Investigation

WASHINGTON—Kurt Mix, a former engineer for BP plc, was arrested today on charges of intentionally destroying evidence requested by federal criminal authorities investigating the April 20, 2010 Deepwater Horizon disaster, announced Attorney General Eric Holder; Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; U.S. Attorney Jim Letten of the Eastern District of Louisiana; and Kevin Perkins, Acting Executive Assistant Director for the FBI’s Criminal Cyber Response and Services Branch.

Mix, 50, of Katy, Texas, was charged with two counts of obstruction of justice in a criminal complaint filed in the Eastern District of Louisiana and unsealed today.

“The department has filed initial charges in its investigation into the Deepwater Horizon disaster against an individual for allegedly deleting records relating to the amount of oil flowing from the Macondo well after the explosion that led to the devastating tragedy in the Gulf of Mexico,” said Attorney General Holder. “The Deepwater Horizon Task Force is continuing its investigation into the explosion and will hold accountable those who violated the law in connection with the largest environmental disaster in U.S. history.”

According to the affidavit in support of a criminal complaint and arrest warrant, on April 20, 2010, the Deepwater Horizon rig experienced an uncontrolled blowout and related explosions while finishing the Macondo well. The catastrophe killed 11 men on board and resulted in the largest environmental disaster in U.S. history.

According to court documents, Mix was a drilling and completions project engineer for BP. Following the blowout, Mix worked on internal BP efforts to estimate the amount of oil leaking from the well and was involved in various efforts to stop the leak. Those efforts included, among others, Top Kill, the failed BP effort to pump heavy mud into the blown out wellhead to try to stop the oil flow. BP sent numerous notices to Mix requiring him to retain all information concerning Macondo, including his text messages.

On or about October 4, 2010, after Mix learned that his electronic files were to be collected by a vendor working for BP’s lawyers, Mix allegedly deleted on his iPhone a text string containing more than 200 text messages with a BP supervisor. The deleted texts, some of which were recovered forensically, included sensitive internal BP information collected in real-time as the Top Kill operation was occurring, which indicated that Top Kill was failing. Court documents allege that, among other things, Mix deleted a text he had sent on the evening of May 26, 2010, at the end of the first day of Top Kill. In the text, Mix stated, among other things, “Too much flowrate—over 15,000.” Before Top Kill commenced, Mix and other engineers had concluded internally that Top Kill was unlikely to succeed if the flow rate was greater than 15,000 barrels of oil per day (BOPD). At the time, BP’s public estimate of the flow rate was 5,000 BOPD—three times lower than the minimum flow rate indicated in Mix’s text.

In addition, on or about August 19, 2011, after learning that his iPhone was about to be imaged by a vendor working for BP’s outside counsel, Mix allegedly deleted a text string containing more than 100 text messages with a BP contractor with whom Mix had worked on various issues concerning how much oil was flowing from the Macondo well after the blowout. By the time Mix deleted those texts, he had received numerous legal hold notices requiring him to preserve such data and had been communicating with a criminal defense lawyer in connection with the pending grand jury investigation of the Deepwater Horizon disaster.

A complaint is merely a charge, and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt.

If convicted, Mix faces a maximum penalty of 20 years in prison and a fine of up to $250,000 as to each count.‪

The Deepwater Horizon Task Force, based in New Orleans, is supervised by Assistant Attorney General Breuer and led by Deputy Assistant Attorney General John D. Buretta, who serves as the director of the task force. The task force includes prosecutors from the Criminal Division and the Environment and Natural Resources Division of the Department of Justice; the U.S. Attorney’s Office for the Eastern District of Louisiana and other U.S. Attorneys’ Offices; and investigating agents from the FBI, Environmental Protection Agency, Department of Interior, U.S. Coast Guard, U.S. Fish and Wildlife Service, and other federal law enforcement agencies.

The task force’s investigation of this and other matters concerning the Deepwater Horizon disaster is ongoing.

The case is being prosecuted by task force Deputy Directors Derek Cohen and Avi Gesser of the Justice Department’s Criminal Division; task force prosecutors Assistant U.S. Attorney Richard Pickens, II of the Eastern District of Louisiana; and Assistant U.S. Attorney Scott Cullen of the Eastern District of Pennsylvania.

Confidential – Caderock Missile Battery Eyeball

Caderock Missile Battery

Eyeball

The site is the Navy’s David Taylor Model Basin of the Naval Surface Warfare Carderock Division.
http://maps.live.com/default.aspx?v=2&FORM=LMLTCP&cp=38.972693~-77.18664
&style=h&lvl=18&tilt=-90&dir=0&alt=-1000&scene=31360260&phx=0&phy=0&phscl=1&encType=1
[Image]
http://maps.live.com/default.aspx?v=2&FORM=LMLTCP&cp=qgvwwh8k0z6w&style=b&lvl=2&tilt=-90&dir=0&alt=-1000&scene=31360260&phx=0&phy=0&phscl=1&encType=1Looking North

[Image]

Looking East[Image]
Looking South[Image]
Looking West[Image]

 

The Hunt For Hitler HD – Full Movie

 

History’s Secrets : The Hunt for Adolf Hitler

” At the end of World War II, Adolf Hitler faced the reality of defeat and committed suicide in a Berlin bunker beneath the Reich Chancellery. Then his body mysteriously disappeared. The FBI spent years tracking false leads and sightings of Hitler. What happened to the German leader’s remains? Without remains, can we really be sure what became of the man? “

SECRET – Unveild by Cryptome – Washington Naval Yard Missile Battery Eyeball

Washington Naval Yard Missile Battery

Eyeball

[Image]Modified Humvee vehicles from the 1st Battalion 200th Air Defense Artillery of the New Mexico National Guard are shown Friday, July 30, 2004, at the unit’s headquarters in Roswell, N.M. About 200 Guard members soon will bolster air defenses near Washington, D.C., in these modified vehicles, carrying up to 288 Stinger missiles. Each Humvee has a turret with 8 missile launchers on top, and there are 36 of the vehicles to be used under the Avenger weapons system, Air Defense Artillery, Maj. Ken Nava said Friday. (AP Photo/Roswell Daily Record, Andrew Poertner) [Image]Modified Humvee vehicles from the 1st Battalion 200th Air Defense Artillery of the New Mexico National Guard are shown Friday, July 30, 2004, at the unit’s headquarters in Roswell, N.M. About 200 Guard members soon will bolster air defenses near Washington, D.C., in these modified vehicles, carrying up to 288 Stinger missiles. Each Humvee has a turret with 8 missile launchers on top, and there are 36 of the vehicles to be used under the Avenger weapons system, Air Defense Artillery, Maj. Ken Nava said Friday. (AP Photo/Roswell Daily Record, Andrew Poertner)
[Image]A military Humvee with an Avenger anti-aircraft missile launcher on top sits parked near the Pentagon Wednesday, Sept. 11, 2002. Defense Secretary Donald H. Rumsfeld ordered the launchers placed around Washignton as a “prudent precaution” on the first anniversary of the terrorist attack on the Pentagon. (AP Photo/J. Scott Applewhite) [Image]Security and construction underway to enhance security is seen on Capitol Hill Wednesday, Feb. 12, 2003. Avenger anti-aircraft missiles have been stationed around Washington, along with extra radars, and the Air Force has stepped up its combat air patrols over the capital. (AP Photo/Terry Ashe)
http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=washington,dc&sll=38.873927,-76.99204
&sspn=0.00043,0.002013&ie=UTF8&ll=38.874087,-76.991919&spn=0.001721,0.004026&t=h&z=19&iwloc=addr
http://maps.google.com/maps?f=q&source=s_q&hl=en&geocode=&q=washington,dc&sll=37.0625,-95.677068
&sspn=58.555544,90.175781&ie=UTF8&ll=38.873927,-76.99204&spn=0.00043,0.002013&t=h&z=20&layer=
c&cbll=38.87321,-76.991253&panoid=RiwZ5AN_ySCudUUM4skfYA&cbp=11,318.0434195361363,,2,-7.6240737092004585
[Image]

[Image]

[Image]

Looking Northhttp://maps.live.com/default.aspx?v=2&FORM=LMLTCP&cp=qgc3yb8khks1&style=o&lvl=2&tilt=-90&dir=0&alt=-1000&scene=31267496&phx=0&phy=0&phscl=1&encType=1

[Image]

Looking East[Image]
Looking South[Image]
Looking West[Image]

 


	

TOP-SECRET – U.S. Navy Fleet Telecommunications Procedures NTP-4 Echo

https://publicintelligence.net/wp-content/uploads/2012/04/USNavy-NTP4E.png

 

The focus of NTP-4 Echo (Naval Communications) is to provide a basic manual addressing C4I concepts and capabilities in the U.S. Navy. Due to increased proliferation of Information Technology (IT) within DoN and the high demand for information dominance within the battle space, the need for a “primary source” C4I document has never been greater. To that end, Naval Network Warfare Command initiated a major revision to this publication reflecting the latest C4I equipment/systems in use today. This document was developed through a collaborative effort with Fleet, Numbered Fleet, Type Commanders, and other components of the Naval Netwar Forcenet Enterprise (NNFE) and serves to meet the following objectives:

1. Outline Navy communications shore/afloat organization.
2. Identify automated systems ashore and afloat to support Navy messaging.
3. Provide guidance for message processing procedures.
4. Identify Communications Security (COMSEC) measures and controls.
5. Identify satellite communications capabilities, systems, and equipment.
6. Identify submarine communications capabilities, systems, and equipment.
7. Outline Navy communications ship/shore circuit modes of operation.
8. Identify Allied/coalition communications capabilities, systems, and equipment.
9. Identify collaboration tools for use on Navy/Joint enterprise networks.
10.Provide guidance for operating and defending afloat and shore network communications systems (to include Information Assurance Vulnerability Management (IAVM) and computer incident reporting).
11.Provide guidance for Communications Spot (COMSPOT) reporting.
12.Provide sample C4I drill packages (used in conjunction with FXP-3).

 

https://publicintelligence.net/wp-content/uploads/2012/04/milstars.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/ehf-coverage.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/inmarsat-coverage.png

Confidential from Cryptome – White House Missile Battery

Shepherd Johnson sends:I found the White House missile battery. It’s on top of the New Executive Office building.

“A rare glimpse of the missile battery on the roof of the “New Executive Office Building” [Eisenhower Executive Office Building], which is next to the White House, being checked by a soldier after a small airplane apparently strayed into restricted White House airspace in Washington, DC, USA 22 November 2010 – AP.” [AP has removed its photo of the battery from its archive, and apparently tracking down all postings of it to successfully demand removal.]

[Image]

[Image]

Missile battery on top of a U.S. government building is secured after the all clear is given following a White House lockdown in Washington, November 22, 2010. Reuters

[Image]
August 28, 2010 Google Earth

[Image]

http://www.emforum.org/vforum/lc051116.htmLet’s hypothesize that there is a surface-to-air missile battery (shown as a light blue symbol in the upper left) and that this battery is a method of protecting the annotated facilities. So knowledge of it might be “useful” to an adversary and the annotated image passes the “usefulness” test. On to the “uniqueness” part of the test.

[Image]
Source

It turns out, however, that the battery is not hypothetical and our geospatial data are not the only source of this information. In fact, as illustrated by the newspaper clippings, the information is quite well known and is readily observable. (If you’re ever walking north on 17th Street in front of the Old Executive Office Building, look up.) So the annotated image fails the “uniqueness” test and safeguards are not justified.

[Image]

 

Push – Full Feauture Film

Push is a 2009 American science fiction thriller film directed by Paul McGuigan. The film stars Chris Evans, Dakota Fanning, Camilla Belle, Cliff Curtis, Joel Gretsch and Djimon Hounsou. The film centers on a group of people born with various superhuman abilities who band together in order to take down a government agency that is using a dangerous drug to enhance their powers in hopes of creating an army of super soldiers.

narrator (Cassie) describes how people with psychic abilities have been involved with the United States government since 1945. Two “Movers”, Nick Gant and his father, are on the run from the “Division”. Realizing that escape is impossible, Nick’s father tells him of a vision he received from a “Watcher”; a girl will give him a flower and he is to help her in order to help all the people with powers. Nick’s father throws Nick into an air vent as Agent Henry Carver of the Division arrives. Nick’s father is killed.

10 years later, the American Division tests a power boosting drug on a “Pusher” (someone who can implant thoughts in others’ minds), named Kira. Hundreds of subjects died from the drug before her; she is the first to survive. Rendering the doctor unconscious, Kira steals his security clearance card and an augmentation drug-filled syringe and escapes.

In Hong Kong, Nick is hiding from the Division as an expatriate. He attempts to use his ability to make a living, but his poor skills at “moving” at a dice game leave him indebted to a local Triad controlled by “Bleeders”, bred by the now-defunct Chinese Division. A young girl named Cassie Holmes arrives at Nick’s apartment, explaining that she is a “Watcher” and that they are going to find a case containing 6 million dollars. They are attacked by Triad Bleeders but escape.

Nick and Cassie go to a nightclub on a hint from Cassie’s predictions. Nick sees an old friend, “Hook” Waters, who is a “Shifter”. He uses his abilities to make a replica of the clue in Cassie’s drawing and tells them to go to Emily Hu, a “Sniff” who can help them find Kira. Nick and Cassie find Kira, who had a romantic relationship with Nick. They recruit a “Shadow” named “Pinky” Stein to hide Kira from the “Sniffs”. Cassie finds the key in her shoe to a locker in which Kira hid a case. With the aid of Cassie’s visions, they piece together the events that led them to meet; Cassie’s mother used her visions to set a complex plan in motion that will destroy Division. Nick devises a plan that involves seven envelopes in which he places instructions; each person in the group is entrusted with one red envelope, and none are to be opened until the right time. While Kira and Pinky leave, Nick and Cassie share a goodbye. Cassie tells him to “take an umbrella, it’s going to rain”, he replies with “you be careful too”.

Nick uses a “Wiper” to erase his memories of the plan, ensuring that Watchers from both Division and the Triads will not be able to interfere. Hook retrieves the case, which has the syringe Kira stole, and brings it to Cassie. Hook shifts another case to match the case with the syringe. Cassie takes the shifted case to Nick’s apartment and waits. Nick regains consciousness: he has no memory of the envelopes or his plan. He opens his envelope, which tells him to return home. He finds the case in his room but Carver introduces himself to Kira as a friend, stating that her memories are false; she is a Division agent who volunteered to take the augmentation injection and suffered amnesia as a side-effect. Carver shows Kira her badge.

Before bidding bye, Nick assures a worried Cassie that she will survive and everything is going to be fine. He asks her to go ahead with everything and instead of thinking too much face it as it may. She leaves as the Hong-Kong watcher tracks her to finally kill her, however at the last moment the “Wiper” appears (the same who helped Nick remove his memory) and erases her memory, thereby saving Cassie.

Nick goes to retrieve the augmentation drug and confronts Carver and Kira. Carver tells Kira and Nick that their relationship never happened; it was a “push” memory. Kira reveals she has been using Nick and Nick takes the three to the building that contains the lockers and the case. Carver locks Nick in his car’s hood and goes to retrieve the case. They are ambushed by the Triads. In the midst of the fight, Nick is released from the hood. He goes to find Kira and is confronted by Victor, another “Mover” and Division agent who works for Carver. During Nick-Victor fight, two of the “Bleeders” screams killing Victor while Nick saves himself by closing his ears. Carver injures Nick. Nick grabs the case and jams the syringe into his arm, which “kills” him. After the fights ends and Carver leaves with Kira, Nick wakes up. Cassie appears with an umbrella and smiles at him. “I told you to bring an umbrella” she tells him, revealing it was part of the plan. Cassie retrieves the true case, revealing that Nick injected himself with soy sauce, as they planned. Asked whether they will see Kira again, Cassie tells Nick that they will see “Miss Trouble soon enough”.

Flying back to America with a sleeping Agent Carver, Kira opens her purse, finding her red envelope. She remembers Nick telling her to open it when “she started doubting the truth” and opens it. She finds a photograph of herself and Nick obviously in a relationship, which means that their relationship was true, and a message written on the photograph that says “KILL HIM” on the upper left corner and “See U soon, Nick” on the lower right. Kira “pushes” Carver, commanding him to put his gun in his mouth and pull the trigger. The screen fades to black, followed by the sound of a gunshot.
[edit] Types of Superhumans

Watchers

Watchers have the ability to foresee the future to varying degrees. As knowledge of the future invariably causes that future to change, Watchers’ visions of the future in their direct sphere of influence are subject to frequent shifting. Watchers visions are like a sense of deja vu. Watchers can get visions at will. Drinking alcoholic beverages can temporarily enhance a Watcher’s abilities (as shown by Cassie). Cassie and Pop Girl are Watchers, and Cassie’s mother is also an advanced Watcher.

Movers

Movers are powerful telekinetics who are trained to identify the specific atomic frequency of a given material and alter the gravitational field around it, usually causing the nearby air to appear warped. This allows them to move both animate and inanimate objects. Advanced Movers can work at the molecular level, creating Energy shields in the air around them or create Power Fists and kicks, a strike that delivers 3x the power than a punch delivered normally. Nick is a Mover, but not a very advanced one, unlike Victor, Carver’s right hand man.

Pushers

Pushers have the ability to implant memories, thoughts and emotions into the minds of other people in order to manipulate them. The skill level of the Pusher determines how many people the Pusher is able to control at one time, and how vivid the implanted memories are. A powerful Pusher can push a large group of people at the same time, basically creating a personal army. A Pusher is able to make a person do anything the Pusher desires, even commit suicide. A Pusher’s eyes indicate how powerful they are: their pupils will dilate to certain degrees depending on how powerful the push is (for example, Henry Carver’s eyes are rendered completely black, signifying that he is an extremely able and effective Pusher). Carver is a trained Pusher, and Kira as well.

Bleeders

Bleeders have the ability to emit high-pitched sonic vibrations that cause ruptures in a target’s blood vessels. While using this ability, their pupils turn into vertical slits, like a snake’s, because of synthetic materials implanted in them to protect the blood vessels from the effects of their own ability. They are also sometimes known as Screechers or Screamers. Pop Girl’s brothers and father, the Triads, are Bleeders.

Sniffs

Sniffs are highly developed psychometrics who can track the location of people or objects over varying distances. Like bloodhounds, their ability is increased if they have tactile access to an object that has been in direct contact with the subject. Sniffs receive information in the form of images, which is why identifiable landmarks help increase their effectiveness. Emily Hu is a highly trained Sniff, and she uses her powers for money. Carver’s associates who kidnapped Kira are also Sniffs.

Shifters

Shifters can temporarily alter the appearance of an object by manipulating patterns of light interacting with it. Once the illusion is established, it remains with the object for a short period of time. For example, a Shifter could touch a one dollar bill and alter it to appear as a one hundred dollar bill until the effect expires. The object shifted must have roughly the same dimensions as the object it is shifted into. The length of time that the effect will last is based on the Shifter’s experience. Hook Waters, an ex-Division agent and Nick’s friend is a highly experienced Shifter.

Wipers

Wipers are skilled at either temporarily or permanently erasing memories, an invaluable asset in espionage. Experience will dictate the accuracy of their wipes, though there is always the danger that they will eliminate a desired memory. Wo Chiang, a fisherman who lives on a dock, is a Wiper who uses his powers for those who need for money; he also erases part of Nick’s and Kira’s memory, and saves Cassie from Pop Girl by sneaking behind her and wiping her entire memory.

Shadows

Shadows are trained to block the vision of other clairvoyants such as Sniffs, making any subject within their target radius appear “dark”. Experience will enhance the size of the area they can shadow and the intensity of their shielding effect. Shadows need to be awake to manifest their ability, so it is common for a detail of two Shadows to operate in shifts while protecting a person or object for extended periods. Most Shadows are effective only against Sniffs, but some extremely powerful Shadows are able to block even Watchers. Pinky, a friend of Nick’s, is a Shadow, and he is effective only against Sniffs. Like other characters, he also uses his powers for money. An old woman hired by Kira to hide the syringe has the ability to shadow an entire building, even from watchers.

Stitches

Stitches are psychic surgeons trained to quickly reconstruct cells to their previous or healthy state. Using only their hands, they can heal and even “unheal” whatever they have done. For more detailed work, Stitches use a silver based cream on their hands which acts as a conductor for their ability.

SECRET – Surface to Air Missiles for 2012 Olympics Site

The former Bryant and May match factory in Fairfield Road, Bow, East London – now a private gated community of exclusive apartments known as Bow Quarter.

The roofs of two towers (converted for lift shafts for the apartments) have been chosen by the Ministry of Defence to site surface-to-air high-velocity missile systems.

Surface to Air Missiles for 2012 Olympics Site

[Image]
[Image]
[Image]

 


	

SECRET – Space Station Expedition 30 Soyuz Capsule Landing

Space Station Expedition 30 Soyuz Capsule Landing

[Image]
Dust plumes are caused by retro-rockets fired just before landing.[Image]
[Image]
[Image][Image]
[Image][Image]
Dan Burbank Extracted[Image]

[Image]

[Image]

Anatoly Ivanishin Extracted[Image]

[Image]

[Image]

Anton Shkaplero[Image]
Left to right, Burbank, Shkaplero and Ivanishin[Image]
Medical Examination Station[Image]
[Image]

 


	

Hitlers Manager – Ferdinand Porsche – Ganzer Film

Im Jahr 1934 legte Ferdinand Porsche auf Drängen Hitlers die tschechoslowakische Staatsangehörigkeit ab und nahm die deutsche an. 1938 wurde er zusammen mit Ernst Heinkel, Willy Messerschmitt und Fritz Todt mit dem 1937 von Hitler neu gestifteten Deutschen Nationalpreis für Kunst und Wissenschaft ausgezeichnet. 1938 erhielt er das Ehrenband der Burschenschaft Bruna Sudetia Wien. Auch er hatte den „Anschluss” Österreichs befürwortet. 1940 wurde Porsche zum Honorarprofessor an der Technischen Hochschule Stuttgart ernannt und 1942 zum Oberführer der Allgemeinen SS, was ihn nicht daran hinderte, bei allen Anlässen nur in Zivil gekleidet zu sein.
Porsche, 1939 zum Wehrwirtschaftsführer ernannt, engagierte sich stark in der Kriegsindustrie. Von 1941 bis 1943 wurde er zum Vorsitzenden der Panzerkommission – eine Spitzenposition in der Kriegswirtschaft – bestellt. Später wurde er in den Rüstungsrat berufen. Als Hitlers Lieblingsingenieur entwickelte er den nach ihm benannten Panzerjäger Ferdinand und den Panzerkampfwagen Maus. Der lediglich in Kleinserie produzierte Ferdinand war zu schwer für den von Porsche konzipierten petro-elektrischen Antrieb, dessen Störanfälligkeit dazu führte, dass mehr Exemplare aufgegeben als im Kampf zerstört wurden. Der Panzerkampfwagen Maus kam über das Stadium zweier Prototypen nicht hinaus.

TOP-SECRET – U.S. Marine Corps Tentative Manual for Partnering Operations

https://publicintelligence.net/wp-content/uploads/2012/04/USMC-PartneringManual.png

In warfighting and counterinsurgency operations, partnering is a command arrangement between a US security force and a host nation (HN) security force in which both forces operate together to achieve mission success and to build the capacity and capability of the HN force. Partnering is not an end, but a deliberate process, a means to an end. A near-term goal might be the standup and development of a HN force increasingly capable of independent operations and decreasingly dependent upon US partnered support. An intermediate objective might be the transition of lead security responsibility from US to HN force. But the ultimate goal is to become “un”-partnered, to enable the HN force to assume full responsibility for security and stability. In warfighting and counterinsurgency partnering, divorce is not a bad ending, it is the desired outcome.

Partnering should be a real union between the two partnered organizations, with a common purpose, in which the whole of the partnership becomes greater than the sum of its parts. Real partnering is total immersion. It cannot be done on occasion, when convenient, or as time permits. Nor should it be limited to periodic or occasional combined combat operations. Real partnering is instead a continuous, collective, and collaborative effort on tasks both large and small toward the common goal. It is full throttle engagement, warts and all.

Be culturally aware but not overly-sensitive.

a. Help the HN understand our perspective, our culture, and our values. Our values will most likely not be theirs so do not impose your values upon their culture; however, do not jeopardize your own morals and beliefs by being overly sensitive to theirs. The key is to ensure that the HN has a basic understanding of our values, especially the delicate balance of honesty vs. saving face.

b. HN forces understand that there may be times when the cultural strain is too great to overcome “living amongst” their personnel, but we must promote the sharing of common areas (dining area, COCs (within classification parameters), etc.) and activities (meals, PT, weapons/vehicle maintenance) which will ultimately help bridge cultural differences without encroaching on each other.

Encourage HN forces to build relationships with the local leaders

a. Positive interaction with the people builds trust – build this trust above all else!

b. Encourage local recruiting for security forces, especially police. In the United States, local police have to live in the communities that they work in; yet, in many places, national police are moved throughout the country where they have no ties to the community and are often viewed as outsiders. This may be an expedient method to restore law and order, but it should only be used in the most extreme circumstances. Locally recruited forces will have the backing of that community – “their community” – and their training by Marines and HN military units serves to reinforce the ties among Marines, the HN forces, and the communities that they operate in. Until the police force is made up of ‘local sons’ there will be no real security or trust in an area.

c. Encourage the HN force to develop an information operations (IO) plan and effective methods to convey key messages to the people. HN forces should be the primary executers of information operations and they should be on hand to explain it to the people. Perception is important to the success of the partnership and its goals.

Embrace the chaos of the environment

a. Do not allow frustration with the HN to show – do it in private away from the partnering force members – never display direct frustration in front of your partnered force.

Do not hesitate to deviate from doctrine when needed.

a. The intent here is to “be doctrinally sound, not doctrinally bound”. “A force engaged in small wars operations, irrespective of its size, is usually independent or semi-independent and, in such a campaign, assumes strategically, tactical, and territorial functions” (SWM 2-10, pg 11). “In short, the force must be prepared to exercise those functions of command, supply, and territorial control which are required of the supreme command or its major subdivisions in regular warfare…For these reason, it is obvious that a force undertaking a small wars campaign must be adequately staffed for independent operations even if the tables of organization do not specify a full staff complement” (SWM 2-11, pg 12).

Das geheime Filmarchiv der Eva Braun… -The Secret Movies of Eva Braun – Ganzer Film – Full Movie

Original 16mm-Filmaufnahmen von Eva Braun in Farbe und schwarzweiß. Eva Braun, die Frau an Hitlers Seite, hat mit ihrer 16-mm-Filmkamera das Leben auf dem Berghof und ihre privaten Reisen festgehalten. Die Aufnahmen, die heute im amerikanischen Nationalarchiv liegen, waren nie für die Öffentlichkeit bestimmt. Nach ihrem Freitod am 30. April 1945 im Bunker der Reichskanzlei galten die Filmrollen lange als verschollen, ehe sie in den USA wieder auftauchten. Diese DVD zeigt erstmals einen umfassenden Zusammenschnitt des gesamten geheimen Archivs. Zeitzeugen aus der engsten Umgebung von Eva Braun und Adolf Hitler kommentieren die einzigartigen Filmaufnahmen, die das Leben der Mächtigen des Dritten Reiches jenseits der Propaganda zeigen. Die DVD bietet als Extras einen 15-minütigen Bonusfilm mit nicht verwendeten Aufnahmen sowie Biographien etc.

Company K – Full Movie – Ganzer Film

 

USA | 2004 | 98 Min.

River Run Film Festival 2009 – Bester Spielfilm

Der Amerikaner Joe Delaney kämpfte auf den Schlachtfeldern des Ersten Weltkriegs für sein Land. 15 Jahre nach dem Ende des Kriegs schrieb er ein Buch über seine Erfahrungen als Mitglied des US-Marine Corps. Doch was er erzählt, ist nicht die Geschichte eines großen Krieges und heldenhafter Soldaten. Es ist die Geschichte eines Mannes, der erkennen muss, dass es einzelne Momente im Leben sind, die den wahren Charakter eines Menschen definieren. Und er erinnert sich an den deutschen Soldaten, den er tötete und der ihn in seinen Träumen heimsuchte.

Stalingrad – Ganzer Film

 

Stalingrad ist ein deutscher Anti-Kriegsfilm aus dem Jahr 1993. Thematischer Hintergrund ist die Schlacht von Stalingrad Ende 1942/Anfang 1943 während des Zweiten Weltkriegs aus der Sicht eines deutschen Sturmpionier-Bataillons. Regie führte Joseph Vilsmaier. Der Film startete am 21. Januar 1993 in den bundesdeutschen Kinos.

SECRET – DDCI Statement about the Watergate Case

Citation: DDCI Statement about the Watergate Case
[Central Intelligence Agency Employee Bulletin Containing Vernon Walter’s Statement on CIA Involvement in Watergate; Best Available Copy] , [Classification Unknown], Newsletter, 359, May 21, 1973, 3 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00031
Origin: United States. Central Intelligence Agency
Individuals/
Organizations Named:
Cushman, Robert E., Jr.; Dean, John Wesley III; Democratic National Committee (U.S.); Ehrlichman, John D.; Gray, L. Patrick; Haldeman, H.R.; Helms, Richard M.; Hunt, E. Howard; Nixon, Richard M.; Schlesinger, James R.; United States. Department of Justice; United States. Federal Bureau of Investigation; United States. White House; Walters, Vernon A.
Subjects: Congressional hearings | Covert operations | Government appropriations and expenditures | Mexico | Watergate Affair (1972-1974)
Abstract: Disseminates Vernon Walter’s statement to congressional committee about his communications with John Dean and Patrick Gray on Central Intelligence Agency involvement in Watergate and CIA’s issuance of equipment to Howard Hunt.
Full Text: Document – PDF – this link will open in a new window (156 KB)

Durable URL for this record

SECRET – Former BP Engineer Arrested for Obstruction of Justice

WASHINGTON—Kurt Mix, a former engineer for BP plc, was arrested today on charges of intentionally destroying evidence requested by federal criminal authorities investigating the April 20, 2010 Deepwater Horizon disaster, announced Attorney General Eric Holder; Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; U.S. Attorney Jim Letten of the Eastern District of Louisiana; and Kevin Perkins, Acting Executive Assistant Director for the FBI’s Criminal Cyber Response and Services Branch.

Mix, 50, of Katy, Texas, was charged with two counts of obstruction of justice in a criminal complaint filed in the Eastern District of Louisiana and unsealed today.

“The department has filed initial charges in its investigation into the Deepwater Horizon disaster against an individual for allegedly deleting records relating to the amount of oil flowing from the Macondo well after the explosion that led to the devastating tragedy in the Gulf of Mexico,” said Attorney General Holder. “The Deepwater Horizon Task Force is continuing its investigation into the explosion and will hold accountable those who violated the law in connection with the largest environmental disaster in U.S. history.”

According to the affidavit in support of a criminal complaint and arrest warrant, on April 20, 2010, the Deepwater Horizon rig experienced an uncontrolled blowout and related explosions while finishing the Macondo well. The catastrophe killed 11 men on board and resulted in the largest environmental disaster in U.S. history.

According to court documents, Mix was a drilling and completions project engineer for BP. Following the blowout, Mix worked on internal BP efforts to estimate the amount of oil leaking from the well and was involved in various efforts to stop the leak. Those efforts included, among others, Top Kill, the failed BP effort to pump heavy mud into the blown out wellhead to try to stop the oil flow. BP sent numerous notices to Mix requiring him to retain all information concerning Macondo, including his text messages.

On or about October 4, 2010, after Mix learned that his electronic files were to be collected by a vendor working for BP’s lawyers, Mix allegedly deleted on his iPhone a text string containing more than 200 text messages with a BP supervisor. The deleted texts, some of which were recovered forensically, included sensitive internal BP information collected in real-time as the Top Kill operation was occurring, which indicated that Top Kill was failing. Court documents allege that, among other things, Mix deleted a text he had sent on the evening of May 26, 2010, at the end of the first day of Top Kill. In the text, Mix stated, among other things, “Too much flowrate—over 15,000.” Before Top Kill commenced, Mix and other engineers had concluded internally that Top Kill was unlikely to succeed if the flow rate was greater than 15,000 barrels of oil per day (BOPD). At the time, BP’s public estimate of the flow rate was 5,000 BOPD—three times lower than the minimum flow rate indicated in Mix’s text.

In addition, on or about August 19, 2011, after learning that his iPhone was about to be imaged by a vendor working for BP’s outside counsel, Mix allegedly deleted a text string containing more than 100 text messages with a BP contractor with whom Mix had worked on various issues concerning how much oil was flowing from the Macondo well after the blowout. By the time Mix deleted those texts, he had received numerous legal hold notices requiring him to preserve such data and had been communicating with a criminal defense lawyer in connection with the pending grand jury investigation of the Deepwater Horizon disaster.

A complaint is merely a charge, and a defendant is presumed innocent unless and until proven guilty beyond a reasonable doubt.

If convicted, Mix faces a maximum penalty of 20 years in prison and a fine of up to $250,000 as to each count.‪

The Deepwater Horizon Task Force, based in New Orleans, is supervised by Assistant Attorney General Breuer and led by Deputy Assistant Attorney General John D. Buretta, who serves as the director of the task force. The task force includes prosecutors from the Criminal Division and the Environment and Natural Resources Division of the Department of Justice; the U.S. Attorney’s Office for the Eastern District of Louisiana and other U.S. Attorneys’ Offices; and investigating agents from the FBI, Environmental Protection Agency, Department of Interior, U.S. Coast Guard, U.S. Fish and Wildlife Service, and other federal law enforcement agencies.

The task force’s investigation of this and other matters concerning the Deepwater Horizon disaster is ongoing.

The case is being prosecuted by task force Deputy Directors Derek Cohen and Avi Gesser of the Justice Department’s Criminal Division; task force prosecutors Assistant U.S. Attorney Richard Pickens, II of the Eastern District of Louisiana; and Assistant U.S. Attorney Scott Cullen of the Eastern District of Pennsylvania.

Unveiled – Nuclear WMD Accident Training


[Image]
[Image][Image]

[Image]

Following: Overhead photos from Google Earth, dated 4 February 2011. Oblique photos from Bing Maps, unknown date.
http://maps.google.com/?t=h&ie=UTF8&ll=35.019664,-106.531205&spn=0.032861,0.068665&z=15&vpsrc=6[Image]

TS-1 (Active)

These appear to be wrecks of motor vehicles

[Image]

[Image]

[Image]

TS-2 (Active)

These appear to be fragments of a B-52 bomber

[Image]

[Image]

[Image]

[Image]

TS-3 (Active)

These appear to be fragments of a B-52 bomber

[Image]

[Image]

[Image]

[Image]

 

TS-4 (Active)

This appears to be an earth penetration of an object, perhaps simulation of unexploded nuclear weapon

[Image]

[Image]


TS-5 (Inactive)  (TR-5 to TR-8 comprise Installation Restoration Plan OT-10)

[Image]

TS-6 (Inactive)

[Image]

TS-7 (Inactive)

[Image]

TS-8 (Appears Converted to Other Use, But May Be Active)

[Image]

 


	

War Fighter – Grozovye Vorota / Grozovue Vorota / Грозовые ворота / The Storm Gate / War Fighter – Full Movie

Grozovye Vorota / Grozovue Vorota / Грозовые ворота / The Storm Gate / War Fighter

War Fighter is a DVD release ( German audio, German subs) of the
russian TV movie “Grozovye Vorota” it’s about a battle durring 2nd Chechen war,
where 200 russian soldiers fights against 2000 terrorists, only 9 survive

U.S. Army Regulation 190-56 Civilian Police and Security Guard Program

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-CivilianPolice.png

 

This regulation establishes the Department of the Army Civilian Police and Security Guard (DACP/SG) Program. It assigns responsibilities and establishes policy, standards, and procedures for the effective implementation of the DACP/SG Program. This regulation applies to all Department of the Army civilian personnel in career series 0083 and 0085 and contract security personnel employed by the U.S. Army and involved in the safeguarding and protection of personnel and property.

 

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-CivilianPolice-badge.png

 

 

World War 3 – Full Movie

Soviet paratroopers drop into Alaska to sabotage the oil pipeline in retaliation against a United States grain embargo. A skirmish occurs at a pumping station, lightly defended by Col. Jake Caffey and a National Guard reckon unit. A stalemate ensues while the possibility of World War III hangs in the balance. The danger escalates as the Russian leaders and the American President play a cat-and-mouse game

ISRAEL DEFENSE – Preparing for Fires and Structural Collapse

Water rescue exercise (Photo: Fire Service)
Water rescue exercise

The defining event that changed the face of firefighting in Israel was the December 2010 fire in the Carmel Mountains. Forty-four people died, and 6,177 acres of woods were destroyed.

Four months after the devastation, the air force established a firefighting squadron whose six aircraft are presently maintained by Elbit Systems. In addition, Israel Fire and Rescue Service ordered 88 firefighting vehicles. “There are several types of firefighting vehicles,” says Fire Service Commissioner, Chief Shahar Ayalon.

“Some of the vehicles are undergoing supply processes and need to undergo several changes. We’ve also published a tender worth 12 million NIS for personal fireman protection equipment including fireproof proximity suits, helmets, shoes, and coats. Additionally, we bought equipment from around the world, and are working with four to five international companies. We’re going to change the firefighter uniform, and even have a new symbol for the firefighters. We are also currently testing the simulators that exist around the world, and have allocated a sum of more than $10 million. In addition, we are constructing a new instruction facility in Rishon LeZion.

Following the 2010 fire, Shahar Ayalon came to head the Fire Service after serving in the Israeli Police as district commander and deputy inspector general. According to Ayalon, the far-reaching changes within the fire service are also intended for firefighters participating in mass disaster relief, such as wide-ranging missile attacks and natural disasters.

In his opinion, the situation is far from satisfactory. Ayalon notes that during the 2011 rocket attacks from Gaza, it was impossible to send a vehicle from Ashkelon to handle a fire that burst out in the nearby town of Gan Yavneh, which was a result of administrative problems (the town belonged to the more distant district of Rehovot). It took a fire vehicle no less than 20 minutes to make it from there. According to him, there remains a severe shortage in firefighting stations across the country.

“We’ve conducted a threat reference with Israel’s Technion and the National Emergency Authority on how many firefighting vehicles and how many firefighters are needed to provide a response for Israel,” says Ayalon. “The interim statement indicates that an additional 40-60 stations are needed on top of the 100 that already exist. We want to lower the response time. In 2010, our average response time was 14 minutes. In the US, the standard is five minutes for the first team, and an additional five minutes for a second team. In Europe, it’s between 8-10 minutes – we want to approach this time.”

“Our current budget is 700 million NIS. I assume that after the reform, the budget will cross the one billion NIS mark. There won’t be any choice but to construct 50 more stations, and this will have to be planned in the framework of the multi-year budget.”

War Scenarios

“The firefighting system responds to 80,000 situations a year, nearly half of which are tied to rescue and extraction missions,” explains Ayalon. “We have 15 urban rescue units that can enter wreckage sites and rescue people from buildings, including two new units in Be’er Sheva and Netanya. These units are comprised of young and well-trained firefighters. We conduct the courses with RESQ1, a company of military veterans who have run these training exercises around the world for years.

“We also send 15 fighters each year to France to undergo advanced studies in rescuing people trapped in stormy weather. The scope of rescue is the same as the scope of firefighting, even though people think we only extinguish fires. In reality, we engage in rescues, deal with dangerous substances, and also fight fires.”

What will happen during a war? After all, it’s the IDF’s Rear-Area Headquarters that primarily deal with search and rescue.

“In a period of emergency and war, the Rear-Area HQ is also responsible for the Fire Service. The threat to the home front switched to a threat of missiles, and we are preparing for a state of demolished buildings in which the firefighters will have to handle both fires and structural collapses.

“We also take into account damage to strategic factories that house dangerous materials, and we intensively practice situations of container and fuel reserve impacts. We carry out risk assessments with the factories and introduce them to the forces. We have an organized doctrine that is also suitable for missile scenarios.

“We built an operations branch that works, practices, and immediately responds to events, reinforces units, and does all the required operations that are similar to a military system.

“For emergency scenarios, we purchased 24 containers equipped with clothing, food, and water. It costs a lot of money, but we placed these types of emergency containers at each station. As soon as there’s a war, we can increase our number of fire departments and our launches by 40% by taking out fire trucks to all sorts of launch points, thus bringing the firefighters closer to response locations. We settle in well-known locations and are capable of emergency deployment that increases manpower by having 1,200 firefighters in the reserve forces join the regular military.

“In emergency scenarios, we are the first ones alerted and the first to reach the scene. If it’s wreckage, we focus on rescuing lives and extracting whoever we can out of the rubble. Once the Rear-Area HQ’s rescue unit arrives, we pass the responsibility on to them and leave the scene. We are the immediate response for the golden hour – the time when the chances of finding survivors is the highest.”

** Photos: The fire extinguishing squad by Fire Service; Chief Shahar Ayalon by Fire Service

TOP-SECRET – (U//FOUO) U.S. Army Regulation 190-56 Civilian Police and Security Guard Program

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-CivilianPolice.png

 

This regulation establishes the Department of the Army Civilian Police and Security Guard (DACP/SG) Program. It assigns responsibilities and establishes policy, standards, and procedures for the effective implementation of the DACP/SG Program. This regulation applies to all Department of the Army civilian personnel in career series 0083 and 0085 and contract security personnel employed by the U.S. Army and involved in the safeguarding and protection of personnel and property.

 

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-CivilianPolice-badge.png

 

 

The Day After (1983) – American Nuclear Holocaust – Full Movie

“I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.” Albert Einstein.

This movie is dedicated to all the war-loving couch-potatoes, media whores, and psychopathic politicians.

Revealed – Patent Office Weighs Patent Secrecy for “Economic Security”

In response to congressional direction, the U.S. Patent and Trademark Office is considering whether to expand the scope of patent secrecy orders — which prohibit the publication of affected patent applications — in order to enhance “economic security” and to protect newly developed inventions against exploitation by foreign competitors.

Currently, patent secrecy orders are applied only to patent applications whose disclosure could be “detrimental to national security” as prescribed by the Invention Secrecy Act of 1951.  At the end of Fiscal Year 2011, there were 5,241 such national security secrecy orders in effect.

But now the Patent Office is weighing the possibility of expanding national security patent secrecy into the “economic security” domain.

“The U.S. Patent and Trademark Office is seeking comments as to whether the United States should identify and bar from publication and issuance certain patent applications as detrimental to the nation’s economic security,” according to a notice that was published in the Federal Register on April 20.

That would be a mistake, I wrote in my own comments submitted to the Patent Office yesterday.

Economic security — which could conceivably implicate all new inventions — is not analogous to the more limited domain of national security-related inventions, “so the use of secrecy orders is inappropriate to protect economic security,” I suggested.

Instead, the existing option for an applicant to request nonpublication of his or her patent application up to the point that the patent is issued is a superior alternative to a mandatory secrecy order, I wrote.  “The inventor is likely to be better qualified than any third party to assess the economic significance of the invention, and is also likely to be best motivated to protect his or her own financial interests.”

“The USPTO has not taken a position” on these questions, the Patent Office said in its April 20 notice, “nor is it predisposed to any particular views.”

Confidential – Govt Appeals Court-Ordered Release of Classified Document

Government attorneys said yesterday that they would appeal an extraordinary judicial ruling that required the release of a classified document in response to a Freedom of Information Act request.

The document in question is a one-page position paper produced by the U.S. Trade Representative (USTR) concerning the U.S. negotiating position in free trade negotiations.  It was classified Confidential and was not supposed to be disclosed before 2013.

But immediate disclosure of the document could not plausibly cause damage to the national security, said DC District Judge Richard W. Roberts in a February 29, 2012 opinion, and so its continued classification, he said, is not “logical.”  He ordered the government to release the document to the Center for International Environmental Law, which had requested it under FOIA.  (Court Says Agency Classification Decision is Not ‘Logical’, Secrecy News, March 2, 2012.)

This kind of independent review of the validity of classification decisions, which is something that judges normally refrain from doing, offers one way to curb galloping overclassification.

While the substance of the USTR document is likely to be of little general interest, the court’s willingness to disregard the document’s ill-founded classification and to require its disclosure seems like a dream come true to critics of classification policy.  If the decision serves as a precedent and a spur to a more broadly skeptical judicial approach to classification matters, so much the better.

But what may be a dream to some is a nightmare to others.  The bare possibility of such an emerging challenge to executive classification authority was evidently intolerable to the Obama Administration, which will now seek to overturn Judge Roberts’ ruling in the DC Circuit Court of Appeals.

Unveiled – Cyber Intelligence Sharing and Protection Act

[House Report 112-445]
[From the U.S. Government Printing Office]


112th Congress                                                   Report
                        HOUSE OF REPRESENTATIVES
 2d Session                                                     112-445

======================================================================



 
             CYBER INTELLIGENCE SHARING AND PROTECTION ACT

                                _______
                                

 April 17, 2012.--Committed to the Committee of the Whole House on the 
              State of the Union and ordered to be printed

                                _______
                                

    Mr. Rogers of Michigan, from the Permanent Select Committee on 
                 Intelligence, submitted the following

                              R E P O R T

                             together with

                             MINORITY VIEWS

                        [To accompany H.R. 3523]

      [Including cost estimate of the Congressional Budget Office]

    The Permanent Select Committee on Intelligence, to whom was 
referred the bill (H.R. 3523) to provide for the sharing of 
certain cyber threat intelligence and cyber threat information 
between the intelligence community and cybersecurity entities, 
and for other purposes, having considered the same, report 
favorably thereon with an amendment and recommend that the bill 
as amended do pass.
    The amendment is as follows:
  Strike all after the enacting clause and insert the 
following:

SECTION 1. SHORT TITLE.

  This Act may be cited as the ``Cyber Intelligence Sharing and 
Protection Act''.

SEC. 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING.

  (a) In General.--Title XI of the National Security Act of 1947 (50 
U.S.C. 442 et seq.) is amended by adding at the end the following new 
section:
          ``cyber threat intelligence and information sharing
  ``Sec. 1104.  (a) Intelligence Community Sharing of Cyber Threat 
Intelligence With Private Sector.--
          ``(1) In general.--The Director of National Intelligence 
        shall establish procedures to allow elements of the 
        intelligence community to share cyber threat intelligence with 
        private-sector entities and to encourage the sharing of such 
        intelligence.
          ``(2) Sharing and use of classified intelligence.--The 
        procedures established under paragraph (1) shall provide that 
        classified cyber threat intelligence may only be--
                  ``(A) shared by an element of the intelligence 
                community with--
                          ``(i) certified entities; or
                          ``(ii) a person with an appropriate security 
                        clearance to receive such cyber threat 
                        intelligence;
                  ``(B) shared consistent with the need to protect the 
                national security of the United States; and
                  ``(C) used by a certified entity in a manner which 
                protects such cyber threat intelligence from 
                unauthorized disclosure.
          ``(3) Security clearance approvals.--The Director of National 
        Intelligence shall issue guidelines providing that the head of 
        an element of the intelligence community may, as the head of 
        such element considers necessary to carry out this subsection--
                  ``(A) grant a security clearance on a temporary or 
                permanent basis to an employee or officer of a 
                certified entity;
                  ``(B) grant a security clearance on a temporary or 
                permanent basis to a certified entity and approval to 
                use appropriate facilities; and
                  ``(C) expedite the security clearance process for a 
                person or entity as the head of such element considers 
                necessary, consistent with the need to protect the 
                national security of the United States.
          ``(4) No right or benefit.--The provision of information to a 
        private-sector entity under this subsection shall not create a 
        right or benefit to similar information by such entity or any 
        other private-sector entity.
  ``(b) Private Sector Use of Cybersecurity Systems and Sharing of 
Cyber Threat Information.--
          ``(1) In general.--
                  ``(A) Cybersecurity providers.--Notwithstanding any 
                other provision of law, a cybersecurity provider, with 
                the express consent of a protected entity for which 
                such cybersecurity provider is providing goods or 
                services for cybersecurity purposes, may, for 
                cybersecurity purposes--
                          ``(i) use cybersecurity systems to identify 
                        and obtain cyber threat information to protect 
                        the rights and property of such protected 
                        entity; and
                          ``(ii) share such cyber threat information 
                        with any other entity designated by such 
                        protected entity, including, if specifically 
                        designated, the Federal Government.
                  ``(B) Self-protected entities.--Notwithstanding any 
                other provision of law, a self-protected entity may, 
                for cybersecurity purposes--
                          ``(i) use cybersecurity systems to identify 
                        and obtain cyber threat information to protect 
                        the rights and property of such self-protected 
                        entity; and
                          ``(ii) share such cyber threat information 
                        with any other entity, including the Federal 
                        Government.
          ``(2) Use and protection of information.--Cyber threat 
        information shared in accordance with paragraph (1)--
                  ``(A) shall only be shared in accordance with any 
                restrictions placed on the sharing of such information 
                by the protected entity or self-protected entity 
                authorizing such sharing, including appropriate 
                anonymization or minimization of such information;
                  ``(B) may not be used by an entity to gain an unfair 
                competitive advantage to the detriment of the protected 
                entity or the self-protected entity authorizing the 
                sharing of information; and
                  ``(C) if shared with the Federal Government--
                          ``(i) shall be exempt from disclosure under 
                        section 552 of title 5, United States Code;
                          ``(ii) shall be considered proprietary 
                        information and shall not be disclosed to an 
                        entity outside of the Federal Government except 
                        as authorized by the entity sharing such 
                        information; and
                          ``(iii) shall not be used by the Federal 
                        Government for regulatory purposes.
          ``(3) Exemption from liability.--No civil or criminal cause 
        of action shall lie or be maintained in Federal or State court 
        against a protected entity, self-protected entity, 
        cybersecurity provider, or an officer, employee, or agent of a 
        protected entity, self-protected entity, or cybersecurity 
        provider, acting in good faith--
                  ``(A) for using cybersecurity systems or sharing 
                information in accordance with this section; or
                  ``(B) for not acting on information obtained or 
                shared in accordance with this section.
          ``(4) Relationship to other laws requiring the disclosure of 
        information.--The submission of information under this 
        subsection to the Federal Government shall not satisfy or 
        affect any requirement under any other provision of law for a 
        person or entity to provide information to the Federal 
        Government.
  ``(c) Federal Government Use of Information.--
          ``(1) Limitation.--The Federal Government may use cyber 
        threat information shared with the Federal Government in 
        accordance with subsection (b) for any lawful purpose only if--
                  ``(A) the use of such information is not for a 
                regulatory purpose; and
                  ``(B) at least one significant purpose of the use of 
                such information is--
                          ``(i) a cybersecurity purpose; or
                          ``(ii) the protection of the national 
                        security of the United States.
          ``(2) Affirmative search restriction.--The Federal Government 
        may not affirmatively search cyber threat information shared 
        with the Federal Government under subsection (b) for a purpose 
        other than a purpose referred to in paragraph (1)(B).
          ``(3) Anti-tasking restriction.--Nothing in this section 
        shall be construed to permit the Federal Government to--
                  ``(A) require a private-sector entity to share 
                information with the Federal Government; or
                  ``(B) condition the sharing of cyber threat 
                intelligence with a private-sector entity on the 
                provision of cyber threat information to the Federal 
                Government.
  ``(d) Report on Information Sharing.--
          ``(1) Report.--The Inspector General of the Intelligence 
        Community shall annually submit to the congressional 
        intelligence committees a report containing a review of the use 
        of information shared with the Federal Government under this 
        section, including--
                  ``(A) a review of the use by the Federal Government 
                of such information for a purpose other than a 
                cybersecurity purpose;
                  ``(B) a review of the type of information shared with 
                the Federal Government under this section;
                  ``(C) a review of the actions taken by the Federal 
                Government based on such information;
                  ``(D) appropriate metrics to determine the impact of 
                the sharing of such information with the Federal 
                Government on privacy and civil liberties, if any; and
                  ``(E) any recommendations of the Inspector General 
                for improvements or modifications to the authorities 
                under this section.
          ``(2) Form.--Each report required under paragraph (1) shall 
        be submitted in unclassified form, but may include a classified 
        annex.
  ``(e) Federal Preemption.--This section supersedes any statute of a 
State or political subdivision of a State that restricts or otherwise 
expressly regulates an activity authorized under subsection (b).
  ``(f) Savings Clause.--Nothing in this section shall be construed to 
limit any other authority to use a cybersecurity system or to identify, 
obtain, or share cyber threat intelligence or cyber threat information.
  ``(g) Definitions.--In this section:
          ``(1) Certified entity.--The term `certified entity' means a 
        protected entity, self-protected entity, or cybersecurity 
        provider that--
                  ``(A) possesses or is eligible to obtain a security 
                clearance, as determined by the Director of National 
                Intelligence; and
                  ``(B) is able to demonstrate to the Director of 
                National Intelligence that such provider or such entity 
                can appropriately protect classified cyber threat 
                intelligence.
          ``(2) Cyber threat information.--The term `cyber threat 
        information' means information directly pertaining to a 
        vulnerability of, or threat to, a system or network of a 
        government or private entity, including information pertaining 
        to the protection of a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(3) Cyber threat intelligence.--The term `cyber threat 
        intelligence' means information in the possession of an element 
        of the intelligence community directly pertaining to a 
        vulnerability of, or threat to, a system or network of a 
        government or private entity, including information pertaining 
        to the protection of a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(4) Cybersecurity provider.--The term `cybersecurity 
        provider' means a non-governmental entity that provides goods 
        or services intended to be used for cybersecurity purposes.
          ``(5) Cybersecurity purpose.--The term `cybersecurity 
        purpose' means the purpose of ensuring the integrity, 
        confidentiality, or availability of, or safeguarding, a system 
        or network, including protecting a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(6) Cybersecurity system.--The term `cybersecurity system' 
        means a system designed or employed to ensure the integrity, 
        confidentiality, or availability of, or safeguard, a system or 
        network, including protecting a system or network from--
                  ``(A) efforts to degrade, disrupt, or destroy such 
                system or network; or
                  ``(B) theft or misappropriation of private or 
                government information, intellectual property, or 
                personally identifiable information.
          ``(7) Protected entity.--The term `protected entity' means an 
        entity, other than an individual, that contracts with a 
        cybersecurity provider for goods or services to be used for 
        cybersecurity purposes.
          ``(8) Self-protected entity.--The term `self-protected 
        entity' means an entity, other than an individual, that 
        provides goods or services for cybersecurity purposes to 
        itself.''.
  (b) Procedures and Guidelines.--The Director of National Intelligence 
shall--
          (1) not later than 60 days after the date of the enactment of 
        this Act, establish procedures under paragraph (1) of section 
        1104(a) of the National Security Act of 1947, as added by 
        subsection (a) of this section, and issue guidelines under 
        paragraph (3) of such section 1104(a); and
          (2) following the establishment of such procedures and the 
        issuance of such guidelines, expeditiously distribute such 
        procedures and such guidelines to appropriate Federal 
        Government and private-sector entities.
  (c) Initial Report.--The first report required to be submitted under 
subsection (d) of section 1104 of the National Security Act of 1947, as 
added by subsection (a) of this section, shall be submitted not later 
than one year after the date of the enactment of this Act.
  (d) Table of Contents Amendment.--The table of contents in the first 
section of the National Security Act of 1947 is amended by adding at 
the end the following new item:

``Sec. 1104. Cyber threat intelligence and information sharing.''.

                                Purpose

    The purpose of H.R. 3523 is to provide for the sharing of 
certain cyber threat intelligence and cyber threat information 
between the intelligence community and cybersecurity entities, 
and other purposes.

                     Committee Statement and Views

    At the beginning of the 112th Congress, the Committee, 
under the direction of Chairman Rogers and Ranking Member 
Ruppersberger, began a bipartisan effort to examine the issue 
of cybersecurity.\1\ The goal of this effort was to better 
understand the threats facing the nation in cyberspace--with 
respect to both the government and in the private sector--and 
to determine what the Intelligence Community could do to help 
better protect the nation. The results of this review were 
stunning: a number of advanced nation-state actors are actively 
engaged in a series of wide-ranging, aggressive efforts to 
penetrate American computer systems and networks; these efforts 
extend well beyond government networks, and reach deep into 
nearly every sector of the American economy, including 
companies serving critical infrastructure needs.
---------------------------------------------------------------------------
    \1\This effort involved a series of briefings and hearings, 
including one open hearing, to inform Committee members and, where 
possible, the public, about the serious national security threat posed 
by nation-state actors and other adversaries in the cyber realm. These 
meetings, briefings, and hearings were in turn supported by numerous 
meetings and briefings conducted by Committee staff with agencies and 
individuals from the Executive Branch including, among others, the 
White House, the Department of Homeland Security, the Department of 
Justice, including the Federal Bureau of Investigation, the Department 
of Defense, including the National Security Agency, and with experts 
from the academic and think-tank communities. The Committee staff also 
held numerous meetings with private sector companies and trade groups 
in industries including technology, telecommunications, financial 
services, utilities, aerospace, and defense. And the Committee staff 
met with representatives of privacy and civil liberties organizations 
including the Center for Democracy and Technology, the American Civil 
Liberties Union, the Electronic Frontier Foundation, the Constitution 
Project, and the CATO Institute, among others. In total, the Committee 
members and staff met with dozens of organizations in conducting its 
review over a nearly one-year period.
---------------------------------------------------------------------------
    Perhaps most troubling, these efforts are targeted not only 
at sensitive national security and infrastructure information, 
but are also often aimed at stealing the corporate research and 
development information that forms the very lifeblood of the 
American economy. China, in particular, is engaged in an 
extensive, day-in, day-out effort to pillage American corporate 
and government information. There can be no question that in 
today's modern world, economic security is national security, 
and the government must help the private sector protect itself.
    The Committee's review also revealed that while the 
government is already doing much to provide support and 
assistance to the private sector to address this threat, in 
particular through DHS and the FBI, more can and should be done 
in the immediate future. In particular, the Committee 
determined that the Intelligence Community is currently in 
possession of tremendously valuable intelligence and strategic 
insights derived from its extensive overseas intelligence 
collection efforts that can and should be provided--in both 
classified and unclassified form (when possible)--to the 
private sector in order to help the owners and operators of the 
vast majority of America's information infrastructure better 
protect themselves. The Committee believes that the recent 
Defense Industrial Base Pilot project (``DIB Pilot'') is a good 
model for demonstrating how sensitive government threat 
intelligence can be shared with the private sector in an 
operationally usable manner. Under the DIB Pilot, the 
government provides classified threat intelligence to key 
Internet Service Providers, who use the information to protect 
a limited number of companies in the defense industrial base, 
all on a voluntary basis.
    The Committee's review also determined that while much 
cybersecurity monitoring and threat information sharing takes 
place today within the private sector, real and perceived legal 
barriers substantially hamper the efforts of the private sector 
to protect itself. The Committee determined that these issues 
are best resolved in the first instance by providing clear, 
positive authority to permit the monitoring--by the private 
sector--of privately-owned and operated networks and systems 
for the purpose of detecting cybersecurity threats and to 
permit the voluntary sharing of information about those threats 
and vulnerabilities with others, including entities within the 
private sector and with the federal government.
    While some have suggested that the private sector needs 
more regulation or that the government ought to directly help 
defend certain portions of the private sector, the Committee's 
view is that the protection of the private sector is best left 
in private hands and that the government ought to provide as 
much intelligence as possible to the private sector before 
reaching for a regulatory ``stick.'' In the view of the 
Committee, such an approach--voluntary, private sector defense 
of private sector systems and networks informed by government 
intelligence information--best protects individual privacy and 
takes advantage of the natural incentives built into our 
economic system, including harnessing private sector drive and 
innovation.
    The Committee's review revealed that America's cyber 
infrastructure is distressingly vulnerable to espionage and 
attacks by nation-states and others with advanced capabilities. 
The Committee believes that immediate and serious action is 
necessary to staunch the bleeding of American corporate 
research and development information and to better protect our 
national security. In particular, the Committee believes that 
the Intelligence Community must take immediate and decisive 
action to provide intelligence to the private sector to help it 
better protect itself. In turn, the private sector must act 
aggressively to better monitor its own systems and to share 
information--both within the private sector and with the 
federal government on a purely voluntary basis. The Committee 
recognizes that because it focused on the issues within its 
jurisdiction, this legislation does not address many of the 
other issues facing the nation with respect to cybersecurity. 
At the same time, however, the Committee firmly believes that 
this legislation is an important first step in the effort to 
better protect the nation from advanced cyber threat actors.

               Committee Consideration and Rollcall Votes

    On December 1, 2011, the Committee met in open session and 
ordered the bill H.R. 3523 favorably reported, as amended.

                              OPEN SESSION

    In open session, the Committee considered the text of the 
bill H.R. 3523.
    Chairman Rogers offered an amendment. The amendment places 
additional restrictions on the use by the government of 
information obtained pursuant to the bill. The amendment was 
agreed to by voice vote.
    Mr. Thompson offered an amendment. The amendment requires 
an annual report by the Inspector General of the Intelligence 
Community reviewing the use of cyber threat information 
provided to the government pursuant to the bill. The amendment 
was agreed to by voice vote.
    Ms. Schakowsky offered an amendment providing that the 
Director of National Intelligence shall develop and 
periodically review policies and procedures governing the 
acquisition, retention, use, and disclosure of information 
obtained by the intelligence community pursuant to the bill. 
Subsequently, Ms. Schakowsky asked for and received unanimous 
consent to withdraw the amendment.
    The Committee then adopted a motion by the Chairman to 
favorably report the bill H.R. 3523 to the House, as amended. 
The motion was agreed to by a record vote of 17 ayes to 1 no:
    Voting Aye: Chairman Rogers, Mr. Thornberry, Mrs. Myrick, 
Mr. Miller, Mr. Conaway, Mr. King, Mr. LoBiondo, Mr. Nunes, Mr. 
Westmoreland, Mr. Rooney, Mr. Heck, Mr. Ruppersberger, Mr. 
Thompson, Mr. Langevin, Mr. Schiff, Mr. Boren, Mr. Chandler.
    Voting No: Ms. Schakowsky.

                      Section-by-Section Analysis


                         SECTION 1. SHORT TITLE

    The short title of the Act is the Cyber Intelligence 
Sharing and Protection Act.

      SECTION 2. CYBER THREAT INTELLIGENCE AND INFORMATION SHARING

Section 2(a): In General

    This subsection of the Act amends Title XI of the National 
Security Act of 1947 by adding a new section, Section 1104.

Section 1104(a) of Title 50: Intelligence Community Sharing of Cyber 
        Threat Intelligence with Private Sector

    Subsection (a) of new Section 1104 provides for the sharing 
of cyber threat intelligence--both classified and 
unclassified--by elements of the Intelligence Community with 
entities in the private sector. It is the view of the Committee 
that the routine and fulsome sharing of such intelligence 
information with appropriate cleared entities and individuals 
within the private sector is critically important to protecting 
the nation from advanced cyber threats. It is critical that as 
much information as possible be shared at machine-speed, in 
real-time, and in a manner that the information--whether 
classified or not--is operationally usable by entities within 
the private sector.
    This subsection seeks to set forth a general framework and 
requires the establishment of specific procedures and 
guidelines to make such sharing happen in the immediate future 
and to permit such sharing to continue so long as the nation 
faces this significant threat to our national security. The 
Committee intends to engage in vigorous oversight of the 
Intelligence Community use of the authorities under this 
section and, in particular, the Office of the Director of 
National Intelligence (ODNI), which is charged with 
promulgating appropriate procedures and guidelines under this 
subsection. The Committee expects to be consulted by ODNI in 
the formulation of these procedures and guidelines to ensure 
that the Committee's intent is achieved by them.
    While the term ``private sector'' is not defined in the 
legislation, the Committee intends that term to be given the 
broadest possible meaning and specifically intends the term to 
include utilities, whether organized as public, private, or 
quasi-public entities, to ensure at the entities that provide 
Americans with access to power, water, gas, and other critical 
services are also provided with access to critical federal 
government intelligence regarding cyber threats.
    In addition, the Committee expects that private sector 
entities receiving classified intelligence pursuant to this 
subsection will use this information not only to protect their 
own systems and networks, but also, where they find appropriate 
as a business matter, to sell cybersecurity goods and services 
appropriately incorporating this information to protect other 
corporate customers.
            Paragraph 1: In General
    Paragraph (1) of subsection (a) requires the Director of 
National Intelligence to establish procedures to allow 
intelligence community elements to share cyber threat 
intelligence with the private sector and to encourage the 
sharing of such intelligence. The Committee intends the DNI's 
procedures to create a sea change in the current intelligence 
sharing practices of the Intelligence Community with respect to 
the private sector.
    First, the DNI's procedures should ensure that as much 
cyber threat intelligence as possible is downgraded to the 
lowest classification level possible, including 
declassification where appropriate, and made available to as 
broad an audience in the private sector as possible, consistent 
with the need to protect the national security.
    Second, the DNI's procedures should ensure that cyber 
threat intelligence, including classified information, is 
routinely and consistently provided out to entities and 
individuals in the private sector with the appropriate 
clearances.
            Paragraph 2: Sharing and Use of Classified Information
    Paragraph (2) of subsection (a) requires that the DNI's 
procedures with respect to classified cyber threat intelligence 
require that classified information only be shared with 
certified entities, as defined by the legislation, or with 
individuals who possess appropriate security clearances, and be 
consistent with the need to protect national security. 
Certified entities are cybersecurity providers, protected 
entities, or self-protected entities that possess or are 
eligible to obtain a security clearance and can demonstrate to 
the Director of National Intelligence that they are able to 
appropriately protect such classified cyber threat 
intelligence.
    Paragraph (2) also requires that the DNI's procedures 
provide that classified cyber threat intelligence only be used 
by certified entities in a manner that protects the classified 
information from unauthorized disclosure. This provision 
ensures that when certified entities employ classified 
intelligence to protect unclassified systems or networks, they 
do so in a way that does not reveal classified information 
directly or indirectly.
    The Committee expects that the DNI's procedures will be 
flexible in nature and will take account of private sector 
innovation and incorporate current and future information 
sharing and security best practices. As a result, the Committee 
expects the DNI to work closely with the private sector to 
establish these procedures, to work with the private sector to 
meet the requirements of the procedures, and to ensure that 
these procedures result in the routine and consistent sharing 
of operationally-usable cyber threat intelligence. The 
Committee also expects the DNI to review and revise these 
procedures on a regular basis, at least annually, and to 
conduct such review in cooperation with the private sector, as 
well as to account for new technologies developed by the 
private sector in each set of revised procedures. The DNI 
should also strongly consider the establishment of a private-
sector advisory committee composed of senior executives at key 
private companies to advise on these procedures on a regular 
basis.
            Paragraph (3): Security Clearance Approvals
    Paragraph (3) requires the DNI to issue guidelines allowing 
the head of intelligence community elements to grant temporary 
or permanent security clearances to certified entities and 
their employees and officers (including non-employee officers 
such as board members) in order to allow the government to 
share classified cyber security threat intelligence with those 
certified entities. The Committee's intent is that the 
intelligence community grant security clearances to entities 
that are involved in protecting their own and their corporate 
customers' networks from cyber threats and that the 
intelligence community share cyber threat intelligence to 
protect the nation from advanced cyber threat actors. In 
particular, the Committee wishes to ensure that the private 
sector be able to receive highly classified cyber threat 
intelligence, including at the Top Secret/Sensitive 
Compartmented Information level, as appropriate to protect 
national security. The Committee is concerned that certain 
industries and entities may currently lack sufficient 
clearances at the appropriate level.
    Paragraph (3) also requires the DNI's guidelines to allow 
intelligence community elements to grant approval for the use 
of appropriate facilities and to expedite security clearances 
as necessary, consistent with the need to protect national 
security. The Committee's intent is that the approval process 
for the granting of security clearances and the use of 
facilities for the handling of classified information be 
expedited and broadened by these provisions.
    Because additional security clearances or facility 
approvals may be necessary to effectuate the goals of this 
legislation, it is further the Committee's intent that the cost 
for these security clearances and facility approvals, as well 
as the underlying investigations and adjudications necessary to 
obtain and maintain them, be fully borne by the private sector. 
As noted above, it is the Committee's intent that private 
sector entities that become certified entities will be able to 
better protect themselves, as well as to sell cybersecurity 
goods and services appropriately incorporating this information 
to protect other corporate customers in the private sector. It 
is therefore the Committee's view that these entities should 
bear the full cost of obtaining access to the valuable cyber 
threat intelligence the government will provide under the 
legislation to certified entities. The Committee therefore 
expects that the DNI's guidelines authorized by the legislation 
will provide for full payment of such costs by the private 
sector entity obtaining the security clearances or facility 
approvals.
            Paragraph 4: No Right or Benefit
    Paragraph (4) makes clear that while the Committee expects 
the Intelligence Community to work with private sector entities 
to help them meet the requirements to serve as a certified 
entity, no private sector entity is entitled to receive cyber 
threat intelligence from the government and that no right or 
benefit to cyber threat intelligence is created by the 
provision of such intelligence to a particular private sector 
entity or group of entities.

Section 1104(b) of Title 50: Private Sector Use of Cybersecurity 
        Systems and Sharing of Cyber Threat Information

    Subsection (b) of new Section 1104 provides clear, positive 
authority, notwithstanding any other provision of law, to 
private sector entities to monitor their own systems and 
networks or those of their corporate customers through the use 
of cybersecurity systems to identify and obtain cyber threat 
information, and to mitigate threat or vulnerabilities to their 
own systems or networks or those of their corporate customers. 
The Committee intends the notwithstanding clauses contained in 
subsection (b), as applied to this authority, to have the 
effect of removing any prohibition, real or perceived, to the 
monitoring, for cybersecurity purposes, of private sector 
systems and networks by the private sector entities that own 
the systems or networks or by security companies contracted by 
the system or network owner to protect those networks and 
systems. Potential barriers to such cybersecurity monitoring 
include federal laws governing electronic surveillance.
    Subsection (b) also provides clear, positive authority, 
notwithstanding any other provision of law, for the private 
sector to share cyber threat information identified and 
obtained through such cybersecurity monitoring with other 
entities within the private sector, as well as with the Federal 
Government on a purely voluntary basis, at the discretion of 
the private sector entities whose systems or networks are being 
protected. The Committee intends the notwithstanding clauses 
contained in subsection (b), as applied to this authority, to 
have the effect of removing any prohibition, real or perceived, 
to the sharing of cyber threat information within the private 
sector, as well as with the Federal Government. Potential 
barriers to such sharing that would be addressed by this 
provision include, but are not limited to, provisions of 
federal antitrust law, which some believe may limit sharing of 
cyber threat information between competitors in the private 
sector, as well as provisions of other federal laws including 
the telecommunications laws. The Committee's intent in 
addressing antitrust issues, amongst others, is to permit 
information sharing about cyber threats that might be hampered 
by such laws, not to permit inappropriate and unlawful 
activity, such as the coordinated fixing of prices.
    The Committee notes that the protections related to the 
authorities provided in this section are fairly robust, even 
standing alone. First, as noted below, only cyber threat 
information--that is information about a threat to, or 
vulnerability of government or private systems or networks--may 
be identified, obtained, or shared. And any such monitoring or 
sharing may only take place for cybersecurity purposes. And 
finally, the liability protection provided in this subsection 
only applies when an entity is acting in good faith. These 
provisions, taken together and building on top of one another, 
in the Committee's view, are a strong step towards protecting 
the privacy and civil liberties of Americans.
            Paragraph 1: In General
    Paragraph (1) of subsection (b) provides the twin 
authorities discussed above to cybersecurity providers, who 
provide goods and services to their corporate customers for 
cybersecurity purposes and to self-protected entities, who 
provide such cybersecurity goods and services for themselves.
    In providing these authorities, the legislation makes clear 
that the monitoring and sharing of information either by a 
cybersecurity provider or a self-protected entity may only take 
place for cybersecurity purposes, a defined term that, as 
discussed below, limits the identification, obtaining, and 
sharing of cyber threat information to the protection of 
private or government systems or networks from threat to, or 
vulnerabilities, of those systems or networks.
    Similarly, the identification and obtaining of cyber threat 
information by a provider or a self-protected entity may only 
take place as part of an effort to protect the rights and 
properties of the provider's corporate customer or the self-
protected entity itself, as the case may be. In this context, 
it is the Committee's intent that the protection of the rights 
and property of a corporate entity includes, but is not limited 
to, the protection of the systems and networks that make up its 
own corporate internal and external information systems but 
also the systems and networks over which it provides services 
to its customers. For example, the Committee expects that an 
internet service provider or telecommunications company may 
seek to protect not only its own corporate networks but also 
the backbone communications systems and networks over which it 
provides services to its customers. Similarly, for example, the 
Committee expects that a utility may seek not only to protect 
its corporate network but may seek to protect the systems and 
networks over which it provides electricity, water, or gas 
services to its customers. The Committee specifically intends 
the authorities provided in subsection (b) to permit private 
sector entities to protect such systems and networks.
    Paragraph (1) also requires that a cybersecurity provider 
obtain the express consent, whether in writing, electronically, 
orally, or otherwise, of its corporate customer before 
conducting any cybersecurity monitoring or sharing under these 
authorities. It is the Committee's intent that express consent 
may be provided on a going-forward basis by a corporate 
customer to a provider for a specified period of time, to be 
determined by the corporate customer.
    In addition, paragraph (1) makes clear that the sharing of 
information either by a cybersecurity provider or a self-
protected entity is to be purely voluntary and at the 
discretion of the entity whose systems or networks are being 
protected. Moreover, the legislation requires that where a 
provider is doing the sharing on behalf of a corporate 
customer, the customer must designate the entities or group of 
entities it wishes to share information with, and that it must 
specifically designate the Federal Government if it wishes to 
share information with the government.
    It is the Committee's expectation that many entities will 
be able to take advantage of the authorities provided in 
paragraph (1) when acting both as a cybersecurity provider and 
as a self-protected entity. For example, an entity such as an 
internet service provider may act as a cybersecurity provider 
when providing managed security services to a corporate 
customer and may simultaneously be acting as a self-protected 
entity when protecting its own corporate systems and networks 
as well as the systems and networks over which it provides 
services to its customers. The Committee's intent is that 
private sector entities will be able to simultaneously take 
advantage of multiple authorities provided within the 
legislation.
            Paragraph 2: Use and Protection of Information
    Paragraph (2) of subsection (b) provides protections to 
promote the robust sharing of cyber threat information both 
within the private sector as well as from the private sector to 
the government on a purely voluntary basis.
    Paragraph (2) provides that cyber threat information shared 
pursuant to paragraph (1) may only be shared in accordance with 
restrictions placed upon such sharing by the protected entity 
or the self-protected entity whose systems and networks are 
being protected and who therefore authorized the sharing. 
Paragraph (2) further provides that these restrictions may 
include the appropriate anonymization or minimization as 
determined by the protected entity or self-protected entity 
authorizing the sharing.
    The Committee's intent is that through paragraph (1) and 
paragraph (2), a private sector entity choosing to share cyber 
threat information under these provisions has complete control 
over whom it shares with and what information it shares, 
including whether the information it shares is anonymized or 
minimized. The Committee believes that leaving the decision to 
share and the execution of desired anonymization and 
minimization in the hands of the private sector entities whose 
systems and networks are being protected, rather than in the 
hands of the party receiving the information, including the 
government, helps enhance privacy and civil liberties.
    Paragraph (2) also provides that information shared 
pursuant to paragraph (1) may not be used by a receiving entity 
to gain an unfair competitive advantage to the detriment of the 
entity sharing the information. The Committee intends this 
provision to highlight that cybersecurity is enhanced by robust 
threat information sharing within the private sector, both 
amongst partners and competitors, without fear that a 
competitor will use the cyber threat or vulnerability 
information to unfairly obtain greater market share rather than 
simply to protect itself. The situation the Committee intends 
this provision to address is best demonstrated by an example: 
Company A shares information about a cyber vulnerability in one 
of its products with Company B, a competitor in the same 
marketplace; Company B the next day puts out an advertisement 
saying, ``Don't buy Company A's product because it has the 
following vulnerability . . . instead, buy our product which 
doesn't have the same vulnerabilities.'' This example would, in 
the Committee's view, constitute gaining an unfair competitive 
advantage at the expense of the entity sharing the information. 
This provision does not prevent any company from obtaining a 
fair competitive advantage by, for example, using the shared 
information to build a better, more secure product that can be 
marketed without reference to a vulnerability shared by a 
particular entity.
    Paragraph (2) further provides that cyber threat 
information voluntarily shared with the Federal Government 
pursuant to paragraph (1) shall be exempt from disclosure under 
the Freedom of Information Act, shall be considered proprietary 
information, shall not be disclosed by the Federal Government 
to an entity outside the Federal Government except as 
authorized by the entity sharing the information, and shall not 
be used by the Federal Government for regulatory purposes. The 
Committee intends this provision to address the key concerns 
expressed by the private sector regarding the sharing of their 
sensitive information with the federal government: first, that 
the government might expose its most sensitive threat and 
vulnerability information to a wide audience either through 
FOIA or by publishing the information, thereby providing a 
roadmap for attacks by cyber threat actors; second, that the 
government might take the information provided by the private 
sector and use it to regulate or impose sanctions upon them.
    The Committee determined that the best way to address these 
concerns and incentivize the sharing of cyber threat 
information with the government was to explicitly and clearly 
protect the information provided in this cybersecurity channel 
from being disclosed under FOIA, to require the government to 
carefully protect the information, and finally, to prohibit the 
government from using information provided in this 
cybersecurity channel from being used for regulatory purposes.
    The Committee was cognizant of the fact that cyber threat 
information provided to the government under these authorities 
might also be required to be provided by certain private sector 
entities to their regulators and therefore provided elsewhere 
in the legislation that the mere classification of the 
information as cyber threat information or its provision to the 
government under this mechanism does not satisfy those 
regulatory requirements nor override any appropriate regulation 
that may take place based on the provision of such information 
to the government through other channels. Nor would these 
provisions prevent a third party from obtaining appropriate 
information through an otherwise appropriate FOIA request to a 
regulator who obtained the information under other regulatory 
authorities. Rather, the limitations here were designed to 
provide a safe harbor where private sector entities could 
provide real-time cyber threat information to the government 
without fear that that particular information would be used to 
regulate them directly or be exploited by bad actors.
            Paragraph 3: Exemption from Liability
    Paragraph (3) provides a bar to civil or criminal causes of 
action being brought or maintained in federal or state court 
against an entity or its officers, employees, or agents acting 
in good faith to use cybersecurity systems for monitoring to 
identify and obtain cyber threat information in accordance with 
the provisions of the legislation. The Committee's intent is to 
provide strong liability protection for private sector entities 
when they act to take advantage of the authorities provided 
under paragraph (1) of subsection (b) to do what the statute 
seeks to encourage them to do: robustly monitor their own 
systems and networks and those of their corporate customers and 
share information about threats and vulnerabilities to better 
protect their systems. Specifically, the Committee intends that 
civil or criminal actions based on the use of cybersecurity 
systems to monitor systems or networks to identify and obtain 
cyber threat information using the authorities of this statute 
shall be dismissed immediately by the courts and prior to 
significant discovery and extensive motion practice.
    Paragraph (3) also provides an identical bar to actions 
against such entities acting in good faith for not acting on 
information obtained or shared in accordance with the 
provisions of the legislation. The Committee's intent is 
likewise to provide strong liability protection to entities 
when they engage in robust cyber threat information sharing so 
that they are not held liable for not acting on every piece of 
cyber threat intelligence provided by the government or every 
piece of cyber threat information that they detect or receive 
from another private sector entity. The Committee believes that 
if information sharing does become truly robust, the amount of 
cyber threat information and the speed with which such 
information will be shared will make it nearly impossible to 
always protect against every threat in real-time and, as such, 
private sector entities ought not be held liable for such 
actions. Similarly, the Committee recognizes that particular 
entities may engage in a cost-benefit analysis with respect to 
implementing protections against particular threats and the 
Committee intends this provision to help ensure that a private 
sector entity making such a judgment not be held liable for 
making such reasonable determinations.
    At the same time, the Committee was fully cognizant of the 
concern that it not create a moral hazard by providing too 
broad a liability protection provision and that it not 
incentivize bad acts. As a result, Paragraph (3) requires that 
the entity be acting in good faith to obtain the benefits of 
this liability protection. That is, where an entity acts in bad 
faith, it does not receive the benefit of the strong liability 
protection provided by the legislation. Of course, where an 
entity is seeking to take advantage of specific statutory 
authority provided by Congress and where Congress is seeking to 
incentivize cybersecurity activities, as with government action 
taken pursuant to statutory authority and the presumption of 
regularity that attaches to such actions, the Committee expects 
that good faith will be presumed in the absence of substantial 
evidence to the contrary.
            Paragraph 4: Relationship to Other Laws Requiring the 
                    Disclosure of Information
    Paragraph (4) provides that the provision of cyber threat 
information to the government under the voluntary system 
established by this statute does not satisfy or affect any 
requirement under other provisions of law to provide 
information to the Federal Government. As noted briefly 
earlier, the Committee intends this provision to ensure that 
while information provided to the government under this 
legislation is protected from use by the government for 
regulatory purposes, that information otherwise required to be 
provided to the government must still be provided and that such 
information--required by other law to be provided to the 
government--may still be used for all lawful purposes, 
including, as required by law, for regulatory purposes.

Section 1104(c) of Title 50: Federal Government Use of Information

    Subsection (c) of new Section 1104 provides certain 
limitations on the government's use of information provided by 
the private sector and ensures that the private sector's 
provision of information to the government is purely voluntary. 
The Committee intends these provisions, along with others in 
the legislation, to help protect the privacy and civil 
liberties of Americans.
            Paragraph (1): Limitation
    Paragraph (1) of subsection (c) limits the Federal 
Government's use of information shared with the government by 
the private sector by requiring at least one significant 
purpose of the government's use of such information to be 
either a cybersecurity purpose or the protection of the 
national security of the United States. As such, the Committee 
intends this provision not to create a wall between 
cybersecurity and national security uses of information on one 
hand and all other lawful government uses on the other, rather 
it intends this provision simply to ensure that the government 
is using the information at least for cybersecurity or national 
security, amongst the other uses it might make of the 
information.
            Paragraph (2): Affirmative Search Restriction
    Paragraph (2) limits the Federal Government's affirmative 
searching of data provided exclusively under this legislation 
to the government by the private sector to only conducting such 
searches for cybersecurity purposes or the protection of the 
national security. The Committee intends this provision to 
ensure that information provided under this authority not be 
affirmatively searched by the government for evidence of 
garden-variety crimes like tax evasion or money laundering.
            Paragraph 3: Anti-Tasking Restrictions
    Paragraph (3) makes clear that nothing in this legislation 
permits the government to require a private sector entity to 
share with the Federal Government nor to condition the sharing 
of cyber threat intelligence under subsection (a) on the 
provision of cyber threat information back to the Federal 
Government under subsection (b). The Committee intends this 
provision to ensure that cyber threat information sharing by 
the private sector with the Federal Government remains purely 
voluntary and that the government not attempt to compel such 
sharing by withholding valuable cyber threat intelligence. The 
Committee believes that this provision also prevents the 
government from ``tasking'' the collection of information as 
the government might do under appropriate criminal or foreign 
intelligence surveillance authority because it ensures that the 
private sector cannot be required to provide information back 
to the government.

Section 1104(d) of Title 50: Report on Information Sharing

    Subsection (d) of new Section 1104 requires the Inspector 
General of the Intelligence Community to report annually to the 
Congressional intelligence committees, in unclassified form 
accompanied by a classified annex as needed, on the use of the 
information shared with the Federal Government under this 
legislation. The report on the use of information shared with 
the Federal Government will include: (1) a review of the use of 
such information for purposes other than cybersecurity; (2) a 
review of the type of information shared with the Federal 
Government; (3) a review of the actions taken by the Federal 
Government based on the information shared; (4) appropriate 
metrics to determine the impact of such sharing on privacy and 
civil liberties, if any such impact exists; and (5) any 
recommendations of the Inspector General for improvements or 
modifications to the authorities provided under this 
legislation. It is the Committee's intent that this report 
provide the Committee with the information it needs to ensure 
that the privacy and civil liberties of Americans are being 
appropriately protected.

Section 1104(e) of Title 50: Federal Preemption

    Subsection (e) of new Section 1104 provides that the 
legislation supersedes any provision of state or local law that 
may prohibit the activities authorized by this legislation. The 
Committee's intent is to ensure, as with the federal provisions 
discussed above, that state and local law on wiretapping, 
antitrust, and public disclosure, to name but a few, do not 
stand as a bar to the kind of robust cyber threat intelligence 
and information sharing that the Committee hopes to engender 
through the process of legislation.

Section 1104(f) of Title 50: Savings Clause

    Subsection (f) of new Section 1104 makes clear that nothing 
in this legislation trumps existing laws or authorities 
permitting the use of cybersecurity systems or efforts to 
identify, obtain, or share cyber threat information. Many 
private sector entities today take advantage of certain 
provisions of federal law to conduct the limited monitoring for 
cybersecurity purposes. While this legislation provides much 
more robust authorities, the Committee believed it important to 
ensure that existing authorities remained in place and that 
those authorities could continue to be used by the appropriate 
government agencies and entities.

Section 1104(g) of Title 50: Definitions

    Subsection (g) of the new Section 1104 provides important 
definitions for the purpose of this legislation. The Committee 
notes that much of the work on limiting the scope and breadth 
of this legislation is done by the definitions and commends 
those interested in this legislation to carefully review these 
definitions in the context of the legislation.
            Paragraph 1: Certified Entity
    As noted briefly above, a certified entity is defined as a 
cybersecurity provider, a protected entity, or a self-protected 
entity that also possesses or is eligible to obtain a security 
clearance at the level appropriate to receive classified cyber 
threat intelligence, as determined by the DNI, and can 
demonstrate to the Director of National Intelligence that it 
can appropriately protect that classified information.
            Paragraph 2: Cyber Threat Information
    Cyber threat information is defined to mean information 
that directly pertains to a vulnerability of, or threat to, a 
system or network of a government or private entity. Such 
information includes, but is not limited to, information 
pertaining to the protection of a system or network from 
efforts to degrade, disrupt or destroy the network, as well as 
the protection of a system or network from the theft or 
misappropriation of private or government information, among 
other things.
            Paragraph 3: Cyber Threat Intelligence
    The definition of cyber threat intelligence is consistent 
with the definition of cyber threat information except that 
cyber threat intelligence is information that is originally in 
the possession of an element of the intelligence community. The 
Committee used different terms in this legislation with similar 
definitions in order to distinguish the origin of information. 
Cyber threat intelligence thus originates with the government 
while cyber threat information originates with the private 
sector.
            Paragraph 4: Cybersecurity Provider
    A cybersecurity provider is defined to be a non-
governmental entity that provides goods or services intended to 
be used for cybersecurity purposes. The Committee intentionally 
excluded governmental entities from this construct to avoid any 
concern that government agencies might serve as cybersecurity 
providers to private sector entities.
            Paragraph 5: Cybersecurity Purpose
    A cybersecurity purpose is defined as the purpose of 
ensuring the integrity, confidentiality, and availability of, 
or safeguarding, a system or network. This includes, but is not 
limited to, the protection of a system or network from efforts 
to degrade, disrupt or destroy the network, as well as the 
protection of a system or network from the theft or 
misappropriation of private or government information, among 
other things.
            Paragraph 6: Cybersecurity System
    A cybersecurity system is defined as a system designed or 
employed to ensure the integrity, confidentiality, and 
availability of, or safeguard, a system or network. This 
includes, but is not limited to, a system designed or employed 
to protect a system or network from efforts to degrade, disrupt 
or destroy the network, as well as a system designed or 
employed to protect a system or network from the theft or 
misappropriation of private or government information, among 
other things.
            Paragraph 7: Protected Entity
    A protected entity is defined as an entity, other than an 
individual, that contracts with a cybersecurity provider for 
goods or services to be used for cybersecurity purposes. The 
Committee intentionally excluded individuals from this 
definition so as to limit the direct scope of the legislation 
to the protection of corporate entities.
            Paragraph 8: Self-Protected Entity
    A self-protected entity is defined as an entity, other than 
an individual, that provides goods or services for 
cybersecurity purposes to itself. As with the definition of a 
protected entity, the Committee intentionally excluded 
individuals from this definition so as to limit the direct 
scope of the legislation to the protection of corporate 
entities.

Section 2(b): Procedures and Guidelines

    This subsection of the Act requires the DNI to establish 
the procedures for sharing of cyber threat intelligence and to 
issue the guidelines for granting security clearances within 60 
days of the date of enactment of the Act. This subsection of 
the Act also requires the DNI to expeditiously distribute the 
procedures and guidelines to appropriate federal government and 
private sector entities. The Committee intends to require the 
DNI to meet these deadlines and to broadly distribute the 
procedures and guidelines. As previously noted, the Committee 
expects the DNI to work closely with the private sector in 
developing these procedures and guidelines.

Section 2(c): Initial Report

    This subsection of the Act requires the first report to be 
provided to the Congressional intelligence committees by the 
Inspector General of the Intelligence Community under new 
subsection (d) of section 1104 to be provided no later than one 
year after the date of the enactment of this Act.

Section 2(d): Table of Contents Amendment

    This subsection of the Act provides for amendments to the 
table of contents of the National Security Act of 1947.

                 Oversight Findings and Recommendations

    With respect to clause 3(c)(1) of rule XIII of the Rules of 
the House of Representatives, the Committee held two closed 
hearings, one open hearing, and four informal meetings or 
briefings relating to the subject matter of the legislation. 
The bill, as reported by the Committee, reflects conclusions 
reached by the Committee in light of this oversight activity.

                General Performance Goals and Objectives

    In accordance with clause 3(c) of House rule XIII, the 
Committee's performance goals and objectives are reflected in 
the descriptive portions of this report.

                       Unfunded Mandate Statement

    Section 423 of the Congressional Budget and Impoundment 
Control Act (as amended by Section 101(a)(2) of the Unfunded 
Mandates Reform Act, P.L. 104-4) requires a statement of 
whether the provisions of the reported bill include unfunded 
mandates. In compliance with this requirement, the Committee 
has received a letter from the Congressional Budget Office 
included herein.

                  Statement on Congressional Earmarks

    Pursuant to clause 9 of rule XXI of the Rules of the House 
of Representatives, the Committee states that the bill as 
reported contains no congressional earmarks, limited tax 
benefits, or limited tariff benefits.

           Budget Authority and Congressional Budget Office 
                             Cost Estimate

    With respect to the requirements of clause 3(c)(2) of rule 
XIII of the Rules of the House of Representatives and section 
308(a) of the Congressional Budget Act of 1974 and with respect 
to requirements of 3(c)(3) of rule XIII of the Rules of the 
House of Representatives and section 402 of the Congressional 
Budget Act of 1974, the Committee has received the following 
cost estimate for H.R. 3523 from the Director of the 
Congressional Budget Office:

                                     U.S. Congress,
                               Congressional Budget Office,
                                 Washington, DC, December 16, 2011.
Hon. Mike Rogers,
Chairman, Permanent Select Committee on Intelligence,
House of Representatives, Washington, DC.
    Dear Mr. Chairman: The Congressional Budget Office has 
prepared the enclosed cost estimate for H.R. 3523, the Cyber 
Intelligence Sharing Act.
    If you wish further details on this estimate, we will be 
pleased to provide them. The CBO staff contact is Jason 
Wheelock.
            Sincerely,
                                              Douglas W. Elmendorf.
    Enclosure.

H.R. 3523--Cyber Intelligence Sharing Act

    H.R. 3523 would amend the National Security Act of 1947 to 
require the Director of National Intelligence (DNI) to 
establish procedures to promote the sharing of information 
about cyberthreats between intelligence agencies and the 
private sector. The DNI also would be directed to establish 
guidelines for granting security clearances to employees of the 
private-sector entities with which the government shares such 
information. CBO estimates that implementing the bill would 
have a discretionary cost of $15 million over the 2012-2016 
period, assuming appropriation of the necessary amounts. 
Enacting H.R. 3523 would not affect direct spending or 
revenues; therefore, pay-as-you-go procedures do not apply.
    CBO anticipates additional personnel would be needed to 
administer the program and to manage the exchange of 
information between intelligence agencies and the private 
sector. Based on information from the DNI and the Office of 
Personnel Management, CBO estimates that those activities would 
cost approximately $3 million annually over the 2012-2016 
period, assuming appropriation of the necessary amounts.
    The bill would impose intergovernmental and private-sector 
mandates, as defined in the Unfunded Mandates Reform Act 
(UMRA), by extending civil and criminal liability protection to 
entities and cybersecurity providers that share or use 
cyberthreat information. The bill also would impose additional 
intergovernmental mandates by preempting state laws. Because 
CBO is uncertain about the number of cases that would be 
limited and any forgone compensation that would result, CBO 
cannot determine whether the costs of the mandate would exceed 
the annual threshold established in UMRA for private-sector 
mandates ($142 million in 2011, adjusted annually for 
inflation). However, CBO estimates that the aggregate costs of 
the mandates on public entities would fall below the threshold 
for intergovernmental mandates ($71 million in 2011, adjusted 
annually for inflation).
    The CBO staff contacts for this estimate are Jason Wheelock 
(for federal costs), J'nell J. Blanco (for the 
intergovernmental impact), and Elizabeth Bass (for the private-
sector impact). This estimate was approved by Theresa Gullo, 
Deputy Assistant Director for Budget Analysis.

         Changes in Existing Law Made by the Bill, as Reported

  In compliance with clause 3(e) of rule XIII of the Rules of 
the House of Representatives, changes in existing law made by 
the bill, as reported, are shown as follows (new matter is 
printed in italic and existing law in which no change is 
proposed is shown in roman):

                     NATIONAL SECURITY ACT OF 1947


                              SHORT TITLE

  That this Act may be cited as the ``National Security Act of 
1947''.

                            TABLE OF CONTENTS

Sec. 2. Declaration of policy.
     * * * * * * *

                       TITLE XI--OTHER PROVISIONS

     * * * * * * *
Sec. 1104. Cyber threat intelligence and information sharing.

           *       *       *       *       *       *       *


TITLE XI--ADDITIONAL MISCELLANEOUS PROVISIONS

           *       *       *       *       *       *       *


           CYBER THREAT INTELLIGENCE AND INFORMATION SHARING

  Sec. 1104. (a) Intelligence Community Sharing of Cyber Threat 
Intelligence With Private Sector.--
          (1) In general.--The Director of National 
        Intelligence shall establish procedures to allow 
        elements of the intelligence community to share cyber 
        threat intelligence with private-sector entities and to 
        encourage the sharing of such intelligence.
          (2) Sharing and use of classified intelligence.--The 
        procedures established under paragraph (1) shall 
        provide that classified cyber threat intelligence may 
        only be--
                  (A) shared by an element of the intelligence 
                community with--
                          (i) certified entities; or
                          (ii) a person with an appropriate 
                        security clearance to receive such 
                        cyber threat intelligence;
                  (B) shared consistent with the need to 
                protect the national security of the United 
                States; and
                  (C) used by a certified entity in a manner 
                which protects such cyber threat intelligence 
                from unauthorized disclosure.
          (3) Security clearance approvals.--The Director of 
        National Intelligence shall issue guidelines providing 
        that the head of an element of the intelligence 
        community may, as the head of such element considers 
        necessary to carry out this subsection--
                  (A) grant a security clearance on a temporary 
                or permanent basis to an employee or officer of 
                a certified entity;
                  (B) grant a security clearance on a temporary 
                or permanent basis to a certified entity and 
                approval to use appropriate facilities; and
                  (C) expedite the security clearance process 
                for a person or entity as the head of such 
                element considers necessary, consistent with 
                the need to protect the national security of 
                the United States.
          (4) No right or benefit.--The provision of 
        information to a private-sector entity under this 
        subsection shall not create a right or benefit to 
        similar information by such entity or any other 
        private-sector entity.
  (b) Private Sector Use of Cybersecurity Systems and Sharing 
of Cyber Threat Information.--
          (1) In general.--
                  (A) Cybersecurity providers.--Notwithstanding 
                any other provision of law, a cybersecurity 
                provider, with the express consent of a 
                protected entity for which such cybersecurity 
                provider is providing goods or services for 
                cybersecurity purposes, may, for cybersecurity 
                purposes--
                          (i) use cybersecurity systems to 
                        identify and obtain cyber threat 
                        information to protect the rights and 
                        property of such protected entity; and
                          (ii) share such cyber threat 
                        information with any other entity 
                        designated by such protected entity, 
                        including, if specifically designated, 
                        the Federal Government.
                  (B) Self-protected entities.--Notwithstanding 
                any other provision of law, a self-protected 
                entity may, for cybersecurity purposes--
                          (i) use cybersecurity systems to 
                        identify and obtain cyber threat 
                        information to protect the rights and 
                        property of such self-protected entity; 
                        and
                          (ii) share such cyber threat 
                        information with any other entity, 
                        including the Federal Government.
          (2) Use and protection of information.--Cyber threat 
        information shared in accordance with paragraph (1)--
                  (A) shall only be shared in accordance with 
                any restrictions placed on the sharing of such 
                information by the protected entity or self-
                protected entity authorizing such sharing, 
                including appropriate anonymization or 
                minimization of such information;
                  (B) may not be used by an entity to gain an 
                unfair competitive advantage to the detriment 
                of the protected entity or the self-protected 
                entity authorizing the sharing of information; 
                and
                  (C) if shared with the Federal Government--
                          (i) shall be exempt from disclosure 
                        under section 552 of title 5, United 
                        States Code;
                          (ii) shall be considered proprietary 
                        information and shall not be disclosed 
                        to an entity outside of the Federal 
                        Government except as authorized by the 
                        entity sharing such information; and
                          (iii) shall not be used by the 
                        Federal Government for regulatory 
                        purposes.
          (3) Exemption from liability.--No civil or criminal 
        cause of action shall lie or be maintained in Federal 
        or State court against a protected entity, self-
        protected entity, cybersecurity provider, or an 
        officer, employee, or agent of a protected entity, 
        self-protected entity, or cybersecurity provider, 
        acting in good faith--
                  (A) for using cybersecurity systems or 
                sharing information in accordance with this 
                section; or
                  (B) for not acting on information obtained or 
                shared in accordance with this section.
          (4) Relationship to other laws requiring the 
        disclosure of information.--The submission of 
        information under this subsection to the Federal 
        Government shall not satisfy or affect any requirement 
        under any other provision of law for a person or entity 
        to provide information to the Federal Government.
  (c) Federal Government Use of Information.--
          (1) Limitation.--The Federal Government may use cyber 
        threat information shared with the Federal Government 
        in accordance with subsection (b) for any lawful 
        purpose only if--
                  (A) the use of such information is not for a 
                regulatory purpose; and
                  (B) at least one significant purpose of the 
                use of such information is--
                          (i) a cybersecurity purpose; or
                          (ii) the protection of the national 
                        security of the United States.
          (2) Affirmative search restriction.--The Federal 
        Government may not affirmatively search cyber threat 
        information shared with the Federal Government under 
        subsection (b) for a purpose other than a purpose 
        referred to in paragraph (1)(B).
          (3) Anti-tasking restriction.--Nothing in this 
        section shall be construed to permit the Federal 
        Government to--
                  (A) require a private-sector entity to share 
                information with the Federal Government; or
                  (B) condition the sharing of cyber threat 
                intelligence with a private-sector entity on 
                the provision of cyber threat information to 
                the Federal Government.
  (d) Report on Information Sharing.--
          (1) Report.--The Inspector General of the 
        Intelligence Community shall annually submit to the 
        congressional intelligence committees a report 
        containing a review of the use of information shared 
        with the Federal Government under this section, 
        including--
                  (A) a review of the use by the Federal 
                Government of such information for a purpose 
                other than a cybersecurity purpose;
                  (B) a review of the type of information 
                shared with the Federal Government under this 
                section;
                  (C) a review of the actions taken by the 
                Federal Government based on such information;
                  (D) appropriate metrics to determine the 
                impact of the sharing of such information with 
                the Federal Government on privacy and civil 
                liberties, if any; and
                  (E) any recommendations of the Inspector 
                General for improvements or modifications to 
                the authorities under this section.
          (2) Form.--Each report required under paragraph (1) 
        shall be submitted in unclassified form, but may 
        include a classified annex.
  (e) Federal Preemption.--This section supersedes any statute 
of a State or political subdivision of a State that restricts 
or otherwise expressly regulates an activity authorized under 
subsection (b).
  (f) Savings Clause.--Nothing in this section shall be 
construed to limit any other authority to use a cybersecurity 
system or to identify, obtain, or share cyber threat 
intelligence or cyber threat information.
  (g) Definitions.--In this section:
          (1) Certified entity.--The term ``certified entity'' 
        means a protected entity, self-protected entity, or 
        cybersecurity provider that--
                  (A) possesses or is eligible to obtain a 
                security clearance, as determined by the 
                Director of National Intelligence; and
                  (B) is able to demonstrate to the Director of 
                National Intelligence that such provider or 
                such entity can appropriately protect 
                classified cyber threat intelligence.
          (2) Cyber threat information.--The term ``cyber 
        threat information'' means information directly 
        pertaining to a vulnerability of, or threat to, a 
        system or network of a government or private entity, 
        including information pertaining to the protection of a 
        system or network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (3) Cyber threat intelligence.--The term ``cyber 
        threat intelligence'' means information in the 
        possession of an element of the intelligence community 
        directly pertaining to a vulnerability of, or threat 
        to, a system or network of a government or private 
        entity, including information pertaining to the 
        protection of a system or network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (4) Cybersecurity provider.--The term ``cybersecurity 
        provider'' means a non-governmental entity that 
        provides goods or services intended to be used for 
        cybersecurity purposes.
          (5) Cybersecurity purpose.--The term ``cybersecurity 
        purpose'' means the purpose of ensuring the integrity, 
        confidentiality, or availability of, or safeguarding, a 
        system or network, including protecting a system or 
        network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (6) Cybersecurity system.--The term ``cybersecurity 
        system'' means a system designed or employed to ensure 
        the integrity, confidentiality, or availability of, or 
        safeguard, a system or network, including protecting a 
        system or network from--
                  (A) efforts to degrade, disrupt, or destroy 
                such system or network; or
                  (B) theft or misappropriation of private or 
                government information, intellectual property, 
                or personally identifiable information.
          (7) Protected entity.--The term ``protected entity'' 
        means an entity, other than an individual, that 
        contracts with a cybersecurity provider for goods or 
        services to be used for cybersecurity purposes.
          (8) Self-protected entity.--The term ``self-protected 
        entity'' means an entity, other than an individual, 
        that provides goods or services for cybersecurity 
        purposes to itself.

                             MINORITY VIEWS

        Cyber Intelligence Sharing and Protection Act, H.R. 3523

    As members of the Intelligence Committee, it is our 
responsibility to ensure that intelligence support to the 
cybersecurity of our nation is focused and robust. The 
Intelligence Community's unique insight and knowledge of 
cyberspace are critical to our nation's ability to defend, not 
only U.S. Government information technology, but also our 
Critical Infrastructure and Defense Industrial Base.
    This Bill is the culmination of a strong bipartisan effort 
and provides an innovative, yet pragmatic, approach to 
cybersecurity. It leverages the Intelligence Community's 
expertise and incentivizes the private sector to share cyber 
threat information in order to build an enduring private-public 
partnership for this strategic threat to our nation's security. 
Specifically, the Cyber Intelligence Sharing and Protection Act 
provides the authority for the Intelligence Community to share 
classified cyber threat intelligence with properly-vetted 
industry partners and encourages the voluntary sharing of cyber 
threat information with the U.S. Government.
    It is the Minority's strong intent in supporting this Bill 
to facilitate this private-public sharing of information 
regarding malevolent cyber activity in a way that ensures that 
the privacy and civil liberties of U.S. persons are respected 
and protected. An equitable and ethical balance between 
flexible information sharing and privacy must be established, 
maintained and vigilantly reviewed.
    We express continued interest in working with the Majority 
to further address concerns raised by the Administration and 
civil liberties organizations.
    We believe that this Bill and its amendments strike this 
delicate balance by requiring that any shared information used 
by the Government meet a cybersecurity or national security 
threshold and by prohibiting the Government's use of shared 
information for regulatory purposes. Moreover, in recognition 
that this Bill is a pioneering effort, this Committee is fully 
committed to diligent oversight of the parties' conduct 
pursuant to this Bill.
    The Bill directs the Intelligence Community Inspector 
General to be alert to and review any U.S. Government activity 
or use of shared information that goes beyond the cybersecurity 
focus of this Bill. Should that oversight identify significant 
concerns or abuse, the Minority is committed to working with 
the Majority to take all appropriate and timely action to 
further enhance privacy protections.
    To repeat: the Minority supported this Bill in the 
expectation that, both the participating private companies and 
the Government, will appreciate and not abuse the flexibility 
and liability protection afforded by this Bill. With the 
dedicated support of both government and industry--overlaid 
with Congressional oversight--we are optimistic that this Bill 
will work as envisioned to strengthen cybersecurity in a manner 
that respects American values.

                                   C.A. Dutch Ruppersberger.
                                   Mike Thompson.
                                   Jim Langevin.
                                   Adam B. Schiff.
                                   Dan Boren.
                                   Ben Chandler.

                             MINORITY VIEWS

        Cyber Intelligence Sharing and Protection Act, H.R. 3523

    The intent of this Bill is to authorize the U.S. Government 
to share classified cybersecurity intelligence with the private 
sector in a secure manner and to enable the private sector to 
share cybersecurity information with the U.S. Government in 
real-time, without fear of liability if acting in good faith.
    I agree that we are facing serious cyber threats and that 
all Americans will benefit from strong cybersecurity 
protections for our critical infrastructure. However, I believe 
we need to balance those concerns with measures to protect the 
privacy and civil liberties that Americans also deserve. While 
I appreciate the efforts of authors of this bipartisan bill and 
its focus on cybersecurity, I believe that balance has not yet 
been achieved.
    Although the Bill includes adequate protections for 
classified information and corporate proprietary information, 
its language does not provide commensurate protection for the 
personal accounts of U.S. persons or personal identifiable 
information (PII). For example, the Bill's language does not 
restrict the nature or volume of the information that the 
private sector can share with the Government, does not provide 
for mandatory minimization of PII, does not significantly 
curtail the Government's use of shared information, and does 
not include most of the privacy protections recommended by the 
White House in its proposed cybersecurity legislation.
    I am also concerned that the new liability shield provided 
in the Bill is overly broad and is less protective of consumers 
than similar shields provided under many state laws. We should 
be very careful whenever we limit injured consumers' ability to 
seek legal redress. If a good faith requirement is to be used, 
it should be based on clear and objective criteria. In no 
event, however, should cybersecurity entities be protected if 
injuries are the result of neglect, recklessness or misconduct.
    Accordingly, while I strongly agree with the need to enact 
effective cybersecurity legislation, and commend the 
constructive bipartisan effort underlying this Bill, I 
respectively dissent because the Bill does not sufficiently 
protect individual privacy rights and civil liberties.
                                   Janice D. Schakowsky.

                                  







Rise Of The Fourth Reich – Full Movie

The officers of the SS, Hitler’s feared paramilitary unit, were the most notorious war criminals of WWII. Some were brought to justice after the war, but many were able to escape from Germany. A massive secret organization known as Odessa was reportedly formed to help them flee and rebuild a new Reich that would again rise to power. MysteryQuest will investigate by following the path of feared Nazis from Germany, to Austria, and Italy. The team will also travel to Paraguay where many of the Nazis reportedly hid while plotting their new rise.

TOP-SECRET – U.S. Army Regulation 525–13 Antiterrorism

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-Antiterrorism.png

 

This regulation establishes the Army Antiterrorism (AT) Program to protect personnel (Soldiers, members of other Services, Department of the Army (DA) civilian employees, Department of Defense (DOD) contractors and Family members of DOD employees), information, property, and facilities (including civil work and like projects) in all locations and situations against terrorism. It provides—

a. Department of the Army AT tasks
b. Department of the Army AT standards.
c. Implementing guidance for the execution of the AT standards.
d. Policies, procedures, and responsibilities for execution of the AT program.

5–21. Standard 20. Terrorism Incident Response Measures

a. Army standard 20. Commanders and heads of agencies/activities will include in AT plans terrorism incident response measures that prescribe appropriate actions for reporting terrorist threat information, responding to threats/actual attacks, and reporting terrorist incidents.

b. Implementing guidance.

(1) Terrorist incident response measures in AT plans will, at a minimum, address management of the FPCON system, implementation of all FPCON measures, and requirements for terrorist related reports. Plans will be affordable, effective, and attainable; tie security measures together; and integrate security efforts by assigning responsibilities, establishing procedures, and ensuring subordinate plans complement each other. At the garrison level, the plans must tie into other installation response plans.

(2) At garrison level, commanders will identify high risk targets (HRTs), mission essential vulnerable areas (MEVAs) and ensure planning provides for focus on these areas. Facility managers whose facility has been identified as a HRT will be informed, and will ensure facility security plans are formulated on this basis.

(3) Commanders will develop procedures to ensure periodic review, update, and coordination of response plans with appropriate responders.

(4) Commanders will ensure CBRNE, medical, fire, and police response procedures are integrated into consequence management/AT plans.

(5) Plans will include procedures for an attack warning system using a set of recognizable alarms and reactions for potential emergencies, as determined by the terrorist threat, criticality, and vulnerability assessments. Commanders will exercise the attack warning system and ensure personnel are trained and proficient in recognition. In conjunction with the alarm warning system, commanders will conduct drills on emergency evacuations/ movements to safe havens/shelters-in-place.

(6) CONUS commanders will—

(a) Notify the local FBI office concerning threat incidents occurring at Army installations, facilities, activities, and civil work projects or like activities.

(b) Take appropriate action to prevent loss of life and/or mitigate property damage before the FBI response force arrives. On-site elements or USACIDC elements will be utilized to safeguard evidence, witness testimony, and related aspects of the criminal investigation process pending arrival of the FBI response force. Command of U.S. Army elements will remain within military channels.

(c) If the FBI declines jurisdiction over a threat incident occurring in an area of exclusive or concurrent Federal jurisdiction, take appropriate action in conjunction with USACIDC elements to resolve the incident. In such cases, commanders will request advisory support from the local FBI office.

(d) If the FBI declines jurisdiction over a threat incident occurring in an area of concurrent or proprietary Federal jurisdiction, coordinate the military response with USACIDC elements, state and local law enforcement agencies, as appropriate. In such cases, commanders will request advisory support from the local FBI office.

(7) OCONUS commanders will—

(a) Where practicable, involve HN security and law enforcement agencies in AT reactive planning and request employment of HN police forces in response to terrorist attacks.

(b) Coordinate reactions to incidents of a political nature with the U.S. Embassy and the HN, subject to instructions issued by the combatant commander with geographical responsibility.

(c) In SIGNIFICANT and HIGH terrorist threat level areas, plans to respond to terrorist incidents will contain procedures for the notification of all DOD personnel and their dependents. Such plans will provide for enhanced security measures and/or possible evacuation of DOD personnel and their dependents.

(8) USACIDC will investigate threat incidents in accordance with paragraph 2–20d.

(9) AT plans, orders, SOPs, terrorism threat, criticality, and vulnerability assessments, and coordination measures will consider the potential threat use of WMD. Commanders will assess the vulnerability of installations, facilities, and personnel within their AOR to potential threat of terrorist using WMD and CBRNE weapons to include TIH. Clear command, control, and communication lines will be established between local, state, Federal, and HN emergency assistance agencies to detail support relationships and responsibilities. Response to WMD use by terrorists will be synchronized with other crisis management plans that deal with large-scale incident response and consequence management. Separate plans devoted only to terrorist use of WMD need not be published if existing crisis management plans covering similar events (such as accidental chemical spills) are sufficiently comprehensive.

 

 

Unveiled – Captured German War Films (1945)

Captured German War Films
Summary: POSTHUMOS AWARDS: CU, Swastika emblem, CUs, display of medals – men at attention. Sequence: Civilians receiving awards from Herman Goering. Karl Von Rumstedt, Admiral Erich Raeder and Herman Goering. Goering pays homage at dead soldier’s bier. MS, casket placed into mausoleum. HITLER VISITS WOUNDED VETS IN HOSPITAL: CU, Adolf Hitler arriving; with wounded vets, people cheer as he departs. MS, Hitler with officers in the field. MS, Heinrich Himmler, Joseph P Goebbels, Gen Guderian and others standing and talking in field. Review: Sequence – youthful officer inspecting and addressing company of German soldiers at attention, cut ins soldiers listening. VOLKSTURM ON PARADE: Sequence: Aged civilian members Of the Home Guard on parade. CU’s brassards with insignia typifying Volksturm. Parade scenes. U BOAT INSPECTION: Sequence: Aged civilian arriving at dock, touring interior of sub, at periscope (evidently U BOAT INVENTOR).

Department of Defense. Department of the Air Force. (09/26/1947 – )

ARC Identifier 64760 / Local Identifier 342-USAF-13034 and ARC Identifier 24043 / Local Identifier 111-ADC-10281. 1939-1945.

TOP-SECRET – Report by Vyshinsky to Molotov Concerning Trade and Economic Cooperation Between the Soviet Union and the United States, August 1941

Date:
08/01/1941
Source:
Library of Congress
Description:
Report by Vyshinsky to Molotov concerning trade and economic cooperation between the Soviet Union and the United States, August 1941

 

To Comrade V. M. Molotov

I present for your confirmation:

1. The draft resolution of the USSR Council of People’s Commissars [SNK SSSR] on extending the trade agreement currently in effect between the USSR and the U.S.A. to August 6, 1942.

2. The text of notes which will be exchanged this August 4 in Washington between Umanskii and Welles.

The SNK SSSR resolution and notes which will be exchanged this August 4 in Washington are subject for publication.

In addition to this note on extending the agreement, two other notes will he exchanged:

a) on the U.S.A. rendering economic cooperation to us (with subsequent publication);

b) on the inapplicability for us of discretionary conditions concerning our gold and silver (without publi-cation).

The texts of the last two notes are not yet in our possession.

[handwritten: ] I am also enclosing a draft response to Comrade Umanskii.

Sent
[signed] A. Vyshinsky

[illegible]
” ” August 1941

IDU MID

TOP-SECRET – Silver Shadow to Unveil New Assault Rifle

https://i0.wp.com/www.israeldefense.com/_Uploads/dbsarticles/_cut/SA0000_0244x0240x0072_000xFFFFFF_doublebarret@jpg.jpg

Silver Shadow will present a new weapon prototype during the Eurosatory exhibition in Paris.

A new player in the arsenal of Israeli weapons? Silver Shadow, the manufacturer of the Israeli-produced Gilboa assault rifle, will soon be presenting another product from the Gilboa line of weapons.

The product is a new assault rifle, with a double barrel – a unique and first of its kind among Israeli-produced weapons. The new weapon increases firepower and has improved marksmanship, but still takes standard ammunition.

The company will present the new weapon at the Eurosatory exhibition in Paris during June 2012. The exhibition is one of the most prominent exhibitions in the world for the fields of defense and security, and takes place every two years in France.

The largest defense companies in the world present their products at the exhibition; the Israeli pavilion, which will feature dozens of companies, is considered one of the most prominent ones at the show.

Hitler’s Escape – Full Movie

According the official public record, Adolf Hitler committed suicide in his underground bunker as allied troops stormed Berlin at the end of World War II. But no one actually saw him die. No body was ever produced. No photographs were ever taken. Some believe Hitler managed to escape, and for years there were sightings of the former dictator in many parts of the world. Then, in the 1990s the Russians revealed secret evidence taken from Hitler’s bunker decades earlier that they said proved he had died there. Among the evidence is a piece of skull. MysteryQuest obtained access to this evidence for testing and the results are startling.

Global Transparency – Culture of secrecy around global land deals must be lifted

A new report today reveals how opening up the process around large-scale land deals in developing countries would benefit local communities, governments and business, and provides direction on how this can be achieved.

The report, Dealing with Disclosure, published by Global Witness, the International Land Coalition and the Oakland Institute, looks at why it is vital to transform the secretive culture behind large scale land  deals, and for the first time shows how it might be done. At present decisions are being made in secret, with basic information unavailable even to those affected. The report argues that all contractual information must be made publicly available unless investors or governments can prove that this would harm commercial competitiveness or public interest – a principle it calls “if in doubt, disclose”.

The rush for land in developing countries has rapidly intensified since 2008, but the sector remains largely unregulated. Concerns are growing over the impact of big, secretive deals between governments and investors on communities and the environment. As more and more land is taken away from local communities, growing numbers of people are losing access to the resources they have relied on for generations, and ecosystems are being destroyed.

Decisions and negotiations around land deals are frequently conducted in secret, without the knowledge, let alone consent, of affected communities.  Without access to basic information such as contract terms or pre-project impact assessment studies, local communities and other parties cannot make informed decisions about the suitability of proposed investments.

This lack of information hampers efforts to hold governments or investors to account, making human rights and environmental abuses more likely. It also undermines governance and democratic processes and fosters high-level corruption, discouraging companies willing to operate responsibly.

Megan MacInnes, Senior Land Campaigner at Global Witness said “Far too many people are being kept in the dark about massive land deals that could destroy their homes and livelihoods. That this needs to change is well understood, but how to change it is not. For the first time, this report sets out in detail what tools governments, companies and citizens can harness to remove the shroud of secrecy that surrounds land acquisition. It takes lessons from efforts to improve transparency in other sectors and looks at what is likely to work for land. Companies should have to prove they are doing no harm, rather than communities with little information or power having to prove that a land deal is negatively affecting them.”

But it’s not only communities who would benefit from the changes the report proposes, as Frederic Mousseau Policy Director at the Oakland Institute explains. “Evidence increasingly points to the significant benefits for governments and business from improved transparency and ongoing public consultation. Whilst investors would benefit from a level playing field as well as reduced risks of corruption and expensive and damaging conflicts with communities, greater transparency would enable governments to make more informed decisions and negotiate better deals when allocating commercial rights to land.”

 

Unveiled – Chinese Wiretap Like World Leaders and Crooks

When Hu Jintao, China’s top leader, picked up the telephone last August to talk to a senior anticorruption official visiting Chongqing, special devices detected that he was being wiretapped — by local officials in that southwestern metropolis.

The discovery of that and other wiretapping led to an official investigation that helped topple Chongqing’s charismatic leader, Bo Xilai, in a political cataclysm that has yet to reach a conclusion.

Until now, the downfall of Mr. Bo has been cast largely as a tale of a populist who pursued his own agenda too aggressively for some top leaders in Beijing and was brought down by accusations that his wife had arranged the murder of Neil Heywood, a British consultant, after a business dispute. But the hidden wiretapping, previously alluded to only in internal Communist Party accounts of the scandal, appears to have provided another compelling reason for party leaders to turn on Mr. Bo.

The story of how China’s president was monitored also shows the level of mistrust among leaders in the one-party state. To maintain control over society, leaders have embraced enhanced surveillance technology. But some have turned it on one another — repeating patterns of intrigue that go back to the beginnings of Communist rule.

“This society has bred mistrust and violence,” said Roderick MacFarquhar, a historian of Communist China’s elite-level machinations over the past half century. “Leaders know you have to watch your back because you never know who will put a knife in it.”

Nearly a dozen people with party ties, speaking anonymously for fear of retribution, confirmed the wiretapping, as well as a widespread program of bugging across Chongqing. But the party’s public version of Mr. Bo’s fall omits it.

The official narrative and much foreign attention has focused on the more easily grasped death of Mr. Heywood in November. When Mr. Bo’s police chief, Wang Lijun, was stripped of his job and feared being implicated in Bo family affairs, he fled to the United States Consulate in Chengdu, where he spoke mostly about Mr. Heywood’s death.

The murder account is pivotal to the scandal, providing Mr. Bo’s opponents with an unassailable reason to have him removed. But party insiders say the wiretapping was seen as a direct challenge to central authorities. It revealed to them just how far Mr. Bo, who is now being investigated for serious disciplinary violations, was prepared to go in his efforts to grasp greater power in China. That compounded suspicions that Mr. Bo could not be trusted with a top slot in the party, which is due to reshuffle its senior leadership positions this fall.

“Everyone across China is improving their systems for the purposes of maintaining stability,” said one official with a central government media outlet, referring to surveillance tactics. “But not everyone dares to monitor party central leaders.”

According to senior party members, including editors, academics and people with ties to the military, Mr. Bo’s eavesdropping operations began several years ago as part of a state-financed surveillance buildup, ostensibly for the purposes of fighting crime and maintaining local political stability.

The architect was Mr. Wang, a nationally decorated crime fighter who had worked under Mr. Bo in the northeast province of Liaoning. Together they installed “a comprehensive package bugging system covering telecommunications to the Internet,” according to the government media official.

One of several noted cybersecurity experts they enlisted was Fang Binxing, president of Beijing University of Posts and Telecommunications, who is often called the father of China’s “Great Firewall,” the nation’s vast Internet censorship system. Most recently, Mr. Fang advised the city on a new police information center using cloud-based computing, according to state news media reports. Late last year, Mr. Wang was named a visiting professor at Mr. Fang’s university.

Together, Mr. Bo and Mr. Wang unleashed a drive to smash what they said were crime rings that controlled large portions of Chongqing’s economic life. In interviews, targets of the crackdown marveled at the scale and determination with which local police intercepted their communications.

“On the phone, we dared not mention Bo Xilai or Wang Lijun,” said Li Jun, a fugitive property developer who now lives in hiding abroad. Instead, he and fellow businessmen took to scribbling notes, removing their cellphone batteries and stocking up on unregistered SIM cards to thwart surveillance as the crackdown mounted, he said.

Li Zhuang, a lawyer from a powerfully connected Beijing law firm, recalled how some cousins of one client had presented him with a full stack of unregistered mobile phone SIM cards, warning him of local wiretapping. Despite these precautions, the Chongqing police ended up arresting Mr. Li on the outskirts of Beijing, about 900 miles away, after he called his client’s wife and arranged to visit her later that day at a hospital.

“They already were there lying in ambush,” Mr. Li said. He added that Wang Lijun, by reputation, was a “tapping freak.”

Political figures were targeted in addition to those suspected of being mobsters.

One political analyst with senior-level ties, citing information obtained from a colonel he recently dined with, said Mr. Bo had tried to tap the phones of virtually all high-ranking leaders who visited Chongqing in recent years, including Zhou Yongkang, the law-and-order czar who was said to have backed Mr. Bo as his potential successor.

“Bo wanted to be extremely clear about what leaders’ attitudes toward him were,” the analyst said.

In one other instance last year, two journalists said, operatives were caught intercepting a conversation between the office of Mr. Hu and Liu Guanglei, a top party law-and-order official whom Mr. Wang had replaced as police chief. Mr. Liu once served under Mr. Hu in the 1980s in Guizhou Province.

Perhaps more worrisome to Mr. Bo and Mr. Wang, however, was the increased scrutiny from the party’s Central Commission for Discipline Inspection, which by the beginning of 2012 had stationed up to four separate teams in Chongqing, two undercover, according to the political analyst, who cited Discipline Inspection sources. One line of inquiry, according to several party academics, involved Mr. Wang’s possible role in a police bribery case that unfolded last year in a Liaoning city where he once was police chief.

Beyond making a routine inspection, it is not clear why the disciplinary official who telephoned Mr. Hu — Ma Wen, the minister of supervision — was in Chongqing. Her high-security land link to Mr. Hu from the state guesthouse in Chongqing was monitored on Mr. Bo’s orders. The topic of the call is unknown but was probably not vital. Most phones are so unsafe that important information is often conveyed only in person or in writing.

But Beijing was galled that Mr. Bo would wiretap Mr. Hu, whether intentionally or not, and turned central security and disciplinary investigators loose on his police chief, who bore the brunt of the scrutiny over the next couple of months.

“Bo wanted to push the responsibility onto Wang,” one senior party editor said. “Wang couldn’t dare say it was Bo’s doing.”

Yet at some point well before fleeing Chongqing, Mr. Wang filed a pair of complaints to the inspection commission, the first anonymously and the second under his own name, according to a party academic with ties to Mr. Bo.

Both complaints said Mr. Bo had “opposed party central” authorities, including ordering the wiretapping of central leaders. The requests to investigate Mr. Bo were turned down at the time. Mr. Bo, who learned of the charges at a later point, told the academic shortly before his dismissal that he thought he could withstand Mr. Wang’s charges.

Mr. Wang is not believed to have discussed wiretapping at the United States Consulate. Instead, he focused on the less self-incriminating allegations of Mr. Bo’s wife’s arranging the killing of Mr. Heywood.

But tensions between the two men crested, sources said, when Mr. Bo found that Mr. Wang had also wiretapped him and his wife. After Mr. Wang was arrested in February, Mr. Bo detained Mr. Wang’s wiretapping specialist from Liaoning, a district police chief named Wang Pengfei.

Internal party accounts suggest that the party views the wiretapping as one of Mr. Bo’s most serious crimes. One preliminary indictment in mid-March accused Bo of damaging party unity by collecting evidence on other leaders.

Party officials, however, say it would be far too damaging to make the wiretapping public. When Mr. Bo is finally charged, wiretapping is not expected to be mentioned. “The things that can be publicized are the economic problems and the killing,” according to the senior official at the government media outlet. “That’s enough to decide the matter in public.”

DoD Stability Operations Capabilities Assessment 2012 – SECRET

https://publicintelligence.net/wp-content/uploads/2012/04/DoD-StabilityOpsAssessment.png

 

This report provides an assessment of Department of Defense (DoD) efforts over the past two years to implement requirements set forth in the 2009 DoD Instruction 3000.05, Stability Operations. It highlights significant initiatives currently underway or planned throughout DoD and provides recommendations and key findings to achieve further progress.

The overarching theme of the report is that the Department must learn from previous hard-won experience in stability operations and institutionalize, enhance, and evolve the lessons learned and capabilities acquired by the U.S. military for current and future operations. As part of a risk -balanced strategy, one ofthe Pentagon’s top priorities should be to prepare for the predominant sources of conflict in the 21 5t Century, specifically fragile states and the irregular challenges that they spawn. Even if we anticipate participating more selectively in these operations in the future, the U.S. military should capitalize on the adaptation in thinking that occurred as a result of the experiences in Afghanistan and Iraq by preserving perishable expertise, and retaining key capabilities and the appropriate skill sets for these operations.

As U.S. defense strategy shifts from an emphasis on today’s wars to preparing for future challenges, the task of promoting stability in a volatile strategic environment remains one of our Nation’s top concerns. Emphasizing more effective non-military means and military-to-military cooperation can help to prevent instability from triggering conflicts, thereby reducing demand for large-scale stability operations aimed at bringing such conflicts to closure. As part of a prudent down-sizing of our posture, the U.S. military must be able to retain otherwise perishable skills, expertise and specialized capabilities acquired as a consequence of its hard-won experiences in Iraq and Afghanistan. Retaining these capabilities requires an enduring investment in people, the wherewithal to institutionalize lessons learned, and the retention of forces that can be quickly regenerated to meet future demands.

The Department of Defense (DoD) has taken positive steps since 2009 toward enhancing its stability operations capabilities. Joint doctrine is now on a firmer foundation; the Services have strengthened relevant proficiencies at the unit level; and investments in civil-military planning, exercising, field-level coordination and capacity-building are noteworthy. Even so, these gains are ad hoc and temporary for the most part and will be fleeting unless affirmative steps are taken to preserve stability operations capabilities in the years ahead.

To help achieve this goal, this report recommends the following specific steps:

• DoD should continue to emphasize stability operations as a core military capability in all of its key policy and strategy documents.
• DoD should continue to make refinements to existing doctrine as new lessons emerge and develop a process to fast-track doctrine that absorbs these lessons based on operational necessities.
• DoD should persist in its efforts to translate such lessons into stability operations-related training and education at all levels. To help sustain civil-military training capacities, it should consider ways of incentivizing U.S. whole-of-government training and exercises, possibly through a pooled funding approach. It could also consider combining multiple exercises into a single capstone event focused on interagency integration.
• In close coordination with interagency partners, DoD should mitigate the negative effects of predictable gaps in civilian capacity in uncertain and hostile operational environments by continuing to place emphasis upon preparing U.S. military forces for likely stability operations tasks. We should continue to advocate for increased civilian agency capacity and resources, while also promoting the development of civilian-military capacity of allies and other partners to address stability operations and related activities.
• As defense resources shift back from contingency funding to our base budget, DoD should continue to work with Department of State, interagency partners and the Congress to review the adequacy of legal authorities and funding for the full range of security assistance and coalition support programs requiring coordinated defense, diplomacy, and development efforts in the stability operations arena. Specifically, the Congressionally-mandated annual review of the Global Security Contingency Fund execution, and other resultant lessons learned documents, could help in mapping out possible legislative changes and in recommending interagency planning process improvements.

Unsolved Mysteries of the Second World War – Hitler’s Secret Weapons – Full Movie

This is the most amazing documentary to date covering the technologies and mysteries of the second world war. There is footage in this film that I have never seen before! Amazing, that’s all I can say.

truthseekertimes.ca

 

Unveiled – Central Intelligence Agency Office of Research and Development Technologies Used in U.S.

Citation: [Central Intelligence Agency Office of Research and Development Technologies Used in U.S.; Attached to Routing and Record Sheet; Includes Memoranda Entitled “Repeated Survey of ORD for Non-foreign Intelligence Activities”; “Contacts with Other U.S. Government Agencies Which Could or Have Resulted in Use of CIA-Developed Technology in Addressing Domestic Problems”; “Domestic Tests for Agency Research and Development Efforts”; “Survey of ORD for Non-foreign Intelligence Activities”; “[Excised] ORD Contacts with Domestic Council Agencies”; “Processing of Audio Tape for Bureau of Narcotics Dangerous Drug Division” [Two Versions]; “Assistance to Bureau of Narcotics: Enhancement of Noisy Audio Tape Recordings”; “Telecon This Morning concerning Any OSA Activities Which Could Put the Agency into an Embarrassing Situation”; “Correspondence Received by Chairman Hébert, House Armed Services Committee, concerning [Excised]”; and “Policy regarding Assistance to Agencies outside the Intelligence Community on Speech Processing Problems”; Heavily Excised]
Top Secret, Compendium, May 09, 1973, 41 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00022
Origin: United States. Central Intelligence Agency. Directorate of Science and Technology. Office of Research and Development
Individuals/
Organizations Named:
Aerospace Corporation; Colby, William E.; Colson, Charles W.; Halperin, Morton H.; Hébert, Felix E.; McMahon, John N.; National Institutes of Health (U.S.); Schlesinger, James R.; United States Intelligence Board. Technical Surveillance Countermeasures Committee; United States. Air Force; United States. Arms Control and Disarmament Agency; United States. Army; United States. Atomic Energy Commission; United States. Cabinet Committee on International Narcotics Control; United States. Central Intelligence Agency. Directorate of Intelligence. National Photographic Interpretation Center; United States. Central Intelligence Agency. Directorate of Intelligence. Office of Scientific Intelligence; United States. Central Intelligence Agency. Directorate of Science and Technology. Deputy Director; United States. Central Intelligence Agency. Directorate of Science and Technology. Office of Research and Development; United States. Coast Guard; United States. Congress. House. Committee on Armed Services; United States. Defense Intelligence Agency; United States. Department of Agriculture; United States. Department of Commerce; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Department of Justice. Law Enforcement Assistance Administration; United States. Department of State; United States. Department of the Interior; United States. Department of the Treasury; United States. Department of the Treasury. Customs Service; United States. Environmental Protection Agency; United States. Executive Office of the President; United States. Federal Aviation Administration; United States. Federal Bureau of Investigation; United States. Internal Revenue Service; United States. National Aeronautics and Space Administration; United States. National Security Agency; United States. Navy; United States. Office of Telecommunications Policy; United States. Secret Service
Subjects: Agricultural products | Communications interception | Counterintelligence | Defectors | Electronic surveillance | Hijacking | Human behavior experiments | Mexico-United States Border | Narcotics | Natural disasters | Natural resources | Nuclear reactors | Opium production | Photographic intelligence | Police assistance | Polygraph examinations | Psychological assessments | Research and development | Riot control | San Francisco (California) | Satellite reconnaissance | Surveillance countermeasures | Surveillance equipment | Telephone monitoring | U-2 Aircraft | Watergate Affair (1972-1974)
Abstract: Describes Central Intelligence Agency Office of Research and Development technology and assistance provided to or requested by military and law-enforcement organizations.
Full Text: Document – PDF – this link will open in a new window (1.5 MB)

Durable URL for this record

Confidential – Individual Indicted in Connection with Machine Gun Attack on U.S. Embassy in Bosnia-Herzegovina in 2011

WASHINGTON—Mevlid Jasarevic, 23, a citizen of Serbia, was indicted today by a federal grand jury in the District of Columbia on charges of attempted murder and other violations in connection with his alleged machine gun attack on the U.S. Embassy in Sarajevo, Bosnia-Herzegovina on October 28, 2011.

The indictment was announced by Lisa Monaco, Assistant Attorney General for National Security; Ronald C. Machen, Jr., U.S. Attorney for the District of Columbia; and James W. McJunkin, Assistant Director in Charge of the FBI’s Washington Field Division.

The 10-count indictment charges Jasarevic with one count of attempt to murder U.S. officers or employees; one count of attempt to murder U.S. nationals within the special maritime and territorial jurisdiction of the United States (the U.S. Embassy); one count of assault with a dangerous weapon with intent to do bodily harm within the special maritime and territorial jurisdiction of the United States; one count of assaulting U.S. officers or employees with a deadly weapon; one count of destruction of property within the special maritime and territorial jurisdiction of the United States; and five counts of use of a firearm during a crime of violence.

Yesterday, authorities in Bosnia-Herzegovina brought charges against Jasaveric and two others in connection with the alleged attack on the U.S. Embassy. Jasaveric is in the custody of Bosnia-Herzegovina authorities. The United States has closely cooperated with Bosnia-Herzegovina authorities in their investigation of the U.S. Embassy attack and strongly supports their decision to charge and prosecute those allegedly involved. The United States will continue to cooperate fully with authorities in Bosnia-Herzegovina to bring to justice those involved.

The case is being investigated by the FBI Washington Field Office. The case is being prosecuted by Assistant U.S. Attorney Robert Bowman of the U.S. Attorney’s Office for the District of Columbia and Trial Attorney Joshua Larocca of the Counterterrorism Section of the Justice Department’s National Security Division. The Office of International Affairs in the Justice Department’s Criminal Division also provided assistance.

The attempted murder charges against Jasarevic, as well as the charges of assaulting U.S. officers and employees with a deadly weapon, and destruction of property each carry a maximum sentence of 20 years. Each charge of using a firearm during a crime of violence carries a mandatory minimum sentence of 30 years for use of a machine gun. The charge of assault with a dangerous weapon with intent to do bodily harm within the special maritime and territorial jurisdiction of the United States carries a maximum sentence of 10 years.

The public is reminded that an indictment contains mere allegations. Defendants are presumed innocent unless and until proven guilty in a court of law.

TOP-SECRET from the FBI – Texas Federal Grand Jury Indicts Sinaloa Cartel Leaders

United States Attorney Robert Pitman, DEA Special Agent in Charge Joseph M. Arabit, FBI Special Agent in Charge Mark Morgan, and ATF Special Agent in Charge Robert Champion today announced the indictment of Joaquin Guzman Loera, aka “El Chapo”; Ismael Zambada Garcia aka “Mayo”; and 22 other individuals responsible for the operations and management of the Sinaloa Cartel (cartel) charging them with violating the Racketeer Influenced and Corrupt Organizations (RICO) Act.

The 14-count grand jury indictment, returned on April 11, 2012 and unsealed today charges conspiracy to violate the RICO statute; conspiracy to possess more than five kilograms of cocaine and over 1000 kilograms of marijuana; conspiracy to import more than five kilograms of cocaine and 1000 kilograms of marijuana; conspiracy to commit money laundering; conspiracy to possess firearms in furtherance of drug trafficking crimes; murder in furtherance of a continuing criminal enterprise (CCE) or drug trafficking; engaging in a CCE in furtherance of drug trafficking; conspiracy to kill in a foreign country; kidnapping; and violent crimes in aid of racketeering.

The other 22 defendants charged in this indictment include:

German (Last Name Unknown), aka “Paisa,” “German Olivares”; Mario Nunez-Meza, aka “Mayito,” “M-10”; Amado Nunez-Meza, aka “Flaco,” “M-11,” “El Flais”; Jose Antonio Torres Marrufo, aka “Jaguar,” “Tonin,” Catorce,” “14,” “Tono,” “El Uno”; Gabino Salas-Valenciano, aka “El Ingeniero”; Sergio Garduno-Escobedo, aka “Coma”; David Sanchez-Hernandez, aka “Christian”; Ivan Sanchez-Hernandez; Jesus Rodrigo Fierro-Ramirez, aka “Huichi,” “Pena”; Arturo Lozano-Mendez, aka “Garza”; Mario De La O Lopez aka “Flaco”; Arturo Shows Urquidi, aka “Chous”; Salvador Valdez, aka “Robles”; Daniel Franco Lopez, aka “Micha,” “Neon,” “Fer”; Luis Arellano-Romero, aka “Bichi,” Bichy,” “Helio”; Fernando Arellano-Romero, aka “Rayo,” “24,” “Gamma,” “Blue Demon”; Mario Alberto Iglesias-Villegas, aka “Dos,” “El 2,” “Delta,” “Parka,” “Grim Reaper,” “Daniel Cuellar Anchondo,” “Delfin”; Adrian Avila-Ramirez aka “Bam Bam,” “Tacuba,” “El 19”; Valentin Saenz De La Cruz aka “El Valle,” “Lic”; Emigdio Martinez, Jr., aka “Millo”; Carlos Flores, aka “Buffalo,” “Charly”; and, Jose (Last Name Unknown), aka “Toca,” “Tocayo,” “Pachi.”

According to the indictment, the purpose of the Sinaloa Cartel is to smuggle large quantities of marijuana and cocaine, as well as other drugs, into the United States for distribution. Laundered proceeds of drug trafficking activities are returned to cartel members and are used in part to purchase properties related to the daily functioning of the cartel, including real estate, firearms, ammunition, bulletproof vests, radios, telephones, uniforms, and vehicles. In an effort to maintain control of all aspects of their operations, the cartel and its associates, including members of the Gente Nueva (“New People”) and the Artistas Asesinos (“Murder artists”), kidnap, torture, and murder those who lose or steal assets belonging to, are disloyal to, or are enemies of the cartel. This includes the Juarez Cartel led by Vicente Carrillo Fuentes, a competing drug organization, as well as its enforcement arm known as La Linea and the Barrio Aztecas. Often, murders committed by the cartel involve brutal acts of violence as well the public display of the victim along with banners bearing written warnings to those who would cross the cartel.

“Murder, kidnapping, money laundering, and drug trafficking are the four corners of this organization’s foundation,” stated U.S. Attorney Robert Pitman. “For years, their violence, ruthlessness, and complete disregard for human life and the rule of law have greatly impacted the citizens of the Republic of Mexico and the United States. They must be held accountable for their criminal actions.”

This investigation resulted in the seizure of hundreds of kilograms of cocaine and thousands of pounds of marijuana in cities throughout the United States. Law enforcement also took possession of millions of dollars in drug proceeds that were destined to be returned to the cartel in Mexico. Agents and officers likewise seized hundreds of weapons and thousands of rounds of ammunition intended to be smuggled into Mexico to assist the cartel’s battle to take control of one of the key drug trafficking corridors used to bring drugs into the United States.

“This indictment is the result of a complex, long-term investigation by DEA and our law enforcement partners in the U.S. and Mexico, targeting the Sinaloa Cartel at its highest levels. In addition to violations relating to the trafficking of huge quantities of cocaine and marijuana, the charges encompass money laundering, weapons smuggling, kidnappings, and murders employed by the cartel to fund, expand and protect its far-reaching criminal enterprise. These charges are an important step in bringing to justice those responsible for supplying a large portion of the illegal drugs flowing into communities in the United States through the El Paso area, as well as much of the violence that has ravaged neighboring Ciudad Juarez,” said Joseph M. Arabit, Special Agent in Charge, Drug Enforcement Administration-El Paso Division.

The indictment references two acts of violence allegedly committed by members of the cartel. First, the indictment alleges that in September 2009, Jose Antonio Torres Marrufo, Gabino Salas-Valenciano, Fernando Arellano-Romero, and Mario Iglesias-Villegas, under the leadership of Joaquin Guzman and Ismael Zambada, conspired to kidnap and murder a Horizon City Texas, resident. Specifically, Jose Antonio Torres Marrufo ordered the kidnapping of the victim to answer for the loss of a 670-pound load of marijuana seized by Border Patrol at the Sierra Blanca checkpoint on August 5, 2009. After the kidnapping, the victim was taken to Juarez, where Torres Marrufo interrogated him and ordered that he be killed. On September 8, 2009, the victim’s mutilated body was discovered in Juarez.

Second, the indictment alleges that on May 7, 2010, Jose Torres Marrufo, Fernando Arellano-Romero, and Mario Iglesias-Villegas, under the leadership of Joaquin Guzman and Ismael Zambada, conspired to kidnap and murder an American citizen and two members of his family. Specifically, Torres Marrufo caused an individual in El Paso to travel to a wedding ceremony in Juarez to confirm the identity of a target. The target was the groom, a United States citizen and a resident of Columbus, New Mexico. Under Torres Marrufo’s orders, the groom, his brother and his uncle were all kidnapped during the wedding ceremony and subsequently tortured and murdered. Their bodies were discovered by Juarez police a few days later in the bed of an abandoned pickup truck. Additionally, a fourth person was killed during the kidnapping at the wedding ceremony.

“This indictment has been years in the making, the focus being to dismantle the Sinaloa Cartel by focusing on its upper echelon. The indictment represents the unwavering commitment and collaboration among the law enforcement community to bring justice to those who have inflicted unconscionable violence on so many citizens on both sides of the border. We are sending a clear message that we will continue our relentless pursuit of drug trafficking organizations responsible for such widespread devastation within our communities,” stated FBI Special Agent in Charge Mark Morgan.

“This highly cooperative investigation shows that law enforcement can make significant inroads into drug trafficking organizations and that the major players are not immune from prosecution. This also relates to the illegal firearm traffickers who support such organizations and are responsible for the violence and bloodshed that is occurring,” stated ATF Special Agent in Charge Robert Champion.

This investigation was conducted by the Drug Enforcement Administration; Federal Bureau of Investigation; and the Bureau of Alcohol, Tobacco, Firearms, and Explosives, together with the Immigration and Customs Enforcement-Homeland Security Investigations, United States Border Patrol, Customs and Border Protection, United States Marshals Service, El Paso Police Department, El Paso Sheriff’s Office, and Texas Department of Public Safety. United States Attorney Robert Pitman also expresses his appreciation to New Mexico United States Attorney Ken Gonzalez and his attorneys, Attorney General of Mexico Marisela Morales and her attorneys, and to law enforcement authorities in Mexico for their assistance.

Upon conviction, the defendants face up to life in federal prison. Three of the 14 counts (seven, 11, and 14)—which involve the kidnapping and murder of a resident of Horizon City and three members of a wedding party in Juarez—may result in the imposition of the death penalty upon conviction.

It is important to note that an indictment is merely a charge and should not be considered as evidence of guilt. The defendant is presumed innocent until proven guilty in a court of law.

SECRET – FBI Motorcycle Gang Trademarks Logo to Prevent Undercover Infiltration

https://publicintelligence.net/wp-content/uploads/2012/04/FBI-VagosTM.png

 

(U//LES) Trademarking of Vagos Outlaw Motorcycle Gang “Cuts” to prevent penetration by undercover Law Enforcement operations.

(U//LES) As of 2 May 2011, the International Chapter of the Vagos Outlaw Motorcycle Gang (Vagos) trademarked their “cuts” – the patches which identify their OMG affiliation – in an effort to prevent law enforcement agencies from inserting undercover officers into their organization.

(U//LES) The Vagos added the ® symbol to the bottom center of the large back patch as shown in photo 1. There are only about 20 of these new patches which are currently being worn by members. It is believed that the new patches will be given out to new members as they are vetted by the Vagos leadership. By doing this, the Vagos believe they will have exclusive rights to the Vagos patch and no one, including undercover officers, would be able to wear the patch without the consent of the International Vagos OMG leadership.

(U//FOUO) Research within the United States Patent and Trademark Office was conducted which indicated the Vagos International Motorcycle Club Corporation California, 780 N. Diamond Bar Blvd., #B12, Diamond Bar California, 91765, filed to make the Vagos name and symbol a registered trademark on July 2, 2010, Serial Number 85076951. Changes and requests by the Vagos Corporation were submitted as recently as May 2, 2011 to the Patent and Trademark Office.

 

https://publicintelligence.net/wp-content/uploads/2012/04/vagos-tm.png

The most important international Book about the STASI

http://bks3.books.google.se/books?id=LLZJk4FrqwwC&printsec=frontcover&img=1&zoom=1&edge=curl&imgtk=AFLRE70e6Nq3p1tcJn_Lbr8L0HfZPzI4eV1PEPEt9i00tzbbJJVEv69yY6XFAWSIlvbeTTw9xds_wXSWLUgakwjhxqirz1XzP2ytczsm0rBAJmRVKCAqxOpHswYMBd1TtBhMcZviH2iE

Seduced by Secrets:

Inside the Stasi’s Spy-Tech World
More fascinating than fiction, Seduced by Secrets takes the reader inside the real world of one of the most effective and feared spy agencies in history. The book reveals, for the first time, the secret technical methods and sources of the Stasi (East German Ministry for State Security) as it stole secrets from abroad and developed gadgets at home, employing universal, highly guarded techniques often used by other spy and security agencies. Seduced by Secrets draws on secret files from the Stasi archives, including CIA-acquired material, interviews and friendships, court documents, and unusual visits to spy sites, including “breaking into” a prison, to demonstrate that the Stasi overestimated the power of secrets to solve problems and created an insular spy culture more intent on securing its power than protecting national security. It recreates the Stasi’s secret world of technology through biographies of agents, defectors, and officers and by visualizing James Bond-like techniques and gadgets. In this highly original book, Kristie Macrakis adds a new dimension to our understanding of the East German Ministry for State Security by bringing the topic into the realm of espionage history and exiting the political domain.
Of all the books on the Stasi, this is fairly unique as it covers their technical espionage and technology procurement programs. Highly recommended.
DOWNLOAD THE E-BOOK HERE

The Truth about the Iranian UAV

Iranian Ababil UAV
Iranian Ababil UAV

Israel is trying to discover the extent to which the Iranian announcement regarding the development of a new UAV named “Shaparak” is true.

According to the Iranians, the UAV has a take-off weight of 100 kg and can carry a payload weighing up to 8 kg. In addition, the statement says that the UAV has an endurance of 3.5 hours in altitudes of up to 4 km.

In recent years, Iran has invested considerable efforts in developing UAVs. However, Israel is assessing that its achievements are few.

Currently, Iran is exploiting situations in other countries in order to garner operational experience with their UAVs. As was previously revealed in IsraelDefense, there is proof that Iran has operated UAVs on behalf of the Syrian regime.

According to reports from sources following Iran’s involvement in the Syrian Civil War, an Iranian Pahpad UAV was sighted in the past few weeks in the skies near Homs, Syria, which is considered the most advanced in Syria’s arsenal.

In the past, Tehran has claimed that the UAV possesses stealth qualities. While Western elements doubt this claim, they say that it is undoubtedly an advanced UAV, at least with regards to its aerodynamic configuration.

Iran has previously supplied Hezbollah with self-produced UAVs, and the country has previously developed various basic UAVs as well, including the Ra’ad and Nazir. Four years ago, Iran’s defense minister claimed that his country successfully developed a UAV with a flight range of approximately 1,000 km.

Israel has experience with simple Iranian UAVs launched from southern Lebanon by Hezbollah towards Israel’s northern region. In June 2006, the IAF intercepted a suicide UAV carrying a payload of explosives. The Ababil UAV is a copy of a Russian UAV that is produced in Iran. It first breached Israel’s borders on November 7, 2004, and circled for five minutes over the region of Nahariya, photographing the area with a basic photographic system installed onboard. The Ababil UAV has a flight speed of nearly 300 km/h and has a maximum range of 240 km.

Israel is assessing that advanced Iranian UAVs have already been transferred to Hezbollah. The operation of the Iranian UAV in Syria is part of Tehran’s assistance fo Assad’s regime, as well as an Iranian opportunity to operate it in real conditions.

Source: Israel Defense

Confidential – Senate Review of CIA Interrogation Program “Nearing Completion”

The Senate Intelligence Committee has been reviewing the post-9/11 detention and interrogation practices of the Central Intelligence Agency for four years and is still not finished.  But the end appears to be in sight.

“The review itself is nearing completion — before the end of summer — but is not over yet,” a spokesperson for the Committee said.  “The release date should be not too far thereafter, but is not set.”

“This review is the only comprehensive in-depth look at the facts and documents pertaining to the creation, management, and effectiveness of the CIA detention and interrogation program,” according to Sen. Jay Rockefeller, who was chairman of the Intelligence Committee when the review began in 2008.

Committee staff are said to have reviewed millions of pages of classified documents pertaining to the CIA program.

In newly published questions for the record following his confirmation hearing last year to be Director of the CIA, Gen. David Petraeus was asked by Senator Rockefeller if he would cooperate with the Committee review.

“I believe that a holistic and comprehensive review of the United States Government’s detention and interrogation programs can lead to valuable lessons that might inform future policies,” Petraeus replied.

“The best way to gain a common set of facts would be to reach out to the intelligence and military communities responsible for detentions and interrogations and for implementing future policies,” he added.  “[T]o gain the proper insights from a series of actions or decisions, we cannot separate the review process from the public servants undertaking the actions,” he said.

Gen. Petraeus also responded to questions concerning interrogation in the “ticking time bomb” scenario (he says “research is required now”), and the applicability of official U.S. government statements on the use of drones to CIA operations (which he declined to confirm), among other topics.

His responses to these questions were published earlier this month in the record of his June 23, 2011 confirmation hearing.

Sen. Dianne Feinstein, the current chair of the Senate Intelligence Committee, provided a preview of the Committee’s findings on CIA interrogation practices in a November 29, 2011 floor statement during the debate on the FY2012 defense authorization act (also noted by Jeffrey Kaye in The Public Record).

“As chairman of the Select Committee on Intelligence, I can say that we are nearing the completion a comprehensive review of the CIA’s former interrogation and detention program, and I can assure the Senate and the Nation that coercive and abusive treatment of detainees in U.S. custody was far more systematic and widespread than we thought,” Sen. Feinstein said.

“Moreover, the abuse stemmed not from the isolated acts of a few bad apples but from fact that the line was blurred between what is permissible and impermissible conduct, putting U.S. personnel in an untenable position with their superiors and the law.”

The FBI – San Marino Man Sentenced to Over 10 Years in Federal Prison in $9 Million Mortgage Fraud and Tax Evasion Scheme

LOS ANGELES—A San Marino man has been sentenced to 121 months in federal prison for defrauding banks and other lenders by using “straw borrowers” and bogus documents to obtain millions of dollars in loans for houses and high-end vehicles that included Ferraris and Lamborghinis.

Scott Dority, 54, was sentenced last Monday by United States District Judge R. Gary Klausner. The sentencing hearing was under seal, and the United States Attorney’s Office learned today that the matter had been unsealed.

Dority pleaded guilty on March 14, 2011 to wire fraud, conspiracy, aggravated identity theft, and two counts of tax evasion. When he pleaded guilty, he admitted that his fraudulent conduct caused at least $4 million in losses to financial institutions that issued mortgages and approximately $5 million in losses to institutions that issue loans for the sports cars and recreational vehicles.

Dority also admitted in court that he failed to file tax returns for 2005 and 2006, even though he had hundreds of thousands of dollars in income in each of those years.

According to a now-unsealed court document, Dority, along with others, recruited individuals with good credit to act as straw buyers to purchase residential homes or expensive vehicles. Dority created a package of materials—including fake bank statements, fake pay stubs, and bogus fake tax returns—to make it appear that these straw buyers had sufficient assets and income to pay back loans used to purchase the real estate and vehicles. These fake documents were then submitted to lenders, who relied upon them to issue more than $9 million in mortgage and vehicle loans.

As part of the 121-month prison sentence, Dority received a mandatory two-year prison term for aggravated identity theft.

The investigation into this scheme was conducted jointly by the Federal Bureau of Investigation, IRS-Criminal Investigation, and the United States Secret Service.

Report – Obama Bans Electronic Aid to Iran and Syria — Executive Order 13606

http://www.whitehouse.gov/the-press-office/2012/04/23/executive-order-blocking-property-and-suspending-
entry-united-states-cer

EXECUTIVE ORDER
13606

– – – – – – –

BLOCKING THE PROPERTY AND SUSPENDING ENTRY INTO THE

UNITED STATES OF CERTAIN PERSONS WITH RESPECT TO GRAVE

HUMAN RIGHTS ABUSES BY THE GOVERNMENTS OF IRAN AND SYRIA

VIA INFORMATION TECHNOLOGY

 

By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International Emergency Economic Powers Act (50 U.S.C. 1701 et seq.) (IEEPA), the National Emergencies Act (50 U.S.C. 1601 et seq.), section 212(f) of the Immigration and Nationality Act of 1952, as amended (8 U.S.C. 1182(f)), and section 301 of title 3, United States Code,

I, BARACK OBAMA, President of the United States of America, hereby determine that the commission of serious human rights abuses against the people of Iran and Syria by their governments, facilitated by computer and network disruption, monitoring, and tracking by those governments, and abetted by entities in Iran and Syria that are complicit in their governments’ malign use of technology for those purposes, threaten the national security and foreign policy of the United States. The Governments of Iran and Syria are endeavoring to rapidly upgrade their technological ability to conduct such activities. Cognizant of the vital importance of providing technology that enables the Iranian and Syrian people to freely communicate with each other and the outside world, as well as the preservation, to the extent possible, of global telecommunications supply chains for essential products and services to enable the free flow of information, the measures in this order are designed primarily to address the need to prevent entities located in whole or in part in Iran and Syria from facilitating or committing serious human rights abuses. In order to take additional steps with respect to the national emergencies declared in Executive Order 12957 of March 15, 1995, as relied upon for additional steps in subsequent Executive Orders, and in Executive Order 13338 of May 11, 2004, as modified in scope and relied upon for additional steps in subsequent Executive Orders, and to address the situation described above, I hereby order:

Section 1.

(a) All property and interests in property that are in the United States, that hereafter come within the United States, or that are or hereafter come within the possession or control of any United States person, including any foreign branch, of the following persons are blocked and may not be transferred, paid, exported, withdrawn, or otherwise dealt in:

(i) the persons listed in the Annex to this order; and(ii) any person determined by the Secretary of the Treasury, in consultation with or at the recommendation of the Secretary of State:

(A) to have operated, or to have directed the operation of, information and communications technology that facilitates computer or network disruption, monitoring, or tracking that could assist in or enable serious human rights abuses by or on behalf of the Government of Iran or the Government of Syria;(B) to have sold, leased, or otherwise provided, directly or indirectly, goods, services, or technology to Iran or Syria likely to be used to facilitate computer or network disruption, monitoring, or tracking that could assist in or enable serious human rights abuses by or on behalf of the Government of Iran or the Government of Syria;

(C) to have materially assisted, sponsored, or provided financial, material, or technological support for, or goods or services to or in support of, the activities described in subsections (a)(ii)(A) and (B) of this section or any person whose property and interests in property are blocked pursuant to this order; or

(D) to be owned or controlled by, or to have acted or purported to act for or on behalf of, directly or indirectly, any person whose property and interests in property are blocked pursuant to this order.

(b) The prohibitions in subsection (a) of this section apply except to the extent provided by statutes, or in regulations, orders, directives, or licenses that may be issued pursuant to this order, and notwithstanding any contract entered into or any license or permit granted prior to the effective date of this order.

Sec. 2. I hereby determine that the making of donations of the type of articles specified in section 203(b)(2) of IEEPA (50 U.S.C. 1702(b)(2)) by, to, or for the benefit of any person whose property and interests in property are blocked pursuant to this order would seriously impair my ability to deal with the two national emergencies identified in the preamble to this order, and I hereby prohibit such donations as provided by section 1 of this order.

Sec. 3. The prohibitions in section 1 of this order include but are not limited to:

(a) the making of any contribution or provision of funds, goods, or services by, to, or for the benefit of any person whose property and interests in property are blocked pursuant to this order; and(b) the receipt of any contribution or provision of funds, goods, or services from any such person.

Sec. 4. I hereby find that the unrestricted immigrant and nonimmigrant entry into the United States of aliens who meet one or more of the criteria in section 1 of this order would be detrimental to the interests of the United States, and I hereby suspend the entry into the United States, as immigrants or nonimmigrants, of such persons. Such persons shall be treated as persons covered by section 1 of Proclamation 8693 of July 24, 2011 (Suspension of Entry of Aliens Subject to United Nations Security Council Travel Bans and International Emergency Economic Powers Act Sanctions).

Sec. 5.

(a) Any transaction by a United States person or within the United States that evades or avoids, has the purpose of evading or avoiding, causes a violation of, or attempts to violate any of the prohibitions set forth in this order is prohibited.(b) Any conspiracy formed to violate any of the prohibitions set forth in this order is prohibited.

Sec. 6. Nothing in section 1 of this order shall prohibit transactions for the conduct of the official business of the United States Government by employees, grantees, or contractors thereof.

Sec. 7. For the purposes of this order:

(a) the term “person” means an individual or entity;(b) the term “information and communications technology” means any hardware, software, or other product or service primarily intended to fulfill or enable the function of information processing and communication by electronic means, including transmission and display, including via the Internet;

(c) the term “entity” means a partnership, association, trust, joint venture, corporation, group, subgroup, or other organization;

(d) the term “United States person” means any United States citizen, permanent resident alien, entity organized under the laws of the United States or any jurisdiction within the United States (including foreign branches), or any person in the United States;

(e) the term “Government of Iran” means the Government of Iran, any political subdivision, agency, or instrumentality thereof, including the Central Bank of Iran, and any person owned or controlled by, or acting for or on behalf of, the Government of Iran; and

(f) the term “Government of Syria” means the Government of the Syrian Arab Republic, its agencies, instrumentalities, and controlled entities.

Sec. 8. For those persons whose property and interests in property are blocked pursuant to this order who might have a constitutional presence in the United States, I find that because of the ability to transfer funds or other assets instantaneously, prior notice to such persons of measures to be taken pursuant to this order would render those measures ineffectual. I therefore determine that for these measures to be effective in addressing the two national emergencies identified in the preamble to this order, there need be no prior notice of a listing or determination made pursuant to section 1 of this order.

Sec. 9. The Secretary of the Treasury, in consultation with the Secretary of State, is hereby authorized to take such actions, including the promulgation of rules and regulations, and to employ all powers granted to the President by IEEPA as may be necessary to carry out the purposes of this order. The Secretary of the Treasury may redelegate any of these functions to other officers and agencies of the United States Government consistent with applicable law. All agencies of the United States Government are hereby directed to take all appropriate measures within their authority to carry out the provisions of this order.

Sec. 10. The Secretary of the Treasury, in consultation with the Secretary of State, is hereby authorized to determine that circumstances no longer warrant the blocking of the property and interests in property of a person listed in the Annex to this order and to take necessary action to give effect to that determination.

Sec. 11. This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

Sec. 12. The measures taken pursuant to this order with respect to Iran are in response to actions of the Government of Iran occurring after the conclusion of the 1981 Algiers Accords, and are intended solely as a response to those later actions.

Sec. 13. This order is effective at 12:01 a.m. eastern daylight time on April 23, 2012.

BARACK OBAMA

__________________

ANNEX

Individual

1. Ali MAMLUK [director of the Syrian General Intelligence Directorate, born 1947]

Entities

1. Syrian General Intelligence Directorate2. Syriatel

3. Islamic Revolutionary Guard Corps

4. Iranian Ministry of Intelligence and Security

5. Law Enforcement Forces of the Islamic Republic of Iran

6. Datak Telecom

__________

Annex from Federal Register:

http://www.ofr.gov/OFRUpload/OFRData/2012-09933_PI.pdf

[FR Doc. 2012-10034 Filed 04/23/2012 at 11:15 am; Publication Date: 04/24/2012]

TOP-SECRET – Photos from the Fodor Nuclear Plant, Near Qom, Iran

[Image]
[Image]
[Image]
Bunker Portals September 2011

[Image]

Site in March 2005

[Image]

Site in September 2009[Image]
Site in July 2011[Image]
Site in September 2011, Missile Protection Site at Upper Right and Below
[Image]
Site in September 2011[Image]
Site in September 2011[Image]
Site in September 2011[Image]
Missile Protection Site in September 2011[Image]

 

Confidential – FBI High Value Detainee Interrogation Group “Advance the Science of Interrogation” Contract Announcement

https://publicintelligence.net/wp-content/uploads/2012/04/FBI-HIG-BAA.png

 

The purpose of research supported by the HIG is to advance the science and practice of intelligence interviewing and interrogation. Offerors will conduct research for the HIG in their facilities. The HIG has defined several areas for long-range study and advisory support. These research areas include but are not limited to:

  • Field observations of military and strategic interrogators, intelligence interviewers and debriefers in order to document strategies, methods and outcomes;
  • Surveys and structured interviews of interrogators, intelligence interviewers and debriefers specified by the Government in order to document what these operational personnel think works and does not work and the development of operationally-based best practices which may be later investigated via laboratory or field studies;
  • Development, testing and evaluation of metrics for assessing the efficacies of interrogations, intelligence interviews and debriefs and of the use of particular interrogation, intelligence interview and debrief strategies and methods;
  • Field quasi-experimental studies to evaluate the efficacy of new evidence-based interrogation, intelligence interview and debrief strategies and methods;
  • Laboratory studies to test and/or discover new interrogation, intelligence interview and debrief methods;
  • Laboratory or field studies to assess the validity of evidence-based interviewing, deception detection, and other relevant principles and/or methods across non-U.S. populations both with and without the use of interpreters;
  • Laboratory or field studies on fundamental psychological processes (to include but not be limited to decision-making, emotion, motivation, memory, persuasion, social identities and social development) as these are relevant to interrogations, intelligence interviews and debriefs;
  • Laboratory or field studies of interpersonal processes (e.g., social influence, persuasion, negotiation, conflict resolution and management), with particular attention to cultural and intercultural issues; and
  • Topics considered out of scope for this BAA include the development of technologies for credibility assessment or other performance support aids, methods relying exclusively on case studies, and language training.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

FBI-HIG-BAA

Verschlusssache Waffenbrüder – Die Straftaten der Sowjetarmee – Ganzer Film

Beinahe 50 Jahre gehörten die Sowjetsoldaten zum Alltag in Ostdeutschland. Laut verkündet wurden die offiziellen Parolen vom festen Bruderbund. Verschwiegen wurde, dass die “Freunde” auch Täter waren. Jahr für Jahr begingen die Armeeangehörigen mehr als 2000 Straftaten. Doch offiziell darüber geredet wurde nicht. Verbrechen sowjetischer Soldaten in der DDR waren tabu. Das tatsächliche Ausmaß dieses dunklen Kapitels der “Waffen- und Klassenbrüderschaft” wurde erst nach dem Abzug der sowjetischen Streitkräfte bekannt. Von 1976 bis 1989 wurden 27.505 kriminelle Vorgänge erfasst: Verkehrs- und Schießunfälle, Diebstähle, Körperverletzungen, Vergewaltigungen und Mord. So ist ein Film entstanden, der erstmalig anhand konkreter Fälle das Problem der Straftaten sowjetischer Soldaten in der DDR dokumentarisch aufarbeitet. Im Mittelpunkt stehen die Opfer und ihre Angehörigen. Zu Wort kommen auch DDR-Militärstaatsanwälte und Angehörige der Kriminalpolizei. Es werden einzelne Straftaten rekonstruiert und der Umgang damit von Seiten der DDR-Behörden geschildert.

Die “DDR” und Kuba – Zement gegen Südfrüchte

Die DDR und Kuba
Auf den ersten Blick gab es nur Gegensätze zwischen diesen beiden Ländern des real existierenden Sozialismus: Hier mausgrau, dort grellbunt, hier bierernst, dort ausgelassen und lebensfroh. Eines jedoch verband Castros Kuba und Honeckers DDR über alle Jahrzehnte hinweg: die Verwaltung des Mangels. Ostberlin schickte klapprige Zementfabriken und sogar Rum aus zweifelhafter Destillation über den Atlantik, Havanna revanchierte sich mit Orangen, die nicht schmeckten, und Arbeiterkolonnen, die den unersättlichen Planstellenhunger der DDR-Staatswirtschaft nur ansatzweise stillen konnten. Im Schatten Moskaus entstand so eine zarte Bande gegenseitiger Abhängigkeiten, nach außen selbstverständlich propagiert als “unverbrüchliche Freundschaft zweier Bruderstaaten”. Seit Castros Machtantritt im Jahr 1959 gab es bei den Genossen in Ostberlin nicht nur ein wirtschaftliches Interesse an dem exotischen “Ostblock”-Staat. So konnte man seinem bald eingemauerten Volk zumindest auf dem Papier einen Urlaub in der Karibik in Aussicht stellen. Umgekehrt war für Castro die DDR das sozialistische “Musterländle” im fernen Europa: Fleiß, Ordnungssinn und Know-How der Ostdeutschen beeindruckten den Revolutionär. Anders als dem sowjetischen “Herren”-Gebaren konnte auch der einfache Kubaner dem immer etwas ungelenken Auftritt der Ostdeutschen Sympathie entgegenbringen. Hinter der offiziellen Propaganda wuchsen so viele menschliche Beziehungen, die oft bis heute lebendig blieben.

Unveiled – Kabul attacks shows failure of intelligence

 

Kabul attacks show intel failures in Afghanistan. Dozens, possibly hundreds of people would have been involved in training, equipping and then infiltrating into the heart of Kabul the large number of insurgents who were prepared to fight to a certain death in the Afghan capital last Sunday. Yet neither Afghan nor foreign intelligence operatives appeared to have any idea that an unprecedented wave of attacks was about to engulf both Kabul and several other key locations around the country. So it seems that Afghan President Hamid Karzai may have a point when he says that the “infiltration in Kabul and other provinces is an intelligence failure for us and especially for NATO and should be seriously investigated”.
►►Report claims China spies on US space technology. China is stealing US military and civilian space technology in an effort to disrupt US access to intelligence, navigation and communications satellites, according to a report authored by the State and Defense Departments. The report (.pdf) argues China should be excluded from recommendations made to the US government to ease restrictions on exports of communications and remote-sensing satellites and equipment. Chinese officials have denied the report’s allegations, calling it a “Cold War ghost”.
►►The long and sordid history of sex and espionage. Using seduction to extract valuable information is as old as the Old Testament —literally— Whether from conviction or for profit, women —and men— have traded sex for secrets for centuries. The Cold War provided plenty of opportunities for so-called “honey-pot” scandals. Perhaps the most dramatic case of seduction in recent times involved Israeli nuclear technician Mordechai Vanunu. In 1986 he visited London and provided The Sunday Times with dozens of photographs of Israel’s alleged nuclear weapons program. But Mossad was on his trail and a female agent —Cheryl Ben Tov— befriended him (reportedly bumping into him at a cigarette kiosk in London’s Leicester Square). She lured him to Rome for a weekend, where he was drugged and spirited to Israel.

Die Mauer – Fluchten und Tragödien – Ganzer Film

Die Mauer – Fluchten und Tragödien Unter Lebensgefahr in die Freiheit

In den frühen Morgenstunden des 13. August 1961 beginnt die “Abriegelung” West-Berlins durch DDR-Grenztruppen — die Geburtsstunde der Mauer. Fast drei Jahrzehnte teilt der “antifaschistische Schutzwall” Deutschland in zwei Hälften, und ca. 200 Menschen bezahlen den Versuch, aus der DDR in den Westen zu fliehen, mit dem Leben. Tausenden gelingt die “Republikflucht”, zum Teil auf abenteuerliche Weise: mit Ballons, durch selbst gegrabene Tunnel, im Kofferraum oder mit Tauchausrüstung durch die Ostsee. Der Film blickt zurück auf ein unmenschliches Bollwerk und die vielen Versuche, es zu überwinden. Wie viele Menschen genau ihr Leben bei einem Fluchtversuch über die Grenze der DDR verloren haben, ist auch heute noch ungewiss. Die SED-Führung versuchte nach Kräften, Todesfälle zu verschleiern. Die Abriegelung Westberlins war unblutig verlaufen, wenige Tage später aber erließ das SED-Politbüro einen ersten, noch verklausulierten Schießbefehl an die Grenztruppen. Am 24. August 1961, wenige Wochen nach Ulbrichts Befehl zur “Grenzschließung”, wurde der 24jährige Günter Litwin bei einem Fluchtversuch durch einen gezielten Kopfschuss getötet.

Unveiled – Ex-MI6 Charles Farr Out of Shadows

A sends:

http://www.thesundaytimes.co.uk/sto/comment/profiles/article1021573.ece [Subscription required]

Chief snooper pops out of the shadows

David Leppard

Sunday Times, 22/4/12, p23 main section

When the embattled Theresa May appears before a committee of MPs on Tuesday to give evidence about her work as home secretary she will be accompanied by one of Whitehall’s most powerful, controversial and secretive mandarins. Charles Farr, the Home Office’s top “securocrat”, is set to emerge from the shadows for the first time as he is asked to defend the coalition’s plans to monitor the Internet use and digital communications of everyone in Britain…

He joined MI6 some time in the 19802, serving in South Africa and Jordan. Farr is understood to have come to prominence, as one contemporary recalled, “flying around Afghanistan in a helicopter with thousands of dollars in bundles, doing deals with farmers to not grow opium. Bad policy as it turned out, but he did it very well…”

Farr’s critics say he still carries the legacy of his MI6 heyday — a mindset they claim is inappropriate for his job at the heart of Whitehall security policy. “When you are an MI6 officer out in the field, trying to stop people getting nuclear weapons in, say, Kazakhstan, you have to be very independently minded and very confident in your own judgement. There’s not a lot of ministerial control or public accountability,” says an admirer who knows him well. “Charles feels very uncomfortable in the world of domestic politics and doesn’t read it very well.”

A former Home Office official went further: “When you’re suddenly flung into a top position with management and policy responsibility in the Home Office, you can’t go on behaving like you are in the Tora Bora caves doing deals with warlords. Your job is to advise ministers who decide policy. You can’t go around thinking you are a player in your own right. It’s a constitutional concern…”

It’s no secret in Whitehall that the grandiosely titled communications capabilities development programme was Farr’s “policy baby”. In fact, it was a rehash of an earlier attempt by Farr in 2009 to persuade the then Labour home secretary to build a giant database where the government could hold details of all emails and telephone calls. It obviously needed sensitive handling, but its delivery was bungled by Farr’s office and it was dumped by Labour after an uproar. When a new government was elected he tried to resurrect the plan — with similar results.

A similar lack of deftness befell Farr’s efforts to develop “Prevent”, a controversial plank of the government’s counterterrorism policy that aimed to identify and thwart thousands of young Muslim men who might be vulnerable to violent extremism… “It was a blurring of the policy of surveillance with a different policy of community engagement and building a civil society,” said a former Home Office official. “But if, like Charles Farr, you are a career spook you just don’t get that. You see everything as an opportunity for surveillance and you see everybody as potentially sinister…”

Another former official, who had a showdown with Farr over policy, recalls: “He’s almost messianic. He’s like he’s on a mission to protect the nation. When you disagree with him he gets very emotional. He’s one of these guys who goes white and shakes when he loses his temper…”

“He has on occasions adopted a style that could be considered inappropriate,” said a former official. “He’s a very uncivil servant.”

STASI auf dem Schulhof

Annette Baumeister zeigt beschädigte Seelen, in denen das Gift der Staatssicherheit bis heute fortwirkt. Tausende Betroffene leben in Deutschland, kaum einer traut sich, darüber zu sprechen. Zu groß ist die Angst, stigmatisiert zu werden.

Am Ende der DDR waren ungefähr 8.000 Kinder und Jugendliche so genannte “inoffizielle Mitarbeiter” der Staatssicherheit. Sie wurden in Jugendclubs, in Kirchen und an den Schulen angesprochen. Sie sollten ihre Freunde aushorchen oder über ihre Eltern berichten.

Marko ist 17 Jahre alt, als ihn die Staatssicherheit über seine Dresdner Schule kontaktiert. Kerstin und Elvira besuchen in den 70er Jahren das Internat Wickersdorf für angehende Russischlehrer. Auch sie sind minderjährig, als sie ins Direktorenzimmer bestellt werden und dort auf Männer von der Staatssicherheit treffen. “Ich hatte das Gefühl, die wissen alles über mich”, sagt Kerstin heute über das Anwerbegespräch als damals 16-Jährige im Büro des Schuldirektors. “Ich hatte auch die Befürchtung, wenn ich da nicht mitmache, dass ich dann auch mein Abitur nicht machen kann.” Unter Druck gesetzt, unterschreibt sie die Verpflichtung, niemandem davon zu erzählen, auch den Eltern nicht.

Das Ministerium für Staatssicherheit will wissen, was die Kinder und Jugendlichen denken und fühlen, will ihnen “unter die Haut kriechen und ins Herz schauen”, schließlich hängt von ihnen die Zukunft des Sozialismus ab. Stasiminister Erich Mielke befahl schon 1966, Minderjährige anzuwerben und zu Spitzeln zu machen. Und an der “Juristischen Hochschule” der Staatssicherheit in Potsdam lernen die Führungsoffiziere, wie das geht und welche Jugendlichen besonders dazu zu drängen sind.

Der Film rekonstruiert das Schicksal von Marko, Kerstin und Elvira und zeigt, wie die Stasi vorging, um Jugendliche zu Spitzeldiensten zu pressen. “Stasi auf dem Schulhof” schenkt drei Betroffenen von damals Gehör. Erstmals erzählen sie ihre Geschichte und reflektieren ihre damalige Lebenssituation, ihre Naivität, ihre Verzweiflung, die Einsamkeit, ihre Schuldgefühle. Daneben erzählt der ehemalige Schuldirektor, welche Rolle er bei der Anwerbung spielte, beschreibt ein ehemaliger Führungsoffizier, mit welchem Geschick er die Jugendlichen anwarb und wie die Treffen mit ihnen abliefen.

Ein Film von Annette Baumeister

Confidential – FEMA Research Report: How to Improve Public’s Suspicious Activity Reporting

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-ImprovingSAR-cover.png

 

 

The Federal Emergency Management Agency’s (FEMA) Individual and Community Preparedness Division partnered with the International Association of Chiefs of Police (IACP) on a project to research and develop a strategy to improve the public’s awareness and reporting of suspicious activity. In early 2010, IACP conducted research of contemporary and historical practices intended to improve the public’s reporting of suspicious activity. The literature review showed that little research existed on the motivations and barriers that affect whether or not individuals report information to law enforcement. To close this gap in data, IACP developed a three phase primary research strategy. This report provides an overview of key research findings and provides insights and recommendations that support national and local campaigns.

This research effort complements other national efforts like the Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) and the U.S. Department of Homeland Security’s “If You See Something, Say Something™” public awareness campaign. The “If You See Something, Say Something™” campaign was originally used by New York’s Metropolitan Transportation Authority (MTA), which has licensed the use of the slogan to DHS for anti-terrorism and anti-crime efforts. As part of the campaign, DHS has partnered with multiple private sector partners, sporting teams, transportation agencies, states, cities, colleges and universities. Great strides have been made within the last few years to improve information sharing amongst law enforcement agencies and fusion centers via initiatives like the NSI; yet, more can be done to improve the quantity and quality of information that law enforcement receives from the public.

Residents know their communities best and are often the first to notice when something out of the ordinary occurs. With the onset of decreased resources and increased responsibilities, law enforcement is more reliant than ever on community members to provide accurate, reliable, and timely information regarding suspicious activities that may be indicators of terrorism.

Focus group participants identified several barriers that may prevent community members from reporting suspicious activity. The most frequently cited reason was fear of retaliation. One participant noted a concern that whenever police are called, “they respond with flashing lights and sirens blaring and everyone in the neighborhood would know [who reported the activity].” Women were more likely than men to list fear of retaliation as a barrier. When it came to suspicious activity that may not necessarily be classified as criminal activity, some participants reported not knowing exactly what qualified as “important enough” to report. They wanted to avoid being wrong or appearing “foolish” in the eyes of local law enforcement.

When telephone survey participants were presented with a list of circumstances that could prevent respondents from reporting suspicious activity, the majority said they would not be deterred from reporting. However, there were circumstances that would at least make people more hesitant to report suspicious activity (See Figure 1). Concern over getting an innocent person in trouble (43 percent) was mentioned as the circumstance that was most likely to cause respondents to reconsider reporting the suspicious activity. According to more than one in three (36 percent) respondents, fear of retaliation would make them reconsider reporting. Nearly a third of respondents (31 percent) felt that if they were not sure the information would be a worthwhile use of police resources, they might not report it. Being uncomfortable judging others and assuming someone else would report the activity were the next most frequently mentioned circumstances that would affect reporting of suspicious activity (31 percent and 29 percent).

 

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-ImprovingSAR.png

 

Communities should leverage new technologies to promote anonymous and easily accessible methods of reporting. Many community members fear retaliation and value anonymity when contacting law enforcement. Website portals, text messaging, and mobile phone applications can be used to allow for convenient, anonymous reporting.

Forty-one percent of females and 30 percent of males listed fear of retaliation as a barrier when deciding whether or not to report an observation of suspicious behavior. Many agencies are turning to text messages and web-based reporting programs that allow residents to remain anonymous while submitting reports, reducing concerns over intimidation and negative consequences.

Across age groups, research participants were receptive to the use of these new technologies in the reporting of suspicious activity. Thirty-four percent stated they were likely to report by phone mobile application, 30 percent by cell phone text message, and 25 percent on a government approved website. However, it is important to provide a variety of reporting options, as some community members may not have access to these forms of technology.

Public education should explain the dispatch process, so community members better understand when, how, and if an officer will respond. For individuals such as the focus group member who worried about police “responding with flashing lights and sirens,” this may help relieve some of the anxiety about remaining anonymous when calling law enforcement.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

FEMA-ImprovingSAR

The Hunt For Gollum – Lord of the Rings Prequel – Full Movie

Award winning unofficial prequel to The Lord Of The Rings dramatising Aragorn & Gandalf’s long search for Gollum directed by British filmmaker Chris Bouchard. Based faithfully on the appendices of the books this is a non-profit, serious homage to the writing of J.R.R Tolkien and the films of Peter Jackson. It was shot on locations in England and Snowdonia with a team of over a hundred people working over the Internet. It took two years to make and was released as a non-profit Internet-only video by agreement with Tolkien Enterprizes. This Youtube version is slightly extended with 1 scene added back in. http://www.thehuntforgollum.com http://www.ioniafilms.com

Born of Hope – Full Movie

Born of Hope is an independent feature film inspired by the Lord of the Rings and produced by Actors at Work Productions in the UK.
http://www.bornofhope.com

Thanks to Chris Bouchard and the H4G team for putting the film here. For more films by the makers of this and BoH extras please visit.
ActorsatWork
http://www.youtube.com/actorsatwork

Check them out for more videos regarding the film including the audio commentary.
http://www.youtube.com/watch?v=elt_l8zisik

A scattered people, the descendants of storied sea kings of the ancient West, struggle to survive in a lonely wilderness as a dark force relentlessly bends its will toward their destruction. Yet amidst these valiant, desperate people, hope remains. A royal house endures unbroken from father to son.

This 70 minute original drama is set in the time before the War of the Ring and tells the story of the Dúnedain, the Rangers of the North, before the return of the King. Inspired by only a couple of paragraphs written by Tolkien in the appendices of the Lord of the Rings we follow Arathorn and Gilraen, the parents of Aragorn, from their first meeting through a turbulent time in their people’s history.

The STASI in West-Berlin – Die STASI in West-Berlin – Full Movie – Ganzer Film

Das Ministerium für Staatssicherheit der DDR (kurz MfS oder Stasi, abwertend auch SSD) war der Inlands- und Auslandsgeheimdienst der DDR und zugleich Ermittlungsbehörde (Untersuchungsorgan) für „politische Straftaten”. Das MfS war innenpolitisch vor allem ein Unterdrückungs- und Überwachungsinstrument der SED („Schild und Schwert der Partei”) gegenüber der DDR-Bevölkerung, das dem Machterhalt diente. Dabei setzte es als Mittel Überwachung, Einschüchterung, Terror und die so genannte Zersetzung gegen Oppositionelle und Regimekritiker („feindlich-negative Personen”) ein.

Das MfS wurde am 8. Februar 1950 gegründet. Der Sprachgebrauch der SED, der das MfS als „Schild und Schwert der Partei” bezeichnete, beschreibt die ihm zugedachte Funktion im politisch-ideologischen System der DDR.

Neben dem MfS gab es auch einen weiteren Nachrichtendienst in der DDR, die Militärische Aufklärung der Nationalen Volksarmee (militärischer Aufklärungsdienst) mit Sitz in Berlin-Treptow. Die Verwaltung Aufklärung wurde ebenso wie die Grenztruppen und die restliche NVA durch die Hauptabteilung I (MfS-Militärabwehr oder Verwaltung 2000) kontrolliert („abgesichert”).

TOP-SECRET – The CIA Crown Jewels – The Watergare Case

Citation: DDCI Statement about the Watergate Case
[Central Intelligence Agency Employee Bulletin Containing Vernon Walter’s Statement on CIA Involvement in Watergate; Best Available Copy] , [Classification Unknown], Newsletter, 359, May 21, 1973, 3 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00031
Origin: United States. Central Intelligence Agency
Individuals/
Organizations Named:
Cushman, Robert E., Jr.; Dean, John Wesley III; Democratic National Committee (U.S.); Ehrlichman, John D.; Gray, L. Patrick; Haldeman, H.R.; Helms, Richard M.; Hunt, E. Howard; Nixon, Richard M.; Schlesinger, James R.; United States. Department of Justice; United States. Federal Bureau of Investigation; United States. White House; Walters, Vernon A.
Subjects: Congressional hearings | Covert operations | Government appropriations and expenditures | Mexico | Watergate Affair (1972-1974)
Abstract: Disseminates Vernon Walter’s statement to congressional committee about his communications with John Dean and Patrick Gray on Central Intelligence Agency involvement in Watergate and CIA’s issuance of equipment to Howard Hunt.
Full Text: Document – PDF – this link will open in a new window (156 KB)

Durable URL for this record

Hitler’s Warriors – Wilhelm Keitel – Full Movie

 

From the series “Hitler’s Warriors”.

Wilhelm Bodewin Gustav Keitel (22 September 1882 — 16 October 1946) was a German field marshal (Generalfeldmarschall). As head of the Oberkommando der Wehrmacht (Supreme Command of the Armed Forces) and de facto war minister, he was one of Germany’s most senior military leaders during World War II. At the Allied court at Nuremberg he was tried, sentenced to death and hanged as a war criminal.

TOP-SECRET from the FBI – Eleven Individuals of the Genovese Organized Crime Family Indicted

An 18-count indictment was unsealed in federal court in Brooklyn this morning charging 11 individuals, including several made members and associates of the Genovese organized crime family of La Cosa Nostra (the “Genovese family”), variously with racketeering conspiracy, extortion, illegal gambling, union embezzlement, and obstruction of justice. The defendants will make their initial appearance later today before United States Magistrate Judge Marilyn D. Go at the U.S. Courthouse at 225 Cadman Plaza East in Brooklyn, New York.

The case was announced by Loretta E. Lynch, United States Attorney for the Eastern District of New York; Janice K. Fedarcyk, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office; Robert Panella, Special Agent in Charge, U.S. Department of Labor, Office of Inspector General, Office of Labor Racketeering and Fraud Investigations, New York Region; Raymond W. Kelly, Commissioner, New York City Police Department; and Rose Gill Hearn, Commissioner, New York City Department of Investigation (DOI).

As alleged in the indictment and a detention memorandum filed by the government today, Conrad Ianniello is a captain in the Genovese family. James Bernardone, the Secretary Treasurer of Local 124 of the International Union of Journeymen and Allied Trades (IUJAT), and Salvester Zarzana, the former President of Local 926 of the United Brotherhood of Carpenters and Joiners, are both soldiers in the Genovese family. Ryan Ellis, Paul Gasparrini, William Panzera, and Robert Scalza, the Secretary Treasurer of IUJAT Local 713, are associates of the Genovese family. Also named as defendants are Robert Fiorello, Rodney Johnson, Felice Masullo, and John Squitieri.

Ianniello is charged with, among other crimes, racketeering conspiracy, including predicate acts of illegal gambling; conspiring to extort vendors at the annual Feast of San Gennaro held in Little Italy, New York in 2008; and, along with Scalza and Ellis, conspiring to extort a labor union between April 2008 and May 2008 in order to induce the union to cease its efforts to organize workers at a company on Long Island. Based on their threats, the defendants allegedly hoped to pave the way for Scalza’s union, IUJAT Local 713, to unionize the company instead.

The indictment charges Bernardone and Gasparrini with racketeering conspiracy, including predicate acts of conspiring to extort a subcontractor related to work performed at construction sites in Manhattan, Queens, and Brooklyn from approximately 2006 to 2009, including work performed at a Hampton Inn located on Ditmars Boulevard in Queens. Zarzana is also charged with extortion related to one of those construction sites. In addition, the indictment alleges that in 2008, Squitieri embezzled money from employee pension and annuity funds of Local 7-Tile, Marble, and Terrazzo of the Bricklayers and Allied Craftworkers union by providing non-union laborers to perform tile-related work during a renovation at the Paramount Hotel in Manhattan, thereby avoiding paying into Local 7’s employee pension benefit plans. Johnson, a project manager at the Paramount Hotel renovation, is charged with obstruction of justice in connection with his efforts to impede a federal grand jury investigation conducted in this district that ultimately resulted in the charges brought in the indictment unsealed today.

Finally, Panzera and Fiorello are charged with crimes related to their involvement in loansharking and the extortionate collection of money from a victim.

“This indictment is the most recent chapter in this office’s continued fight against organized crime’s efforts to infiltrate unions and businesses operating in New York City. Where others saw a city festival, urban renewal, and job growth, these defendants allegedly saw only a chance to line their pockets at the expense of hard working individuals. And when law enforcement began to probe their actions, one defendant allegedly went so far as to try to block that investigation,” stated United States Attorney Lynch. “Organized crime figures and union officials who seek to earn money by corrupting legitimate industry will be investigated and prosecuted to the full extent of the law.”

FBI Assistant Director in Charge Fedarcyk stated, “Today’s charges highlight not only the ongoing vigilance of the FBI in policing the corrupt conduct of La Cosa Nostra, but also the necessity of such vigilance. Even as mob families seek and discover new ways to make money by illegitimate means, they continue to rely on tried-and-true schemes like extortion and gambling. The mob’s purpose is making money, and how is less important than how much.”

Special Agent in Charge Panella, U.S. Department of Labor, Office of Inspector General, stated, “The RICO indictment and today’s arrests reflect our strong commitment to combat the infiltration of unions by organized crime members and associates for their personal enrichment. The defendants allegedly utilized their organized crime influence to corrupt businesses and advance various illegal schemes. The Office of Inspector General will continue to work with our law enforcement partners to vigorously investigate labor racketeering in the nation’s unions.”

NYPD Commissioner Kelly stated, “As alleged in the indictment, the defendants’ extortion knew no bounds—in fact, one of the defendants allegedly even used the feast of San Gennaro to extort money from vendors involved in the celebration of the saint’s life. I commend the U.S. Attorney’s Office and the federal agents and New York City detectives for this successful investigation.”

DOI Commissioner Gill Hearn stated, “The charges underscore the determination of federal and city investigators to curtail organized crime’s influence in New York City, including the Feast of San Gennaro in Little Italy. DOI was pleased to assist its federal partners on this significant indictment.”

The defendants face maximum sentences ranging from five to 20 years of imprisonment on each count of conviction.

The government’s case is being prosecuted by Assistant United States Attorneys Nicole Argentieri, Jacquelyn Kasulis, and Amanda Hector.

The Defendants

Name Age Residence
Conrad Ianniello 68 Staten Island, New York
James Bernardone 44 Bronx, New York
Ryan Ellis 30 Queens, New York
Rober Fiorello 62 Jackson, New Jersey
Paul Gasparrini 39 Yonkers, New York
Rodney Johnson 49 Edgewater, New Jersey
Felice Masullo 40 Queens, New York
William Panzera 39 North Haledon, New Jersey
Robert Scalza 66 Long Island, New York
John Squitieri 55 Rockland County, New York
Salvester Zarzana 48 Brooklyn, New York

Revealed – Kony 2012 Campaign Loses Couch Potatoes

https://s3.amazonaws.com/disinfo/wp-content/uploads/2012/04/InvisibleChildrenDickheads.jpg

 

Linking to a video on Facebook is one thing. Getting off the couch is quite another.

Viral internet sensation Kony 2012 found the campaign’s youthful army of ”clicktivists” largely unwilling to actually get up, go outside and put up posters.

Judging by the mood online, many had decided the whole meme was, like, so 10 minutes ago.

Participants in the campaign’s Cover the Night event on Friday were asked to form into teams, volunteer for their community for a few hours by picking up rubbish or washing cars, then spend the evening plastering walls, pavements and windows with promotional material.

But amazing things generally failed to happen. In New York, barely 5000 people had pledged on Facebook to join in. The event’s page didn’t specify a location, and Twitter revealed only a handful of groups heading to places such as Times Square, where a big video screen showed a Kony 2012 trailer every half hour just above a Foot Locker store.

Unveiled – Alan Turing Code Papers Released

https://upload.wikimedia.org/wikipedia/commons/1/19/Turing_Plaque.jpg

Alan Turing, perhaps the greatest computer scientist ever, famous for breaking the Germans’ Enigma code in World War II, wrote two papers on code breaking that have just been released by Britain’s spy center, GCHQ.

Two 70-year-old papers by Alan Turing on the theory of code breaking have been released by the government’s communications headquarters, GCHQ.

It is believed Turing wrote the papers while at Bletchley Park working on breaking German Enigma codes. A GCHQ mathematician said the fact that the contents had been restricted “shows what a tremendous importance it has in the foundations of our subject”.

It comes amid celebrations to mark the centenary of Turing’s birth. The two papers are now available to view at the National Archives at Kew, west London. GCHQ was able to approximately date the papers because in one example Turing had made reference to Hitler’s age.

 

Alan Mathison Turing, OBE, FRS (play /ˈtjʊərɪŋ/ TEWR-ing; 23 June 1912 – 7 June 1954), was an English mathematician, logician, cryptanalyst, and computer scientist. He was highly influential in the development of computer science, providing a formalisation of the concepts of “algorithm” and “computation” with the Turing machine, which played a significant role in the creation of the modern computer.[1][2] Turing is widely considered to be the father of computer science and artificial intelligence.[3] He was stockily built, had a high-pitched voice, and was talkative, witty, and somewhat donnish.[4] He showed many of the characteristics that are indicative of Asperger syndrome.[5]

During the Second World War, Turing worked for the Government Code and Cypher School (GCCS) at Bletchley Park, Britain’s codebreaking centre. For a time he was head of Hut 8, the section responsible for German naval cryptanalysis. He devised a number of techniques for breaking German ciphers, including the method of the bombe, an electromechanical machine that could find settings for the Enigma machine.

After the war he worked at the National Physical Laboratory, where he created one of the first designs for a stored-program computer, the ACE. In 1948 Turing joined Max Newman’s Computing Laboratory at Manchester University, where he assisted in the development of the Manchester computers[6] and became interested in mathematical biology. He wrote a paper on the chemical basis of morphogenesis,[7] and he predicted oscillating chemical reactions such as the Belousov–Zhabotinsky reaction, which were first observed in the 1960s.

Turing’s homosexuality resulted in a criminal prosecution in 1952, when homosexual acts were still illegal in the United Kingdom. He accepted treatment with female hormones (chemical castration) as an alternative to prison. He died in 1954, just over two weeks before his 42nd birthday, from cyanide poisoning. An inquest determined it was suicide; his mother and some others believed his death was accidental. On 10 September 2009, following an Internet campaign, British Prime Minister Gordon Brown made an official public apology on behalf of the British government for the way in which Turing was treated after the war.[8]

https://en.wikipedia.org/wiki/Wikipedia:Pronunciation_respelling_key

Secret – Canada Integrated Terrorism Assessment Centre (ITAC) Occupy Wall Street Bulletins

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy-2.png

 

The following Integrated Terrorism Assessment Centre (ITAC) bulletins were obtained via an information request from the Canadian Security Intelligence Service (CSIS) by Paroxysms.  Most of the documents were also simultaneously released to the Globe and Mail, though the collection released to Paroxysms is more complete and contains several additional bulletins that are not included in the other collection.

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE

ITAC-Occupy

Confidential from the FBI – Madam Employed Illegal Aliens in Marietta Prostitution House

ATLANTA—Luiz M. Gutierrez, 56, of Marietta, pleaded guilty today in federal district court to conspiracy to entice individuals to cross state lines to engage in prostitution and to encourage and induce aliens to reside unlawfully in the United States.

According to United States Attorney Yates, the charges, and other information presented in court: Gutierrez operated a house of prostitution in Marietta, Georgia, in which she employed illegal aliens, both as house caretakers and prostitutes. In addition to employing prostitutes who lived in Georgia, Gutierrez regularly solicited illegal alien prostitutes living in other states, including Alabama, Florida, North Carolina, and Massachusetts, to travel to Georgia, where they worked for Gutierrez and Epifania Sanchez Delarosa, her co-defendant, who also allegedly operated brothels. Gutierrez also recruited prostitutes who lived in Georgia to travel to Alabama to work for an associate of Gutierrez who owned and managed brothels in that state.

Gutierrez was indicted on December 6, 2011 on two counts of conspiracy, two counts of enticing individuals to cross state lines to engage in prostitution, and two counts of encouraging and inducing aliens to reside unlawfully in the United States. She pleaded guilty to one conspiracy count. She could receive a maximum sentence of five years in prison and a fine of up to $250,000. In determining the actual sentence, the court will consider the United States Sentencing Guidelines, which are not binding but provide appropriate sentencing ranges for most offenders.

Sentencing is scheduled for July 10, 2012 at 11:00 a.m. before United States District Judge Timothy C. Batten.

This case is being investigated by special agents of the Federal Bureau of Investigation and the U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI), with assistance from the Cobb County Police Department.

Assistant United States Attorneys Teresa D. Hoyt and William G. Traynor and Department of Justice Civil Rights Division Trial Attorney Benjamin Hawk are prosecuting the case.

SECRET – Thirty Arrested in Connection with Narcotics Trafficking

OKLAHOMA CITY—James E. Finch, Special Agent in Charge of the FBI Oklahoma City Division announces the arrest of 30 individuals for violation of federal narcotic laws. In addition to the 30 individuals arrested yesterday, law enforcement in Oklahoma is looking for two additional individuals.

Yesterday’s event is a culmination of a three-year investigation into narcotics trafficking from California to Oklahoma. Arrests took place in Oklahoma City; Del City; Norman; Tulsa; Sacramento, California; Stockton, California; and San Francisco, California. These arrests stem from two indictments returned by the federal grand jury in the Western District of Oklahoma.

Law enforcement in Oklahoma is still searching for two individuals who have not been located. Those individuals are Tyrone Tanner, 31, from Tulsa, Oklahoma; and Darnell Banks, 26, from Oklahoma City, Oklahoma. Their photos can be seen below.

This investigation and yesterday’s arrests would not have been possible without the assistance of the Homeland Security Investigation, U.S. Marshals Service, Internal Revenue Service, Oklahoma City Police Department, Del City Police Department, Norman Police Department, Tulsa County Sheriff’s Office, Drug Enforcement Administration (DEA)-Stockton, FBI-Stockton, Stockton Police Department, FBI-Sacramento, DEA-Sacramento, FBI-San Francisco, and DEA-San Francisco.

Anyone with information regarding the whereabouts of any of the individuals listed above is urged to immediately contact the Oklahoma City Division of the FBI at (405) 290-7770 (24 hour number). You may remain anonymous.

Eichmann (2007) – Full Movie

Adolf Eichmann was a German Nazi and SS-Obersturmbannführer (Lieutenant Colonel) and one of the major organizers of the Holocaust. Because of his organizational talents and ideological reliability, Eichmann was charged by Obergruppenführer (General) Reinhard Heydrich with the task of facilitating and managing the logistics of mass deportation of Jews to ghettos and extermination camps in German-occupied Eastern Europe.

Read the rest at Wikipedia http://en.wikipedia.org/wiki/Adolf_Eichmann

Crpytome unveils – OWS Protestors Get 1A Camp at National Memorial

Notice of Temporary Change

Federal Hall National Memorial is announcing a temporary change to how the public will access the building. Taking this action affords visitors safe access to the site without interfering with those participating in 1st amendment activities at the site.

[Image]

17 April 2012

Occupy Wall Street 17 April 2012

The steps of Federal Hall National Memorial have replaced the sidewalks for the Occupy Wall Street
encampment. Located across Wall Street from the New York Stock Exchange, it is one of the most
popular tourist stops in NYC.

The protest is described by OWS as training for a worldwide General Strike on 1 May 2012. More:

Tidalhttp://occupytheory.org

http://occupiedmedia.us

Cryptome Protest Series: http://cryptome.org/protest-series.htm

 


 

Occupy Wall Street 17 April 2012

[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. April 17, 2012. Cryptome

[Image]

[Image][Image]

US National Park Service (USNPS) police, which guard national Memorials such as the Statue of Liberty,
are monitoring the protest along with NYPD. An attempt by USNPS police to move the protestors to one
side of the steps was resisted by the protestor above while Cryptome photos and a video were made.
In answer to an inquiry about the resistance, the USNPS officer answered every question with
“they are exercising free speech.”

[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. As temperatures warm, members of the global protest movement have reasserted their commitment to finding a permanent presence in the financial district following their eviction from Zucotti Park last November in a dramatic police raid. Getty
[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. As temperatures warm, members of the global protest movement have reasserted their commitment to finding a permanent presence in the financial district following their eviction from Zucotti Park last November in a dramatic police raid. Getty
[Image]Members of Occupy Wall Street gather on the steps of Federal Hall after being evicted from the sidewalk early yesterday morning where they had been sleeping on April 17, 2012 in New York City. As temperatures warm, members of the global protest movement have reasserted their commitment to finding a permanent presence in the financial district following their eviction from Zucotti Park last November in a dramatic police raid. Getty
Following photos taken by Cryptome between 11:30 and 13:30, 17 April 2012.
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]US National Park Service police SWAT members. Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome

[Image]

[Image]

Senior Park Service police overheard discussing how to corral the protestors without provoking resistance. 17 April 2012. Cryptome

[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
 

Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome

[Image]Side wall of Federal Hall National Memorial where OWS protestors slept overnight until evicted by NYPD. 17 April 2012. Cryptome
[Image]Sidewalk across from Federal Hall National Memorial where OWS protestors slept overnight until evicted by NYPD. 17 April 2012. Cryptome
[Image]Occupy Wall Street, Federal Hall National Memorial, 17 April 2012. Cryptome
[Image]School children were led in a protest chant by their teacher.

 


	

Confidential – Soros Open Society Institute Tax Report 2010

 

The Open Society Institute (OSI), renamed in 2011 to Open Society Foundations, is a private operating and grantmaking foundation started by George Soros, aimed to shape public policy to promote democratic governance, human rights, and economic, legal, and social reform. On a local level, OSF implements a range of initiatives to support the rule of law, education, public health, and independent media. At the same time, OSF works to build alliances across borders and continents on issues such as combating corruption and rights abuses.

One of the aims of the OSF is the development of civil society organizations (e.g., charities, community groups and trade unions) to encourage participation in democracy and society.

Open Society Institute was created in 1993 by investor George Soros to support his foundations in Central and Eastern Europe and the former Soviet Union. On May 28, 1984 Soros signed the contract between the Soros Foundation (New York) and the Hungarian Academy of Sciences, the founding document of the Soros Foundation Budapest.[1]This was followed by several foundations in the region to help countries move away from communism. In August 2010, Open Society Initiative changed its name to Open Society Foundations to better reflect its role as funder for civil society groups around the world. OSF has expanded the activities of the Soros Foundations network to other areas of the world where the transition to democracy is of particular concern. The Soros Foundations network has nodes in more than 60 countries, including the United States. OSF projects include the National Security and Human Rights Campaign that opposes detention of unprivileged combatants and the Lindesmith Center and others dealing with drug reform.

Related initiatives include the Open Society Initiative for West Africa (OSIWA) and the Open Society Initiative for Southern Africa (OSISA). Recent efforts have included those that have met with controversy, including an effort in East Africa aimed at spreading human rights awareness among prostitutes in Uganda and other East African nations, which was not received well by the Ugandan authorities, who considered it an effort to legalize and legitimize prostitution.[2] Other initiatives includes: AfriMAP; Arts & Culture Program; Americas Quarterly; Burma Project/Southeast Asia Initiative; Central Eurasia Project; Central Eurasia Project; Closing the Addiction Treatment Gap; Documentary Photography Project; Soros Documentary Fund (SDF);[3] Early Childhood Program; East East Program: Partnership Beyond Borders; Education Support Program; EUMAP; Global Drug Policy Program; Information Program; International Higher Education Support Program; Latin America Program; Local Government & Public Service Reform Initiative; Media Program; Middle East & North Africa Initiative; Open Society Fellowship; OSI-Baltimore; OSI-Brussels; OSI-Washington, D.C.; Public Health Program; Roma Initiatives; Scholarship Programs; Special Initiatives; Think Tank Fund[4]; Turkmenistan Project; U.S. Programs; International Women’s Program; the Youth Initiative[5]; the International Migration Initiative; Policy Matters Ohio and the Open Society Justice Initiative.

According to the 2009 OSF expenditures report[6], Africa region (outside of the South Africa) was the key area of funded activities: about $51,000,000 were spent on civil society support, human rights, education, justice, media, public health, transparency, and other activities there.

Among other regions, activities in five counties received the most funding (excluding funds provided by non-OSI parties): Ukraine ($8.47M; mostly in civil society support, human rights, public health), South Africa ($7.23M; human rights, civil society, information and media and other), Russia ($6,29M; almost solely civil society support), Serbia ($5,04M; mostly civil society, education and youth, human rights, transparency), Georgia ($4.84M; media, human rights, civil society, administration, transparency, public health and other).

6 out of 10 countries with most activities of the Institute in 2009 are post-Soviet states. Another 3 are situated Eastern Europe.

https://en.wikipedia.org/wiki/Open_Society_Institute

DOWNLOAD THE ORIGINAL DOCUMENT HERE

osi-tax-2010

Uncensored – FEMEN Ring Bells at St Sophia cathedral

Femen Ring Bells at St Sophia cathedral to protest the antiabortion law against women rights.Femen провели акцию протеста на колокольне Софийского собора

Пятеро активисток женской организации FEMEN забрались на колокольню Софийского собора в центре

Confidential – U.S. Air Force Small Unmanned Aircraft Systems (SUAS) Airpower Lessons from Iraq and Afghanistan

https://publicintelligence.net/wp-content/uploads/2012/04/USAF-SUAS-LL.png

 

 

“Enduring Airpower Lessons from Operation ENDURING FREEDOM (OEF) and Operation IRAQI FREEDOM (OIF)” is one of three lessons learned (L2) focus areas directed by the Chief of Staff of the Air Force (CSAF) at CORONA Top 2008. This report is the third and last in a series of Unmanned Aircraft Systems (UAS) L2 reports produced for fiscal year 2009 and focuses on Small UAS (SUAS) capabilities and issues.

Five key observations provide insight into SUAS issues:

OBSERVATION 1: Insufficient analysis and education exist on the capabilities of SUAS and how they could be effectively employed by the USAF.

OBSERVATION 2: The USAF does not have a comprehensive strategy for the acquisition, sustainment and development of SUAS capabilities; and the USAF has not properly funded SUAS programs.

OBSERVATION 3: HQ AFSOC received funding and has developed the first Air Force SUAS Formal Training Unit (FTU).

OBSERVATION 4: There are no full-time, dedicated professional uniformed Group 2 and 3 UAS operators and maintainers.

OBSERVATION 5: Frequency and bandwidth management, communications infrastructure and datalinks will only be more stressed with the proliferation of SUAS; and SUAS Ground Control Station (GCS) frequencies are unencrypted and unprotected.

OBSERVATION 5: Frequency and bandwidth management, communications infrastructure and datalinks will only be more stressed with the proliferation of SUAS; and SUAS GCS frequencies are unencrypted and unprotected.

Discussion: With the proliferation of SUAS on the battlefield of the near future, the current SUAS GCS proprietary datalinks are not flexible and sustainable. Many of the current SUAS use datalink equipment that is not interoperable with other datalinks or tunable to other frequencies. In fact, the number of available proprietary SUAS frequencies is so limited US military SUAS operations are threatened by interference from other operations. Additionally, SUAS datalinks are unencrypted and are thus susceptible to enemy exploitation. Since datalinks are also unprotected, GCS are jammable and locations can even be triangulated and possibly physically attacked.

Not all Group 2 and 3 UAS are Cursor on Target (CoT) capable. Among other capabilities, CoT enables users to communicate from a common set of applications to various datalinks such as Link-16 and Situational Awareness Data Link (SADL). Any GCS standards must deliver CoT compatibility to enable existing CoT systems to seamlessly integrate, thereby decreasing integration costs and simplifying transition.

Given that SUAS datalink frequencies are not tunable, they may be prohibited from operating in other regions and countries of the world. This limitation is due to the potentiality of interfering with host-nation communications frequencies. Additionally, SUAS datalinks are not interoperable with manpack radios, burdening operators to transport multiple pieces of communications hardware on the battlefield.

Effective 1 October 2009, Assistant Secretary of Defense (Networks and Information Integration) (ASD (NII)) mandated the use of Common Data Link (CDL) for all UAS greater than 30 lbs. As it was originally designed and fielded in the late 1970s, CDL was adequate. According to HQ AFSOC, CDL is not small enough for Group 1 SUAS operations, but will be leveraged on Group 2 and 3 systems. However, the continued proliferation of CDL enabled airborne assets has already reached a tipping point. CDL is a huge and inefficient frequency space consumer. This dated, yet capable, waveform needs modernization, to include “dial-a-rate” speeds, more efficient error correction coding, multiple encoding rates, expanded frequency band alternatives (e.g., into L, S, C and extended Ku) and importability to software defined radios. Such modifications could improve UAS density 3 to 15 times what it is today. As it stands, failure to modernize the CDL waveform will limit the number of participants that can operate within a region (or suffer degraded video quality) and require strict frequency deconfliction.
Lessons Identified:

  • Develop tunable, interoperable, and unrestricted SUAS GCS frequencies since available radio frequency spectrum is an essential enabler for UAS operations.
  • Secure and protect SUAS GCS frequencies.
  • Develop SUAS GCS datalinks capable of Voice-Over Internet Protocol (VoIP), video and data multicast.
  • Make all Group 2 and 3 UAS CoT capable.
  • Develop digital SUAS GCS datalinks that are interoperable with field radios.
  • Modernize CDL waveform.

Die Gesichter des Bösen – Hitlers Henker – SPIEGEL TV – Ganzer Film

Argumente gegen Holocaustleugner
http://www.h-ref.de/
Die Dokumentation zeichnet die Wege der Täter nach, die die unbeschreiblichen Verbrechen im “Dritten Reich” erst möglich machten.
Heinrich Himmler organisierte für seinen Führer die brutale Verfolgung politischer Gegner in einem System von Konzentrationslagern. Der fanatische Nationalsozialist und Antisemit plante die Vernichtung der europäischen Juden. Im Holocaust wurden schließlich über sechs Millionen Menschen ermordet.

Der berüchtigte SS-Arzt Josef Mengele gehörte zu den grausamsten Tätern der Nazidiktatur. 40.000 unschuldige Opfer schickte er ins Gas, benutzte Kinder für Menschenversuche. Nach dem Krieg gelang ihm die Flucht, er wurde weltweit verfolgt – aber nie gefasst. Adolf Eichmann, der berüchtigte Organisator des Holocaust war jedoch nicht der einzige, dem schließlich der Prozess gemacht wurde. Der ehemalige SS-Hauptsturmführer Erich Priebke ist der Mitwirkung an besonders grausamen Morden angeklagt worden. Das Massaker in den ardeatinischen Höhlen, an dem er als Offizier beteiligt war, gilt als das schlimmste Kriegsverbrechen, das die Deutschen im besetzten Italien begangen haben.

Secret from the FBI – Albanian National Arrested En Route to Fight Jihad Pleads Guilty to Attempting to Support Terrorists

Agron Hasbajrami, an Albanian citizen and resident of Brooklyn, pled guilty today in United States District Court for the Eastern District of New York before the Honorable John Gleeson to attempting to provide material support to terrorists. At sentencing, Hasbajrami faces up to 15 years in prison. As a condition of his plea, Hasbarjrami has agreed to be deported from the United States.

The guilty plea was announced by Loretta E. Lynch, United States Attorney for the Eastern District of New York; Janice K. Fedarcyk, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office; and Raymond W. Kelly, Commissioner, New York City Police Department.

According to court documents, Hasbajrami attempted to travel to the Federally Administered Tribal Areas of Pakistan (the FATA) for the purpose of joining a radical jihadist insurgent group. In addition, Hasbajrami sent over $1,000 in multiple wire transfers abroad to support terrorist activities in Pakistan and Afghanistan. In pursuing his goal of fighting jihad, Hasbajrami exchanged e-mail messages with an individual in Pakistan who told him that he was a member of an armed group that had murdered American soldiers. In order to preserve the secrecy of their communications, Hasbajrami and the individual used multiple e-mail addresses to disguise their correspondence. In one e-mail message, Hasbajrami stated that it was difficult to ask for money from fellow Muslims because they became apprehensive “when they hear it is for jihad.” In another e-mail, Hasbajrami stated that he wished to travel abroad to “marry with the girls in paradise,” using jihadist rhetoric to describe his desire to die as a martyr.

On September 5, 2011, Hasbajrami purchased a one-way airline ticket to travel to Turkey the following day. Based on Hasbajrami’s e-mail communications, he intended to travel from Turkey to the FATA to join a jihadist group. On September 6, 2011, Hasbajrami was arrested at an international departures terminal at John F. Kennedy International Airport in Queens, New York. At the time of his arrest, Hasbajrami was carrying a tent, boots, and cold-weather gear. Following his arrest, a search of Hasbajrami’s residence revealed, among other items, a note reading, “Do not wait for invasion, the time is martyrdom time.”

“The defendant reached across the ocean from Brooklyn to Pakistan, seeking out terrorists in the hopes of becoming one. Once he found what he sought, he pledged his money, his energy, and the end of his own life to the goal of spreading terror abroad. As this case demonstrates yet again, law enforcement in New York and across the United States has the vigilance, capability, and skill to catch terrorists before they strike,” stated United States Attorney Lynch. “We will continue to bring to justice those who intend to harm Americans and hold them accountable for their actions.”

FBI Assistant Director in Charge Fedarcyk stated, “The defendant has admitted to attempting to provide material support to terrorists, but this entailed much more than the money he wired overseas. If not for his arrest, he would have traveled to Pakistan to wage jihad and aim to kill American soldiers. Our mission includes not only preventing acts of terrorism here but also preventing would-be terrorists from going abroad to harm Americans.”

“The plea demonstrates that Brooklyn is no place from which to launch terrorist aspirations without the good chance of being captured and prosecuted,” Police Commissioner Kelly said. “Vigilance paid dividends again.”

The government’s case is being prosecuted by Assistant United States Attorneys Seth D. DuCharme and Matthew S. Amatruda, with assistance provided by Trial Attorney Courtney Sullivan of the DOJ Counterterrorism Section.

Mengeles Erben – Menschenexperimente im Kalten Krieg – Ganzer Film

Die Erprobung von Giftstoffen für staatliche Mordaufträge und tödliche Experimente mit Lagerinsassen verbindet man mit dem systematischen Massenmord der Nazis. Josef Mengele ist der bekannteste Vertreter dieser “Wissenschaft ohne Gewissen”.

Die Geschichte der Menschenversuche im Auftrag des Staates beginnt in den 20er Jahren im “Labor 12” des sowjetischen Geheimdienstes. Dort wurden tödliche Gifte an “Volksfeinden” erprobt. Die Existenz dieses Labors wurde nur durch einen Zufall Anfang der 90er Jahre bekannt, denn Russland hält die Akten über Menschenversuche bis heute geheim. Das “Labor 12” allerdings gibt es unter anderem Namen bis heute.

Nach den Massenmorden während des Zweiten Weltkrieges handelten einige der schlimmsten Kriegsverbrecher mit den Siegermächten Straffreiheit gegen Übergabe der Versuchsergebnisse aus. So arbeitete der japanische General Ishii Shiro, der für den Tod von über 300.000 Menschen verantwortlich war, nach dem Krieg für die USA. Dort waren Militär und Geheimdienste angetan von den Ergebnissen echter Menschenexperimente mit Pest, Anthrax und Tularämie, Unterkühlung, Unterdruck und neuartigen Bomben. Bislang konnten die Militärs nur auf Daten aus Tierversuchen zurückgreifen. Keiner der mindestens 10.000 Verbrecher von Ishiis Todesimperium wurde in den USA bestraft. Einige beendeten ihre wissenschaftlichen Karrieren als Manager großer japanischer Pharma- und Medizinunternehmen. Es störte die Sieger angesichts des Rüstungswettlaufes im Kalten Krieg nicht einmal, dass Ishiis Untergebene auch mit US-Kriegsgefangenen experimentiert hatten. “Mengeles Erben” haben den Zweiten Weltkrieg überlebt, indem sie neuen Herren dienten. Sie waren weiter im Staatsauftrag aktiv. In Nordkorea gibt es nach Zeugenaussagen sogar bis in die Gegenwart Gaskammern, in denen Massenvernichtungsmittel an Häftlingen erprobt werden. In vielen ehemals kommunistischen Staaten verläuft die Aufarbeitung der finsteren Vergangenheit schleppend. Auch die ehemalige CSSR experimentierte mit Verhördrogen und Giften. Die Versuche und Ergebnisse sind bis heute geheim und werden vertuscht. Vielleicht, weil sich wie nach dem Zweiten Weltkrieg erneut interessierte Abnehmer für Spezialkenntnisse finden.

Über einige der bisher kaum erforschten systematischen medizinischen Experimente an Menschen berichtet der Dokumentarfilm “Mengeles Erben” weltweit zum ersten Mal im Fernsehen.

THE CIA CROWN JEWELS

Citation: “Family Jewels”
[Central Intelligence Agency Activities; Attached to Routing and Record Sheet; Includes Memoranda Entitled “Family Jewels”; “Johnny Roselli”; “Project Mockingbird”; “Yuriy Ivanovich Nosenko”; “Material Requisitioned From Logistics By Security For Issuance to Local Police”; “Audio Countermeasures Support to the United States Secret Service”; “Identification of Activities with Embarrassment Potential for the Agency”; and “[Excised] Equipment Test, Miami, Florida, August 1971”; Memorandum on Surveillance and Police Support Activities; and News Articles Entitled “6 Attempts to Kill Castro Laid to CIA” and “Castro Stalker Worked for the CIA”; Heavily Excised], Secret, Memorandum, May 16, 1973, 37 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00001
Origin: United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security. Director
From: Osborn, Howard J.
To: United States. Central Intelligence Agency. Management Committee. Executive Secretary
Individuals/
Organizations Named:
Agnew, Spiro T.; Anderson, Jack; Arlington County (Virginia). Police Department; Bissell, Richard M., Jr.; Carroll, Joseph F.; Carter, Marshall S.; Castro Ruz, Fidel; Dulles, Allen W.; Edwards, Sheffield; Fairfax County (Virginia). Police Department; Getler, Michael; Giancana, Momo Salvatore (“Sam”); Golitsyn, Anatolii [Codename Aeladle]; Harvey, William K.; Helms, Richard M.; Houston, Laurence R.; Hume, Brit; Kennedy, Robert F.; King, J.C.; Kirkpatrick, Lyman B., Jr.; Maheu, Robert A.; Marchetti, Victor; McCone, John A.; McGuire, Phyllis; McNamara, Robert S.; Miami (Florida). Police Department; Montgomery County (Maryland). Police Department; Morgan, Edward P.; New York City (New York). Police Department; Nosenko, Yurii; O’Connell, James; Orta, Juan; Rosselli, John (“Johnny”); Rowan, Dan; San Francisco (California). Police Department; Soviet Union. Committee for State Security; Spear, Joseph C.; Taylor, Rufus L.; Trafficante, Santos, Jr.; United States. Central Intelligence Agency. Deputy Director; United States. Central Intelligence Agency. Director; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security; United States. Central Intelligence Agency. Directorate of Operations. Soviet/East European Division; United States. Central Intelligence Agency. Directorate of Operations. Technical Services Division; United States. Central Intelligence Agency. Directorate of Plans. Western Hemisphere Division; United States. Central Intelligence Agency. Executive Director-Comptroller; United States. Central Intelligence Agency. General Counsel; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Federal Bureau of Investigation; United States. Secret Service; Varona Loredo, Manuel Antonio de; Waddin, Thomas; Washington (D.C.) Metropolitan Police Department; Whitten, Les
Subjects: Castro Ruz, Fidel Assassination Plots | Congress members | Cuban exiles | Defectors | Democratic National Convention (1968) | Detention | Domestic intelligence | Gambling | Illegal entry | Information leaks | Interagency cooperation | JMWAVE Intelligence Station (Miami, Florida) | Journalists | Mail opening | Miami (Florida) | National Security Act (1947) | News media | Organized crime | Police assistance | Political activists | Project Butane | Project Celotex I | Project Celotex II | Project Merrimac | Project Mockingbird | Project Redface I | Project SRPOINTER | Republican National Convention (1968) | Safe houses | Soviet Union | Surveillance countermeasures | Surveillance equipment | Vietnamese Conflict protest movements | Washington Post | Wiretapping
Abstract: Describes Central Intelligence Agency Office of Security activities “representing a possible potential threat or embarrassment to the Agency,” including contacts with organized crime members, support to local police forces, domestic surveillance, and plots to assassinate Fidel Castro.
Full Text: Document – PDF – this link will open in a new window (1.2 MB)

Durable URL for this record

Discussion – Günter Grass, Israel and the crime of poetry

Günter Grass identifies Israel as a threat to world peace in his poem, ‘What Must Be Said’ [GALLO/GETTY]

New York, NY – On Wednesday, April 4, 2012, the German newspaper Süddeutsche Zeitung published Nobel laureate Günter Grass’ poem (the German original) that has created quite a stir not only in Germany, Israel and Iran, but also across the globe. As a result Israeli interior minister Eli Yishai has banned the Nobel laureate from entering Israel.

In this poem, Günter Grass breaks a long standing German taboo and publicly criticises Israel for aggressive warmongering against Iran, identifies the Jewish state as a threat to world peace, accuses “the West” of hypocrisy and denounces his own government for providing nuclear submarines to Israel:

… Because we – as Germans burdened enough –
Could be the suppliers to a crime
That is foreseeable, wherefore our complicity
Could not be redeemed through any of the usual excuses.

The poem drew much appreciation from those opposing yet another pending war in the region by pointing to the big elephant in the room, but also widespread condemnation by Jewish and non-Jewish groups and public figures in Germany, igniting the irritable Israeli Prime Minister Binyamin Netanyahu, in effect corroborating Günter Grass’ own assessment that his silence so far had to do with the concern that he would be accused of anti-Semitism. He was accused of anti-Semitism.

But has the charge of anti-Semitism really silenced the critics of Israel – as Günter Grass suggests in this poem? Not really – or perhaps only so in Germany, for obvious reasons, but certainly not around the globe. The only people who are afraid of being called anti-Semites are the anti-Semites. Yes certain segments of pro-Israeli Zionists, by no means all, hurtle that accusation to silence their opponents. But by no stretch of the imagination has that charge silenced anyone but the anti-Semites – and they better remain silent.

In the European and by extension North American birthplace of anti-Semitism, anti-Semitism is either perfectly alive and well, or transformed into Islamophobia, or camouflaged into Evangelical Zionism, or else abused by some Zionists to silence any opposition coming towards Israel – certainly to no avail.

To be sure, the condition in Germany is perhaps different – as indeed it should be. But by overcoming that false fear, Günter Grass can no longer be accused of anti-Semitism – and thus the significance of his poem is not in the straw man he constructs to shoot down (perhaps rhetorically, for after all, we are talking about a poem). It is somewhere else. 

Tomorrow may be too late

In the body of the poem itself, titled “What Must Be Said”, Günter Grass, 84, says that he risks the danger of being called an anti-Semite because:

Aged and with my last ink,
That the nuclear power of Israel endangers
The already fragile world peace?
Because it must be said
What even tomorrow may be too late to say…

Remaining silent at these dire circumstances is irresponsible and dangerous:

I am silent no longer
Because I am tired of the hypocrisy
Of the West…

Now that is good enough a reason to break the silence – and you need not invoke fear of being called an anti-Semite. Günter Grass expresses fear of a pending war that “could erase the Iranian people”. He pulls no punches as to the facts that we all know:

Yet why do I forbid myself
To name that other country
In which, for years, even if secretly,
There has been a growing nuclear potential at hand
But beyond control, because no testing is available?

He then points finger at his own country:

Now, though, because in my country
Which from time to time has sought and confronted
The very crime
That is without compare
In turn on a purely commercial basis, if also
With nimble lips calling it a reparation, declares
A further U-boat should be delivered to Israel,
Whose specialty consists of guiding all-destroying warheads to where the existence
Of a single atomic bomb is unproven,
But through fear of what may be conclusive,
I say what must be said.

Setting the dubious fear of being accused of anti-Semitism aside, Günter Grass provides ample reasons – European hypocrisy, German complacency, American barefaced double-standards, Ahmadinejad’s buffoonery and Israeli warmongering – for his poem to assume the global significance that it has. But the importance of the poem is not in stating the obvious – it is in revealing the repressed. 

European colonialism and Jewish Holocaust 

Given the history that culminated in the Jewish Holocaust, Jews around the globe, including Israel, have every right to get agitated with a prominent German public intellectual lecturing them about violence. But Zionism is chiefly responsible for having wasted the moral authority of the Jewish Holocaust – through what Norman Finkelstein has aptly called “the Holocaust Industry” – on establishing a racist apartheid state called “Israel” – a colonial settlement as a haven for the victims of a whole history of European anti-Semitism, on the broken back of a people who had nothing to do with that travesty.

With a leading German public intellectual openly criticising Israel, pointing to European hypocrisy, and blaming his own country for aiding and abetting in the aggressive militarisation of the Jewish state – a gushing wound is opened that implicates both Europe and the colonial settlement that in more than one sense is its own creation. In two specific terms, both as a haven for the victims of the Jewish Holocaust and as the legacy of European colonialism, Israel reflects back on its European pedigree. It is here that Grass’ poem reveals more than meets the eye.

For over 60 years, Palestinians have paid with their lives, liberties and homeland for a European crime with which they had absolutely nothing to do.

The Zionist project precedes the European Jewish Holocaust -that ghastly crime against humanity following the horrid history of European anti-Semitism expressed and manifested in systematic pogroms over many long and dark centuries. Palestine was colonised by the victims of European anti-Semitism – as a haven against Jewish persecution. That paradox remains at the heart of a Jewish state that cannot forget the truth of its own founding myth.

There is a link between the Jewish Holocaust and the history of European colonialism, of which Zionism (perhaps paradoxically, perhaps not) is a continued contemporary extension.

It was Aimé Césaire who in his Discourse sur le colonialisme/Discourse on Colonialism (1955) argued that the Jewish Holocaust was not an aberration in European history. Rather, Europeans actually perpetrated similar crimes against humanity on the colonised world at large.

With German atrocities during the Holocaust, Europeans tasted a concentrated dose of the structural violence they had perpetrated upon the world at large. Colonialism and the Holocaust were thus the two sides of the same coin: the aggressive transmutation of defenceless human beings into instruments of power – into disposable “things”. Long before the Jewish Holocaust, the world Europeans had conquered and colonised was the testing ground of that barbaric violence they had termed the “civilising mission of the white man”.

European guilt about the Holocaust is absolutely necessary and healthy – it is an ennobling guilt. It makes them better human beings, for them to remember what they did to European Jewry. But, and there is the rub, they are, with a supreme hypocrisy that Günter Grass notes in his poem, spending that guilt (when not redirecting it into Islamophobia) on sustaining a colonial settlement, an extension of their own colonial legacy, in supporting Israeli colonialism in the Arab and Muslim world – as a garrison state that further facilitates their renewed imperial interests in the region. Europeans are turning their legitimate guilt into an illegitimate instrument of their sustained imperial designs on the globe, from whom Americans then take their cues.

European logic of colonialism

Israel is a European colonial settlement, the last astonishingly barefaced remnant of European colonialism in a world that calls itself “postcolonial”.

The same people who are with perfect justification enraged by the foolish Ahmadinejad (when he denies the Holocaust) are evidently entirely undisturbed when their Prime Minister Golda Meir or their favourite presidential candidate Newt Gingrich denies the existence of Palestinians.

The daring imagination of Günter Grass’ poem – a heroically tragic act precisely because the poet is implicated in the moral outrage of his own poem – is significant precisely because it captures this German and by extension European logic/madness of colonial conquest and moral cannibalism. A German intellectual exposing the structural link between Zionism and colonialism marks the even more innate link between the Holocaust and colonialism – precisely at the moment of warning against the regional warmongering of Zionism as the post/colonial extension of European colonialism.

What Prime Minister Netanyahu’s reaction to Günter Grass’ poem, and many others like him, do not recognise is that precisely when they accuse the German poet of anti-Semitism they are in fact acknowledging the colonial provenance of the Jewish state. The harder they object to Günter Grass, the clearer becomes the fact that the Jewish state is the rhetorical articulation of the very logic of European global colonialism, of which the Jewish Holocaust, as Aimé Césaire rightly recognised, was a local overdose.

There is one, and only one, definitive resolution for that paradoxical consistency to come to an end: the one state solution for the Israeli-Palestinian dilemma. It is only in that basic, simple, elegant, humane, non-violent, enduring and just resolution that the paradox of Zionism as colonialism, and the structural link between the Jewish Holocaust and European colonialism, can once and for all be resolved.

The fact and the inevitability of that solution, delivering both Israelis and Palestinians from their mutual (however asymmetrical) sufferings, has been staring the world in the eye from day one – and yet the belligerent politics of despair has caused an intentional blindness that prevents that simple vision. So, yes, Günter Grass is right – and in this revelation he could no longer possibly be an anti-Semite:

Only this way are all, the Israelis and Palestinians,
Even more, all people, that in this
Region occupied by mania
Live cheek by jowl among enemies,
In the end also to help us.

Hamid Dabashi is Hagop Kevorkian Professor of Iranian Studies and Comparative Literature at Columbia University in New York.  His forthcoming book, The Arab Spring:  The End of Postcolonialism (Zed, 2012) is scheduled for publication in May 2012. 

The views expressed in this article are the author’s own and do not necessarily reflect Al Jazeera’s editorial policy.

Geheimsache Mauer – Ganzer Film

Es gab einmal die Vision einer perfekten Grenze – modern, unsichtbar, ohne Tote. Hightech statt Schuss-waffen, Sperrzaun und Beton. Ihre Erfinder nannten sie “Mauer 2000”. Doch diese Vision wurde nie in die Realität umgesetzt.

Am 13. August 2011 jährt sich zum 50. Mal der Tag, an dem mit der Teilung Berlins die Spaltung Deutschlands und Europas vollendet und für mehr als zweieinhalb Jahrzehnte zementiert wurde. Erzählt wird die Geschichte der Berliner Mauer aus einer neuen Perspektive, aus der Sicht derer, die sie geplant, erbaut und bewacht haben. Dabei offenbart das Doku-Drama einen tiefen Einblick hinter die Kulissen, in das “betonierte” Denken und berechnende Kalkül der Mauerstrategen, in ihre geheimen Pläne, die tödliche Grenze immer weiter zu perfektionieren.

Erzählt wird aber auch, wie ganz unterschiedliche Menschen die Mauer persönlich erlebten, wie sie für sie arbeiteten, in ihrem Schatten lebten und versuchten, sie zu überwinden. So berichtet zum ersten Mal ein ehemaliger DDR-Grenzer in diesem Zusammenhang über seine Gefühle in dem Moment, als er an der Mauer schoss. Erstmals berichtet ein Oberbefehls- haber der Grenztruppen über strategische Überlegungen und von den geheimen Sitzungen des Grenzkommandos. Im Gegensatz dazu erzählen Flüchtlinge, wie sie in gefährlichen Fluchtversuchen ihr Leben für die Freiheit jenseits der Grenze riskierten.

Der Fall X : Wie die DDR Westberlin erobern wollte – Ganzer Film

Die Führung der DDR hat bis kurz vor der Wiedervereinigung Pläne für eine Eroberung West-Berlins entwickelt und wiederholt in Manövern geübt. Zu diesem Schluss kommen die beiden Historiker und Filmemacher Hans Sparschuh und Rainer Burmeister in ihrer spannenden Dokumentation. Die Historiker Hans Sparschuh und Rainer Burmeister liefern zahlreiche Beweise wie Karten und Aktennotizen, eine sogar von Erich Mielke. Die DDR hat Pläne entwickelt, West-Berlin zu erobern. Nach spätestens drei Tagen sollte alles vorbei sein. Binnen weniger Stunden sollte die zahlenmässig haushoch überlegene NVA die Truppen der Alliierten überrennen. Mitarbeiter der Staatssicherheit sollten dann damit beginnen, hochrangige West-Berliner Polizeibeamte, Politiker, Journalisten und Beamte zu verhaften und in Lagern festsetzen. Der Verhaftungslisten waren bereits getippt. Die DDR-Führung plante, nach drei Tagen die Eroberung abzuschliessen, um dem Westen möglichst wenig Zeit zur Reaktion zu geben. Die im Osten verhasste D-Mark sollte anschliessend abgeschafft und durch eine Kriegswährung ersetzt werden. Ein weitverbreitetes Relikt aus der DDR-Ära: Plattenbauten. Die aus Betonfertigteilen hergestellten Häuser sollten die Wohnungsknappheit nach dem Krieg bekämpfen. Zur Zeit ihrer Entstehung waren sie begehrt, da die Wohnungen im Gegensatz zu Altbauwohnungen mit fliessendem warmen und kaltem Wasser und Zentralheizung ausgestattet waren. Der Palast der Republik beherbergte die Volkskammer der DDR und wurde als Kulturhaus genutzt. Hier traten nationale und internationale Künstler wie Udo Lindenberg, Harry Belafonte, Mireille Mathieu oder Katja Ebstein auf. Das asbestverseuchte Gebäude wurde von Februar 2006 bis Dezember 2008 schrittweise abgerissen. Der Berliner Fernsehturm ist mit 368 Metern das höchste Bauwerk Deutschlands. Mit dem Bau wurde 1965 begonnen. Wenn die Sonne die Kugel der Blechprismen aus rostfreiem Stahl anstrahlt, erscheint eine Reflexion in Form eines Kreuzes. In Anspielung auf die atheistische Grundeinstellung der sozialistischen Regierung bezeichneten Berliner dieses leuchtende Kreuz als “Rache des Papstes”. In ihrer Dokumentation liefern die Historiker umfassende Belege für ihre Thesen. An knapp 60 Stellen in der Stadt wollten Soldaten die Mauer durchbrechen. Aus Kartenmaterial und Aktennotizen geht hervor, dass zuerst alle Brücken der Stadt besetzt werden sollten. Damit wollte die DDR-Spitze verhindern, dass sich die alliierten Besatzer zu einem Verband vereinigen konnten. Dann sollten die Flughäfen der Stadt erobert und besetzt werden, um West-Berlin dauerhaft zu isolieren. Die Pläne wurden nach Recherchen der Historiker ab dem Jahr 1969 konkret. Auch eine Notiz von Erich Mielke soll dies beweisen. In zahlreichen Manövern sei der Überfall immer wieder geübt worden. Noch im Jahr 1988 gab es den Recherchen zufolge ein grosses Manöver in Magdeburg, bei dem die Eroberung einer Stadt trainiert wurde.

STASILAND GERMANY – Full Movie

Everyone knows about the Nazis camps of Auschwitz and Dachau. But few are aware of the systemic oppression that went on under the Stasis. Now some ex-Stasis agents are trying to re-write history.

“I won’t apologise for anything. I can only apologise for not having worked more efficiently”, states former Stasi spy Peter Wolter. He maintains that the thousands of people tortured and imprisoned were; “quite rightly punished”. Along with other ex-agents, Wolter is campaigning to have a museum documenting the suffering of prisoners in Stasi prisons closed. As Anna Funder, author of ‘Stasiland’ states; “these were people writing doctoral theses on how to destroy a soul”. Now thousands of ordinary Germans who had their lives destroyed by the Stasis fear their suffering will be negated.

Editorial – The New (Conservative) Liberalism by Charles Davis

Charles Davis, on liberalism in America, and how it fails to provide systemic solutions to the problems faced in an increasingly conservative world. Via Al Jazeera:

Once upon a time — say, three years ago — your average Democrat appeared to care about issues of war and peace. When the man dropping the bombs spoke with an affected Texas twang, the moral and fiscal costs of empire were the subject of numerous protests and earnest panel discussions, the issue not just a banal matter of policy upon which reasonable people could disagree, but a matter of the nation’s very soul.

Then the guy in the White House changed.

Now, if the Democratic rank and file haven’t necessarily learned to love the bomb – though many certainly have — they have at least learned to stop worrying about it. Barack Obama may have dramatically expanded the war in Afghanistan, launched twice as many drone strikes in Pakistan as his predecessor and dropped women-and-children killing cluster bombs in Yemen, but peruse a liberal magazine or blog and you’re more likely to find a strongly worded denunciation of Rush Limbaugh than the president. War isn’t over, but one could be forgiven for thinking that it is.

Given the lamentable state of liberal affairs, Drift, a new book from MSNBC’s Rachel Maddow, is refreshing. Most left-of-centre pundits long ago relegated the issue of killing poor foreigners in unjustifiable wars of aggression to the status of a niche concern, somewhere between Mitt Romney’s family dog and the search results for “Santorum” in terms of national importance. So in that sense, it’s nice to see a prominent progressive at least trying to grapple with the evils of militarism and rise of the US empire. It’s just a shame the book isn’t very good…

 

Die Akte Gysi – Ganzer Film

“Die Akte Gysi” zeigt, wie aus einem willigen Helfer des DDR-Systems ein populärer, gesamtdeutscher Politiker wurde. Und wie er trotz aller Stasi-Vorwürfe immer noch als Stimme der Benachteiligten und Unterdrückten hofiert wird.

Gregor Gysi kennen alle. Denn er spielt viele Rollen: als charismatischer Politiker, als Stimme der Linkspartei und als gern gesehener Talkshow-Gast, egal zu welchem Thema. Seine Markenzeichen: emotionale Empörung, populistische Parolen. Die mediale und politische Omnipräsenz provoziert aber immer wieder eine Frage: Gibt es einen anderen Gysi, einen, der früher mit der DDR-Stasi gekungelt hat? Er bestreitet das energisch, seine Anwälte versorgen allzu wissbegierige Journalisten mit entsprechenden Schriftsätzen und Gerichtsprozessen.

“Die Akte Gysi” zeigt, wie aus einem willigen Helfer des DDR-Systems ein populärer, gesamtdeutscher Politiker wurde. Und wie er trotz aller Stasi-Vorwürfe immer noch als Stimme der Benachteiligten und Unterdrückten hofiert wird. Der Film von Hans-Jürgen Börner und Silke König zeigt die Biographie eines Mannes im Spannungsfeld von inszenierten Auftritten und bedrückenden Stasi-Akten. Gregor Gysis Karriere begann, fernab von Fernsehkameras, als Rechtsanwalt in der Deutschen Demokratischen Republik. Gysi wuchs als Funktionärskind eines prominenten Vaters, des Botschafters und Staatssekretärs für Kirchenfragen, Klaus Gysi, auf. Sohn Gregor war der jüngste Rechtsanwalt der Republik. Und hatte viele prominente Mandanten wie Rudolf Bahro und Robert Havemann.

Er hatte beste Kontakte ins ZK der SED und auch zur Staatssicherheit. Original-Akten, die über das Wirken des Rechtsanwalts Gysi Auskunft geben könnten, wurden nach der Wende offenbar größtenteils vernichtet. Aber in den Akten seiner ehemaligen Mandanten finden sich die Kopien von Stasi-Berichten. Die Dokumentation liefert den politischen und biographischen Zusammenhang, befragt ehemalige Mandanten und präsentiert Akten über das Wirken des Gregor Gysi. Der Film berichtet u. a. über die Tragödie eines Vaters, dessen Sohn von der Stasi ermordet wurde. Vom Schicksal der Bürgerrechtlerin Vera Lengsfeld, ihren quälenden Stunden in Untersuchungshaft. Vom Schriftsteller Lutz Rathenow, dessen Unterhaltung auf einem Empfang belauscht wurden. Und von dem Berliner Künstler Thomas Klingenstein, dessen Gesprächsinhalte einer Autofahrt bei der Stasi landeten. Viele Schicksale, aber immer eine Hauptperson: Gregor Gysi. Viele Opfer, die vor der Kamera reden. Und einer, der lieber schweigt: Gregor Gysi.
Wo bitte ist unser”Rechtsstaat”???

SECRET from the FBI – Russian National Charged in $1 Million Trading Account Hack

A Russian national living in New York has been charged for his alleged role in a ring that stole approximately $1 million by hacking into retail brokerage accounts and executing sham trades.

Petr Murmylyuk, aka “Dmitry Tokar,” 31, of Brooklyn, has been charged with one count of conspiracy to commit wire fraud, unauthorized access to computers, and securities fraud.

According to a criminal complaint, beginning in late 2010, Murmylyuk worked with others to steal from online trading accounts. Members of the ring first gained unauthorized access to the online accounts and then changed the phone numbers and e-mail addresses. Once the hackers controlled the accounts, they used stolen identities to open additional accounts at other brokerage houses. They then caused the victims’ accounts to make unprofitable and illogical securities trades with the new accounts that benefitted the hackers.

The affected brokerage houses have reported combined losses to date of approximately $1 million as a result of the fraudulent schemes.

Story Background:

NEWARK, NJ—A Russian national living in New York has been charged for his alleged role in a ring that stole approximately $1 million by hacking into retail brokerage accounts and executing sham trades, U.S. Attorney for the District of New Jersey Paul J. Fishman announced today.

Petr Murmylyuk, aka “Dmitry Tokar,” 31, of Brooklyn, New York, has been charged by complaint with one count of conspiracy to commit wire fraud, unauthorized access to computers, and securities fraud. The U.S. Securities and Exchange Commission (SEC) is also filing a parallel civil action. Murmylyuk is currently in state custody facing charges arising out of a separate investigation conducted by the Manhattan District Attorney’s Office and will appear in Newark federal court to face the conspiracy charge on a date to be determined.

“Hackers continue to find new and advanced ways to steal from the financial sector,” said First Assistant U.S. Attorney J. Gilmore Childers. “Through the illusion of legitimacy, these alleged hackers controlled both sides of securities transactions to game the market and drain their victims’ accounts. Those who use their computer skills for fraud underestimate the combined resolve of law enforcement and the financial services industry to detect and stop these crimes.”

“This investigation highlights the level of sophistication reached by individuals involved in computer intrusions and hacking activities in furtherance of complex economic and financial crimes,” said FBI Newark Division Assistant Special Agent in Charge David Velazquez. “The same level of sophistication must be maintained by federal investigators and prosecutors, together with private sector partners, to stay one step ahead of these individuals.”

According to the complaint unsealed today in Newark federal court:

Beginning in late 2010, Murmylyuk worked with others to steal from online trading accounts at Scottrade, E*Trade, Fidelity, Schwab, and other brokerage firms. Members of the ring first gained unauthorized access to the online accounts and changed the phone numbers and e-mail addresses on file to prevent notice of unauthorized trading from going to the victims.

Once the hackers controlled the accounts, they used stolen identities to open additional accounts at other brokerage houses. They then caused the victims’ accounts to make unprofitable and illogical securities trades with the new accounts—referred to in the complaint as the “profit accounts”—that benefitted the hackers.

One version of the fraud involved causing the victims’ accounts to sell options contracts to the profit accounts, then to purchase the same contracts back minutes later for up to nine times the price. In another version of the fraud, they used the profit accounts to offer short sales of securities at prices well over market price and to force the victim accounts to make irrational purchases. (A short sale is a sale of stock that an investor does not own but rather borrows from a stock lender and must eventually return.)

Murmylyuk and a conspirator recruited foreign nationals visiting, studying, and living in the United States—including Russian nationals and Houston residents Anton Mezentsev, Galina Korelina, Mikhail Shatov, and others—to open bank accounts into which illegal proceeds could be deposited. Murmylyuk and the conspirator then caused the proceeds of the sham trades to be transferred from the profit accounts into those accounts, where the stolen money could be withdrawn.

Fidelity, Scottrade, E*Trade, and Schwab have reported combined losses to date of approximately $1 million as a result of the fraudulent schemes.

Murmylyuk is also accused of placing a telephone call to Trade Station Securities in which he claimed to be “Dmitry Tokar,” through whose brokerage account the ring placed approximately $200,000 in fraudulent securities trades. Murmylyuk was arrested in Brooklyn on November 3, 2011, in possession of a laptop that evidenced the fraud.

Mezentsev, Korelina, and Shatov were previously charged in the District of New Jersey and convicted of conspiracy to commit wire fraud based on their agreement to receive stolen money in the accounts in their names. U.S. District Judge Esther Salas sentenced Mezentsev, Korelina, and Shatov to 27 months, 14 months, and 14 months in prison, respectively, earlier this year.

If convicted, Murmylyuk faces a maximum potential penalty of five years in prison and a $250,000 fine.

U.S. Attorney Fishman praised special agents of the FBI, under the direction of Special Agent in Charge for the Newark Division Michael B. Ward; Immigration and Customs Enforcement-Homeland Security Investigations, under the direction of New Jersey Special Agent in Charge Andrew McLees; and Internal Revenue Service-Criminal Investigations, New York Field Office, under the direction of Acting Special Agent in Charge Victor W. Lessoff, for their work in the continuing investigation.

He also thanked special agents of the FBI in St. Louis and San Francisco and the U.S. Secret Service in Houston, as well as the Manhattan District Attorney’s Office, under the direction of District Attorney Cyrus R. Vance, Jr., for its contributions and cooperation in coordinating the parallel investigations. He also thanked the SEC’s Philadelphia Regional Office, under the leadership of its Regional Director Daniel M. Hawke, and the Justice Department’s Computer Crime and Intellectual Property Section for their assistance in the investigation.

The government is represented by Assistant U.S. Attorney Seth B. Kosto of the Computer Hacking and Intellectual Property Section of the U.S. Attorney’s Office for the District of New Jersey’s Economic Crimes Unit in Newark.

The charges and allegations in the complaint are merely accusations, and the defendant is considered innocent unless and until proven guilty.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency Financial Fraud Enforcement Task Force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes.

TOP-SECRET- The NSA Operation REGAL: Berlin Tunnel

Operation code name: PBJOINTLY Product code name: REGAL

The Berlin Tunnel operation was not a unique type of operation that was only run in Berlin. Prior to the Berlin Tunnel, the British ran a number of successful tunnel cable-tap operations in Vienna,[1] which at the time of these operations, was still an occupied city, divided into four sectors just like Berlin. The British cable taps began in 1948, and ran until the occupation of Austria ended, restoring state sovereignty to the country in 1955. The Soviets had a tap near Potsdam on a cable that served the American Garrison in Berlin.[2]

What has made the Berlin Tunnel famous, while the cable-tap tunnels of Vienna and Potsdam have faded into obscurity is the paradox of intelligence operations which results in fame being a measure of failure and obscurity being a measure of success. The Berlin Tunnel’s true claim to fame, therefore, is that it gained front-page notoriety when the Soviets “discovered” it.

The Official CIA history of the tunnel (prepared in August 1967 and declassified in February 2007) theorizes that the amount of publicity given to the Berlin Tunnel was the result of chance rather than of a conscious decision on the part of the Soviet leadership. During the planning phase of the tunnel, a consensus assessment had been reached which postulated that in the event of the discovery of the tunnel, the Soviet reaction would be to “suppress knowledge” of its existence, so as to save face, rather than have to admit that the West had the capability to mount such an operation. The CIA history of the project suggests that this expectation was defeated because the Soviet Commandant of the Berlin Garrison (who would normally have handled an event of this nature) was away from post at the time, and his deputy found himself in the position of having to make a decision about the tunnel “without benefit of advice from Moscow.”[3]

In his academic history of the Berlin Tunnel (Spies Beneath Berlin), David Stafford of the University of Edinburgh points out that, even though the tunnel was a joint American-British project, the British did not share in the limelight of publicity with the Americans when the tunnel was discovered. This was due, he says, to the fact that Soviet First Secretary Khrushchev was on an official state visit to the U.K.. The visit’s culmination, a visit to Windsor Castle and a reception by the Queen, was scheduled for the day following the discovery of the Berlin Tunnel. British participation in the project was officially hushed up by both the British and the Soviets so as not to spoil the success of the state visit.[4] To this day British Intelligence Services are usually tight-lipped when it comes to discussions of the Berlin Tunnel, or any post-1945 intelligence operation for that matter,[5] while the Americans have declassified the in-house history of the project and authorized one of its participants to include a chapter about it in a book on the Intelligence war in Berlin written in cooperation with one of the KGB veterans of that period (Battleground Berlin).

The intelligence fame/obscurity paradox aside, the Berlin Tunnel operation was, in the words of Allen Dulles (then DCI), “one of the most valuable and daring projects ever undertaken” by the CIA.[6]

The Berlin Tunnel, unlike the Vienna tunnels, was a major engineering feat. It stretched 1476 feet/454[7] meters through sandy ground[8] to reach a cable only 27 inches/68.5 cm beneath the surface,[9] on the edge of a major highway. One of the most difficult engineering problems that had to be overcome in the course of the project was to dig up to the cable from the main tunnel shaft without dropping some truck passing over the highway above into the tunnel.[10] This task was handled by the British,[11] who had their experience of Vienna to fall back on.

The total cost of the tunnel project was over six and a half million[12] 1950s dollars, which in 2007 dollars would be over 51 and a quarter million.[13] By way of comparison, the development and delivery of the first six U-2 aircraft, a project contemporary with the Berlin Tunnel, cost 22 million total,[14] or 3.6 million each. That means that the tunnel cost roughly as much as two U-2s.

According to Murphey, Kondrashev and Bailey in Battleground Berlin, the tale of the tunnel began in early 1951, when Frank Rowlett told Bill Harvey how frustrated he was by the loss of intelligence due to the Soviet shift from radio to landline.[15] The assessment process that preceded target selection continued throughout 1952, the year that saw Harvey reassigned to Berlin. Test recordings of the kind of traffic available from the cables were made in the spring and summer of 1953.[16] By August of 1953, plans for the tunnel were being readied for presentation to the DCI, Allen Dulles.[17]

Dulles approved the terms of reference for cooperaton with the British on the Berlin Tunnel in December 1953.[18] The “go” was given to start the construction of the warehouse that would serve as the cover for the tunnel, and construction was completed in August. The American engineering team that actually dug the tunnel arrived to take control of the compound on 28 August. Digging began on 2 September, but, on 8 September, the miners struck water and which necessitated that pumps be brought in. The tunnel reached its distant end on 28 February 1955,[19] and the tap chamber took another month to complete. The complex process of tapping into the three target cables without alerting the Soviets to what was going on was a slow one. It lasted from 11 May through 2 August 1955.[20] Collection of intelligence from the taps, however, began as soon as the first circuits were brought on-line.

During the night of 21-22 April 1956, the Soviets “discovered” the tunnel, and collection ceased. That did not close the project, however. The take from the Berlin Tunnel during the time that it was operational (11 months and 11 days) was so great that processing of the backlog of material continued through the end of September 1958.[21]

The loss of this valuable source was, of course, a blow to US/UK intelligence efforts against the Soviets at the time, but this loss was somewhat compensated for by the prestige that the CIA won in the press following the tunnel’s discovery. The article on the tunnel in the issue of Time magazine (07 May 1956) that followed the tunnel’s discovery said “It’s the best publicity the U.S. has had in Berlin for a long time.”

An urban legend that persistently continues to associate itself with the Berlin Tunnel is that the idea for the tunnel came from Reinhard Gehlen (the German Abwehr-Ost general who surrendered to the Americans and later became the head of the West German BND). Murphy, Kondrashev and Bailey flatly reject this assertion in Battleground Berlin.[22] David Stafford argues credibly against the validity of this legend in his academic history of the Berlin Tunnel. He notes that there is no evidence to support this theory, and “those most closely in the know in the CIA have strenuously denied it,”[23] essentially repeating Murphy, Kondrashev and Bailey. Stafford’s most telling argument against Gehlen’s involvement is that no mention of the Berlin Tunnel is to be found in Gehlen’s memoirs (The Service: The Memoirs of General Reinhard Gehlen, New York: World Publishing, 1972). “Never a modest man,” says Stafford, Gehlen “would surely have bid for some of the credit had he been any way involved. In fact, he does not even refer to it.”[24]

In the section “Recapitulation of Intelligence Derived” from the Berlin Tunnel, the CIA History of the project says that the “REGAL operation provided the United States and the British with a unique source of current intelligence on the Soviet Orbit of a kind and quality which had not been available since 1948. Responsible officials considered PBJOINTLY, during its productive phase, to be the prime source of early warning concerning Soviet intentions in Europe, if not world-wide.”[25] The section goes on to list general types of political, ground-forces, air-force and naval intelligence that the tunnel provided, many of them with glowing comments from consumers.

The debate about the value of the information derived from the Berlin Tunnel has been raging since 1961, when it was discovered that PBJOINTLY was compromised to the Soviets by the British mole George Blake who attended the meeting on the Berlin Tunnel between the British and Americans in London in December 1953. Many widely read books and articles on the tunnel contended that the KGB had used the tunnel to feed the Americans and the British disinformation. Stafford, however, convincingly dispels all suspicions that the Berlin Tunnel was turned into a disinformation counter-intelligence operation by the KGB. Drawing on the information that came to light during the “Teufelsberg” Conference on Cold-War intelligence operations that brought intelligence professionals from both the CIA and the KGB together in Berlin in 1999, Stafford concludes that “[f]ar from using the tunnel for misinformation and deception, the KGB’s First Chief Directorate had taken a deliberate decision to conceal its existence from the Red Army and GRU, the main users of the cables being tapped. The reason for this extraordinary decision was to protect “Diomid”, their rare and brilliant source George Blake.”[26]

Stafford ends his discussion of the legitimacy of the material collected from the Berlin Tunnel with a quote from Blake, who was still living in Moscow at the time of the “Teufelsberg” Conference. “I’m sure 99.9% of the information obtained by the SIS and CIA from the tunnel was genuine.”[27]

By T.H.E. Hill

DOWNLOAD THE ORIGINAL NSA DOCUMENT HERE

nsa-operation-regal

Confidential – Canada Integrated Terrorism Assessment Centre (ITAC) Occupy Wall Street Bulletins

The following Integrated Terrorism Assessment Centre (ITAC) bulletins were obtained via an information request from the Canadian Security Intelligence Service (CSIS) by Paroxysms.  Most of the documents were also simultaneously released to the Globe and Mail, though the collection released to Paroxysms is more complete and contains several additional bulletins that are not included in the other collection.

Integrated Terrorism Assessment Centre/Centre intégré d’évaluation du terrorisme

 

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy.png

 

https://publicintelligence.net/wp-content/uploads/2012/04/ITAC-Occupy-2.png

TOP-SECRET – Minutes of conversation between Chinese Prime Minister Zhou Enlai and North Korean Prime Minister Kim Il-Sung

Date:
November 27 1958
Source:
Obtained for NKIDP from the P.R.C. Foreign Ministry Archives by Gregg Brazinsky and translated for NKIDP by Mengyin Kung. [Document 204-00064-02 (1)]
Description:
The document features a conversation between the Chinese and Korean delegates during a luncheon covering the topics of DPRK’s industrial and agricultural development, the state of South Korea’s military, the recent Japanese-American Security Treaty, and recent contact between North and South Korea. The conversation continued after the luncheon, additionally covering: electricity, steel, cotton, and sugar production; political organization; military; the 5-year plan; South Korea; US military involvement in socialist states; the Soviet Union; Japan; Taiwan; the Socialist camp; Chinese volunteer troops in Korea; and Vietnam.

 

Prime Minister Kim Il Sung (right) of Communist North Korea and Chinese Premier Zhou Enlai wave to crowds after arriving in Beijing on a state visit.
Time: 1:00 PM, 27 November 1958

Location: Xihua Hall

[Delegates from] China: Deputy Premier Peng Dehuai, Deputy Premier Premier He Long, Deputy Premier Chen Yi, Deputy Minister Zhang Wentian, Ambassador Qiao Xiaoguang.

[Delegates from] Korea: Prime Minister Kim Il-Sung, Deputy Chairman Pak Jeongae, Deputy Prime Minister and Foreign Minister Nam Il, Minister of National Defense Kim Gwangrae, Minister of Education and Culture Li Yeongho, Ambassador Li Ilgyeong

Interpreter: Jiang LongqiuNote taker: Wang Shikun[North Korean] Prime Minister Kim Il-Sung and the Korean delegation paid [PRC] Premier Zhou Enlai a visit the day they arrived in Beijing. Zhou invited the delegation to a luncheon in Xihua Hall [of the Zhongnanhai]. During the lunch, Premier [Zhou] asked about the development of the industrial and agricultural sectors in Korea. Prime Minister Kim Il-Sung gave a brief introduction on the situation of Korea’s food, steel, and electrical sectors this year.

Deputy Premier Peng Dehuai asked about the production in South Korea and whether there were exports. Prime Minister Kim said that parts of rice in South Korea were exported to Japan. He said that [the fundamental environment] in South Korea was not good and had not recovered after the destruction [of war]. Most of the goods and materials were imported from the United States. People could not even afford to buy some basic commodities in the market.

Deputy Premier Peng asked if there was any production of ammunition in South Korea. General Kim Gwangrae said that recently South Korea was preparing to build some arsenals in Busan which would produce bullets, grenades, etc. [He was not sure] if [the arsenals] were built or not. He said there were 700,000 soldiers in [South Korean President] Rhee Syngman’s standing army, so South Korea spent a big portion of its budget on military.

Premier Zhou mentioned the recently-signed Japanese-American Security Treaty by the Nobusuke Kishi government. He said [the treaty] was to misguide Japanese people. It was meant to follow West Germany, to restore Japan’s militarism, re-militarize Japan. But Japanese people suffered from the war; they were the first ones ever suffered from the damage of atomic bombs. Therefore, Japan’s socialist party and Japanese people disagreed with Kishi’s plan, which was a good thing. Premier [Zhao] asked Prime Minister Kim his opinion on this issue. Kim said that the United States and the Kishi administrations’ plan could never come to fruition. Although they linked everything up now, it would eventually fall apart. It is fundamentally flawed; their way would only cause everything to go in the opposite direction. It would educate Japanese people. Recently, Deputy Premier Chen Yi made a statement regarding Kishi’s plan; Japanese people welcomed and supported [the statement]. Foreign Minister Nam Il said, “We issued an editorial the day after reading Chen Yi’s statement. We welcomed Chen’s statement.”

Deputy Premier Peng asked whether fishermen in the south crossed the “38th parallel” recently. Kim said that in the spring, there were nine ships, around 40 people. “We invited them to visit the north, and helped them catch many fish, filled their ships, and let them go. They had a favorable impression.” Kim said, “Not only that, some journalists from the south liked to listen about construction in the north. Recently we organized a meeting in Panmunjom for journalists from the north and the south. Our journalists gave them some documents. They were very happy and brought those back. Panmunjom thus became a place [for both sides] to meet.” Premier, Deputy Premier Peng, Deputy Premier Chen Yi all praised this arrangement and thought this was good.

[All the delegates] also talked about some other daily life issues. The conversation continued after the luncheon.

Premier [Zhou]: Hocus pocus—this is what our country is trying to destroy—superficial beliefs. We are mobilizing people to do this. We are doing a general survey of radioactive substances in the country. We distributed 2,000 plus detectors around the country, to 20,000 plus communes to let people do it. We will keep secret the location of those places where there is a lot [of the radioactive substances], and publicize those places where there is little. [Developing] industry is not something mysterious; everyone can do it. I have some words to say: let all people develop industry; yet it is not easy. On the one hand, let everyone develop industry, but [at the same time] there need to be larger scale collective efforts. This is how we combine popularity and collectivity together.

Prime Minister Kim: This year, we’ve seen the results of China’s Great Leap Forward that destroyed superficial beliefs, as well as your success in developing handicraft industry and small-scale industry. We now have around 1,000 small-scale enterprises. Because of labor shortages, we cannot do it on a larger scale, but can only do it at county level. [We] mobilized the family members of staff to do more light industry, food industry, and daily life product industry, such as pottery and porcelain as well as cement. It is the same in the countryside. It is beneficial that farmers take advantage of their fallow time to develop steel industry. Farmers are highly motivated.

Premier: That is [true] because this helps increase production.

Kim: By doing this, it is also convenient to do irrigation work in the countryside. We’ve already constructed some small-scale hydroelectric plants. It is estimated that by next year, the electrification will be completed. Presently in Korea 36% of the countryside is still without electricity.

Premier: Your electrification development is way ahead of us.

Kim: Small-scale power plants are easy, as long as there are brooks.

Premier: That is good, walking with your own two legs [being practical]. Or else once large power plants fail, the whole countryside will be affected.

Kim: Small-scale plants are all independent.

Premier: How much of an increase will there be next year?

Kim: The Tokro River [one of the tributaries of the Yalu River/Amnok River] Hydroelectric Power Plant [which is in Kanggye, the provincial capital of Chagang, N. Korea] will be completed by next year. [There will be an] 80,000 kilowatt [increase]. [We are] recovering thermal power plants in several places; [we can increase the power generation] to 10 billion kWh by next year. [We need to] increase 8.9 billion kWh this year. Our goal is 20 billion kWh.

Premier: 20 billion kWh distributed according to the population, every ten people can have 100,000 kWh of electricity.

Deputy Premier Peng: Based on our situation, that is quite a high figure. Based on the situation in Western Europe, more is needed.

Premier: We haven’t reached 30 billion kWh this year. [We can] have 80 billion kWh next year.

Kim: We have shortcomings in terms of developing animal husbandry and cooking oil. Now we have to develop animal husbandry and vegetable cooking oil. People’s living standards continue to increase. They need not only food but also good food.

Premier: Did you have droughts this year?

Kim: Many. Very little water is left in the reservoirs. Hydroelectric plants did not have enough water [to operate]. We had very little rain this year. Elders say that this is the first time in a hundred years. According the forecast, we will have more rain next year. We are promoting energy conservation. [People are] used to wasting [electricity].

Premier: We saw that there were many lights without switches in Korea.

Kim: There were some lights that burnt coal. Now they are all gone.

Premier: Your steel production should follow [the electricity production] too.

Kim: It is estimated that iron production will reach 1 million tons next year (we have 450,000 metric tons [one metric ton equals to 1,000 kilograms] this year), and steel production 650,000 to 700,000 metric tons (now it’s 400,000 metric tons).

Premier: [Steel production] can reach 1 million tons the year after next year?

Kim: [Yes].

Premier: 1 million metric tons of steel means one ton of steel for every ten people. We need to have 60 million metric tons of steel to attain that ratio. You are ahead of us, which is very good. Isn’t it great to reach the goals of socialism? (Premier turned to Comrade Pak Jeongae) Comrade Pak Jeongae, you surpassed us very quickly. We are very pleased and should congratulate you.

Pak (smiled and nodded)

Kim: With your help.

Premier and Deputy Premier Peng: Mainly on your own, through your own efforts.

Peng: You’ve got many advantages–transportation, power, raw materials, minerals, and so on.

Premier: How about cotton this year?

Kim: Still very little; [we] mainly depend on you and the Soviets. The government purchased 50,000 metric tons of unginned cotton.

Premier: 50,000 metric tons of unginned cotton and 17,000 metric tons of ginned cotton will be 34 million catties [a catty is approximate 600 grams]—that is more than 300,000 piculs [one picul equals to 100 catties].

Kim: We have good harvest of cotton this year due to good weather. Plus we used nutrition pots that shortened one month of the growing period of cotton. We plan to plant more cotton next year. The production of flax this year is good as well—one field yielded one metric ton.

Premier: Your nutrition pots were successful. [It is] good for your weather since you have shorter frost-free period. Korean people are used to physical labor. We also mobilize women now. You have enough material for producing paper. Do you have enough material for sugar?

Kim: We had some wrong beliefs in terms of producing sugar. Last year our [people] who were in charge of light industry visited China and decided that we could have more beets next year, to produce sugar with indigenous methods. It could be successful. We can have 20,000 metric tons [of sugar] plus 10,000 metric tons imported. Koreans don’t like drinking tea and coffee that much. We are used to drinking water.

Premier: You can grow some tea in your mountains.

Kim: We have no plan for now. According to ancient records, there was tea in the southern part of Korea, from the seeds brought from China. Which one is better for sugar production: Sugarcanes or sugar-beets?

Premier: Certainly sugarcanes are better. Sugar-beets get go bad easily. However you have a short frost-free period, so it’s probably not easy to extract sugar from sugarcanes. It’s faster to get sugar from sugar-beets.

Kim: We had some sugar-beets in the Japanese-occupation period. Some problems occurred, so we gave up. We grew some sugar-beets this year. It doesn’t look bad.

Premier: How’s the recovery of your handicraft industry?

Kim: We’ve recovered 900 small workshops, and some 700 to 800 cooperative groups.

Premier: How many agricultural cooperatives?

Kim: 3,873 after merging “li” and “groups.”

Premier: You eliminated one [administrative] organ, right?

Kim: We used to have “classes” above “li.” We eliminated “[administrative] organs,” so now there are only four levels.

Premier: It’s better to have it simplified. How many counties do you have?

Kim: 200 counties.

Premier: How many provinces?

Kim: Nine provinces.

Premier: How many staff member do you have in administrative agencies?

Kim: 16,000 people, not including teaching and administrative staff.

Premier: How many are there in the teaching and administrative staff?

Kim: Around 70,000 to 80,000. After downsizing, we have the smallest ratio of government workers and total population among all nations.

Premier: After downsizing, we have 1.3 to 1.4 million government workers in central and local government agencies. You have fewer people in the central government; we have more people and more cities. We have five levels from the central government to “towns,” [xiang, township/country/village] as opposed to your four levels from the central government to “li.”

Kim: We merged “li” and “groups,” which cut down 7,000 people in the staff.

Premier: That is a good idea.

Kim: We also merged supply and marketing cooperatives into li, which cut down some 10,000 people.

Premier: Are these people taken care of by the cooperatives?

Kim: We are still trying it out. The central government still provides [for these peoples’ livings].

Premier: The cadres we demoted are still paid with salaries. The cooperatives would be overwhelmed to shoulder such a burden suddenly.

Kim: Our cooperatives provide [for workers’ living.] We haven’t yet handed schools over to cooperatives.

Premier: How many troops do you have now?

Kim: 300,000 troops. Troops are more [than government workers].

(One paragraph screened.)

Premier: You have a huge burden. [Having] 300,000 troops is because you are facing different circumstances. How many workers do you have?

Kim: Workers and staff are 1.1 million.

Premier: That’s a good ratio.

Deputy Premier Peng: The industrial and agricultural output values in Korea are higher than ours.

Premier: What are the industrial and agricultural output values that you announced?

Kim: The ratio of industry to agriculture is 70%. I don’t remember the exact number.

Premier: You sped up your industrialization, electrification, and mechanization.

Kim: We have 30,000 truck tractors. 15,000 cars will be fine.

Premier: We are experimenting in farming with electrical tractors in Guangdong. You can pay a visit there. When [King] Sihanouk [of Cambodia] came to China, he visited the one in Tianjin. It wasn’t that good at that time. [Electrical tractors] save oil and steel, and are not heavy. How many years did you shorten your scheduled date of fulfilling your five-year plan?

Kim: We will fulfill it next year (two years earlier), but we announced that it would be finished a year and a half earlier than scheduled.

Premier: We can finish our five-year plan this year. You have many advantages, which is totally different from the situation in the two Germanys. [As long as] your peoples’ living standard continues to improve, people in the south will move [to the north].

(One paragraph screened.)

Kim: Our slogan is “fight for another two years.” China has fought for three years.

Premier: To better your infrastructure to influence [the situation with the south]. Who will take over after Rhee Syngman?

Kim: Yi Gibung. He is a parliamentarian, but very old.

Premier: There are only old people left in the south. Their ambassador to Taiwan, Kim Hong-Il, is he a cadre of Rhee’s?

Kim: He emerged from the Manchukuo government.

Nam Il: He does not come from Rhee’s direct faction.

Premier: Is there any possibility that he will take over from Rhee?

Kim: [Rhee] does not have a high prestige in Korea. Yi Gibung probably has more prestige [than Rhee].

Premier: There will be chaos wherever Americans set fire. Like in Iraq.

Deputy Premier Chen: It was difficult to know beforehand that there would be coup in Sudan.

Premier: Armed coups crop up everywhere in Asia and Africa. There are armed riots in Indonesia; there were coups in North Africa, Algeria, Sudan and Egypt; the same in Iraq, Jordan, Ceylon, Pakistan and Burma. Although U Nu said he stepped down himself, he was actually [overthrown] in a coup. The same in Thailand. There have been two [coups] in South Vietnam, but they were suppressed. Coups are everywhere. The backyard of the United States, the Latin America, is facing the same situation. The U.S. supports military coups everywhere, sets fire everywhere, and therefore it’s inevitable that nationalist states fight. There could be changes in southern Korea, because they depend on military, not people, and there will always be people who oppose them. We can categorize the examples we have. First is Iraq, a good example. [Iraqis] had a thorough revolution, leaving Americans with no proxy to support and had to recognize Iraq. The second example is Indonesia. The U.S. supported the rebels in the beginning, but in the end had to recognize Sukarno as he insisted on fighting the rebels. The third example is in Lebanon, the U.S. withdrew eventually, leaving a bad reputation. The fourth example is in Latin America, the U.S. attempted to conduct a conspiracy in Argentina, but failed eventually. All these are armed coups, either revolutions or counter-revolutions. Now that the U.S. has shown its failure in several places, which was concluded in the recent election in the U.S., Dulles’ brinkmanship policy was defeated. To the socialist camp, [the U.S.] is on the defensive. Of course, if there is any conflict among us, they will definitely exploit it. As long as we are united, they can never defeat us. Hungary is a good example, and so is Taiwan. We insist on fighting, they will reconsider [their strategy]. The situation in Quemoy and Matsu also accounts for the U.S.’s defensive strategy.

We leaders in the socialist camp have to build our countries. The stronger we are, the more chaotic it will be in the capitalist world. They don’t recognize us now? That’s good. (Smiles at Deputy Premier Chen) Then we have less to do, less trouble.

Deputy Premier Chen: Then I am going to “lose my job.”

(One paragraph screened.)

[Unknown]: Now while they think the situation in Taiwan is somewhat pacified, they are having conflict in the west again. France wants to have a trade union with Italy, the Netherlands, Belgium, Luxembourg and West Germany against Britain. The British are furious. It’s good to have [Charles] DeGulle as president, so that there is no harmony among them.

Deputy Premier Peng: The U.S. exposes their weaknesses the most in Korea.

Premier: Now [U.S. power] is declining. In another ten years, [our power] could be considerable.

Deputy Premier Peng: [We] improve a bit each year; then it will be considerable.

Premier: You are doing better than us. You eliminated illiteracy; you learned new technology fast. The Soviet Union is making efforts to build their nation. [The Soviet Union] is the big brother, with a strong foundation. We don’t [have a strong foundation yet]. We learn fast, but that’s not enough. You are better, at least you eliminated illiteracy.

Kim: According to the situation in northern Korea, I think we only need another 3.5 million tons of steel.

Premier: In another ten years, everything in the socialist camp can surpass imperialist states. Or at least [our] major things have to surpass theirs.

Kim: We think so, too. It will have a great impact on southern Korea that we successfully finish our ten-year construction plan. Then, it is possible to reunite Korea peacefully. As long as you can pin down Americans (the interpreter did not hear this line and did not translate it.)

Premier: The situation will be different in southern Korea by then. Taiwan, for instance, if Chiang Kai-shek or his agent pronounced to reunite with the mother land, the U.S. could do nothing. I’m saying that the fortress can be penetrated from the inside. External factors can influence internal ones, and then internal factors will work themselves out.

Deputy Premier Peng: How many Koreans are there in Japan?

Kim: 600,000 people. According to Japanese statics, 400,000 requested to come back to northern Korea. After the armistice, they requested to come back, but our condition was too dire to welcome them back. Now we can receive them again. Nam Il has made several statements in relation to this. The Japanese government did not give an official response. It is the association of Koreans in Japan that is leading the people’s movement in Korea. [The association] leads the overseas Koreans to urge the Japanese government to give work authorization and leads petition movements. Japanese people also set up organizations to help Koreans to come back to Korea (including Hatoyama in the Japan Socialist Party). From the perspective of Japanese people, they wish Koreans could go home because they are also having a hard time making ends meet. The problem here is the fact that these people request to go back to northern Korea which affects “Japan-Korea talks.” The Japanese government is in an awkward position. The Foreign Minister’s statement was sent to the Japanese government through the Japanese Embassy in the Soviet Union. However, the Japanese government sent the statement back to us three days after they received it.

Nam Il: The Japanese said it was a hot potato.

Premier: Did the Japanese merchant ships come?

Kim: Boats came stealthily.

Premier: As long as they have the will to come back, there will be a way. Just take their time.

Kim: We are not planning on bringing them back soon, either. We prepare for a long fight. First we ask the Japanese government to arrange those people’s lives, give them jobs. As long as [the Koreans in Japan] can fight, their dream will come true.

Premier: The longer they stay suppressed in Japan, the stronger their will to fight Japanese and Americans. Thus, [Japanese] actually are training these people for us.

Kim: It is also a good way to influence public opinion in southern Korea. We are taking care of those Koreans in Japan while the government in the south is doing nothing. People in the south said, “Only the Republic cares about us and solves our problems.” Each year we budget 130 to 140 million Japanese yen for education for the Koreans in Japan. It’s been three years.

Premier: How do you send the money?

Kim: Through banks.

Premier: Japanese don’t oppose it?

Kim: They did not oppose it. This actually helps relieve some of their difficulties.

Premier: Do you, the Korea Workers’ Party, have any opinion on our way of dealing with the Taiwan issue? Can you understand [our methods]?

Kim: We fully support China’s methods.

Park: Fully support.

Premier: Our Minister of Defense has issued a proclamation four times.

Kim: Chiang Kai-shek did not respond?

Premier: They don’t dare to respond now. The U.S.-Chiang contradiction is still developing, though.

Deputy Premier Peng: They said the proclamations were to instigate the U.S.-Chiang relations.

Deputy Premier Chen: We were instigating their relations.

Kim: If we don’t let Americans go, they are to be blamed.

Premier: You understand the proclamation, but some of the western comrades don’t. It’s hard to translate. But Chiang Kai-shek understands, and Americans are beginning to understand. Dulles understands, too. His recent speech at the U.S. national church committee seems like responding to Chairman Mao’s “paper tiger” statement. He said that the free world has strengthened; the socialist camp will undergo some changes. He is putting his hope in us, in that there will be contradiction in the socialist camp. That means, so far, he has no other way to deal with us; it also means that he does not dare to fight. Once we strengthen our unity, his dream will be shattered. He also says that freedom is not reliable, is empty. He says that freedom can not help stabilize Asian and African countries. It needs economic aid, needs money. Therefore, he wants those Christians to do some ideological work for him. He wants them to persuade capitalists not to be extravagant but to invest in Asian and African countries.

Deputy Premier Peng: The production in Britain has reduced 20%, 25% in the U.S. It has also reduced in France and in Japan.

Premier: Their world has shrunken and they still can’t cooperate [with each other]. [There is also an] economic crisis and multiple contradictions.

Kim: Premier Zhou is right. We need to earn time to build ourselves.

(Several paragraphs screened)

[Premier:] Your construction has gone quite well. We are pleased. You showed such a warm welcome when the volunteer troops returned home. I wondered whether that probably disturbed your schedule [of construction].

Kim: It was our obligation to send off the volunteer troops when they left Korea. They bled for Korea and rendered so many achievements. It was also an education to Korean people, as well as an influence to politics outside [Korea], contradicted the rumor that Korean people did not welcome the volunteer troops. Yet we did not do it formal enough.

Premier: That was formal enough. Guo [Moruo] came back from Korea and composed more poems than we can cover [in this conversation].

Kim: When the volunteer troops left Korea, almost every Korean cried. It’s people’s affection. I am grateful for your appreciation of our construction. It’s an encouragement to us.

Premier: Your [situation] is not easy, either.

Kim: Finally, I would like to mention that when Deputy Prime Minister Li Juyeon and Comrade Li Chong-ok visited China last time, we already solved the issues of long-term trade and loan. We are very pleased and would like to express our appreciation.

Premier: We had limited power and did only very little.

Kim: We are very content. The Standing Committee listened to the report from Comrade Li Juyeon and was very content with it.

Premier: We will be able to help more once our construction improves. Everyone minds his own construction of socialism and we will all be pleased. After you come back from Vietnam, should we issue a communiqué?

Kim, Pak Jeongae and Nam Il said that they were willing to issue a communiqué at the same time.

Premier: That is good. We can assign this to the two foreign ministers. They can assign it to others and we don’t have to worry about it.

Kim: Our military delegation does not have many things on the agenda this time. We used to contact the volunteer troops when they were [in Korea]. Now that the volunteer troops have returned, we need to talk about how to maintain contact in the future. Another thing is about mutual learning and military education. I hope that Minister Peng Dehuai will be able to help.

Premier: That’s good. He (Peng Dehuai) was in the liberation army as well as the volunteer troops.

Deputy Premier Peng: The military delegation can see whatever they wish to see. We have no secrets to keep from a fraternal country.

Kim: The Vietnamese delegation brought a military group last time it visited Korea. The Korean military delegation will come with us to Vietnam this time. They may not come back with the government delegates when we come back from Vietnam. They could stay longer in China, visit more places.

Premier: That’s good. The Foreign Affairs Office of the Ministry of Defense will communicate with them about the details of the itinerary of the military delegation.

Collection North Korea in the Cold War
Creator Kim Il Sung, Zhou, Enlai, 1898-1976
Contributor Chen Yi, Peng Dehuai, Zhang Wentian
Type Minutes of Conversation
Subject China, PRC, relations with North Korea, China, PRC, relations with Taiwan, Chinese troops, Chollima, Communist countries, end of the Korean War, imperialism, US, Internment Camps, Japan, occupation of, Japanese Army, Korea, DPRK, 1956, Korea, DPRK, Central Committee (CC), Korea, DPRK, economic development, Korea, DPRK, in Sino Soviet Split, Korea, DPRK, Korean People’s Army, KPA, Korea, DPRK, Korean Worker’s Party, KWP, Korea, DPRK, KWP Political Council, Korea, DPRK, Ministry of Foreign Affairs, Korea, DPRK, Relations with China, PRC, Korea, DPRK, Relations with the Soviet Union, Korea, DPRK, Repatriates from Japan , Korea, DPRK, Soviet Economic and Military Aid, Korea, elections in, Korea, ROK, NK’s view on Protests in South Korea, Korea, unification of, Korea, withdrawal of foreign troops from, Korean War, Middle East, US involvement in , North Korea’s request for economic help, Political Change in South Korea, political mood in North Korea, Reaction of North Korea, socialism, Soviet involvement in the Korean War, Soviet Union, relations with Japan, Soviet Union, relations with North Korea, Soviet Union, strategies against the US, Soviet Union–Foreign relations–United States, Soviet Union–Foreign relations–Vietnam, US economic embargo against Cuba, US expansion of the Vietnam War, US tactics in South Vietnam, US, foreign policy of, US, policy in the Middle East, US, relations with Vietnam, Vietnam War, Chinese involvement in, Vietnam, aid to, Vietnam, DRV, relations with Korea, Vietnam–Foreign relations–Soviet Union
Coverage Afghanistan, Africa, Albania, Allied Forces, Arab countries, Argentina, Armenia (Republic), Asia, Beijing (China), Berlin (Germany), Brazil, Cambodia, Central America, China, Communist countries, Congo (Democratic Republic), Eastern Europe, Former Soviet republics, Germany, Germany (East), Germany (West), Great Britain, Iraq, Italy, Japan, Jordan, Korea, Korea (North), Korea (South), Latin America, London (England), Middle East, Moscow (Russia), North America, Pacific Area, Russia, South Africa, Southeast Asia, Soviet Union, Taiwan, United States, Vietnam, Vietnam, Western Europe
Relation North Korea in the Cold War
Lang Chinese
Publisher
Rights
Format Translation
Identifier: D78A35DD-CB92-327B-CBB66940976549AF

SECRET – U.S. Army Small Unmanned Aerial Vehicle (SUAV) Airspace Command and Control (A2C2) Handbook

https://publicintelligence.net/wp-content/uploads/2012/04/CALL-A2C2.png

 

The purpose of this handbook is to enhance understanding of Army airspace command and control (A2C2) to mitigate risks between small unit unmanned aerial vehicles (SUAVs) and rotary wing operations below the coordinating altitude. This handbook provides leaders at the brigade and below with guidelines in the form of airspace coordination techniques and procedures regarding SUAV mission planning and airspace deconfliction.

This handbook is the result of combining information from several sources, including Raven operators currently deployed in support of Operation Enduring Freedom and Operation Iraqi Freedom.

2. TYPES OF SEPARATION

There are three primary means of maintaining separation between manned and unmanned aircraft: lateral, time, and vertical separation. Beyond the need to ensure physical separation exists, leaders must plan for frequency separation between unmanned vehicles.

a. Lateral separation spaces aircraft that may be operating at the same altitude by not having them operate in the same geographic space. This can be done through the assignment of flight corridors, ROA/ROZ, and other graphic control measures such as phase lines and unit boundaries.

b. Time separation spaces aircraft that may be operating in the same geographic area or at the same operating altitudes by not allowing them to operate at the same time. Time separation may also be required when aircraft, manned and unmanned, must fly near indirect-fire trajectories or ordnance effects. The timing of surface fires must be coordinated with aircraft routing. This ensures that, even though aircraft and surface fires may occupy the same space, they do not do so at the same time.

c. Vertical separation spaces aircraft based on operating altitude or by assigning different operating altitudes to other aircraft that may be working in the same geographic area. Vertical separation is the least preferred method since SUAVs and rotary wing aircraft normally operate from the surface to 500 feet above ground level (AGL).

 

https://publicintelligence.net/wp-content/uploads/2012/04/raven-suav.png

 

The Shabak Show Terrorists Returning to Terrorism

 

https://i0.wp.com/www.israeldefense.com/_Uploads/dbsarticles/_cut/SA0000_0244x0240x0072_000xFFFFFF_terrorsists@jpg.jpg

Over the past few months since the conclusion of the Shalit exchange deal, the Shabak has been working to ensure that the prisoners released in the framework of the deal have not returned to terror activities. Two examples from recent months prove that not all of them have decided to abandon the path of terrorism, and have instead, returned to their previous terror activities.

Shabak announced that at the end of March 2012, the Judea Military Court sentenced Daoud Hilo, a Ramallah resident and one of the prisoners released in the Shalit deal, to 44 months in prison. Hilo was convicted based on his admission of guilt for attempting to trade war equipment in January 2012. This was a month after his December 8, 2011 release in the framework of the second phase of the Shalit deal.

Having been previously sentenced to 40 months in 2010 (for which he spent 23 months in prison), Hilo’s conviction cancelled the mitigation he received (approximately 17 months) in the framework of the Shalit deal, and now he will return to serve the entire duration of his sentence. Along with a fine of 2,000 NIS, Hilo was also sentenced to 12 months probation for three years from the day he is released, for the felony he was sentenced for in this case or any other firearms felony.

Another example of a Shalit deal prisoner returning to terrorism was found when the Shabak revealed the attempts of Omar Abu-Sneineh, a Hamas operative from Hebron, to recruit operatives in the Judea and Samaria region for the purpose of an abduction attack. Having been banished to the Gaza Strip in the framework of the deal, Abu-Sneineh’s planned abduction was intended for bargaining for the release of prisoners. A Fatah operative serving a life sentence for murder, he crossed the lines into the ranks of Hamas while in prison.

Abu-Sneineh, who was released in October 2011, sent a memory card to his family in the Judea and Samaria region that contained detailed instructions on how to carry out the abduction attack. His intent was to have it later reach the hands of the operatives he would recruit.

The memory card, which was obtained by Shabak, included, among other things, instructions for the operatives on how to behave after abducting an Israeli. The card contained instructions such as: “refrain from hiding (the abducted person) in abandoned areas, caves, or groves, unless it’s a body or the head of the abducted person. If dealing with a live person, which needs to be reached at least once a week in order to bring food and water, it’s best to hide him in a house, an agricultural farm, a work place, or someplace similar.” Abu-Sneineh also listed instructions for obtaining firearms and for recruiting operatives into the service of the terror organizations.

Shabak has stated that the organization “will continue its mission to foil intentions to carry out terror attacks against Israeli targets, And will do everything in its power to bring those involved in terrorism to justice. This includes all the prisoners released in the deal for the freeing of Gilad Shalit that have returned to terror activity.”

Report about Chinese “GoMopa”-allies: – Chinese hackers – No site is safe

 

Story Highlights:
* Chinese hackers claim to have broken into Pentagon’s system
* The hackers met with CNN on an island near a Chinese naval hub
* Hackers say Beijing secretly pays them at times, something the government denies
* Official: “The Chinese government does not do such a thing”

The story –
They operate from a bare apartment on a Chinese island. They are intelligent 20-somethings who seem harmless. But they are hard-core hackers who claim to have gained access to the world’s most sensitive sites, including the Pentagon.

In fact, they say they are sometimes paid secretly by the Chinese government — a claim the Beijing government denies.

“No Web site is one hundred percent safe. There are Web sites with high-level security, but there is always a weakness,” says Xiao Chen, the leader of this group.

Wie Bennewirtz für seine mutmasslichen “Partner” MEHRMALS NUR “GoMoPa”-kritische Artikel löschen lassen wollte

Subject:   Fwd: Request
From:   “P. Schmitz” <p.schmitz@deinguterruf.de>
Date:   Fri, July 8, 2011 11:24 am
To:   office@ebizz.tv
Priority:   Normal
Options:   View Full Header | View Printable Version  | Download this as a file
Dear madams, dear sirs,

unfortunately I did not receive a reply concerning my request from
July 1st from you yet. In this context I again want to point out the
major wish of our customer SJB seeing the name removed from the
entries mentioned below. It would be a great pleasure if you can
manage the removal according to the wish of our customer.

Thank you very much for your understanding.

Please do not hesitate contacting me for further discussion.

With kind regards,
P. Schmitz
Dein guter Ruf.de

---------- Forwarded message ----------
From: P. Schmitz <p.schmitz@deinguterruf.de>
Date: 2011/7/1
Subject: Request
To: office@ebizz.tv

Dear madams, dear sirs,

by order of our customer SJB Fonds Skyline OHG we are kindly asking you
to remove some entries on your website thetvnet.com. The
topicality and the
correctness of these entries are no longer up to date. It is a major
concern of our customer to see them removed:

immobilien-vertraulich.com/law/7279-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7277-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7268-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7264-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7262-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7224-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7223-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7217-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7212-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7210-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7203-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7200-opfer-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7189-opfer-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7120--klaus-maurischats-gomopa-cybermoerder-leichen-und-falschmeldungen-plastern-ihren-weg--nicht-nur-im-internet.html
immobilien-vertraulich.com/boerse-ipo-reit/7119--der-mehrfach-vorbestrafte-serienbetrueger-und-mutmassliche-paederast-klaus-maurischat-und-seine-neue-qwirecard-enteq.html

We hope you can manage the removal of these entries according to the wish
of our customer contemporarily. . These entries and similar ones cause
major problems for our customer.
We wanna thank you for your appreciation, for further information
please visit our website deinguterruf.de. (the english version is
still under construction).

In case you are not the right receipt for this request, it would be
very kind if you can name the correct person in charge.
If you have further questions concerning this case or our services in
general, please contact me.
It would be a great pleasure to receive a positive feedback.

With kind regards,

--
Mit freundlichen Grüßen,

P. Schmitz
DEIN GUTER RUF.DE

Ein Projekt der
MoveVision GmbH

Alfredstraße 341
45133 ESSEN
Tel: 0201-2489452
E-mail: p.schmitz (at) deinguterruf.de

MoveVision – GmbH - HRB 22121
Geschäftsführer: Martin Lux - Steuernummer: DE228746207

--
Mit freundlichen Grüßen,

P. Schmitz
DEIN GUTER RUF.DE

Ein Projekt der
MoveVision GmbH

Alfredstraße 341
45133 ESSEN
Tel: 0201-2489452
E-mail: p.schmitz (at) deinguterruf.de

MoveVision – GmbH - HRB 22121
Geschäftsführer: Martin Lux - Steuernummer: DE228746207
Subject: Request
From: “P. Schmitz” <p.schmitz@deinguterruf.de>
Date: Fri, July 1, 2011 12:18 pm
To: office@ebizz.tv
Priority: Normal
Options: View Full HeaderView Printable VersionDownload this as a file
Dear madams, dear sirs,

by order of our customer SJB Fonds Skyline OHG we are kindly asking you
to remove some entries on your website thetvnet.com. The
topicality and the
correctness of these entries are no longer up to date. It is a major
concern of our customer to see them removed:

immobilien-vertraulich.com/law/7279-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7277-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7268-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7264-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7262-sjb-fonds-opfer-sven-babyface-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt-.html
immobilien-vertraulich.com/law/7224-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7223-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7217-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7212-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7210-opfer-sven-schmidt-als-chef-terrorist-von-europas-gefaehrlichster-internet-kriminellen-bande-enttarnt.html
immobilien-vertraulich.com/law/7203-der-beweis-tatsaechlich-vorbestrafter-serienbetrueger-klausmaurischat-gomopa-hat-eigenes-kinder-portal-.html
immobilien-vertraulich.com/law/7200-opfer-die-killer-bibel-toxdat-die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7189-opfer-die-killer-bibel-toxdat--die-900-seiten-stasi-mordstudie-von-gomopa-mastermind-ehrenfried-stelzer.html
immobilien-vertraulich.com/law/7120--klaus-maurischats-gomopa-cybermoerder-leichen-und-falschmeldungen-plastern-ihren-weg--nicht-nur-im-internet.html
immobilien-vertraulich.com/boerse-ipo-reit/7119--der-mehrfach-vorbestrafte-serienbetrueger-und-mutmassliche-paederast-klaus-maurischat-und-seine-neue-qwirecard-enteq.html

We hope you can manage the removal of these entries according to the wish
of our customer contemporarily.These entries and similar ones cause
major problems for our customer.
We wanna thank you for your appreciation, for further information
please visit our website deinguterruf.de. (the english version is
still under construction).

In case you are not the right receipt for this request, it would be
very kind if you can name the correct person in charge.
If you have further questions concerning this case or our services in
general, please contact me.
It would be a great pleasure to receive a positive feedback.

With kind regards,

--
Mit freundlichen Grüßen,

P. Schmitz
DEIN GUTER RUF.DE

Ein Projekt der
MoveVision GmbH

Alfredstraße 341
45133 ESSEN
Tel: 0201-2489452
E-mail: p.schmitz (at) deinguterruf.de

MoveVision – GmbH - HRB 22121
Geschäftsführer: Martin Lux - Steuernummer: DE228746207

INTERESSANT - BENEWIRTZ WOLLTE HIERMIT AUSSCHLIESSLICH "GoMoPa"-KRITISCHE ARTIKEL LÖSCHEN

Die STASI und Ihr Tarnunternehmen in Neuss – die mutmasslichen STASI-Morde

 

DIE WELT BERICHTET:

Überhaupt sind es die zahlreichen, bis heute ungeklärten Todesfälle beim Bereich Kommerzielle Koordinierung (KoKo) und dessen Stasi-Firmen in Ost und West, die bei den Ermittlungen zu den Einsatzgruppenmorden eine zentrale Rolle spielen. Schon im 1994 vorgelegten Bericht des Bundestagsuntersuchungsausschusses, der sich mit den kriminellen Praktiken des von den Stasi-Offizieren im besonderen Einsatz (OibE) Alexander Schalck-Golodkowski und Manfred Seidel geführten DDR-Devisen-Beschaffungs-Imperium auseinander setzt, wurde konstatiert, dass die Todesfälle “wahrscheinlich einen nachrichtendienstlichen Hintergrund” hätten.

Ermittelt wird heute zu den bereits in dem Bericht aufgeführten Fällen der durch “Herzversagen” aus dem Leben geschiedenen Geschäftsführer der KoKo-Firmen Itema in Neuss, Karl-Heinz Noetzel und Fritz John Bruhn. Letzterer wurde im Ost-Berliner Hotel “Metropol” im August 1982 tot aufgefunden. Laut “Focus” hatte Bruhn nach Erkenntnissen des Verfassungsschutzes seit 1979 die westdeutsche Spionageabwehr über konspirative Geldtransfers für die DKP informiert. In Bruhns Verfassungsschutzakte findet sich das Abhörprotokoll einer brutalen Einschüchterung. So sagte im Januar 1981 das DKP-Mitglied Friedrich R. aus Bochum zu Bruhn: “Mach keinen Blödsinn, einen Kontakt zum Verfassungsschutz bekommt die Partei sowieso heraus. Die Folgen würdest du nicht überstehen.”

QUELLE: DIE WELT

http://www.welt.de/print-wams/article100912/Erschiessen-Erstechen-Verbrennen-Strangulieren.html

 

 

Karl-Heinz Nötzel, Geschäftsführer der DDR-Tarnfirma Intema in Neuss, erstickt am 8. September 1981 in einer Leipziger Hoteltoilette – angeblich an Speiseresten. Offizielle Todesursache: Herzversagen. Nötzel, der über die Intema Ostberlin Devisen beschaffte, stand bei der DDR-Staatssicherheit im Verdacht, ein Agent des Kölner Bundesamts für Verfassungsschutz (BfV) zu sein.

Fritz John Bruhn, 57, Nötzels Nachfolger bei der Parteifirma Intema, wird am 20. August 1982 leblos im Ostberliner Hotel „Metropol“ aufgefunden. Die Obduktion ergibt: Herzversagen.

FOCUS vorliegende Verfassungsschutz-Dossiers beweisen, dass Bruhn seit 1979 die westdeutsche Spionageabwehr über konspirative Geldtransporte der DDR und die Drahtzieher illegaler Ost-West-Geschäfte informierte. Eine BfV-Verschlussakte über die Geheimoperation mit dem Codenamen „Einkäufer“ schildert detalliert, wie Bruhn am 24. Januar 1981 von dem DKP-Mitglied Friedrich R. aus Bochum eingeschüchtert wurde: „Mach keinen Blödsinn“, so die Warnung laut Wortprotokoll, „einen Kontakt zum Verfassungsschutz bekommt die Partei sowieso heraus.“ R. dann massiv drohend zu Bruhn: „Die Folgen würdest du nicht überstehen.“


Deutschland: Die düstere Seite der DDR – weiter lesen auf FOCUS Online: http://www.focus.de/politik/deutschland/deutschland-die-duestere-seite-der-ddr_aid_194129.html

Global Witness – Sentencing of former Nigerian politician highlights role of British and US banks in money laundering

Global Witness calls for a thorough investigation into HSBC, Barclays, Citibank and Abbey National (now owned by Santander) for their roles in the laundering of millions of pounds by James Ibori, former governor of Nigeria’s oil-rich Delta State. Ibori pleaded guilty to ten counts of money laundering and fraud in relation to an estimated $250 million of stolen state assets on 27 February; today was the first day of his sentencing hearing.

“By doing business with Ibori and his associates, these banks facilitated his corrupt behaviour and allowed him to spend diverted state assets on a luxury lifestyle, including a private jet and expensive London houses, while many Nigerians continue to live in poverty,” said Robert Palmer, a campaigner with Global Witness.

Today, the prosecution provided an overview of Ibori’s crimes, and in particular any aggravating factors. The details of how Ibori and his accomplices stole government funds and moved them into the UK are only coming out now, as a reporting restriction was in place until his guilty plea. His wife, sister and mistress have already been convicted of money laundering as have a string of professional intermediaries including a lawyer, a fiduciary agent and a corporate financier.

Ibori, who was governor of Delta State from 1999 to 2007, inflated government contracts, accepted kickbacks and even directly stole funds from state coffers.

His official salary was £4,000 a year and his formal asset declaration stated that he had no cash or bank accounts outside of Nigeria. Despite this he managed to buy several houses around the world, including one in the UK valued at £2.2 million, luxury cars (a Bentley, Range Rover and Maybach) and a $20 million Challenger private jet.

According to the prosecutor, Sasha Wass QC, Ibori and his associates used multiple accounts at Barclays, HSBC, Citibank and Abbey National to launder funds. Millions of pounds passed through these accounts in total, some of which were used to purchase expensive London property.

In one case US$4.8 million was transferred from a Barclays account belonging to a company of which Ibori was formally a director to another account at Barclays controlled by Ibori’s lawyer, Badhresh Gohil. The funds passed through two Swiss accounts, including one at a branch of Schroders in Zurich, and were used as part payment for the private jet. In another case, Ibori and others were able to cream $37.8 million off from the sale of Delta state shares in the telecoms company V Mobile.

Ibori had numerous Barclays accounts. The prosecutor described how in one case between 1999 and 2006 Ibori deposited £1.5 million in a Knightsbridge branch of Barclays, much of this was in rolls of banknotes.

In America Ibori held two accounts at Citibank and ran up a $920,000 American Express credit bill between 2003 and 2006. He bought a $1.8 million house in Houston, as well as moving at least $500,000 through his lawyer’s client account at the now-defunct AIDT bank in Denver, Colorado.

Banks and lawyers have a legal obligation to identify their customers and carry out ongoing checks to identify any suspicious transactions which they have to report to the authorities. In particular, they are supposed to identify customers who are senior politicians or their family members and close associates, who could potentially represent a corruption risk, and do extra checks on their funds.

This case raises serious questions about the due diligence that Barclays and the other banks carried out on Ibori and his associates. What checks did these banks do to ensure that the funds they were handling were not the proceeds of corruption?

A 2011 review by the UK bank regulator, the Financial Services Authority (FSA), revealed that British banks were systematically failing to carry out the required anti-money laundering checks – particularly when dealing with senior foreign politicians. The FSA has said that it will take a tougher line in future and will start doing more intensive supervision. For example, last month Coutts bank was fined £8.75 million for failures uncovered during the regulator’s 2011 review. But compared to the £1.9 billion in profits made by Coutts’ parent bank RBS, this fine can be seen as simply a cost of doing business, especially as RBS has been fined more than once in the past for similar failures.

“It’s welcome that the FSA has said it will do more to target banks that fail to tackle financial crime. But unless they issue penalties that really hurt, nothing will change,” said Palmer. “And we now need an investigation into how Ibori was able to move so much money through these British banks for so long and whether or not sufficient checks were carried out.”

The case also shows how money launderers such as Ibori are able to use shell companies spread across different countries to move and conceal their assets. At present it can be incredibly difficult for law enforcement and others to identify the actual person who controls and benefits from a company. Global Witness is calling for all countries to use their company registers to publish details on the real, ‘beneficial’ owner of all companies.

Barclays and HSBC declined to comment on the specific allegations due to client confidentiality. They said they had robust anti-money laundering and anti-corruption policies that applied across their global holdings. Santander declined to comment.

/Ends

Contact: Robert Palmer on +44 (0)20 7492 5860 or +44 (0)7545 645406, rpalmer@globalwitness.org.

Notes to editors:

1. In 2010 Global Witness’s report International Thief Thief revealed that HSBC, Barclays, Natwest, RBS and UBS had accepted millions of pounds for two other Nigerian state governors who had been accepting bribes.

2. The FSA’s report from June 2011 was deeply critical of banks for the handling of corrupt risk, for example it found that a third of banks did not have information on the ultimate, or beneficial, owner, despite this being a legal requirement.

3. RBS was fined £5.6 million in 2010 for failing to check whether its customers were on the UK terrorist sanctions list and £750,000 in 2002 for inadequate customer due diligence procedures.

Cyrano De Bergerac – Full Movie

France, 1640: Cyrano, the charismatic swordsman-poet with the absurd nose, hopelessly loves the beauteous Roxane; she, in turn, confesses to Cyrano her love for the handsome but tongue-tied Christian. The chivalrous Cyrano sets up with Christian an innocent deception, with tragic results.

Confidential – The Evolving Missions of the Secret Service, and More from CRS

hough it does not mention anything about Secret Service agents hiring prostitutes in Colombia last week, a newly updated report from the Congressional Research Service provides a timely discussion of The U.S. Secret Service: An Examination and Analysis of Its Evolving Missions, April 16, 2012

Some other new or newly updated CRS reports obtained by Secrecy News include the following.

An Overview of Tax Provisions Expiring in 2012, April 17, 2012

Private Health Insurance Market Reforms in the Patient Protection and Affordable Care Act (ACA), April 16, 2012

Pension Benefit Guaranty Corporation (PBGC): A Fact Sheet, April 16, 2012

Nanotechnology: A Policy Primer, April 13, 2012

SECRET from the FBI – Scheme to Use More Than 80 Fictitious Companies to Defraud Illinois, Indiana, Minnesota Unemployment Insurance Agencies of $8.7 Million

CHICAGO—A suburban Chicago woman who owned a South Side tax preparation business allegedly schemed to falsely claim more than $1 million in federal tax refunds and, together with 14 co-defendants, allegedly engaged in a related scheme using other individuals’ identities, including some tax service clients and some stolen, to fraudulently obtain more than $8.7 million from state unemployment insurance agencies in Illinois, Indiana, and Minnesota. The defendants allegedly registered approximately 80 fictitious employers with the states’ unemployment insurance agencies and used the sham employers to fraudulently collect unemployment insurance benefits. The Illinois Department of Employment Security was allegedly defrauded of at least $5.95 million, the Indiana Department of Workforce Development was allegedly cheated of at least $2.4 million, and the Minnesota Department of Employment and Economic Development lost at least $342,000 as a result of the alleged fraud scheme.

The lead defendant, Jacqueline Kennedy, owned and managed ATAP Financial Enterprises Inc., ATAP Tax & Business Solutions Inc., and ATAP Tax Services Inc., (collectively, ATAP), all tax preparation businesses located at one time at 1757 West 95th St. in Chicago. Kennedy, 39, of Country Club Hills, was charged with 14 counts of mail and wire fraud, six counts of filing false claims for tax refunds, and one count of aggravated identity theft.

Kennedy and 14 co-defendants were indicted together on various tax, fraud, and identity theft charges in a 60-count indictment returned yesterday by a federal grand jury, Patrick J. Fitzgerald, United States Attorney for the Northern District of Illinois, announced today. All 15 defendants will be ordered to appear for arraignment at a later date in U.S. District Court in Chicago.

“This indictment highlights the determination of the Labor Department’s Office of Inspector General to investigate fraud against the unemployment insurance program. The defendants allegedly schemed to illegally obtain approximately $8.7 million in unemployment benefits. We will continue to work with our law enforcement partners and our colleagues in the Illinois, Indiana, and Minnesota state workforce agencies to aggressively investigate allegations of fraudulent activities to obtain unemployment insurance benefits,” said James Vanderberg, Special Agent in Charge of the Chicago Regional Office of the U.S. Department of Labor, Office of Inspector General, Office of Labor Racketeering and Fraud Investigations.

Mr. Fitzgerald and Mr. Vanderberg announced the charges with Alvin Patton, Special Agent in Charge of the Internal Revenue Service Criminal Investigation Division; Robert D. Grant, Special Agent in Charge of the Chicago Office of Federal Bureau of Investigation; and Thomas P. Brady, Inspector in Charge of the U.S. Postal Inspection Service in Chicago. The Social Security Administration Office of Inspector General also assisted in the investigation.

Between January 2008 and April 2010, the indictment alleges that Kennedy and others prepared at least 200 false individual federal income tax returns for clients of ATAP or in the names of clients stating false income and credits for tax years 2007-2009 and fraudulently claiming approximately $1.025 million in tax refunds. Kennedy allegedly inflated certain ATAP clients’ tax refunds by manufacturing false Forms W-2 from companies for which the clients did not work and from companies for which the clients worked but did not earn the inflated wages reported.

As part of the alleged unemployment insurance fraud scheme, Kennedy and others allegedly used personal identifying information of numerous individuals, both ATAP tax clients, including names, Social Security numbers, and dates of birth, to file retroactive wage reports and subsequent claims for benefits, according to the indictment. At times, Kennedy and others stole the identities of ATAP clients and others and used the identifiers to file fraudulent claims for unemployment insurance benefits. At other times, they agreed with ATAP clients and others to file fraudulent claims on their behalf in exchange for a share of the proceeds, the indictment alleges.

Kennedy and co-defendant Tara Cox, 32, of Blue Island, who was charged with 15 counts of mail and wire fraud and one count of aggravated identity theft, allegedly created the 80-some fictitious companies and registered them with the state unemployment agencies, knowing that the vast majority of employers existed only for the purpose of drawing unemployment insurance benefits on behalf of purported employees. According to the indictment, they allegedly filed false quarterly wage reports on behalf of these fictitious employers, knowing that these companies, in fact, did not employ any workers. Kennedy and Cox then filed or caused others to file fraudulent claims for unemployment insurance benefits by claiming to be employees of the fictitious companies who were terminated without fault. During the course of the alleged scheme between February 2009 and October 2011, Kennedy, Cox, and others allegedly filed at least 900 false unemployment insurance claims before the scheme was detected and payments were stopped.

In Illinois and Minnesota, unemployment insurance claimants could chose to have their benefits directly deposited into a bank account or have the state agency issue them a debit card, while Indiana claimants received a debit card through the mail. The indictment alleges that Kennedy and Cox caused fraudulent unemployment insurance payments to be made to debit cards for the benefit of themselves and the following co-defendants: Cox’s mother, Rowena Pughsley, 60, also of Blue Island, charged with six counts of mail fraud, one count of aggravated identity theft, and two counts of filing false income tax returns; April Blanchard, 37, of Chicago, charged with 10 counts of mail and wire fraud; Orvin Hurst, 35, of Chicago, charged with nine counts of mail and wire fraud; Marcel Mason, 38, whose last known address was in Beecher, charged with four counts of mail and wire fraud; Lantz Roberts, 39, of Chicago, charged with four counts of mail fraud; Jocklyn Batey, 64, of Chicago, charged with two counts of mail fraud; Shawn Ray, 49, of Chicago, charged with two counts of mail fraud; Ashlee Petermon, 25, of Chicago, charged with one count of mail fraud; Eboni Coppage, 26, of Bloomington, charged with two counts of mail fraud; Tameka Thompson, 31, of Park Forest, charged with one count of mail fraud; Charles Williams, 37, of Sauk Village, charged with two counts of mail and wire fraud; and Anise McGill, 26, of Alsip, charged with one count of mail fraud.

At times, Kennedy, Cox, Pughsley, and Blanchard allegedly paid or caused to be paid unemployment payroll tax contributions on behalf of the fictitious employers to create the false impression that the employers were legitimate businesses with actual employees. In addition, Cox and others allegedly purchased Social Security numbers for filing bogus claims for unemployment insurance benefits. Ten of the defendants, including Orvin Hurst’s brother, Marlin Hurst, 39, of Chicago, who was charged with five counts of mail fraud, caused unemployment insurance debit cards to be delivered to their home and other addresses with which they were associated, knowing that the cards were fraudulently obtained, the indictment alleges. Fourteen of the defendants allegedly withdrew funds from bank automated teller machines using unemployment insurance debit cards in the names of purported employees of fictitious employers knowing they were not entitled to those funds.

Kennedy, Pughsley, Cox, Blanchard, Mason, and others allegedly falsely certified fraudulent unemployment insurance claims, including representing to the state agencies that the claimants were entitled to unemployment insurance benefits, had been available and able to work, and actively sought work during the certification period.

Pughsley alone was charged with two counts of filing false individual federal income tax returns for 2009 and 2010 for allegedly under-reporting her total income as $196,414 in 2009 and $70,538 in 2010, when she knew that her gross income and total income were substantially greater.

The indictment seeks forfeiture of approximately $8.7 million in alleged fraud proceeds from Kennedy, Cox, Pughsley, and seven other defendants.

The charges in the indictment carry the following maximum penalties on each count: mail and wire fraud—20 years in prison; filing false claims for tax refunds—five years; aggravated identity theft—mandatory two years consecutive to any other sentence imposed and a maximum fine of $250,000 on each count, or an alternate fine on the fraud counts totaling twice the loss or twice the gain, whichever is greater. In addition, restitution is mandatory. Each count of filing a false income tax return carries a three-year maximum sentence and a $250,000 fine. In addition, defendants convicted of tax offenses must pay the costs of prosecution and remain liable for any and all back taxes, as well as a potential civil fraud penalty of 75 percent of the underpayment plus interest. If convicted, the court must impose a reasonable sentence under federal statutes and the advisory United States Sentencing Guidelines.

The government is being represented by Assistant U.S. Attorneys Andrianna D. Kastanek and Mark E. Schneider.

The public is reminded that an indictment is not evidence of guilt. The defendants are presumed innocent and are entitled to a fair trial at which the government has the burden of proving guilt beyond a reasonable doubt.

TOP-SECRET from Crpytome – Nuclear Power Plant Onsite Emergency Response Capabilities

[Federal Register Volume 77, Number 75 (Wednesday, April 18, 2012)] [Proposed Rules] [Pages 23161-23166] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2012-9336] ======================================================================== Proposed Rules Federal Register ________________________________________________________________________ This section of the FEDERAL REGISTER contains notices to the public of the proposed issuance of rules and regulations. The purpose of these notices is to give interested persons an opportunity to participate in the rule making prior to the adoption of the final rules. ======================================================================== Federal Register / Vol. 77, No. 75 / Wednesday, April 18, 2012 / Proposed Rules [[Page 23161]] NUCLEAR REGULATORY COMMISSION 10 CFR Parts 50 and 52 [NRC-2012-0031] RIN 3150-AJ11 Onsite Emergency Response Capabilities AGENCY: Nuclear Regulatory Commission. ACTION: Advance notice of proposed rulemaking. ———————————————————————– SUMMARY: The U.S. Nuclear Regulatory Commission (NRC or the Commission) is issuing this Advance Notice of Proposed Rulemaking (ANPR) to begin the process of potentially amending its regulations to strengthen and integrate onsite emergency response capabilities. The NRC seeks public comment on specific questions and issues with respect to possible revision to the NRC’s requirements for onsite emergency response capabilities, and development of both new requirements and the supporting regulatory basis. This regulatory action is one of the actions stemming from the NRC’s lessons-learned efforts associated with the March 2011 Fukushima Dai-ichi Nuclear Power Plant accident in Japan. DATES: Submit comments by June 18, 2012. Comments received after this date will be considered if it is practical to do so, but the NRC is only able to ensure consideration of comments received on or before this date. ADDRESSES: You may access information and comment submissions related to this document, which the NRC possesses and is publicly available, by searching on http://www.regulations.gov under Docket ID NRC-2012-0031. You may submit comments by any of the following methods: Federal Rulemaking Web Site: Go to http://www.regulations.gov and search for Docket ID NRC-2012-0031. Address questions about NRC dockets to Carol Gallagher; telephone: 301-492- 3668; email: Carol.Gallagher@nrc.gov. Email comments to: Rulemaking.Comments@nrc.gov. If you do not receive an automatic email reply confirming receipt, contact us directly at 301-415-1677. Fax comments to: Secretary, U.S. Nuclear Regulatory Commission at 301-415-1101. Mail comments to: Secretary, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001, Attn: Rulemakings and Adjudications Staff. Hand deliver comments to: 11555 Rockville Pike, Rockville, Maryland 20852, between 7:30 a.m. and 4:15 p.m. (Eastern time) Federal workdays; telephone: 301-415-1677. For additional direction on accessing information and submitting comments, see “Accessing Information and Submitting Comments” in the SUPPLEMENTARY INFORMATION section of this document. FOR FURTHER INFORMATION CONTACT: Robert H. Beall, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001; telephone: 301-415-3874; email: Robert.Beall@nrc.gov. SUPPLEMENTARY INFORMATION: I. Accessing Information and Submitting Comments II. Background: Fukushima Dai-ichi and the NRC Regulatory Response III. Background: Onsite Emergency Response Capabilities A. Emergency Operating Procedures B. Severe Accident Management Guidelines C. Extensive Damage Mitigation Guidelines D. Onsite Emergency Response Capabilities Versus Emergency Preparedness IV. Discussion and Request for Public Comment A. ANPR Purpose B. Rulemaking Objectives/Success Criteria C. Applicability to NRC Licenses and Approvals D. Relationship Between Recommendation 8 and Other Near-Term Task Force Recommendations E. Interim Regulatory Actions V. Public Meeting VI. Rulemaking Process and Schedule VII. Related Petition for Rulemaking Actions VIII. Available Supporting Documents I. Accessing Information and Submitting Comments A. Accessing Information Please refer to Docket ID NRC-2012-0031 when contacting the NRC about the availability of information for this notice. You may access information related to this ANPR, which the NRC possesses and is publicly available, by the following methods: Federal Rulemaking Web Site: Go to http://www.regulations.gov and search for Docket ID NRC-2012-0031. NRC’s Agencywide Documents Access and Management System (ADAMS): You may access publicly available documents online in the NRC Library at http://www.nrc.gov/reading-rm/adams.html. To begin the search, select “ADAMS Public Documents” and then select “Begin Web- based ADAMS Search.” For problems with ADAMS, please contact the NRC’s Public Document Room (PDR) reference staff at 1-800-397-4209, 301-415- 4737, or by email to PDR.Resource@nrc.gov. The ADAMS accession number for each document referenced in this notice (if that document is available in ADAMS) is provided the first time that a document is referenced. A table listing documents that provide additional background and supporting information is in Section VIII of this document. NRC’s PDR: You may examine and purchase copies of public documents at the NRC’s PDR, Room O1-F21, One White Flint North, 11555 Rockville Pike, Rockville, Maryland 20852. B. Submitting Comments Please include Docket ID NRC-2012-0031 in the subject line of your comment submission, in order to ensure that the NRC is able to make your comment submission available to the public in this docket. The NRC cautions you not to include identifying or contact information in comment submissions that you do not want to be publicly disclosed. The NRC posts all comment submissions at http://www. regulations.gov as well as enters the comment submissions into ADAMS. The NRC does not edit comment submissions to remove identifying or contact information. If you are requesting or aggregating comments from other persons for submission to the NRC, then you should inform those persons not to include identifying or contact information in their comment submissions that they do not want to be publicly disclosed. Your request should state that the NRC will not edit comment submissions to remove such information before making the comment submissions available to the public or entering the comment submissions into ADAMS. [[Page 23162]] II. Background: Fukushima Dai-ichi and the NRC Regulatory Response On March 11, 2011, a magnitude 9.0 earthquake struck off the coast of the Japanese island of Honshu. The earthquake precipitated a large tsunami that is estimated to have exceeded 14 meters (45 feet) in height at the Fukushima Dai-ichi Nuclear Power Plant site (hereinafter referred to as the site or the facility). The earthquake and tsunami produced widespread devastation across northeastern Japan, resulting in approximately 25,000 people dead or missing, displacing tens of thousands of people, and significantly impacting the infrastructure and industry in the northeastern coastal areas of Japan. At the time of the earthquake, Fukushima Dai-ichi Units 1, 2, and 3 were in operation. Units 4, 5, and 6 had been shut down for routine refueling and maintenance activities, and the Unit 4 reactor fuel had been offloaded to the Unit 4 spent fuel pool. As a result of the earthquake, the three operating units at the site automatically shut down, and offsite power was lost to the entire facility. The emergency diesel generators started at all six units, providing alternating current (AC) electrical power to critical systems; overall, the facility response to the seismic event appears to have been normal. Approximately 40 minutes after shutdown of the operating units, the first large tsunami wave inundated the site, followed by multiple additional waves. The tsunami resulted in extensive damage to site facilities and a complete loss of AC electrical power at Units 1 through 5, a condition known as station blackout (SBO). One diesel generator remained functional on Unit 6. Despite the actions of the operators following the earthquake and tsunami, cooling was lost to the fuel in the Unit 1 reactor after several hours, in the Unit 2 reactor after about 70 hours, and in the Unit 3 reactor after about 36 hours, resulting in damage to the nuclear fuel shortly after the loss of cooling. In the days following the Fukushima Dai-ichi nuclear accident, the NRC Chairman directed the NRC staff to establish a senior-level agency task force to conduct a methodical and systematic review of the NRC’s processes and regulations to determine whether, in light of the events in Japan, the agency should make additional improvements to its regulatory system, and to make recommendations to the Commission for its policy direction. This direction was provided in a tasking memorandum dated March 23, 2011, from the NRC Chairman to the NRC Executive Director for Operations (COMGBJ-11-0002) (ADAMS Accession No. ML110950110). In SECY-11-0093, “Near-Term Report and Recommendations for Agency Actions Following the Events in Japan” (ADAMS Accession No. ML11186A959), dated July 12, 2011, the Near-Term Task Force (NTTF) provided its recommendations to the Commission. The staff requirements memorandum (SRM) for SECY-11-0093 (ADAMS Accession No. ML112310021), dated August 19, 2011, directed the NRC staff to identify and make “recommendations regarding any Task Force recommendations that can, and in the staff’s judgment, should be implemented, in part or in whole, without unnecessary delay.” In SECY-11-0124, “Recommended Actions To Be Taken Without Delay from the Near-Term Task Force Report” (ADAMS Accession No. ML11245A127), the NRC staff provided recommendations to the Commission on actions that, in the staff’s judgment, should be initiated without unnecessary delay, and requested that the Commission provide direction for moving forward on these recommendation (subsequently referred to as “Tier 1” recommendations). The Commission approved the staff’s proposed actions in the SRM for SECY-11-0124 (ADAMS Accession No. ML112911571), dated October 18, 2011. In SECY-11-0137, “Prioritization of Recommended Actions to Be Taken in Response to Fukushima Lessons Learned” (ADAMS Accession No. ML11269A204), the NRC staff requested that the Commission approve the staff’s prioritization of the NTTF recommendations. In the SRM for SECY-11-0137 (ADAMS Accession No. ML113490055), dated December 15, 2011, the Commission approved the staff’s proposed prioritization of the NTTF recommendations and supported action on the Tier 1 recommendations, subject to the direction in the SRM. With respect to regulatory action regarding onsite emergency response capabilities, the Commission directed the NRC staff to initiate a rulemaking on NTTF Recommendation 8, in the form of an ANPR. This document responds to that Commission direction. In November 2011, the Institute of Nuclear Power Operations (INPO) issued INPO-11-005, “Special Report on the Nuclear Accident at the Fukushima Dai-ichi Nuclear Power Station” (ADAMS Accession No. ML11347A454). In the SRM for SECY-11-0137, the Commission directed NRC staff to consider INPO-11-005 in its development of the technical bases for any proposed regulatory changes. III. Background: Onsite Emergency Response Capabilities A. Emergency Operating Procedures Emergency Operating Procedures (EOPs) are required procedures designed to mitigate the effects of a design basis accident and place the plant in a safe shutdown condition. The EOPs are required by Title 10 of the Code of Federal Regulations (10 CFR) Part 50, Appendix B, Criterion V, “Instructions, Procedures, and Drawings,” and are included in the administrative control sections of licensee’s technical specifications. Licensed operators are trained and evaluated in the implementation of EOPs through initial license training. The NRC evaluates licensed operator candidates’ knowledge of EOPs during an initial written examination, as required by 10 CFR 55.41 and 55.43, and an initial operating test, as required by 10 CFR 55.45. For proficiency, licensed operator requalification training programs, required by 10 CFR 55.59, routinely train and evaluate licensed operators on their knowledge and ability to implement the EOPs. B. Severe Accident Management Guidelines During the 1990s, the nuclear industry developed Severe Accident Management Guidelines (SAMGs) as a voluntary industry initiative in response to Generic Letter 88-20, Supplement 2, “Accident Management Strategies for Consideration in the Individual Plant Examination Process,” dated April 4, 1990 (ADAMS Accession No. ML031200551). SAMGs provide guidance to operators and Technical Support Center (TSC) staff in the event of an accident that progresses beyond a plant’s design basis (and therefore beyond the scope of the EOPs). The nuclear power industry owners’ groups (i.e., industry organizations with representatives from the various nuclear plant owners that provide industry oversight for various plant designs) developed generic guidelines specific to the individual plant designs. Given the voluntary nature of the initiative for SAMGs, their implementation throughout the industry has been varied, as noted by NRC inspection results for Temporary Instruction 2515/184, “Availability and Readiness Inspection of Severe Accident Management Guidelines (SAMGs)” (ADAMS Accession No. ML11115A053). The guidelines themselves were implemented by individual licensees, [[Page 23163]] but because the NRC has not developed a regulatory requirement for SAMGs, the training, evaluation, and procedure control requirements for SAMGs vary from plant to plant. C. Extensive Damage Mitigation Guidelines Following the terrorist events of September 11, 2001, the NRC ordered licensees to develop and implement specific guidance and strategies to maintain or restore core cooling, containment, and spent fuel pool cooling capabilities using existing or readily available resources that can be effectively implemented under the circumstances associated with loss of large areas of the plant due to explosions or fire. These requirements were subsequently imposed as license conditions for individual licensees and formalized in the Power Reactor Security Requirements final rule (74 FR 13926; March 27, 2009) in 10 CFR 50.54(hh)(2). As a result, Extensive Damage Mitigation Guidelines (EDMGs) were developed in order to provide guidance to operating crews and TSC personnel on the implementation of the strategies developed to address these large area events. The events at the Fukushima Dai-ichi Nuclear Power Station following the March 11, 2011, earthquake and tsunami highlighted the continued potential benefits of these strategies in mitigating the effects of prolonged SBOs and other events that challenge key safety functions. The NRC has not developed a specific regulatory requirement for training on EDMGs. D. Onsite Emergency Response Capabilities Versus Emergency Preparedness This ANPR focuses on the effectiveness of accident mitigating procedures and the training and exercises associated with these procedures. When using the term “accident mitigating procedures” in this document, the NRC is referring to EOPs, SAMGs, and EDMGs. The licensee’s emergency preparedness plan and implementing procedures, which are required by 10 CFR 50.47 and 50.54(q) and Appendix E to 10 CFR part 50, are being evaluated through other NTTF recommendations, and the associated efforts are referred to in the questions in Section IV.D. However, the licensee’s emergency preparedness plan and implementing procedures are not the subject of this ANPR. IV. Discussion and Request for Public Comment A. ANPR Purpose In SECY-11-0124, the NRC staff recommended that the agency engage stakeholders during rulemaking activities “so that the regulatory action and licensee actions taken effectively resolve the identified issues and implementation challenges are identified in advance.” The NRC staff proposed interaction with stakeholders to support development of the regulatory basis, a proposed rule, and implementing guidance for strengthening and integrating the onsite emergency response capabilities. In the SRM for SECY-11-0124, the Commission directed the NRC staff to issue an ANPR prior to developing the regulatory basis for a proposed rule. Accordingly, the NRC’s objective in this ANPR is to solicit external stakeholder feedback to inform the NRC staff’s efforts to evaluate regulatory approaches for strengthening the current onsite emergency response capability requirements. In the SRM for SECY-11-0124, the Commission also encouraged NRC staff to develop recommendations that continue to realize the strengths of a performance-based system as a guiding principle. The Commission indicated that, to be effective, approaches should be flexible and able to accommodate a diverse range of circumstances and conditions. The Commission stated that for “consideration of events beyond the design basis, a regulatory approach founded on performance-based requirements will foster development of the most effective and efficient, site- specific mitigation strategies, similar to how the agency approached the approval of licensee response strategies for the `loss of large area’ event” addressed in 10 CFR 50.54(hh)(2). Consistent with the Commission’s direction in the SRM for SECY-11- 0124, the NRC is open to flexible, performance-based strategies to address onsite emergency response capability requirements. This ANPR is structured around questions intended to solicit information that (1) supports development of such a framework and (2) supports assembling a complete and adequate regulatory basis that enables rulemaking to be successful. In this context, commenters should feel free to provide feedback on any aspects of onsite emergency response capability that would support this ANPR’s regulatory objective, whether or not in response to a stated ANPR question. B. Rulemaking Objectives/Success Criteria The NRC is considering development of a proposed rule that would amend the current onsite emergency response capability requirements. Currently, the regulatory and industry approaches to onsite emergency response capability are fragmented into the separate strategies that were discussed in Section III of this document. By promulgation of an onsite emergency response capability rule, the NRC would be able to establish regulations that, when implemented by licensees, would strengthen and integrate the various onsite emergency response strategies. Specifically, the proposed requirements for onsite emergency response capability would strive to accomplish the following goals: 1. Ensure that effective transitions are developed between the various accident mitigating procedures (EOPs, SAMGs, and EDMGs) so that overall strategies are coherent and comprehensive. 2. Ensure that command and control strategies for large scale events are based on the best understanding of severe accident progression and effective mitigation strategies, and well defined in order to promote effective decision-making at all levels and develop organizational flexibility to respond to unforeseen events. 3. Ensure that the key personnel relied upon to implement these procedures and strategies are trained, qualified, and evaluated in their accident mitigation roles. 4. Ensure that accident mitigating procedures, training, and exercises are appropriately standardized throughout the industry and are adequately documented and maintained. The NRC is seeking stakeholders’ views on the following specific regulatory objectives: 1. What is the preferred regulatory approach to addressing NTTF Recommendation 8? For example: a. Should the NRC develop a new rule, or could the requirements that would provide for a more strengthened and integrated response capability be accomplished by a method other than a rulemaking? Provide a discussion that supports your position. b. If a new rule is developed, what type of supporting document would be most effective for providing guidance on the new requirements? Provide a discussion that supports your position. 2. The NTTF recommendation for emergency response procedures stressed that the EOP guidelines should be revised to establish effective transitions between EOPs, SAMGs, and EDMGs in [[Page 23164]] an effort to promote a more integrated approach to onsite emergency response. The NRC is interested in stakeholder opinions on the best course of action for revising and maintaining these procedures to accomplish this objective. For example: a. Should the SAMGs be standardized throughout the industry? If so, describe how the procedures should be developed, and discuss what level of regulatory review would be appropriate. Should there be two sets of standard SAMGs, one applicable to pressurized water reactors (PWRs) and one applicable to boiling water reactors (BWRs), or should SAMGs be developed for the various plant designs in a manner similar to EOPs? Provide a discussion that supports your position. b. What is the best approach to ensure that procedural guidance for beyond design basis events is based on sound science, coherent, and integrated? What is the most effective strategy for linking the EOPs with the SAMGs and EDMGs? Should the transition from EOPs to SAMGs be based on key safety functions, or should the SAMGs be developed in a manner that addresses a series of events that are beyond a plant’s design basis? Provide a discussion that supports your position. c. The NTTF Recommendation 8 strongly advised that the plant owners’ groups should undertake revision of the accident mitigating procedures to avoid having each licensee develop its own approach. Is this the best course of action? What additional scenarios or accident plans should be considered for addition to SAMG technical guidelines as a result of the lessons learned in Japan? Provide a discussion that supports your position. d. In the SRM for SECY-11-0137, the Commission directed the NRC staff to consider the November 2011 INPO report, INPO-11-005, in the development of the technical bases for Recommendation 8. How should this document be used by industry in developing SAMGs and the NRC in developing any proposed regulatory changes? Provide a discussion that supports your position. e. Should there be a requirement for the SAMGs and EDMGs to be maintained as controlled procedures in accordance with licensee quality assurance programs? Provide a discussion that supports your position. f. Should the SAMGs and EDMGs be added to the “Administrative Controls” section of licensee technical specifications? Provide a discussion that supports your position. g. In a letter dated October 13, 2011 (ML11284A136), the Advisory Committee on Reactor Safeguards (ACRS) recommended that Recommendation 8 be expanded to include fire response procedures. In their letter, ACRS stated that some plant-specific fire response procedures can direct operators to perform actions that may be inconsistent with the EOPs, and that experience has shown that parallel execution of fire response procedures, abnormal operating procedures, and EOPs can be difficult and complex. Should efforts to integrate the EOPs, SAMGs, and EDMGs include fire response procedures? Are there other procedures that should be included in the scope of this work? Provide a discussion that supports your position. h. What level of effort, in terms of time and financial commitment, will be required by the industry to upgrade the accident mitigating procedures? If possible, please include estimated milestones and PWR/ BWR cost estimates. 3. The NTTF established the identification of clear command and control strategies as an essential aspect of Recommendation 8. What methodology would be best for ensuring that command and control for beyond design basis events is well defined? For example: a. Should separate procedures be developed that clearly establish the command and control structures for large-scale events? Should defined roles and responsibilities be included in technical specifications along with associated training and qualification requirements? Provide a discussion that supports your position. b. Should the command and control approach be standardized throughout the industry or left for individual licensees to define? Provide a discussion that supports your position. c. What level of effort, in terms of time and financial commitment, will be required by the industry to develop these command and control strategies? If possible, please include estimated milestones and PWR/ BWR cost estimates. 4. As the guidelines for accident mitigating procedures are revised and the command and control strategies are developed, personnel who will be implementing these procedures must be adequately trained, qualified, and evaluated. What would be the best approach for ensuring that the personnel relied upon to implement the revised procedures are proficient in the use of the procedures, maintain adequate knowledge of the systems referenced in these procedures, and can effectively make decisions, establish priorities, and direct actions in an emergency situation? For example: a. Should a systems approach to training be developed to identify key tasks that would be performed by the various roles identified in the new strategies? Provide a discussion that supports your position. b. Should the current emergency drill and exercise requirements be revised to ensure that the strategies developed as a result of this ANPR will be evaluated in greater depth? Provide a discussion that supports your position. c. Should the revised accident mitigating procedures, specifically SAMGs and EDMGs, be added to the knowledge and abilities catalogs for initial reactor operator licenses? Provide a discussion that supports your position. d. What level of plant expertise should be demonstrated by the personnel assigned to key positions outlined by the accident mitigation guidelines and command and control strategy? Should these personnel be required to be licensed or certified on the plant design? Provide a discussion that supports your position. e. What training requirements should be developed to ensure emergency directors and other key decision-makers have the command and control skills needed to effectively implement an accident mitigation strategy? Provide a discussion that supports your position. f. What should the qualification process entail for key personnel identified in the new strategies? How would this qualification process ensure proficiency? Provide a discussion that supports your position. g. What level of effort, in terms of time and financial commitment, will be required by the industry to develop and implement these training, qualification, and evaluation requirements? If possible, please include estimated milestones and PWR/BWR cost estimates. C. Applicability to NRC Licenses and Approvals The NRC would apply the new onsite emergency response capability requirements to power reactors, both currently operating and new reactors, and would like stakeholder feedback. Accordingly, the NRC envisions that the requirements would apply to the following: Nuclear power plants currently licensed under 10 CFR part 50; Nuclear power plants currently being constructed under construction permits issued under 10 CFR part 50, or whose construction permits may be reinstated; [[Page 23165]] Future nuclear power plants whose construction permits and operating licenses are issued under 10 CFR part 50; and Current and future nuclear power plants licensed under 10 CFR part 52. D. Relationship Between Recommendation 8 and Other Near-Term Task Force Recommendations The NRC notes that there is a close relationship between the onsite emergency response capability requirements under consideration in this ANPR effort and several other near-term actions stemming from the NTTF report (and identified in SECY-11-0124 and SECY-11-0137). Regulatory actions taken in response to these other activities might impact efforts to amend onsite accident mitigating procedures and training. In this regard: 1. What is the best regulatory structure for integrating the onsite emergency response capability requirements with other post-Fukushima regulatory actions, such that there is a full, coherent integration of the requirements? 2. Recommendations 4.1 and 4.2 address SBO regulatory actions and mitigation strategies for beyond design basis external events, respectively. The implementation strategies developed in response to Recommendations 4.1 and 4.2 will require corresponding procedures. The NRC recognizes the need for coordinating efforts under Recommendations 4.1, 4.2, and 8. What is the best way to integrate these three regulatory efforts to ensure that they account for the others’ requirements, yet do not unduly overlap or inadvertently introduce redundancy, inconsistency, or incoherency? 3. Recommendation 9.3 addresses staffing during a multiunit event with an SBO. Should staffing levels change as a result of a revised onsite emergency response capability or should these duties be assigned to existing staff? 4. Recommendation 10.2 addresses command and control structure and qualifications for the licensee’s decision-makers for beyond design basis events. Should this recommendation be addressed concurrently with Recommendation 8? E. Interim Regulatory Actions The NRC recognizes that implementation of multiple post-Fukushima requirements could be a challenge for licensees and requests feedback on how best to implement multiple requirements, specifically onsite emergency response capability requirements, without adversely impacting licensees’ effectiveness and efficiency. It will take several years to issue a final rule. Should the NRC use other regulatory vehicles (such as commitment letters or confirmatory action letters) to put in place interim coping strategies for onsite emergency response capabilities while rulemaking proceeds? V. Public Meeting The NRC plans to hold a category 3 public meeting with stakeholders during the ANPR public comment period. The public meeting is intended as a forum to discuss the ANPR with external stakeholders and provide information on the feedback requested in the ANPR to support development of onsite emergency response capability requirements. The meeting is not intended to solicit comment. Instead, the NRC will encourage stakeholders at the meeting to provide feedback in written form during the ANPR comment period. To support full participation of stakeholders, the NRC staff plans to provide teleconferencing and Webinar access for the public meeting. Since the intent of the meeting is not to solicit or accept comments, the meeting will not be transcribed. The NRC will issue the public meeting notice 10 calendar days before the public meeting. Stakeholders should monitor the NRC’s public meeting Web site for information about the public meeting: http://www.nrc.gov/public involve/public-meetings/index.cfm. VI. Rulemaking Process and Schedule Stakeholders should recognize that the NRC is not obligated to provide detailed comment responses to feedback provided in response to this ANPR. If the NRC develops a regulatory basis sufficient to support a proposed rule, there will be an opportunity for additional public comment when the regulatory basis and the proposed rule are published. If supporting guidance is developed for the proposed rule, stakeholders will have an opportunity to provide feedback on the implementing guidance. VII. Related Petition for Rulemaking Action The NTTF report provided a specific proposal for onsite emergency actions that was subsequently endorsed by the National Resources Defense Council (NRDC) in a petition for rulemaking (PRM), PRM-50-102 (76 FR 58165; September 20, 2011), as a way to address licensee training and exercises. In connection with NTTF Recommendation 8.4, “Onsite emergency actions,” the NRDC requested in its petition that the NRC “institute a rulemaking proceeding applicable to nuclear facilities licensed under 10 CFR 50, 52, and other applicable regulations to require more realistic, hands-on training and exercises on Severe Accident Mitigation [sic] Guidelines (SAMGs) and Extreme Damage Mitigation Guidelines (EDMGs) for licensee staff expected to implement the strategies and those licensee staff expected to make decisions during emergencies, including emergency coordinators and emergency directors.” The Commission has established a process for addressing a number of the recommendations in the NTTF Report, and the NRC determined that the issues raised in PRM-50-102 are appropriate for consideration and will be considered in this Recommendation 8 rulemaking. Persons interested in the NRC’s actions on PRM-50-102 may follow the NRC’s activities at www.regulations.gov by searching on Docket ID NRC-2012-0031. VIII. Available Supporting Documents The following documents provide additional background and supporting information regarding this activity and corresponding technical basis. The documents can be found in ADAMS. Instructions for accessing ADAMS are in the ADDRESSES section of this document. ———————————————————————— ADAMS Accession Number/Federal Date Document Register Citation ———————————————————————— April 4, 1990…………….. Generic Letter 88-20, ML031200551 Supplement 2, “Accident Management Strategies for Consideration in the Individual Plant Examination Process”. August 28, 2007…………… Appendix A to 10 CFR 72 FR 49505 part 50–General Design Criteria for Nuclear Power Plants. August 28, 2007…………… Final Rule: Licenses, 72 FR 49352 Certifications, and Approvals for Nuclear Power Plants. March 27, 2009……………. Final Rule: Power 74 FR 13926 Reactor Security Requirements. [[Page 23166]] March 23, 2011……………. Memorandum from ML110950110 Chairman Jaczko on Tasking Memorandum- COMGBJ-11-0002–NRC Actions Following the Events in Japan. April 29, 2011……………. Temporary Instruction ML11115A053 2515/184, Availability and Readiness Inspection of Severe Accident Management Guidelines (SAMGs). May 26, 2011……………… Completion of ML111470264 Temporary Instruction 2515/184, Availability and Readiness Inspection of Severe Accident Mitigation Guidelines (SAMGs), at Region IV Reactor Facilities. May 27, 2011……………… Region I Completion of ML111470361 Temporary Instruction (TI)-184, Availability and Readiness Inspection of Severe Accident Mitigation Guidelines (SAMGs). June 1, 2011……………… Completion of ML111520396 Temporary Instruction (TI) 2515/184, Availability and Readiness Inspection of Severe Accident Management Guidelines (SAMGs) at Region III Sites–Revision. June 2, 2011……………… Completion of ML111530328 Temporary Instruction (TI) 184, Availability and Readiness Inspection of Severe Accident Mitigation Guidelines (SAMGS) at Region II Facilities–Revision. July 12, 2011…………….. SECY-11-0093–“The ML11186A959 Near-Term Task Force ML111861807 Review of Insights (Enclosure) from the Fukushima Dai-ichi Accident”. August 19, 2011…………… SRM-SECY-11-0093–Near- ML112310021 Term Report and Recommendations for Agency Actions Following the Events in Japan. September 9, 2011…………. SECY-11-0124, ML11245A127 “Recommended Actions ML11245A144 to be Taken Without (Enclosure) Delay from the Near- Term Task Force Report.”. October 3, 2011…………… SECY-11-0137, ML11269A204 “Prioritization of ML11272A203 Recommended Actions (Enclosure) to be Taken in Response to Fukushima Lessons Learned.”. October 18, 2011………….. Staff Requirements ML112911571 Memorandum–SECY-11-0 124–Recommended Actions to be Taken Without Delay From The Near-Term Task Force Report. July 26, 2011…………….. NRDC’s Petition for ML11216A242 Rulemaking to Require More Realistic Training on Severe Accident Mitigation Guidelines (PRM 50- 102). September 14, 2011………… Letter to Geoffrey H. ML112700269 Fettus, Natural Resources Defense Council, Inc. from Annette Vietti-Cook, In Regards to the NRC Will Not Be Instituting a Public Comment Period for PRM-50-97, PRM-50-98, PRM-50-99, PRM-50- 100, PRM-50-101, and PRM-50-102. October 13, 2011………….. Initial ACRS Review ML11284A136 of: (1) The NRC Near- Term Task Force Report on Fukushima and (2) Staff’s Recommended Actions to be Taken Without Delay. November 30, 2011…………. INPO-11-005, Special ML11347A454 Report on the Nuclear Accident at the Fukushima Dai-ichi Nuclear Power Station. December 15, 2011…………. Staff Requirements ML113490055 Memorandum–SECY-11-0 137–Prioritization of Recommended Actions to be Taken in Response to the Fukushima Lessons- Learned. March 14, 2012……………. Summary of the Public ML12073A283 Meeting to Discuss Implementation of Near-Term Task Force Recommendation 8, Strengthening and Integration of Onsite Emergency Response Capabilities Such As EOPS, SAMGS, and EDMGS, Related to the Fukushima Dai-ichi Power Plant Accident. ———————————————————————— Dated at Rockville, Maryland, this 4th day of April 2012. For the Nuclear Regulatory Commission. Michael F. Weber, Acting Executive Director for Operations. [FR Doc. 2012-9336 Filed 4-17-12; 8:45 am] BILLING CODE 7590-01-P

Don’t Look In the Basement – Full Feature

One of the first of several horror films with “Don’t” leading the title, this gory low-budget thriller takes place in an experimental hospital for the criminally insane, where the pioneering director allows several patients to act out their twisted fantasies (which involve necrophilia, paranoia and popsicles). When a new staffer shows up, things start to go haywire — beginning with the bloody axe-murder of the doctor himself and leading to a total takeover of the asylum by its most dangerous inmates. The acting is horrendous, the sound is incoherent and the color is so cheap-looking that some theaters were issued black-and-white prints… but somehow the intrinsic sleaziness generated by the threadbare production manages to lend it a remarkably suitable ambience. Instead of vanishing into obscurity, this quirky little potboiler became a staple on the early-70’s drive-in circuit, thanks to Hallmark Films’ frequent double-bill bookings with Wes Craven’s Last House on the Left (even borrowing the logline “Keep telling yourself: It’s only a movie…”) and Mario Bava’s Bay of Blood. Some video versions are missing most of the graphic violence from the original cut.

Secret – U.C. Davis Pepper Spray Incident Reynoso Task Force Report

Our overriding conclusion can be stated briefly and explicitly. The pepper spraying incident that took place on November 18, 2011 should and could have been prevented.

On November 18, 2011, University of California, Davis, police officers used pepper spray on students sitting in a line in the midst of a protest and “occupation” on the campus quad. Viral images of the incident triggered immediate and widespread condemnation of the police action.

To assist the Task Force with fact finding and the identification of best practices in policing, the University engaged Kroll, Inc., an internationally known risk management firm. Kroll completed the final draft of its report on Feb. 22, 2012 (the “Kroll Report”). The Kroll Report describes at length the events leading up to this incident. In brief, at approximately 3:00 p.m. on Thursday, November 17, 2011, tents were erected on the Quad at the Davis campus. The Administration decided to remove the tents, instructing police to do so at 3:00 p.m. on Friday, November 18, 2011. While attempting to remove tents, the police arrested several individuals. Subsequently, in the midst of a growing group of people, the police officers employed pepper spray to remove several students linking arms in a line across a walkway in the Quad.

The UC Davis protest focused on and drew strength from widespread discontent among students about the increase in tuition and fees at the University of California. The incident also took place against the backdrop of worldwide student protests, including demonstrations by the Occupy Wall Street movement, which triggered similar events across the nation. These protests presented challenges for all affected universities and municipalities in attempting to balance the goals of respecting freedom of speech, maintaining the safety of both protesters and non-protesters, and protecting the legitimate interests of government and the non-protesting public.

In the immediate aftermath of the UC Davis incident, University of California President Mark G. Yudof announced the appointment of former California Supreme Court Justice Cruz Reynoso to chair a Task Force to address the pepper spraying of UC Davis students. This was a result of a request from Chancellor Katehi for an independent investigation to review the incident and report findings and recommendations to enable peaceful and nonviolent protests. All Task Force members are either currently or were once affiliated with UC Davis and most were nominated by relevant campus organizations.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

UCD-ReynosoReport

Russian Television – Leaked CIA Memo: Bush knew US torture was ‘war crime’

 

Water boarding and stress positions… just two of the torture techniques used by the U.S. against terror suspects. Now, a secret memo has been leaked which brands them “war crimes”, and shows the Bush administration was warned against their use. As RT’s Marina Portnaya explains, many feel President Obama isn’t doing enough to make up for America’s past mistakes.

RT on Twitter http://twitter.com/RT_com
RT on Facebook http://www.facebook.com/RTnews

Confidential – DoD SERE Pre-Academic Laboratory (PREAL) Enhanced Interrogation Techniques Manual

The following manual was recently released by the Department of Defense.  The manual was produced by the DoD’s Joint Personnel Recovery Agency (JPRA) and used by instructors in the JPRA’s Survival Evasion Resistance Escape (SERE) courses to train participants for the potential experience of detention.  According to Jason Leopold and Jeffrey Kaye of Truthout, the manual was reportedly consulted during high-level discussions in the Bush administration regarding potential “enhanced interrogation techniques.”  Several techniques described in the manual are mentioned in a series of controversial memos commonly referred  to as the “Torture memos” authored by Justice Department Office of Legal Counsel attorney John Yoo.

https://publicintelligence.net/wp-content/uploads/2012/04/DoD-PREAL-1.png

 

 

Eegah! – Full Cult Movie

While driving through the desert, a teenage girl is frightened by a seven-foot giant which appears in her path. After escaping, she returns to the site with her boyfriend and her father in an attempt to find the giant. They do, and it proceeds to terrorize them and the rest of Palm Springs, California.

TOP-SECRET from the FBI – Two Former Executives Plead Guilty to Foreign Bribery Offenses

WASHINGTON—Stuart Carson, the former president of Rancho Santa Margarita, California-based valve company Control Components Inc. (CCI), and Hong “Rose” Carson, the former CCI director of sales for China and Taiwan, have pleaded guilty to violating the Foreign Corrupt Practices Act (FCPA), announced the Justice Department’s Criminal Division and the U.S. Attorney’s Office for the Central District of California.

The Carsons, who are married and reside in San Clemente, California, each pleaded guilty late yesterday before U.S. District Judge James V. Selna in Santa Ana, California to separate one-count superseding informations charging them with making a corrupt payment to a foreign government official in violation of the FCPA. According to court documents, CCI designed and manufactured service control valves for use in the nuclear, oil and gas, and power generation industries worldwide. At sentencing, Stuart Carson, 73, faces up to 10 months in prison. Rose Carson, 48, faces a sentence of three years’ probation, which may include up to six months of home confinement. Sentencing is scheduled for October 15, 2012.

On April 8, 2009, the Carsons and four other former executives of CCI were charged in a 16-count indictment for their roles in the foreign bribery scheme. The four former CCI executives charged include Paul Cosgrove, CCI’s former director of worldwide sales; David Edmonds, CCI’s former vice president of worldwide customer service; Flavio Ricotti, the former CCI vice president of sales for Europe, Africa, and the Middle East; and Han Yong Kim, the former president of CCI’s Korean office. On April 28, 2011, Ricotti pleaded guilty to one count of conspiracy to violate the FCPA. The trial of Cosgrove and Edmonds is scheduled for June 5, 2012. The charges against Kim are pending as well. An indictment merely contains allegations and defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

In related cases, two defendants previously pleaded guilty to conspiring to bribe officers and employees of foreign state-owned companies on behalf of CCI. On January 8, 2009, Mario Covino, the former director of worldwide factory sales for CCI, pleaded guilty to one count of conspiracy to violate the FCPA. On February 3, 2009, Richard Morlok, the former CCI finance director, also pleaded guilty to one count of conspiracy to violate the FCPA. Covino, Morlok, and Ricotti are scheduled to be sentenced in November and December 2012.

On July 31, 2009, CCI pleaded guilty to a three-count criminal information charging the company with conspiracy to violate the FCPA and the Travel Act and with two substantive violations of the FCPA. CCI was ordered to pay an $18.2 million criminal fine, placed on organizational probation for three years, and ordered to create and implement a compliance program and retain an independent compliance monitor for three years. CCI admitted that from 2003 through 2007, it made corrupt payments in more than 30 countries, which resulted in net profits to the company of approximately $46.5 million from sales related to those corrupt payments.

The case is being prosecuted by Deputy Chief Charles G. La Bella and Trial Attorney Andrew Gentin of the Criminal Division’s Fraud Section and Assistant U.S. Attorneys Douglas McCormick and Gregory Staples of the U.S. Attorney’s Office for the Central District of California. The case was investigated by the FBI’s Washington Field Office and its team of special agents dedicated to the investigation of foreign bribery cases.

Agency – Full Feature Film

 

 

Agency tackles the question of the efficiency of media manipulation. An unscrupulous advertising agency, in league with equally untrustworthy political campaign manager Robert Mitchum, plants subliminal messages in its TV commercials. Just as Vance Packard warned in the 1950s expose The Hidden Persuaders, these hidden messages persuade the viewers to vote for Mitchum’s candidate. Given the potency of the the film’s premise, it’s disappointing to watch director George Gaczender handle the material (based on a novel by Paul Gottleib) is so cut-and-dried a fashion. But Mitchum is good, as are his costars Valerie Perrine, Lee Majors, Saul Rubinek and Alexandra Stewart.

Cryptome unveils – Secret Service DoD Sexual Entrapment by CU/VZ

Odd that Cuba and/or Venezuela have not openly been accused of orchestrating the Secret Service/DOD Cartagena sexual honey pot — an entrapment long employed by spy services against the US and its allies, as well as by the US and its allies. Neither CU nor VZ took part in the Cartagena conference where the US failed to get approval for continued Cuba sanctions considered by Latin Americans to be US-Monroe Doctrine abusive.

Senator Collins has raised the possibility of a trap but will likely be briefed into silence. Neither Democrats or Republicans want to open this top secret Pandora’s Box (excuse the pun).

The Open Government Partnership conference in Brasilia which followed Cartagena also camouflaged with triple-crossing “openness” the legacy of Monroe Doctrine covert operations in Latin America to enforce hemispheric hegemony with stealth and bribery.

The chances are high that the sexual entrapment was a CU/VZ counterspy operation against the nest of spies operating in Cartagena, and that White House and Congressional investigations will perfectly cloak the dust-up as it has since President Monroe ordered the standard deception in 1823.

TOP-SECRET – Central Intelligence Agency Component and Activity

Citation: [Central Intelligence Agency Component and Activity]
Secret, Table of Contents, May 09, 1973, 1 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00039
Origin: United States. Central Intelligence Agency
Individuals/
Organizations Named:
International Police Academy; United States. Central Intelligence Agency. Directorate of Operations. Central Cover Staff; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff. Police Group; United States. Central Intelligence Agency. Directorate of Operations. Domestic Operations Division; United States. Central Intelligence Agency. Directorate of Operations. East Asia Division; United States. Central Intelligence Agency. Directorate of Operations. European Division; United States. Central Intelligence Agency. Directorate of Operations. Foreign Intelligence Staff; United States. Central Intelligence Agency. Directorate of Operations. Foreign Resources Division; United States. Central Intelligence Agency. Directorate of Operations. Narcotics Coordination Group; United States. Central Intelligence Agency. Directorate of Operations. Soviet Bloc Division; United States. Federal Bureau of Investigation; United States. Securities and Exchange Commission; Vesco, Robert L.
Subjects: Covert operations | Domestic intelligence | Interagency cooperation | Personnel management | Police assistance | Political activists | Project MHCHAOS [Codename CHAOS] | Recruitment | Wiretapping
Abstract: Lists topics of papers from Central Intelligence Agency divisions on domestic espionage activities and programs.
Full Text: Document – PDF – this link will open in a new window (20 KB)

Durable URL for this record

Junction – Full Movie

Michaela, a lost and lonely young woman, gets a mysterious message from the father she never knew, sending her on a journey to discover twisted family secrets. As she uncovers each piece of the puzzle, she descends even deeper into their warped world of pilgrims and pyromania. Dragged out to the desert, and pushed to the very edge, Michaela is forced to make a choice: preserve the delicate web that history has woven for her family, or strike out on her own and destroy the cycle of evil in her blood. That is, if she can survive the fire.

 

Secret – FBI International Expansion and Influence of US-Based Gangs

https://publicintelligence.net/wp-content/uploads/2012/04/FBI-InternationalGangs.png

 

The purpose of this assessment is to explore the expansion and influence of US-based gangs abroad and their illicit operations and associations with foreign criminal organizations. For the purpose of this assessment, the term “gang” encompasses both street gangs and outlaw motorcycle gangs. In addition to FBI and open source reporting, the following law enforcement agencies from the United States, Canada, Central America, the Netherlands, and United Kingdom were surveyed to obtain data for the assessment.

(U) Key Judgments

  • (U//LES) Several US-based gangs have expanded internationally, although their expansion appears to be limited and unsystematic. Major US-based gangs are operating in Australia, Asia, Canada, the Caribbean, Central America, Europe, Mexico, South America, and New Zealand. Most gang members abroad are not counterparts of US-based sets or cliques, but are homegrown or “wanna-be” gang members influenced by media and popular culture. Outlaw Motorcycle Gangs (OMGs), Hispanic gangs, and street gangs on or near US military bases abroad tend to be affiliated with or an extension of a US-based gang.
  • (U//LES) Many US-based gangs maintain some ties to foreign criminal organizations. Most criminal gangs involved in drug trafficking and distribution have alliances with Mexican, Colombian, or Nigerian drug cartels, or to organized crime or domestic terrorist groups. Such alliances could ultimately facilitate the gang’s expansion abroad and collaboration with foreign criminal organizations.
  • (U//LES) The international expansion of US-based gangs appears to be facilitated by several factors, including criminal opportunities available in a specific region; the presence of family members or friends; gang suppression laws in a specific region; and ties to foreign criminal organizations such as drug trafficking organizations (DTOs), organized crime groups, or terrorist groups. Gangs that are sophisticated and organized are more likely to have factions abroad. US-based gangs will continue to expand their operations abroad as long as conditions facilitating such expansion and a market for illicit goods are present.
  • (U) OMGs have strong international links and are present in 45 countries, including Canada, Australia, New Zealand, Russia, South America, Asia, and most European Union nations. Their expansion abroad is primarily driven by the illicit drug market and the search for international suppliers. Major OMGs are expanding faster overseas than they are in the United States, and expansion efforts are likely to continue.
  • (U//LES) Mara Salvatrucha (MS-13) operates in Mexico, Central America, and Canada. MS-13 members are allegedly involved in alien smuggling outside of the United States and are providing alien smuggling organizations with enforcement services for a fee. Although there is no evidence suggesting a link between MS-13 and any terrorist organizations, the gang’s propensity for alien smuggling and profit motivations may make them amenable to smuggling terrorists into the United States.
  • (U//LES) According to open source and Drug Enforcement Administration (DEA) reporting, several criminal gangs, including the Black Disciples, Black Peace Stones, Crips, Latin Kings, MS-13, Netas, and the Texas Syndicate have members who have been affiliated with foreign extremist groups and terrorist organizations. Furthermore, some of these gangs subscribe to radical Islam, making them more susceptible to recruitment by terrorist organizations and more likely to travel abroad to engage in criminal activity. The potential for terrorist recruitment of street gangs greatly increases in correctional institutions, where several associations between American gangs and international terrorists have been documented.
  • (U//LES) US law enforcement officials have suggested that US-based gangs migrate abroad and collaborate with questionable international interest groups for a profit-related purpose. Consequently, it is likely that several US-based gangs will augment their relationships with foreign criminal organizations and DTOs to obtain access to the illicit global market, should it serve their financial objectives.

Incomparable Pulitzer-Winning Middle East Correspondent Dies in Syria

democracynow.org – The Pulitzer Prize-winning New York Times foreign correspondent Anthony Shadid has died at the age of 43. Shadid died of an apparent asthma attack on Thursday while covering the conflict in Syria. An American of Lebanese descent who spoke fluent Arabic, Shadid captured dimensions of life in the Middle East that many others failed to see. His exceptional coverage won him a Pulitzer Prize in 2004 and 2010 for international reporting while covering the U.S. occupation of Iraq. Shadid has been a guest on Democracy Now! several times over the past decade reporting on Libya, Tunisia, Iraq and Lebanon. We air excerpts from our last interview with Shadid in April 2011, just after he returned home following his six-day capture in Libya by Col. Muammar Qaddafi’s forces.

To watch the complete daily, independent news hour, read the transcript, download the podcast, and for additional Democracy Now! reports, visit http://www.democracynow.org/

Public Intelligence – Lost-Links and Mid-Air Collisions: The Problems With Domestic Drones

https://publicintelligence.net/wp-content/uploads/2012/04/flight-route-airspace-chaos.png

A map of current military remotely piloted aircraft (RPA) operations as of 2011 is presented with an overlay of flight paths through the national airspace in a U.S. Air Force Chief Scientist presentation.

Public Intelligence

Most of the public discussion surrounding the use of drones both internationally and domestically has focused on issues of privacy or civilian casualties. Due to the technical complexity of drone operations, there has been little media examination of the practical feasibility of widespread domestic drone deployment. In February, the FAA Reauthorization Act of 2012 was signed into law clearing the way for more than 30,000 domestic drones by 2020. The law requires the FAA to create procedures for commercially-operated drones by 2015 and enables law enforcement agencies to operate small-scale drones at low altitudes. While this has a number of negative implications for the right to privacy, such as the lack of any laws governing the usage of data collected via drones, the thought of a future where U.S. skies are filled with an array of drones has a much larger, more practical problem: is it even logistically possible to operate thousands of pilot-less aircraft in the domestic airspace?

Lost-Links

The first set of problems that will likely plague any attempt at the widespread use of drones inside the U.S. relate to frequency allocation and electromagnetic interference (EMI). In order to be controlled from a remote location, drones must communicate via with a ground control station via some sort of data link. In order for this link to be maintained, there must be protection against electromagnetic interference that can disrupt the communications link. If the interference is sufficient in scale, it can lead to what is called a lost link event causing the drone to lose contact with its operator. Sometimes the link is reestablished and the pilot is able to maintain control of the drone. Sometimes the link cannot be reestablished and the drone is effectively turned into a zombie that can drift far from its intended target, as may have occurred recently with the RQ-170 captured by Iran in December 2011.

A U.S. Air Force Scientific Advisory Board report from April 2011 obtained by Public Intelligence warns of the potential vulnerabilities of communications links used for remotely piloted aircraft (RPAs): “Limited communications systems result in communications latency, link vulnerabilities, and lost-link events, which limits mission roles assigned to RPAs, operational flexibility, and resiliency in the face of unanticipated events.” The report notes that there are a “wide range of methods that a determined adversary can use for attacking RPA guidance and navigation systems” such as constructing “simple GPS noise jammers” that “can be easily constructed and employed by an unsophisticated adversary.”

https://publicintelligence.net/wp-content/uploads/2012/04/datalink-rf.png

A diagram of the data link between a drone and its ground data terminal (GDT). The data transmitted through the GDT is sent to a ground control station (GCS) where the drone pilot operates the unmanned aircraft.

Finding unallocated frequencies that can be used for drone aircraft can also be a difficult task. For example, when the Department of Defense’s Joint Spectrum Center analyzed the deployment of Predator B drones in 2004 along a section of the Mexico-Arizona border, they conducted extensive analysis of the potential for electromagnetic interference and other frequency disruptions. The report examines potential conflicts between Mexican fixed microwave links, National Science Foundation radio astronomy observatories and various other potential sources of interference. When several Predator drones were needed for tests at Creech Air Force Base in Nevada, the Joint Spectrum Center had to study the potential for interaction with residential indoor and industrial outdoor radio local area networks, outdoor video surveillance networks and other potential signals arising from a nearby residential community.

The issue of communications interference and lost-link events is “a major concern and failure of [common data link or CDL] communications due to EMI has resulted in numerous UAS accidents” according to a 2010 U.S. Army Command and General Staff College report. “The omnidirectional antennas the aircraft uses to establish the CDL leaves the system open to interference. Environmental EMI from communications systems produce sufficient energy to disrupt CDLs and are responsible for 15 percent of Army UAS accidents.”

To make matters worse, the data links used to communicate with many types of drones are completely unencrypted. In 2010, the Air Force produced a report on lessons learned from the use of small unmanned aircraft systems (SUAS) that argues the current communications systems used by smaller drones are vulnerable and unsustainable: “Many of the current SUAS use datalink equipment that is not interoperable with other datalinks or tunable to other frequencies. In fact, the number of available proprietary SUAS frequencies is so limited US military SUAS operations are threatened by interference from other operations. Additionally, SUAS datalinks are unencrypted and are thus susceptible to enemy exploitation. Since datalinks are also unprotected, GCS are jammable and locations can even be triangulated and possibly physically attacked.”

Mid-Air Collisions

The second set of problems facing domestic drones center around their ability to avoid collisions both in the air and with objects on the ground.  Current military drone operations in places like Afghanistan, Pakistan, Somalia and Yemen occur in an airspace environment that is relatively unoccupied.  There is not a tremendous amount of air traffic in Somalia, for example, or Yemen and the terrain is largely devoid of high-rise buildings and other grounded objects that could create impediments to small-scale drone operations.  Yet, even in these environments, avoiding collisions and deconflicting airspace is a major concern for drone operators.

A U.S. Army handbook designed to inform soldiers about airspace control details the complex procedures necessary for the safe and effective use of small unmanned aerial vehicles (SUAVs) in combat missions.  First a mission plan must be organized and approved before being submitted to an airspace control authority who analyzes the plan against other proposed mission plans for deconfliction.  If there are conflicts between the proposed mission and other activities occurring in the area, then the mission is adjusted to maintain safe control over the airspace. The handbook repeatedly warns that “Failure to conduct airspace coordination prior to SUAV operations may contribute to a mid-air collision resulting in severe injury or death to personnel.”

https://publicintelligence.net/wp-content/uploads/2012/04/suav-mission-flow.png

A diagram of the small unmanned aerial vehicle (SUAV) mission planning process as presented in a U.S. Army manual.

In fact, mid-air collisions have occurred in the course of combat operations. In May 2011, a RQ-7B Shadow and a C-130 cargo plane collided over Afghanistan. Though no one was injured, the C-130 was forced to make an emergency landing. In response to the incident, a FAA spokesperson told AOL Defense that there are several studies indicating that “you could not use TCAS to reliably have other aircraft detect the unmanned aircraft.”

TCAS or the Traffic Collision Avoidance System is the standard technology used by commercial aircraft around the world to help avoid mid-air collisions. The system, based on transponders that operate in each aircraft independent of air traffic control, reportedly has difficulties incorporating drones due to their lack of a pilot and often unpredictable flight patterns. A U.S. Air Force study conducted by MIT states that TCAS was “designed under the assumption that a pilot was on-board the aircraft to interpret displays and perform visual acquisition. The TCAS traffic display is intended to aid visual acquisition by indicating the proper sector to search out the cockpit, but does not by itself provide sufficient bearing or altitude rate accuracy to support avoidance maneuvers. The role of a TCAS traffic display in a UAV ground control station is therefore under debate.”

The FAA’s own website makes it clear that due to drones’ “inability to comply with ‘sense and avoid’ rules, a ground observer or an accompanying ‘chase’ aircraft must maintain visual contact with the UAS and serve as its ‘eyes’ when operating outside of airspace that is restricted from other users.” A 2011 presentation from the U.S. Air Force Chief Scientist acknowledges this need for increased integration of domestic drone operations into the national airspace, as well as improvement in collision avoidance systems capable of surviving “lost-link” events where the drone loses contact with its ground control station.

The potential for mid-air collisions has already caused problems for domestic drone operations in Hawaii, where the state purchased a $70,000 drone to monitor Honolulu Harbor without the knowledge that FAA approval would be required to operate the device.  When the FAA analyzed the case, they found that traffic from Honolulu International Airport and a nearby Air Force base made operating the drone too dangerous and denied the state’s request.  Situations like this will likely arise with greater frequency as the push toward domestic drone operations is continued in the U.S. and other Western countries.

PJ Media – Reporters Expose Leftists in the Department of Justice

PJ Media’s J. Christian Adams and Hans Von Spakovsky talk to Bill Whittle about the shady hiring practices at the Department of Justice, revelations that earned PJ Media a Pulitzer Prize nomination. From the failure to comply with the Freedom of Information requests, to the hiring of radical lawyers, Bill Whittle brings you the shocking truth about Obama’s Department of Justice. You don’t want to miss this interview.

For all of PJ Media’s Reports on the Depratment of Justice click here:
http://pjmedia.com/every-single-one-pj-medias-investigation-of-justice-depart..

TV – Pulitzer Prize Profile: The Philadelphia Inquirer’s Public Service Award

Announced Monday by Columbia University, The Philadelphia Inquirer won the Pulitzer Prize for public service for its “Assault on Learning” series that chronicled pervasive under-reported violence in the city’s public schools. Jeffrey Brown and The Inquirer’s Kristen Graham discuss the award and the series’ impact on the city.

Aufklärungswürdig: Die einstige SED kann € 560 Millionen in Immobilien investieren

Liebe Leser,

wie kann die ehemalige SED € 560 Millionen in Immobilien investieren ?

Ist die ehemalige SED, nunmehr “Die Linke” eine Milliardärspartei, wo sie doch die Interessen der “Werktätigen” vertritt ?

Und die gesamte deutsche Presse und erlauvben Sie mir dies pointiert zudeklarieren “die sogenante Immobilien-“FACHPRESSE”

schluckt diese Ankündigug des mutmasslichen STASI IM Gregor Gysi ohne mit der Wimper zu zucken ?

Mutmasslich Stümper oder korrumpierte Chargen…

Wo ist Deutschland im Jahre 2012 gelandet ?

In dem Parallel-Universum SED-STASI und hat es nicht gemerkt ?

Fragwürdig !

Herzlichst Ihr

Bernd Pulch, Magister Artium der Publizistik, Germanistik und Komparatistik

Uncensored – FEMEN Bewegung in Ukrain

http://www.dailymotion.com/video/xnj95w_femen-bewegung-in-ukraine_sexy?search_algo=1

FEMEN Bewegung in Ukraine: Die Organisation tritt für die Selbstbestimmung des Menschen,
insbesondere der Frauen ein.

Sie ist international für Oben-ohne Proteste gegen Wahlfälschungen, Sextourismus, Sexismus, Wladimir Putin, geplante staatliche Verhaltensvorschriften während der Fußball-Europameisterschaft 2012 u.a. bekannt geworden

Secret from the FBI – CIO of Hedge Fund Sentenced to One Year in Prison for Insider Trading Scheme

NEWARK, NJ—The chief investment officer and portfolio manager of the Clay Capital Fund, a hedge fund based in Summit, New Jersey, was sentenced today to 12 months in prison for participating in an insider trading scheme which netted more than $2.5 million in illicit profits, U.S. Attorney Paul J. Fishman announced.

James Turner, 45, of Traverse City, Michigan, previously pleaded guilty before U.S. District Judge Dennis M. Cavanaugh to an information charging him with securities fraud. Judge Cavanaugh imposed the sentence today in Newark federal court.

According to documents filed in this case and statements made in court:

Beginning in 2006, Turner received inside information from his brother-in-law, Scott Vollmar, and from Scott Robarge, Turner’s friend and former college classmate. Vollmar, who was formerly employed as a director of business development at Autodesk Inc., a software company based in California, passed inside information to Turner concerning Autodesk’s confidential negotiations to acquire Moldflow Corp. Turner admitted he used that inside information to purchase more than $7 million worth of Moldflow stock for the Clay Capital Fund and for himself and his family members. Following the public announcement of Autodesk’s acquisition of Moldflow, Turner sold the Moldflow shares he had bought, realizing illicit profits of more than $1.7 million. Turner admitted he received inside information from Vollmar in advance of the public release of Autodesk’s earnings reports and that he used this information to trade Autodesk stock, resulting in illicit profits of more than $500,000.

Scott Robarge, who was formerly employed as a recruiting technology manager at Salesforce.com Inc., a software company based in California, passed inside information to Turner concerning Saleforce’s quarterly sales results. Turner admitted he used this inside information to trade Salesforce stock, realizing illicit profits of more than $200,000.

In addition to the prison term, Judge Cavanaugh sentenced Turner to three years of supervised release and fined him $25,000.

Vollmar and Robarge have both previously pleaded guilty and are scheduled to be sentenced on May 14, 2012.

U.S. Attorney Fishman credited special agents of the FBI, under the direction of Special Agent in Charge Michael Ward in Newark; postal inspectors of the U.S. Postal Inspection Service, under the direction of Postal Inspector in Charge Philip R. Bartlett; and the U.S. Securities and Exchange Commission’s Chicago Regional Office, under the direction of Merri Jo Gillette, for the investigation leading to today’s plea. He also thanked the SEC Market Abuse Unit, under the direction of Daniel M. Hawke, for its important role in the investigation leading to today’s sentence.

The government is represented by Assistant U.S. Attorney Christopher J. Kelly of the U.S. Attorney’s Office Economic Crimes Unit in Newark.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency Financial Fraud Enforcement Task Force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes.

Cryptome unveils – Defense Support to Special Events like Cartagena

Defense Support to Special Events

 


[Federal Register Volume 77, Number 74 (Tuesday, April 17, 2012)]
[Rules and Regulations]
[Pages 22671-22676]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-9148]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

32 CFR Part 183

[DOD-2009-OS-0039; RIN 0790-AI55]


Defense Support to Special Events

AGENCY: Department of Defense.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This rule establishes procedures and assigns responsibilities 
for Special Events, sets forth procedural guidance for the execution of 
Special Events support when requested by civil authorities or 
qualifying entities and approved by the appropriate DoD authority, or 
as directed by the President, within the United States, including the 
District of Columbia, the Commonwealth of Puerto Rico, the U.S. Virgin 
Islands, Guam, American Samoa, the Commonwealth of the Northern Mariana 
Islands, and any other territory or possession of the United States or 
any political subdivision thereof and elsewhere if properly approved.

DATES: This rule is effective May 17, 2012.

FOR FURTHER INFORMATION CONTACT: Ms. Carol Corbin, 571-256-8319.

SUPPLEMENTARY INFORMATION: The Department of Defense published a 
proposed rule on November 26, 2010 (75 FR 72767-72771). One comment was 
received and addressed below:
    Comment: ``This comment pertains to Page 72770, Section A(iiii)G 
reference to DOD support to the ``National Boy Scout Jamboree''. 
Recommend that DOD not support this event. The Boy Scouts of America 
are an organization that discriminates based on sex, sexual 
orientation, and religion. DOD support is contrary to policies of state 
governments and the federal government. Material support is against the 
general principle of separation of church and state and the important 
elements of the constitution of the United States. DOD support 
essentially demonstrates an ``establishment of religion'' and is 
contrary to anti-discrimination policys [sic].''
    Response: The Department of Defense has valid statutory authority, 
10 U.S.C. 2554, for providing support to the Boy Scout jamboree.

Executive Order 12866, ``Regulatory Planning and Review'' and Executive 
Order 13563, ``Improving Regulation and Regulatory Review''

    It has been certified that 32 CFR Part 183 does not:
    (1) Have an annual effect on the economy of $100 million or more or 
adversely affect in a material way the economy, a section of the 
economy, productivity, competition, jobs, the environment, public 
health or safety, or State, local, or tribal governments or 
communities;
    (2) Create a serious inconsistency or otherwise interfere with an 
action taken or planned by another agency;
    (3) Materially alter the budgetary impact of entitlements, grants, 
user fees, or loan programs, or the rights and obligations of 
recipients thereof; or
    (4) Raise novel legal or policy issues arising out of legal 
mandates, the President's priorities, or the principles set forth in 
these Executive Orders.

Sec. 202, Pub. L. 104-4, ``Unfunded Mandates Reform Act''

    It has been certified that 32 CFR part 183 does not contain a 
Federal mandate that may result in the expenditure by State, local, and 
tribal governments, in aggregate, or by the private sector, of $100 
million or more in any one year.

Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601 et 
seq.)

    It has been certified that 32 CFR part 183 is not subject to the 
Regulatory Flexibility Act (5 U.S.C. 601 et seq.) because it would not, 
if promulgated, have a significant economic impact on a substantial 
number of small entities. This rule establishes procedures and assigns 
responsibilities within DoD for Special Events in support of civil and 
non-governmental entities; therefore, it is not expected that small 
entities will be affected because there will be no economically 
significant regulatory requirements placed upon them.

Public Law 96-511, ``Paperwork Reduction Act'' (44 U.S.C. Chapter 35)

    It has been certified that 32 CFR part 183 does not impose 
reporting or recordkeeping requirements under the Paperwork Reduction 
Act of 1995.

Executive Order 13132, ``Federalism''

    It has been certified that 32 CFR part 183 does not have federalism 
implications, as set forth in Executive Order 13132. This rule does not 
have substantial direct effects on:
    (1) The States;
    (2) The relationship between the national government and the 
States; or
    (3) The distribution of power and responsibilities among the 
various levels of government.

List of Subjects in 32 CFR Part 183

    Armed forces, Special events.

    Accordingly, 32 CFR part 183 is added to subchapter I to read as 
follows:

PART 183--DEFENSE SUPPORT OF SPECIAL EVENTS

Sec.
183.1 Purpose.
183.2 Applicability and scope.
183.3 Definitions.
183.4 Policy.
183.5 Responsibilities.
183.6 Procedures.

     Authority: 2 U.S.C. 1966, 2 U.S.C. 1970, 10 U.S.C. 372-374, 10 
U.S.C. 377, 10 U.S.C. 2012, 10 U.S.C. 2553-2555, 10 U.S.C. 2564, 18 
U.S.C. 1385, 18 U.S.C. 3056, 31 U.S.C. 1535-1536, 32 U.S.C. 502, 32 
U.S.C. 508, Pub. L. 94-524, and Section 5802 of Pub. L. 104-208, as 
amended.


Sec.  183.1.  Purpose.

    This part:

[[Page 22672]]

    (a) Establishes DoD policy, assigns responsibilities, and provides 
procedures for support of civil authorities and qualifying entities 
during the conduct of special events in accordance with the authority 
in DoD Directive (DoDD) 5111.1 (see http://www.dtic.mil/whs/directives/
corres/pdf/511101p.pdf) and the Deputy Secretary of Defense Memorandum, 
``Delegations of Authority,'' November 30, 2006 (available by written 
request to Deputy Secretary of Defense, 1010 Defense Pentagon, 
Washington, DC 20301-1010). This support will be referred to as 
``support of special events.''
    (b) Implements provisions of DoDD 5111.1; the Deputy Secretary of 
Defense Memorandum, ``Delegations of Authority,'' November 30, 2006; 
title 2, United States Code (U.S.C.), sections 1966 and 1970; title 10, 
U.S.C., sections 372-374, 377, 2012, 2553-2555, and 2564; title 18, 
U.S.C. sections 1385 and 3056; title 31, U.S.C., sections 1535-1536; 
title 32, U.S.C., sections 502 and 508; Public Law 94-524; Section 5802 
of Public Law 104-208, as amended; and title 32, Code of Federal 
Regulations (CFR) part 185, addressing matters pertaining to Defense 
Support of Civil Authorities (DSCA) for special events, including 
support for qualifying entities.


Sec.  183.2.  Applicability and scope.

    (a) Applies to the Office of the Secretary of Defense (OSD), the 
Military Departments, the Office of the Chairman of the Joint Chiefs of 
Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of 
the Inspector General of the Department of Defense, the Defense 
Agencies, the DoD Field Activities, National Guard personnel providing 
support of special events in title 32, U.S.C., status, and all other 
organizational entities in DoD (hereinafter referred to collectively as 
the ``DoD Components'').
    (b) Does not apply to installation commanders or Heads of DoD 
Components providing localized support to a special event solely under 
the auspices of community relations, public outreach, or recruitment 
efforts pursuant to DoDD 5410.18 (see http://www.dtic.mil/whs/directives/
corres/pdf/541018p.pdf) and DoD Instruction (DoDI) 5410.19 
(see http://www.dtic.mil/whs/directives/corres/pdf/541019p.pdf) or 
other similar authority.


Sec.  183.3.  Definitions.

    Unless otherwise noted, these terms and definitions are for the 
purpose of this part only.
    Civil Authorities. Defined in Joint Publication 1-02 (see http://www.
dtic.mil/doctrine/new_pubs/jp1_02.pdf.)
    Integrated Federal Support Overview (IFSO). A collaborative effort 
of the Special Events Working Group. The purpose of the IFSO is to 
inform the Secretary of Homeland Security and other appropriate senior 
Federal officials, including the Federal coordinator for the special 
event, of all the Federal activities and support in preparation for and 
execution of a special event. The IFSO facilitates the Federal 
coordinator's ability to lead a unified coordination group initially in 
case of an incident to support the Secretary of Homeland Security's 
incident management responsibilities. It also educates Federal 
interagency partners on Federal resources committed to the special 
event.
    National Special Security Event (NSSE). An event of national 
significance as determined by the Secretary of Homeland Security. These 
national or international events, occurrences, contests, activities, or 
meetings, which, by virtue of their profile or status, represent a 
significant target, and therefore warrant additional preparation, 
planning, and mitigation efforts. The USSS, FBI, and FEMA are the 
Federal agencies with lead responsibilities for NSSEs; other Federal 
agencies, including DoD, may provide support to the NSSE if authorized 
by law.
    NSSE Executive Steering Committee. Established when the Secretary 
of Homeland Security designates a specific event to be an NSSE. The 
group, led by the USSS, comprises Federal, State, and local public 
safety and security officials whose primary responsibility is to 
coordinate and develop a specific security plan for the designated 
NSSE.
    Qualifying entity. A non-governmental organization to which the 
Department of Defense may provide assistance by virtue of statute, 
regulation, policy, or other approval by the Secretary of Defense or 
his or her authorized designee.
    Special event. An international or domestic event, contest, 
activity, or meeting, which by its very nature, or by specific 
statutory or regulatory authority, may warrant security, safety, and 
other logistical support or assistance from the Department of Defense. 
Event status is not determined by the Department of Defense, and 
support may be requested by either civil authorities or non-
governmental entities. Support provided may be reimbursable.
    Special Event Working Group. A single forum designed to ensure 
comprehensive and coordinated Federal interagency awareness of, and 
appropriate support to, special events. The Special Event Working Group 
is co-chaired by representatives from DHS (including the USSS and FEMA) 
and the FBI, and comprises representatives from more than 40 Federal 
departments and agencies, including the Department of Defense, the 
Departments of Homeland Security, Justice, State, Energy, Labor, Health 
and Human Services, and Commerce, the Office of the Director of 
National Intelligence, and the Environmental Protection Agency. The 
Department of Defense representative on the Special Event Working Group 
is designated by the Assistant Secretary of Defense for Homeland 
Defense and Americas' Security Affairs (ASD(HD&ASA)).


Sec.  183.4.  Policy.

    It is DoD policy that:
    (a) DoD capabilities may be used to provide support for 
international and domestic special events as authorized by law and DoD 
policy. DoD resources in support of special events may be provided only 
after the resources of all other relevant governmental and non-
governmental entities are determined not to be available, unless there 
is a statutory exception or the Department of Defense is the only 
source of specialized capabilities. DoD support should not be provided 
if use of commercial enterprises would be more appropriate.
    (b) DoD Components shall provide support to civil authorities or 
qualifying entities for special events only as authorized in this part.
    (c) The Department of Defense may support such events with 
personnel, equipment, and services in accordance with applicable laws, 
regulations, and interagency agreements. Most support shall be provided 
on a non-interference basis, with careful consideration given to 
effects on readiness and current operations. Support for National 
Special Security Events (NSSEs) shall be in accordance with National 
Security Presidential Directive-46/Homeland Security Presidential 
Directive-15, Annex II.
    (d) DoD security and safety-related support for an event shall have 
priority over logistics assistance. However, logistics assistance may 
be provided if deemed appropriate and necessary, consistent with 
applicable statutes and policy guidance.
    (e) Funding for special events is subject to the following:
    (1) The Department of Defense may receive separate funding or 
authority to provide support to specific special events.

[[Page 22673]]

    (2) Support of special events for which the Department of Defense 
does not receive appropriations or for which DoD funds are not 
available for such support must be approved by the Secretary of Defense 
and must be provided on a reimbursable basis in accordance with title 
10, U.S.C., sections 377, 2553-2555, and 2564; title 31, U.S.C., 
sections 1535-1536; or other applicable statutes.
    (3) Reimbursement for DoD support provided to civilian law 
enforcement agencies during special events is required, in accordance 
with title 10 U.S.C. 377, unless the Secretary of Defense elects to 
waive reimbursement after determining that the support:
    (i) Is provided in the normal course of military training or 
operations; or
    (ii) Results in a benefit to the personnel providing the support 
that is substantially equivalent to that which would otherwise be 
obtained from military operations or training.
    (4) The DoD will provide support to NSSEs in accordance with HSPD 
15/NSPD 46, as authorized by law and policy.
    (5) Security and safety of special events are responsibilities 
shared by Federal, State, and local authorities. If Federal funds will 
be provided to State or local authorities to offset the costs of 
enhanced security and public safety for special events and if State or 
local officials request the employment of National Guard personnel in a 
Federal pay status, States shall be encouraged to use those funds to 
employ those National Guard personnel in a State pay status or to 
reimburse the Department of Defense for costs related to the employment 
of the National Guard personnel in a Federal pay status.
    (f) DoD support of special events that includes support to civilian 
law enforcement officials must comply with DoDD 5525.5 (see 
http://www.dtic.mil/whs/directives/corres/pdf/552505p.pdf).
    (g) DoD support of special events that includes support to civilian 
intelligence officials must comply with DoD 5240.1-R (see 
http://www.dtic.mil/whs/directives/corres/pdf/524001r.pdf).


Sec.  183.5.  Responsibilities.

    (a) The Under Secretary of Defense for Policy (USD(P)) shall 
establish policy for and facilitate the interagency coordination of 
special events with Federal, State, and local agencies, and qualifying 
entities and the DoD Components, as required.
    (b) The ASD(HD&ASA), under the authority, direction, and control of 
the USD(P), shall:
    (1) In coordination with the CJCS, oversee the management and 
coordination of DoD support of special events including events covered 
under title 10, U.S.C., section 2564.
    (2) Serve as the principal civilian advisor to the Secretary of 
Defense and the USD(P) on DoD support of special events.
    (3) In accordance with DoDD 5111.13 (see 
http://www.dtic.mil/whs/directives/corres/pdf/511113p.pdf), 
approve requests for assistance 
from civil authorities and qualifying entities for DoD support of 
special events. Such requests shall be coordinated with appropriate 
offices within OSD, with the CJCS, and with the heads of appropriate 
DoD Components. The ASD(HD&ASA) will immediately notify the Secretary 
of Defense and the USD(P) when this authority is exercised.
    (4) Coordinate, or consult on, special event support policy with 
other Federal departments and agencies (which may include the 
Department of Homeland Security (DHS), the Federal Bureau of 
Investigation (FBI), the U.S. Secret Service (USSS), and the Federal 
Emergency Management Agency (FEMA)) and with other qualifying entities 
as appropriate.
    (5) Develop, coordinate, and oversee the implementation of DoD 
support of special events.
    (6) Through the CJCS, monitor the activation, deployment, and 
employment of DoD personnel, facilities, and other resources involved 
in DoD support of special events.
    (7) Coordinate DoD support of special events with the General 
Counsel of the Department of Defense (GC, DoD) and the Under Secretary 
of Defense (Comptroller)/Chief Financial Officer, Department of Defense 
(USD(C)/CFO).
    (8) Coordinate with the Assistant Secretary of Defense for Public 
Affairs (ASD(PA)) to ensure that information relating to DoD support of 
special events receives appropriate dissemination using all approved 
media.
    (9) Represent the Department of Defense regarding special events to 
other Federal departments and agencies, State and local authorities, 
and qualifying entities, including designating the Department of 
Defense representatives for the working groups identified in Sec.  
183.6(b) of this part.
    (10) Manage, in conjunction with the USD(C)/CFO, the Support for 
International Sporting Competitions (SISC) Defense Account.
    (11) In accordance with section 5802 of Public Law 104-208, as 
amended, notify the congressional defense committees of DoD plans to 
obligate funds in the SISC Defense Account.
    (12) In accordance with title 10 U.S.C. 2564, submit an annual 
report to Congress, no later than January 30 of each year following a 
year in which the Department of Defense provides assistance under title 
10 U.S.C. 2564, detailing DoD support to certain sporting competitions.
    (c) The Under Secretary of Defense for Personnel and Readiness 
(USD(P&R)) shall coordinate on DoD support of special events and, in 
coordination with the CJCS, provide advice regarding the effect the 
requested support will have on readiness and military operations.
    (d) The USD(C)/CFO shall:
    (1) Coordinate on DoD support of special events, and provide advice 
regarding the effect on the DoD budget and on DoD financial resources.
    (2) Maintain the SISC Defense Account in conjunction with the 
ASD(HD&ASA).
    (e) The Under Secretary of Defense for Acquisition, Technology, and 
Logistics (USD(AT&L)) shall coordinate on DoD logistical support of 
special events.
    (f) The GC, DoD shall coordinate and provide legal counsel on DoD 
support of special events.
    (g) The ASD(PA) shall provide policy guidance and review, 
coordinate, and approve requests for ceremonial and entertainment 
support for special events covered by this part, in accordance with 
DoDD 5410.18 (see 
http://www.dtic.mil/whs/directives/corres/pdf/541018p.pdf), DoDI 5410.19 
(see http://www.dtic.mil/whs/directives/corres/pdf/541019p.pdf) and DoDD 
5122.05 (see http://www.dtic.mil/whs/directives/corres/pdf/512205p.pdf).
    (h) The Heads of the DoD Components shall:
    (1) Designate and maintain an office of primary responsibility 
(OPR) for special events or a special events coordinator, and provide 
that OPR designation and contact information to the CJCS within 60 days 
of the publication of this part. Changes to OPR designation and contact 
information shall be provided to the CJCS within 30 days of the change.
    (2) Provide personnel, equipment, and support of special events as 
directed.
    (3) Ensure that personnel supporting special events comply with 
applicable antiterrorism and force protection training and standards.
    (4) Provide other support of special events as directed.
    (i) The CJCS shall:
    (1) Provide planning guidance to DoD Components for all special 
events for which DoD support may require the employment of military 
forces or centralized command and control.
    (2) Review all requests for DoD support of special events and, in 
coordination with the USD(P&R),

[[Page 22674]]

provide advice on the effect that the requested support will have on 
readiness and military operations.
    (3) Prepare, staff, and issue orders and messages on DoD support of 
special events that has been approved by authorized DoD officials.
    (4) Issue guidance to the Combatant Commanders on the 
implementation of this part.
    (5) Process requests for DoD support of special events.
    (6) Maintain sufficient staff to manage the day-to-day operational 
aspects of DoD support of special events.
    (7) Manage and maintain equipment that is procured to support DoD 
special events.
    (i) Establish and operate a system for delivering DoD assets to 
authorized recipients and for recovering loaned assets at the 
conclusion of the event.
    (ii) Ensure the civil authorities and qualifying entities 
authorized to accept DoD assets provide a surety bond or other suitable 
insurance protection to cover the cost of lost, stolen, or damaged DoD 
property.
    (iii) Plan and program for the life-cycle replacement of special 
events equipment procured under title 10 U.S.C. 2553, 2554, and 2564.
    (iv) Procure goods and services through contracting, when necessary 
and authorized by law.
    (8) Administer the expenditure of appropriated funds, and ensure 
that the Department of Defense is reimbursed for its support of special 
events when required by law or DoD policy.
    (i) With the assistance of the DoD Components, provide cost 
estimates of DoD support to a special event that is under consideration 
for approval.
    (ii) Upon approval, administer the execution of funding for DoD 
support of special events.
    (iii) At the conclusion of DoD support to a special event, collect 
and provide a financial accounting for all DoD funds expended in 
support of that special event.
    (9) Establish and maintain effective liaison with DoD Components 
for the timely exchange of information about special event projects.
    (10) Provide other support of special events as directed.
    (j) The Chief, National Guard Bureau (NGB), under the authority, 
direction, and control of the Secretary of Defense through the 
Secretary of the Army and the Secretary of the Air Force, shall:
    (1) Serve as the channel of communications for all matters 
pertaining to the National Guard between DoD Components and the States 
in accordance with DoDD 5105.77 (see 
http://www.dtic.mil/whs/directives/corres/pdf/510577p.pdf).
    (2) Report National Guard special event support of civil 
authorities or qualifying entities when using Federal resources, 
equipment, or funding to the National Joint Operations and Intelligence 
Center.
    (3) Serve as an advisor to the Combatant Commanders on National 
Guard matters pertaining to the combatant command missions, and support 
planning and coordination for DoD support of special events as 
requested by the CJCS or the Combatant Commanders.
    (4) Ensure that National Guard appropriations are appropriately 
reimbursed for special event activities.
    (5) Advocate for needed special event capabilities.
    (6) Develop, in accordance with DoDD 5105.77 and in coordination 
with the Secretaries of the Army and Air Force and the ASD(HD&ASA), 
guidance regarding this part as it relates to National Guard matters.


Sec.  183.6.  Procedures.

    (a) General Provisions. (1) This section provides the basic 
procedures for DoD support to special events.
    (2) As appropriate, amplifying procedures regarding DoD support to 
special events shall be published separately and maintained by the 
Office of the ASD(HD&ASA) and released as needed in the most effective 
medium consistent with DoD Directive 8320.02 (see 
http://www.dtic.mil/whs/directives/corres/pdf/832002p.pdf).
    (b) Special Event Process. (1) Engagement. (i) Engagement may be 
initiated by the Department of Defense, civil authorities, or 
qualifying entities. If the initial engagement is not a written request 
for assistance (RFA), representatives of the ASD(HD&ASA) and the Joint 
Staff will confer to determine actual requirements.
    (ii) Engagement may involve informational briefings and meetings 
between DoD representatives and special event organizers, civil 
authorities, or qualifying entities. These informal engagements may 
result in non-DoD entities submitting an RFA to the DoD Executive 
Secretary, requesting DoD support for a special event.
    (iii) Once an RFA is received, it will be sent to the ASD(HD&ASA) 
and the CJCS simultaneously for staffing and recommendation. Additional 
engagement with the requestor may be required to quantify the scope and 
magnitude of the support requested.
    (2) Planning. (i) The direction and focus of DoD special-event 
planning will depend on the nature of the event and scope and magnitude 
of the support requested or anticipated. International events may 
require additional planning, procedures, and coordination with the 
government of the host country.
    (ii) For National Special Security Events (NSSEs) and events that 
may require the employment of military forces and centralized command 
and control, the CJCS will issue a planning order requesting a 
Combatant Commander to initiate planning and notify potential 
supporting commands or organizations and the Chief, NGB, as 
appropriate. When possible, established CJCS-directed planning 
procedures will be used for the Combatant Commander to provide an 
assessment and request for forces.
    (A) The NSSE designation process generally is initiated by a formal 
written request to the Secretary of Homeland Security by the State or 
local government hosting the event. In other situations where the event 
is federally sponsored, an appropriate Federal official will make the 
request.
    (B) Once the request is received by DHS, the USSS and the FBI will 
send an NSSE questionnaire to the responsible host official for 
completion. The request, completed questionnaires, and other supporting 
information are reviewed by the NSSE Working Group (which includes a 
non-voting DoD member), which provides a recommendation to the 
Secretary of Homeland Security regarding NSSE designation.
    (C) The Secretary of Homeland Security makes the final 
determination to designate an event as an NSSE pursuant to Homeland 
Security Presidential Directive 7 (see 
http://www.gpo.gov/fdsys/pkg/PPP-2003-book2/pdf/PPP-2003-book2-doc-pg1739.pdf).
    (iii) There are numerous events where DoD support should be 
anticipated and a planning order issued to the appropriate Combatant 
Commander. These include, but are not limited to:
    (A) The President's State of the Union Address or other addresses 
to a Joint Session of Congress.
    (B) Annual meetings of the United Nations General Assembly.
    (C) National Presidential nominating conventions.
    (D) Presidential inaugural activities.
    (E) International summits or meetings.
    (F) State funerals.
    (G) The National Boy Scout Jamboree.
    (H) Certain international or domestic sporting competitions.
    (iv) There are other events that the Department of Defense supports 
that do not involve the assignment of military forces or centralized 
command and control by Combatant Commanders, which include planning 
requirements

[[Page 22675]]

by the host organizations. These include, but are not limited to:
    (A) Military Department or Service-sponsored events, such as:
    (1) The Marine Corps Marathon.
    (2) The Army 10-Miler.
    (3) Navy Fleet Weeks.
    (4) Installation or Joint Service Open Houses.
    (5) Service or Joint Air Shows.
    (B) Community relations activities authorized in accordance with 
DoDI 5410.19.
    (v) The Department of Defense may provide support to certain 
sporting events that are included under subsection (c) of section 2564 
of title 10, U.S.C., by providing technical, contracting, and 
specialized equipment support. These events may be funded by the SISC 
Defense Account pursuant to title 10 U.S.C. 2564 and include:
    (A) The Special Olympics.
    (B) The Paralympics.
    (C) Sporting events sanctioned by the United States Olympic 
Committee (USOC) through the Paralympic Military Program.
    (D) Other international or domestic Paralympic sporting events that 
are held in the United States or its territories, governed by the 
International Paralympic Committee, and sanctioned by the USOC:
    (1) For which participation exceeds 100 amateur athletes.
    (2) In which at least 10 percent of the athletes participating in 
the sporting event are either members or former members of U.S. 
Military Services who are participating in the sporting event based 
upon an injury or wound incurred in the line of duty or veterans who 
are participating in the sporting event based upon a service-connected 
disability.
    (vi) Planning for DoD support to the Olympics and certain other 
sporting events requires additional considerations.
    (A) Subsections (a) and (b) of section 2564 of title 10, U.S.C., 
authorize the Secretary of Defense to provide assistance for the 
Olympics and certain other sporting events. Unless the event meets the 
specific requirements stated in paragraph (b)(2)(v) of this section, 
the Attorney General must certify that DoD security and safety 
assistance is necessary to meet essential security and safety needs of 
the event.
    (B) The Department of Defense, led by the ASD(HD&ASA), will 
collaborate with the CJCS, the Department of Justice, including the 
FBI, and other appropriate DoD Components and Federal departments or 
agencies, usually as part of a Joint Advisory Committee (JAC), to 
provide a recommendation to the Attorney General on what categories of 
support the Department of Defense may be able to provide to meet 
essential security and safety needs of the event.
    (C) Support other than safety and security may be authorized for 
sporting events, but only to the extent that:
    (1) Such needs cannot reasonably be met by a source other than the 
Department of Defense.
    (2) Such assistance does not adversely affect military 
preparedness.
    (3) The requestor of such assistance agrees to reimburse the 
Department of Defense, in accordance with the provisions of title 10 
U.S.C. 377, 2553-2555, and 2564; title 31 U.S.C. 1535-1536; and other 
applicable provisions of law.
    (vii) Types of support that the Department of Defense can provide 
include, but are not limited to:
    (A) Aviation.
    (B) Communications (e.g., radios, mobile telephones, signal 
integrators).
    (C) Security (e.g., magnetometers, closed-circuit televisions, 
perimeter alarm systems, undercarriage inspection devices).
    (D) Operations and Command Centers (e.g., design and configuration, 
video walls).
    (E) Explosive ordnance detection and disposal (technical advice, 
explosive ordnance disposal teams, explosive detector dog, dog teams).
    (F) Logistics (transportation, temporary facilities, food, 
lodging).
    (G) Ceremonial support (in coordination with the ASD(PA)).
    (H) Chemical, biological, radiological, and nuclear threat 
identification, reduction, and response capabilities.
    (I) Incident response capabilities (in coordination with the 
Department of Justice, DHS, the Department of Health and Human 
Services, and in consultation with appropriate State and local 
authorities).
    (viii) DoD personnel support of special events is provided using a 
total force sourcing solution that may include Active Duty and Reserve 
Component military personnel, DoD civilian personnel, and DoD 
contractor personnel. The Department of Defense also may decide to 
respond to requests for assistance by approving, with the consent of 
the Governor(s) concerned, National Guard forces performing duty 
pursuant to title 32 U.S.C. 502.
    (A) National Guard personnel conducting support of special events 
while on State active duty, at the direction of their Governor or 
Adjutant General, are not considered to be providing DoD support of 
special events.
    (B) This part does not limit or affect Department of Defense and 
National Guard personnel volunteering to support special events during 
their non-duty time. This volunteer support is not considered as part 
of DoD support of special events. Volunteers are prohibited from 
obligating or using DoD resources to support a special event while in a 
volunteer status except as authorized by separate statute or authority.
    (3) Coordination. (i) Coordination of DoD support of special events 
will likely take place simultaneously with engagement and planning; 
operate across the full spectrum of strategic, operational, and 
tactical levels; and occur internally among DoD Components and 
externally with supported civil authorities and qualifying entities.
    (A) Policy coordination at the departmental level between the 
Department of Defense and other Federal departments or agencies is the 
responsibility of the ASD(HD&ASA). Other DoD Components may send 
representatives to these meetings with the prior concurrence of the 
ASD(HD&ASA). Standing departmental-level special events coordination 
meetings include:
    (1) USSS-led NSSE Working Group.
    (2) DHS-led Special Events Working Group.
    (3) Department of State, Bureau of Diplomatic Security-led 
International Sporting Event Group.
    (B) Coordination within the Department of Defense is led by the 
ASD(HD&ASA) and is facilitated by the CJCS for the Combatant Commands 
and other joint commands and by other DoD Component Heads for their 
constituent elements.
    (C) The CJCS will work with the Military Service Chiefs, the Chief 
of the National Guard Bureau, and the Heads of DoD Components when 
subject matter expertise is needed for the event organizers. This will 
be based upon location and other criteria, as needed.
    (ii) Inputs to the DHS-produced Integrated Federal Support Overview 
(IFSO) will be solicited by the CJCS and sent to the ASD(HD&ASA) for 
consolidation and deconfliction prior to final submission to DHS. DoD 
Component Heads not tasked by the Joint Staff will submit their input 
directly to the ASD(HD&ASA).
    (iii) RFAs for DoD support will adhere to the following:
    (A) An RFA for DoD support to a special event may be made by 
Federal, State, or local civil authorities, or by qualifying entities.
    (B) RFAs will be in writing and addressed to the Secretary of 
Defense, the Deputy Secretary of Defense, or the

[[Page 22676]]

DoD Executive Secretary, 1000 Defense, Pentagon, Washington, DC 20301-
1000. DoD Components who receive RFAs directly from the requestor will 
immediately forward them to the DoD Executive Secretary for 
disposition, distribution, and tracking.
    (C) At a minimum, the RFA will be distributed to the ASD(HD&ASA) 
and the CJCS for staffing and recommendation. If the RFA is for a 
single capability for which a DoD Component is the OPR or serves as a 
DoD Executive Agent, the RFA is sent to that Component for action with 
an information copy provided to the ASD(HD&ASA) and the CJCS.
    (D) Vetting of RFAs will be in accordance with the DoD Global Force 
Management process and consistent with criteria published in DoD 
8260.03-M, Volume 2 (see 
http://www.dtic.mil/whs/directives/corres/pdf/826003m_vol2.pdf).
    (E) Heads of DoD Components will consult with the DoD Executive 
Secretary on which DoD official will communicate DoD special event 
support decisions to the requesting authorities.
    (4) Execution. Execution of DoD support of special events is a 
shared responsibility. The scope and magnitude of the support being 
provided will determine the OPR and level of execution.
    (i) When joint military forces or centralized command and control 
of DoD support to a special event are anticipated or required, a 
Combatant Commander may be identified as the supported commander in a 
properly approved order issued by the CJCS. The designated Combatant 
Command shall be the focal point for execution of DoD support to that 
special event with other DoD Components in support. Reporting 
requirements shall be in accordance with the properly approved order 
issued by the CJCS and standing business practices.
    (ii) When there are no joint military forces required and there is 
no need for centralized command and control, DoD support of special 
events shall be executed by the CJCS or the Head of a DoD Component, as 
designated in a properly approved order or message issued by the CJCS. 
Oversight of DoD support will be provided by the ASD(HD&ASA).
    (iii) As described in the Joint Action Plan for Developing Unity of 
Effort, when Federal military forces and State military forces are 
employed simultaneously in support of civil authorities in the United 
States, appointment of a dual-status commander is the usual and 
customary command and control arrangement. Appointment of a dual-status 
commander requires action by the President and the appropriate Governor 
(or their designees).
    (5) Recovery. (i) Durable, non-unit equipment procured by the 
Department of Defense to support a special event shall be retained by 
the CJCS for use during future events in accordance with Sec.  
183.5(i)(7) of this part.
    (ii) An after-action report shall be produced by the Combatant 
Command or OPR and sent to the ASD(HD&ASA) and the CJCS within 60 days 
of completion of the event.

    Dated: April 6, 2012.
Patricia L. Toppings,
OSD Federal Register Liaison Officer, Department of Defense.
[FR Doc. 2012-9148 Filed 4-16-12; 8:45 am]
BILLING CODE 5001-06-P


Alien Species – Full Movie

A fleet of UFOs is circling the Earth and a top scientist races to discover their true intentions for the planet. When the UFOs begin an attack on Earth, the scientist finds himself thrown in with a sheriff and his deputies transporting some prisoners to jail. The unlikely group is forced to seek shelter from the attack in a nearby cave, not knowing how significant the location is to the alien’s plans.

CONFIDENTIAL – FEMA National Level Exercise 2012 Private Sector Participant Guide

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-NLE2012-PrivateSectorGuide.png

This document is intended to provide private sector stakeholders with an overview of NLE 2012, to include a discussion of the exercise timeline, a snapshot of the exercise scenario, and a review of the various potential exercise participation opportunities.

1.1 NLE 2012 Scope

National Level Exercises and the predecessor Top Official exercises continue to involve broad participation based on exercise objectives, scenario implications, and other considerations. This year is no different. NLE 2012 participants include various states within Federal Emergency Management Agency (FEMA) Regions I, II, III, and V. The primary subject area and specific audiences for this scenario include Information Technology, Communications, Water, and Mass Transit/Rail. With limited exception, these are the main focus of the Players and Simulation Cell subject matter experts. Interested parties outside of that scope will still find value in the Virtual Participation and Downloadable tabletop.

2.0 Private Sector Participation Value Proposition

Participation in NLE 2012 will provide private sector organizations a variety of benefits, ultimately contributing to an enhanced understanding of information sharing, response, and incident management activities related to a national cyber event. More specifically, it is anticipated that through participation in NLE 2012, private sector organizations, in collaboration with Federal, state, local, tribal, and territorial government partners as well as other exercise stakeholders, will:

  • Achieve a better collective understanding of the cyber challenges within and across sectors.
  • Examine and better understand cyber threat alert, warning, and information sharing across sectors and between government and the private sector
  • Contribute to defining government and private sector roles and responsibilities in cyber incident response and recovery under the National Cyber Incident Response Plan (NCIRP).
  • Test and examine government-private sector coordinating structures, processes, and capabilities regarding cyber incident response and recovery.

3.0 NLE 2012 Overview

NLE 2012 is sponsored by the FEMA’s National Exercise Division (NED) and includes participation of all levels of government; appropriate Federal department and agency senior officials, their deputies, and staff; and key operational elements. NLE 2012 will examine the Nation’s ability to coordinate and implement prevention, preparedness, response, and recovery plans and capabilities pertaining to a significant cyber event or a series of related cyber events. Unique to NLE 2012 will be an emphasis on the shared responsibility among the Federal Government; state, local, tribal nations, and territories; the private sector; and international partners to manage risk in cyberspace and respond together to a cyber event with national consequences.

Public Intelligence – Baltimore Police Officer Safety Warning: Fighting Bandanas

https://publicintelligence.net/wp-content/uploads/2012/04/MD-FightingBandanas.png

 

This is a regular bandana and a dog’s heavy choker chain constructed to make a rather nasty version of a fighting bandana. The heavy choker chain is sewn into the bandana using heavy thread.

Seeing a glint of steel anywhere in the bandana or the ends of the bandana is a warning sign. Movements to reach around to grasp the exposed tails of the bandana are another danger cue. Also, the bandana could easily be overlooked as a weapon during a search.

This is a common bandana that you can purchase anywhere. You fold it as you would to use it for a headband, then fold that in half so the tails of the bandana meet.

You then simply sew up each side of the bandana where the fold is until you have a pocket.

Anything can then be placed in the pockets to include a roll of coins, a socket from a set of wrenches, a long spark plug socket or a cylindrical piece of metal.

You then stuff it in your back pocket and let the tails hang out and it appears to be a simple, folded bandana in your back pocket.

Officers should remember that a harmless bandana in someone’s back pocket might not be so harmless.

Uncensored – FEMEN Protest Abortion Ban in Kiev

FEMEN Protest Abortion Ban in Kiev

A topless activists of Ukrainian feminist movement Femen holds a placard which translates as ‘I give birth not for you’ as others strike the bells after they barricaded St. Sophia’s cathedral bell tower in Kiev on April 10, 2012. The protest was held to oppose a draft law being proposed to prohibit abortions.

[Image]

[Image]

[Image]

Frankenstein (1910) – Full Movie

Frankenstein is a 1910 film made by Edison Studios that was written and directed by J. Searle Dawley. It was the first motion picture adaptation of Mary Shelley’s Frankenstein. The unbilled cast included Augustus Phillips as Dr. Frankenstein, Charles Ogle as the Monster, and Mary Fuller as the doctor’s fiancée.

Shot in three days, it was filmed at the Edison Studios in the Bronx, New York City. Although some sources credit Thomas Edison as the producer, he in fact played no direct part in the activities of the motion picture company that bore his name.

Women Protest – Afghan Young Women Protest Killing Women

Afghan Young Women Protest Killing Women

[Image]An Afghan woman holds up a poster during a protest in Kabul, Afghanistan, Saturday, April 14, 2012. A group of Afghan women protested against domestic violence. The poster reads: “Where is justice”. (Musadeq Sadeq)
[Image]Afghan Young Women for Change (YWC) activists, holding placards which read ‘where is justice?’, take part in a protest denouncing violence against women in Afghanistan in Kabul on April 14, 2012. Some 30 Afghan women took to the streets of the capital Kabul against the killing of five Afghan women in less than a month in three provinces of the country. Getty
[Image]
[Image]
[Image]
[Image]
[Image]
[Image]Afghan policemen keep watch during a protest by Afghan Young Women for Change (YWC) activists denouncing violence against women in Afghanistan in Kabul on April 14, 2012. Some 30 Afghan women took to the streets of the capital Kabul against the killing of five Afghan women in less than a month in three provinces of the country.

Nosferatu (1922) – Full Movie

✌️SHARE

👉THE ONLY WEBSITE WITH THE LICENSE TO SPY!
https://berndpulch.org
👉JOIN @ABOVETOPSECRETXXL
https://t.me/ABOVETOPSECRETXXL
gab.com/berndpulch
gettr.com/user/berndpulch
https://truthbook.social/berndpulch
👉JOIN @ABOVETOPSECRETXXL
Subscribe to https://t.me/ABOVETOPSECRETXXL
SUPPORT US AND Become a Patron!
https://www.patreon.com/bePatron?u=54250700
True Information is the most valuable resource and we ask you kindly to give back.

Cryptome unveils – Cartegena Sex Culture

Cartegena Sex Culture

 

[Image]Prostitutes walk a street of the old city, as heads of state met for the Americas Summit in Cartagena April 14, 2012. Headlines from this weekend’s gathering of more than 30 heads of state have focused on an embarrassing scandal after members of U.S. President Barack Obama’s security detail were caught with prostitutes in historic Cartagena. Picture taken April 14. Reuters
[Image]Prostitutes walk a street of the old city, as heads of state met for the Americas Summit in Cartagena April 14, 2012. Headlines from this weekend’s gathering of more than 30 heads of state have focused on an embarrassing scandal after members of U.S. President Barack Obama’s security detail were caught with prostitutes in historic Cartagena. Picture taken April 14. Reuters
[Image]Prostitutes walk a street of the old city, as heads of state met for the Americas Summit in Cartagena, April 14, 2012. Headlines from this weekend’s gathering of more than 30 heads of state have focused on an embarrassing scandal after members of U.S. President Barack Obama’s security detail were caught with prostitutes in historic Cartagena. Picture taken April 14. Reuters
[Image]Sex in the city of Cartagena, December 9, 2010  http://southamtour.blogspot.com/2010/12/sex-in-city-of-cartagena.html

 


	

The Cabinet of Dr. Caligari – Full Movie

The Cabinet of Dr. Caligari (German: Das Kabinett des Doktor Caligari) is a 1920 silent horror film directed by Robert Wiene from a screenplay by Hans Janowitz and Carl Mayer. It is one of the most influential of German Expressionist films and is often considered one of the greatest horror movies of the early times. This movie is cited as having introduced the twist ending in cinema.

Jean-Marc Lofficier wrote Superman’s Metropolis, a trilogy of graphic novels for DC Comics illustrated by Ted McKeever, the second of which was entitled Batman: Nosferatu, most of the plot derived from The Cabinet of Dr. Caligari. Caligari himself appears as a member of Die Zwielichthelden (The Twilight Heroes), a German mercenary group in The League of Extraordinary Gentlemen: Black Dossier by Alan Moore and Kevin O’Neill. Also, in The Sandman issue “Calliope” written by Neil Gaiman and pencilled by Kelley Jones, a character, Richard Madoc, writes a book “The Cabaret of Dr. Caligari”, an obvious pseudonym.

The name ‘Caligari’ has been used extensively in popular music. Pere Ubu has a song entitled “Caligari’s Mirror”. Goth rock group Bauhaus used a still of Cesare from the film on early t-shirts for their popular single “Bela Lugosi’s Dead”. The band Abney Park has a cut “The Secret Life of Dr. Calgari” on their album Lost Horizons (released 2008).

The 1998 music video for Rob Zombie’s single “Living Dead Girl” restaged several scenes from the film, with Zombie in the role of Caligari beckoning to the fair attendees. In addition to artificially imitating the poor image quality of aged film, the video also made use of the expressionistic sepia, aqua, and violet tinting used in Caligari. The film also inspired imagery in the video for “Forsaken” (2002), from the soundtrack for the film Queen of the Damned.

Hard rock group Rainbow used the film as inspiration for the music video to “Can’t Let You Go”, a single from their 1983 album Bent Out Of Shape, vocalist Joe Lynn Turner being made up as Cesare. The director was Dominic Orlando. The video for Coldplay’s “Cemeteries of London” included clips from the film. The video for the song “Otherside” by the Red Hot Chili Peppers off the album Californication, briefly used the film as a reference to its visuals.

According to Jean Cocteau, he was approached during the early 1930s by director Robert Wiene about playing “Cesare” in a sound remake, which was never made. In 1936, Bela Lugosi, while filming in England, was offered the part of “Caligari” in a sound remake, but returned to work in the U.S. During the 1940s, writer Hans Janowitz seemed close to selling his rights in a script to be directed by Fritz Lang, but neither that nor his plans for a sequel, Caligari II, came to fruition.

In 1991, the film was remade as The Cabinet of Dr. Ramirez, adapted by Mikhail Baryshnikov, who played “Cesar”, Joan Cusack, who played “Cathy”, Peter Gallagher, who played “Matt”, Peter Sellars, who directed, and Ron Vawter, who played “Dr. Ramirez”.

The film was adapted into an opera in 1997 by composer John Moran. The Cabinet of Dr. Caligari premiered at the American Repertory Theater in Cambridge, Massachusetts, in a production by Robert McGrath.

Also, during 1997, playwright Susan Mosakowski adapted it to drama, performed at La MaMa Experimental Theatre Club.

The band Pere Ubu’s second album Dub Housing features a song called “Caligari’s Mirror”.

The final episode of the children’s television series Count Duckula, titled “The Zombie Awakes”, is a parody of The Cabinet of Dr. Caligari. A mad psychologist, named Dr. Quackbrain sends a somnambulist named Morpheus to bring Duckula to Quackbrain’s castle, which is designed inside and out with the same extreme lights, shadows, angles and shapes characteristic of Caligari’s expressionist style.

There is strong influence of The Cabinet of Dr. Caligari on the concept of the 2009 fantasy film The Imaginarium of Dr. Parnassus, by Terry Gilliam as well as on the book Shutter Island by Dennis Lehane on which the eponymous movie by Martin Scorsese is based. Scorcese was surprised that Lehane hadn’t seen The Cabinet of Dr. Caligari whose story has many similarities with that of Shutter Island.

Public Intelligence – Public-Private Partnerships Expand Amidst Cybersecurity Fears

https://publicintelligence.net/wp-content/uploads/2012/04/nsic.png

 

Public Intelligence

A fascinating article in the San Jose Mercury News discusses the recent expansion of public-private partnerships in the growing effort to combat cyber threats from criminals and foreign governments.  These partnerships occur through formal agreements between major corporations and government-backed organizations, such as law enforcement, the military or research institutions.  The agreements usually involve sharing of intelligence between the government and corporate representatives, as well as participation in threat reporting programs and security exercises. In some cases, the partnerships relate directly to research and development regarding ways to mitigate security threats.

One example of a public-private partnership discussed in the article is the Network Security Innovation Center (NSIC), a component of Lawrence Livermore National Laboratory that works directly with a number of companies to investigate cyber threats.  The NSIC is described as a an “industry-driven network security initiative” that includes Adobe, Cisco, eBay, Intel, McAfee, PayPal, Qualcomm, Seagate among its corporate partners.  Some of the same firms, along with Hewlett-Packard, Juniper Networks, Symantec and VMware, reportedly help military and intelligence agencies with similar issues at a Maryland-based lab owned by Lockheed Martin.

These partnerships are considered to be of such importance to the government’s cybersecurity efforts that Secretary of Homeland Security Janet Napolitano will be personally speaking on Monday to companies in Silicon Valley about the need for their involvement. This year’s upcoming National Level Exercise will focus on cybersecurity threats to critical infrastructure and many corporations are expected to participate in the exercise.  FEMA has even produced a guide to encourage private-sector participation.  The Cybersecurity Intelligence  Sharing and Protection Act (CISPA), which is currently working its way through the House, widely expands the capabilities for sharing classified information in public-private partnerships between government agencies and major corporations.  Though the NSA has reportedly been sharing threat information with banks and other private companies for some time, CISPA enables companies to have immunity for providing information to the government and allows for greater sharing of potentially personally-identifiable information than is possible in traditional public-private partnerships.

Dune – Der Wüstenplanet – Ganzer Spielfilm von David Lynch – Sting, Jürgen Prochnow, Kyle MacLachlan,

David Lynchs Oscar nominierter Klassiker des Science Fiction Genres mit Jürgen Prochnow, Sting …

In einer sehr fernen Zukunft ist die intergalaktische Welt voller Mysterien und Intrigen. Der wichtigste Planet des Universums ist Arrakis, der Wüstenplanet, genannt auch DUNE. Nur auf ihm findet man das Spice, eine hochwirksame Droge mit unvorstellbaren Kräften – inzwischen die wertvollste Substanz im gesamten Universum. Als das Haus Atreides die Macht über Arrakis übernimmt, beginnt ein gigantischer Machtkampf, der in grausamen Schlachten und einem interstellaren Krieg gipfelt.

Exposed – 12 Secret Service Agents In Prostitution Scandal

Members of the president’s Secret Service detail, including a supervisor, are in what looks to be some pretty hot water. At least one United States Secret Service agent is alleged to have sought the services of a prostitute in Cartagena, Colombia, where President Obama is visiting for the Summit of the Americas. CBS News has learned that one of the agents allegedly involved with the prostitute is a supervisor of the Counter Terror Assault Team (CAT). The CAT team is responsible for advance planning and response and is not part of the president’s protective detail.

A source in the Secret Service tells CBS News that one or more of the officers were involved with prostitutes and that there was a dispute over payment. One prostitute went to the police, who notified the State Department. The agents stayed at Hotel Caribe, where the international press is staying. A former Secret Service agent said the American Embassy in Colombia directed the entire division of 12 to be sent back to the United States because it was an embarrassment for the president and the U.S. The team was replaced before the president’s arrival in Colombia on Friday. The source also said that two of the men sent home were first level supervisors. Secret Service spokesman Ed Donovan confirmed the removal of personnel in a statement and said the agency is taking “allegations of misconduct seriously.”

Lord of War’s Sentencing and his global network of shell companies

The Southern District of New York sentenced Viktor Bout, also known as the Merchant of Death, to 25 years in prison, finally putting an end to his notorious career as a weapons trafficker. In November of last year, a jury convicted Bout on terrorism charges, including conspiring to kill Americans and conspiring to provide material support to terrorists.

While this case was narrowly focused on Bout’s conspiracy to sell weapons to the FARC in Colombia, it is effectively an indictment on his career as a gunrunner, fuelling conflict around the world and using shell companies to hide his activities as he did so. The U.S. Department of the Treasury has described Bout’s network as “one of the largest illicit arms-trafficking networks in the world.”

“Bout was able to hide his identity behind anonymous companies created in the U.S. and abroad to further his efforts to traffic weapons to conflict zones,” said Stefanie Ostfeld, Global Witness Policy Advisor. “He exploited the same loophole used by terrorists, corrupt dictators, drug traffickers and tax evaders to legally hide their identities to access the U.S. financial system.”

Bout used a global network of shell companies to advance his illicit activities. To date, twelve American shell companies, incorporated in Texas, Florida and Delaware, have been identified as linked to him.

Investigations continue to expose how easy it is for individuals to mask their identity behind U.S. shell companies so they can stash their ill-gotten gains in American banks or commit other crimes. Global Witness’ research has revealed that corrupt foreign politicians and pariah regimes such as Iran exploit the secrecy provided by anonymous American shell companies to access the U.S. financial system. A recent World Bank report found that the U.S. was the favorite destination of corrupt politicians trying to set up such shell companies.

Corporate secrecy fundamentally undermines U.S. laws to combat money laundering and tax evasion, as well as U.S. efforts to tackle global corruption. Congress has introduced a bill that would shed light on this problem by requiring companies to disclose their ultimate owners.

“Congress must pass the Incorporation Transparency and Law Enforcement Assistance Act, which would make it much harder for arms traffickers like Bout, and other criminals, to hide their identities and illicit activities behind U.S. shell companies. Once corrupt and other dirty money has been moved through an anonymous corporate vehicle into the financial system, it is much harder to track it down,” said Ostfeld.

/Ends

Contacts:

Washington, DC: Stefanie Ostfeld, +1 202 577 5858

Washington, DC:  Robert Palmer, +44 7545 645 406

Notes to editors

1. On August 2, 2011, Senators Levin and Grassley introduced the bipartisan Incorporation Transparency and Law Enforcement Assistance Act (S. 1483). Representatives Maloney, Lynch and Frank introduced a companion bill (H.R. 3416) on November 14, 2011. These bills would require companies to disclose information about the real people who own or control them (often called the “beneficial owners”) at the time they are created. Multiple law enforcement organizations including the Fraternal Order of Police and Federal Law Enforcement Officers Association have endorsed the bill. The Obama Administration, through the U.S. Open Government Partnership Action Plan and its Strategy to Combat Transnational Organized Crime, also supports legislation to stop states from allowing secretive shell companies to be set up.

U.S. Army Network Operations (NETOPS) Manual – Confidential

https://publicintelligence.net/wp-content/uploads/2012/04/USArmy-NetOps.png

FM 6-02.71 provides doctrine for the overall guidance and direction pertaining to the command and control of Army communications networks (voice, video, and data) and information services (collaboration, messaging, storage, mediation, etc.) throughout strategic, operational, and tactical levels. It describes the Army’s portion of the Global Information Grid ( hereafter referred to as LandWarNet), network operations goals and objectives, and the associated roles and responsibilities of applicable organizations, materiel, leadership, personnel, and facilities that must integrate LandWarNet standards, telecommunications, services, and applications for the purpose of enabling warfighters to conduct the information management and knowledge management tasks necessary to meet achieve information superiority and decision dominance.

The network operations construct is an integrated operational framework consisting of network management/enterprise systems management, information assurance/computer network defense, and information dissemination management/content staging. This manual provides a general functional understanding of each network operations component, along with an understanding of why the components must be integrated in order to meet overall objectives.

As stated, network operations are critical to the command and control of organizational communications networks and information services that enable commanders to use the network in order to shape and influence operations. Its principles allow for assured network and information system availability, assured information protection, and assured information delivery. The result is a horizontal fusion of information that flows to the right place, at the right time, and in the right format in order to attain information superiority and decision dominance over any adversary.

1-2. In concept, the GIG is very much like the Worldwide Web. It exists as a baseline capability and is comprised of information and information services residing on transporting infrastructures and segments. It is important to note that the GIG is a portion of cyberspace. The DOD definition of cyberspace is ―the global domain consisting of interdependent networks of information technology infrastructures, and includes the internet, telecommunications networks, computer systems, and embedded processors and controllers.‖ The GIG, as the DOD’s portion of cyberspace, interacts with and provides connections to national and global cyberspace, the national information infrastructure and global information infrastructure respectively. DOD’s strategy is to create the cyberspace domain by integrating the seven components of the GIG (warrior, global applications, computing, communications, NETOPS, information management, and foundation as described in Figure 1-1) in order to enable joint forces to achieve information superiority, as well as in the future, allow them to conduct offensive cyberspace operations when necessary. Authorized users access the GIG and its services either through military or commercial communications or through a series of entry points, e.g., standardized tactical entry point (STEP) and teleport facilities. These points provide information transfer gateways as a means of forming a junction of space-based, aerial, and terrestrial networks and a connection for strategic or fixed assets and tactical or deployed users. It provides multiple connection paths between information users and information producers and enables effective and efficient information flow.

THREAT

2-27. Threats to the GIG and LWN are genuine, world-wide in origin, technically multifaceted and growing. They come from individuals and groups motivated my military, political, cultural, ethnic, religious, personal, or industrial gain. These types of threats are categorized by the Committee on National Security Systems Instruction No. 4009 as incidents (assessed occurrence having actual or potential adverse effects on an information system, or events occurrences, not yet assessed, that may affect the performance of an information system). According to FM 3-13, the capabilities of adversaries operating in the information environment are:

  • First level: lone or small groups of amateurs using common hacker tools and techniques in an unsophisticated manner without significant support.
  • Second level: individuals or small groups supported by commercial business entities, criminal syndicates, or other transnational groups using common hacker tools in a sophisticated manner. This level of adversary includes terrorists and non-governmental terrorist organizations. Their activities include espionage, data collection, network mapping or reconnaissance, and data theft.
  • Third level: individuals or small groups supported by state-sponsored institutions (military or civilian) and significant resources, using sophisticated tools. Their activities include espionage, data collection, network mapping or reconnaissance, and data theft.
  • Fourth level: state-sponsored offensive IO, especially computer network attacks, using state-of-the-art tools and covert techniques conducted in coordination with (ICW) military operations.

2-28. These events and incidents (both initiated by potential or actual adversaries or by Army users or administrators as a result of carelessness or non-compliance) are identified by the IA and CND communities into categories that include:

  • Category 1: root level intrusion (incident) unauthorized privileged access (administrative or root access to a DOD system).
  • Category 2: user-level intrusion (incident) unauthorized non-privileged access (user-level permissions) to a DOD system.
  • Category 3: unsuccessful activity attempt (event) attempt to gain unauthorized access to the system that is defeated by normal defensive mechanisms. Attempt fails to gain access to the system (e.g., attacker attempt valid or potentially valid username and password combinations) and the activity cannot be characterized by as exploratory scanning.
  • Category 4: denial of service (incident) activity that impairs, impedes, or halts normal functionality of a system or network.
  • Category 5: non-compliance activity (event) activity that due to DOD actions (or non-actions) makes an IT system potentially vulnerable (e.g., missing security patches, connections across security domains, installation of vulnerable applications, etc.).
  • Category 6: reconnaissance (event) an activity (scan or probe) that seeks to identify a computer, an open port, an open service, or any combination thereof for later exploit.
  • Category 7: malicious logic (incident) installation of malicious software (e.g., Trojan, backdoor, virus, or worm).

2-29. The globalization of network communications and the IT marketplace creates vulnerabilities due to increased access to the information infrastructure from points around the world and the uncertainties of the security of the IT supply chain. The global commercial supply chain provides adversaries with greater opportunities to manipulate information and communications technology products over the products life cycle…adversaries have greater access to our networks when (their) products or services are delivered. Threats against computers, network, and information systems vary by the level of hostility (peacetime, conflict, or war), technical capabilities and motivation of the perpetrator. Threats to the information systems and networks relied upon by strategic and tactical forces exist from various sources, and they exist on a continual basis.

ATTACKS

2-32. An intentional intrusion is an attack against computers or information systems. Some attacks have a delayed effect and others are immediate. Both the delayed and immediate attacks corrupt databases and controlling programs, and may degrade or physically destroy the system attacked. Timely attack detection is essential to initiating network restoration and network intrusion response capabilities. The following paragraphs discuss types of attacks.

2-33. Computer attacks generally aim at software or data contained in either end-user or network infrastructure computers. Adversaries aim at unobtrusively accessing information, modifying software and data, or totally destroying software and data. These activities can target individual computers or a number of computers connected to a LAN or wide area network (WAN). Computer attacks may take place during routine tactical operations and may be multifaceted to disrupt major military missions. These attacks can also take place during wartime and peacetime. Attacks can be part of a major nation-state effort to cripple the US national information infrastructure. They can also come from mischievous or vengeful insiders, criminals, political dissidents, terrorists, and foreign espionage agents.

2-34. Malicious computer attacks can be intentionally designed to unleash computer viruses, trigger future attacks, or install software programs that compromise or damage information and systems. They may also involve unauthorized copying of files, directly deleting files, or introducing malicious software or data. Malicious software generally consists of executable software codes secretly introduced into a computer and includes viruses, Trojan horses, trap-doors, and worms. Malicious data insertion, sometimes termed ―spoofing,‖ misleads a user or disrupts systems operation. For example, an attack disrupts a packet data network by introducing false routing table data into one or more routers. An attacker who denies service or corrupt data on a wide scale may weaken user confidence in the information they receive by corrupting or sending false data.

2-35. Physical attacks generally deny service and involve destruction, damage, overrun, or capture of the systems components. This may include end-user computers, communications devices, and network infrastructure components. A physical attack involves the overrun and capture of computer equipment that allows the adversary to employ a computer attack. Another form of physical attack is theft of items, such as cryptographic keys or passwords. This is a major concern since these items can support subsequent electronic or computer attacks.

2-36. Electronic attacks focus on specific or multiple targets within a wide area. Attacks against communications links include the following two types of signal intelligence operations: signal intercept and analysis to compromised data and emitter direction findings, and geo-location to support signal analysis and physical attacks. ―Jamming‖ is another attack against communications links. Jamming corrupts data and may cause denial of service to users. For example, the jamming of communications links supporting global positioning system users is a specific concern.

War Fighter – Full Movie

Grozovye Vorota / Grozovue Vorota / Грозовые ворота / The Storm Gate / War Fighter

War Fighter is a DVD release ( German audio, German subs) of the
russian TV movie “Grozovye Vorota” it’s about a battle durring 2nd Chechen war,
where 200 russian soldiers fights against 2000 terrorists, only 9 survive

Waterloo – Ganzer Spielfilm

Spielfilm von Sergei Bondartschuk (1970)

Im Jahr 1815 entkommt der ehemalige französische Kaiser Napoleon (Rod Steiger) aus seinem Exil Elba, nachdem man ihn nach den langen Kriegen, dem fatalen Russlandfeldzug und der Niederlage bei Leipzig dorthin verbannt hatte. Überraschenderweise schafft es der Ex-Imperator, die Armee wieder auf seine Seite zu ziehen und gegen den König Louis (Orson Welles) ziehen zu lassen.

Der bittet jedoch ganz Europa zu Hilfe und Arthur Wellesly, Duke of Wellington (Christopher Plummer) macht sich mit einer zusammengewürfelten Armee aus mehreren Ländern an die Verteidigung.

Auf dem Schlachtfeld von Waterloo muss sich das Schicksal Europas schließlich endgültig entscheiden, als beide Parteien aufeinandertreffen…

Israel Head of Air Attacks – Israel’s Long Arm – Col. Nissim


Col. Nissim (Photo: IDF Spokesperson)
Col. Nissim (Photo: IDF Spokesperson)

The heightened tension with Iran over its nuclear program is forcing the Israeli Air Force (IAF) to rethink its special needs.

Colonel Shlomo Nissim, head of the IAF’s Aircraft Engineering Department, says, “Our goal is to be at the forefront of technology. We have outstanding people with brilliant ideas, whose professionalism is their calling. Their dedication is expressed in achievements in every field.”

One of the department’s recently completed projects is flexible fuel tanks that extend the range of Yasur (Ch-53 Sea Stallion) and Yanshuf (UH-60 Black Hawk) helicopters. The IAF designed the fuel tanks, and an Israeli company manufactured them.

The project has aroused considerable interest, especially after the announcement of the establishment of the IDF Depth Command, headed by Major General (Res.) Shai Avital. This command is officially charged with planning and implementing long-range, multi-arm special operations in the enemy’s strategic depth. This requires special operational and tactical equipment, and one of the basic tools is extended-range cargo helicopters.

Col. Nissim’s department is constantly improving the performance of IAF planes and helicopters, but not only in the Iranian context. One of the department’s developments that elicited considerable international attention is called the “smart patch.” The patch is glued to a smooth surface in an aircraft suspected of suffering from rapid structural fatigue. The band-shaped patch has microelectronic components that track the structural fatigue and relay the data to mechanics, thus eliminating the need to disassemble the aircraft for examination.

The engineering department is also working on a computerized system that will collect all the flight data from IAF helicopters for analysis. “Today, pilots fill out a questionnaire on their extreme flight maneuvers. However, the method is cumbersome, irksome, and inaccurate. This system will facilitate a new way to track aircraft fatigue. When development is completed, the system will be installed in all IAF helicopters,” Col. Nissim says.

Nissim also explained the IDF’s reasons for purchasing new Hercules transportation planes. “The IAF chose the lengthier model of the C-130J because it has an enhanced storage capacity. Naturally, we’ll be installing a number of our own systems in the aircraft, but the less I speak about them, the better.”

In addition to the procurement of new planes, the older Hercules, which has been in IAF use since the 1970s, will get a new lease on life.

According to Nissim, “The main section of the wings will be replaced to prevent dangerous cracking. Israel Aerospace Industries will put on new wings that will guarantee the planes have many more years of flight.” As new Hercules turboprop transport planes enter operational service, and some of the older ones continue flying, others – mainly the C-130Es – will be deactivated.

The Yasur helicopter has been in the IAF for many years, perhaps it too needs to be retired?

“There are no current alternatives to a heavy helicopter. We keep our Yasur fleet in top working condition through constant maintenance and upgrading. The Yasur will be flying at least until 2024. Nevertheless, the IAF is looking at the Sikorsky CH-53K helicopter, which is still in the planning stages in the US. However, it won’t be ready for export until 2019, which is only one of its problems. The price tag per aircraft is over $100 million.”

A new system that recently joined the Yasur fleet is the automatic hovering system. This system, a product by DRS, is connected to all of the helicopter’s sensors that monitor the aircraft’s altitude, speed, and other data. When a pilot reaches the desired altitude, he activates the hovering system and removes his hands from the flight control system. From that moment on, the system takes control, and the helicopter is as stable as a rock. The IAF played a key part in the system’s development.

The hovering system is being integrated into Yanshuf helicopters. “We test every system that can improve mission performance,” says Col. Nissim.

**Yasur brought back to service, Photo: Ofer Zidon

Uncensored – Occupy Wall Street 13 April 2012

[Image]Occupy Wall Street protestors are taking up the movement in Manhattan again, sleeping on sidewalks around the New York Stock Exchange. Eric Michael Johnson for The New York Times

Occupy Wall Street 13 April 2012

[Image]Occupy Wall Street protestors are arrested by New York City police officers during a demonstration across the street from the New York Stock Exchange on April 13, 2012 in New York City. In preparation for massive May Day demonstrations, Occupy Wall Street protestors continue to hold weekly ‘Spring Training’ demonstrations. Getty

[Image]

[Image]

[Image]

[Image]

[Image]Occupy Wall Street protestors stage a demonstration across the street from the New York Stock Exchange on April 13, 2012 in New York City. In preparation for massive May Day demonstrations, Occupy Wall Street protestors continue to hold weekly ‘Spring Training’ demonstrations. Getty
[Image]An Occupy Wall Street protestor holds a sign during a demonstration on April 13, 2012 in New York City. In preparation for massive May Day demonstrations, Occupy Wall Street protestors continue to hold weekly ‘Spring Training’ demonstrations. Getty
[Image]New York City police officers monitor an Occupy Wall Street protest on April 13, 2012 in New York City. In preparation for massive May Day demonstrations, Occupy Wall Street protestors continue to hold weekly ‘Spring Training’ demonstrations. Getty
[Image]Members of the Occupy Wall Street hold a protest rally in the financial district in New York April 13, 2012. Reuters
[Image]New York City police officers stand guard in front of the New York Stock Exchange during an Occupy Wall Street protest on April 13, 2012 in New York City. In preparation for massive May Day demonstrations, Occupy Wall Street protestors continue to hold weekly ‘Spring Training’ demonstrations. Getty
[Image]Occupy Wall Street protesters chant during a demonstration at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange in the Financial District in New York April 13, 2012. Reuters
[Image]Members of the Occupy Wall Street movement hold a banner along Wall Street after spending the night sleeping across the street from the New York Stock Exchange April 13, 2012. Reuters
[Image]Members of the Occupy Wall Street wake up from a night of sleeping on the street in front of the New York Stock Exchange in New York April 13, 2012. Reuters
[Image]A member of the Occupy Wall Street movement yawns after waking up from a night of sleeping on the street in front of the New York Stock Exchange in New York April 13, 2012. Reuters
[Image]Occupy Wall Street protesters sleeps at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]
[Image]Occupy Wall Street protester Yoni Miller (R) hands out flyers to people at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]A police officer inspects Occupy Wall Street protesters sleeping at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]Occupy Wall Street protesters read a book on the steps of Federal Hall, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner Wall Street and Nassau Street, near the stock exchange, for the past three nights. Reuters
[Image]Occupy Wall Street protesters chant during a demonstration at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]Occupy Wall Street protester Brandon Crozier holds up a sign at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]A woman walks past sleeping Occupy Wall Street protesters, at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]A man walks past Occupy Wall Street protesters at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protestors have slept at the corner for the past three nights. Reuters
[Image]Occupy Wall Street protester Ray Leone (C) holds up a sign at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters

[Image]

[Image]Occupy Wall Street protesters hold up signs at the corner of Wall Street and Nassau Street, across the street from the New York Stock Exchange, in the Financial District in New York April 12, 2012. Occupy Wall Street protesters have slept at the corner for the past three nights. Reuters
[Image]Occupy Wall Street participants occupy a sidewalk near the New York Stock Exchange, background right, Thursday, April 12, 2012. (Richard Drew)

New York Times, April 13, 2012:

For the third consecutive night, Occupy Wall Street protesters used a tactic that many of them hope will emerge as a replacement for their encampment at Zuccotti Park, which was disbanded by the police in November. Norman Siegel, a prominent civil-rights lawyer who visited the protesters on Wednesday night, said a decision by a federal court in Manhattan arising from a lawsuit in 2000 allowed the protesters to sleep on sidewalks as a form of political expression so long as they did not block doorways and took up no more than half the sidewalk.The protesters first cited that ruling last week while sleeping outside bank branches near Union Square, but said this week that they wanted so-called sleep-outs to occur nightly around the New York Stock Exchange. An organizer, Austin Guest, said protesters had scheduled such events for Friday night at four other spots, each related to the Occupy Wall Street message that the financial system benefits the rich and corporations at the expense of ordinary citizens. The protesters’ presence on and near Wall Street has drawn the attention of the police, but officers have not dislodged them.

Michigan Fusion Center Energy Substations Copper Thefts Bulletin – Confidential

https://publicintelligence.net/wp-content/uploads/2012/04/MIOC-CopperThefts.png

Over the last week, approximately 10 Energy Sector substations in the Marshall and Battle Creek area have been the victims of copper theft. Because the current street value for scrap copper is over $4.00 per pound, electric substations have become lucrative targets. The targeting of substations for copper has been an issue for over a year. The recent thefts from substations in the greater Flint area caused significant power outages to the area and safety issues for first responders. The suspects are stealing the grounding system conductors and other wires stored at the substation at night. This is accomplished by digging up sections of the grounding system conductors and cutting it off from the power units. The process is time-consuming and requires the suspects to go inside the substation perimeter fence. A few sites have experienced repeated offenses of copper theft.

Energy Sector companies have advised there SIGNIFICANT safety risk when responding to a substation that has been the victim of copper theft. If a section of the substation grounding system is severed or removed, the grounding system and equipment connected to the grounding system can still hold dangerous levels of electric charge. This may include the perimeter fencing.

Responders should check the perimeter of the substations for signs of intrusion, including cut fencing or cut gate locks. Officers should look for power equipment sparking or the smell of burnt material before proceeding. Do not touch the fence or go inside as the area is not safe and a company representative should be on site before entrance is made. If a suspect is found within the perimeter and/or within the fenced area, responding officers should make the suspect walk toward the officers, away from the electric equipment and advise the suspect not to touch the perimeter fence.

 

TOP-SECRET – Classified Info in Criminal Trials, and More from CRS

Former CIA officer John C. Kiriakou is to be arraigned today on charges of leaking classified information to the press in violation of the Espionage Act and the Intelligence Identities Protection Act — charges that he denies.  See The Case of An Accused Leaker: Politics or Justice? by Carrie Johnson, National Public Radio, April 13.

A newly updated report from the Congressional Research Service discusses Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act, April 2, 2012.

Another newly updated CRS report finds that federal agencies spent $750.4 million last year to pay for “advertising services.”  But though non-trivial, it seems that this amount was less than was spent for such purposes in any previous year since 2003.

The term advertising is not strictly defined in budget documents, and may include various forms of public relations, public service notices, and the like. “Government advertising can be controversial if it conflicts with citizens’ views about the proper role of government,” the CRS report stated. “Yet some government advertising is accepted as a normal part of government information activities.”

Federal advertising expenditures have actually decreased over the past two years and haven’t been lower since 2003. The highest level of advertising expenditures in the past decade occurred in 2004, the CRS report found.  See Advertising by the Federal Government: An Overview, April 6, 2012.

Some other updated CRS reports that have not been made publicly available by Congress include these:

Detention of U.S. Persons as Enemy Belligerents, April 11, 2012

Rare Earth Elements in National Defense: Background, Oversight Issues, and Options for Congress, April 11, 2012

The Lord’s Resistance Army: The U.S. Response, April 11, 2012

Kuwait: Security, Reform, and U.S. Policy, April 11, 2012

Pakistan: U.S. Foreign Assistance, April 10, 2012

TOP-SECRET from the FBI – Eight Individuals Charged and Arrested in Two Separate Corruption Investigations

Wifredo A. Ferrer, United States Attorney for the Southern District of Florida; and Dena E. Choucair, Acting Special Agent in Charge, Federal Bureau of Investigations (FBI), Miami Field Office, announce that eight individuals have been charged in two separate complaints involving public corruption allegations. The first complaint, 12-2494-Garber, charges the lead code compliance inspector for the city of Miami Beach (Jose L. Alberto), four Miami Beach code compliance officers (Willie E. Grant, Orlando E. Gonzalez, Ramon D. Vasallo, Vicente L. Santiesteban), and two Miami Beach firefighters (Henry L. Bryant and Chai D. Footman) for their participation in a scheme to extort cash payments from a South Beach nightclub. The second complaint, 12-2495-Garber, charges Daniel L. Mack, a Miami-Dade police officer, and Henry L. Bryant (who was also charged in the first complaint) for their participation in a drug trafficking conspiracy in which they agreed to transport and protect what they believed to be multiple kilograms of cocaine. The defendants are expected to make their initial appearances in federal court today at 2:00 p.m. before U.S. Magistrate Judge Barry Garber.

U.S. Attorney Wifredo A. Ferrer stated, “When government officials misuse their offices and abuse their power to line their own pockets and satisfy their greed, they erode the public’s trust in good and efficient government. It is incumbent upon all of us to adopt a zero-tolerance policy for corruption, at any level of government. I encourage victims to come forward, report shakedowns of this kind, and help us shine a light on backroom corruption.”

“When corrupt officials break the law for their own personal gain, they breach the public’s trust and violate the very principles they have sworn to uphold,” said Dena E. Choucair, Acting Special Agent in Charge of the FBI’s Miami Division. “This should serve as a reminder to all of our public officials that no one is above the law.”

The first complaint (the extortion complaint) charges Alberto, 41, of Miami Beach; Grant, 56, of Miami; Gonzalez, 32, of Miami; Vasallo, 31, of Miami Beach; Santiesteban, 29, of Miami; Bryant, 45, of Miami Gardens; and Footman, 36, of Miramar, with one count of conspiracy to commit extortion under color of official right, in violation of 18 U.S.C. § 1951(a). If convicted, the defendants face a maximum statutory penalty of up to 20 years’ imprisonment.

Miami Beach nightclubs are subject to inspection by both the city of Miami Beach Code Compliance Division and the city of Miami Beach Fire Department for compliance with municipal code regulations. Both the fire department and the Code Compliance Division can issue citations for code violations. According to the extortion complaint affidavit, in early June 2011, Alberto, the lead code compliance inspector for the city of Miami Beach, solicited a cash pay-off from a Miami Beach nightclub owner in exchange for not enforcing a large fine for a code violation. The nightclub owner reported the alleged extortion to the FBI, which commenced an undercover investigation. During the investigation that followed, an undercover FBI agent posed as the manager of the nightclub and, along with the nightclub owner, made a series of cash pay-offs to Alberto and co-defendants Grant, Gonzalez, Vasallo, Santiesteban, Bryant, and Footman. The purpose of the cash pay-offs was to allow the nightclub to continue operating and to avoid any future potential code violations. According to statements made by Bryant in a recorded conversation, he and Alberto had worked together “for about 12 years on every little gig that [they] had.” Bryant also bragged that he and Alberto had kept another business open despite multiple code violations because the business had paid them “four grand.” Over the course of the investigation, which lasted seven months, the undercover agent paid more than $25,000 in cash pay-offs to the various Miami Beach public employees.

The second complaint (the drug trafficking complaint) charges Mack, 47, of Miami, and Bryant, of Miami Gardens, with conspiring to possess with the intent to distribute more than five kilograms of cocaine, in violation of 21 U.S.C. § 841(a)(1) and 846. If convicted, the defendants face a maximum statutory penalty of up to life imprisonment.

According to the affidavit filed in support of the drug complaint, in early December 2011, the undercover agent and Bryant discussed the possibility of recruiting police officers who could provide protection for the movement of cocaine. Over the following weeks, during recorded meetings and conversations, Bryant explained that he knew police officers that would escort the cocaine and that he would personally move the cocaine in his own vehicle. After reaching an agreement with the undercover agent, Bryant transported what he believed to be cocaine from the nightclub in Miami Beach to pre-determined drop-off points in Miami-Dade County on two separate occasions: on December 21, 2011, the defendants moved approximately nine kilograms of sham cocaine; on January 14, 2012, the defendants moved approximately 10 kilograms of sham cocaine. On both occasions, Bryant picked up the sham cocaine and returned for cash payment. On both occasions, Bryant’s vehicle was escorted by the Miami-Dade Police Department police cruiser assigned to defendant Mack, who had been introduced to the undercover agent as a police officer who would be providing security for the movement of cocaine. At that meeting, Mack wore his Miami-Dade Police Department uniform, was armed, and drove his Miami-Dade police cruiser. For these two transactions, the undercover agent paid the defendants a total of $25,000 in cash pay-offs.

The case was investigated by the FBI Miami-Area Public Corruption Task Force, assisted by the Miami-Dade Police Department Professional Compliance Bureau and United States Customs Border Protection Office of Internal Affairs. These cases are being prosecuted by Assistant U.S. Attorneys Jared E. Dwyer and Robin W. Waugh.

A complaint is only an accusation, and a defendant is presumed innocent until and unless proven guilty.

A copy of this press release may be found on the website of the United States Attorney’s Office for the Southern District of Florida at http://www.usdoj.gov/usao/fls.

CONFIDENTIAL – IARPA Catalyst Entity Extraction and Disambiguation Study Final Report

https://publicintelligence.net/wp-content/uploads/2012/04/IARPA-Catalyst.png

(U) Catalyst, a component of DDNI/A’s Analytical Transformation Program, will process unstructured, semistructured, and structured data to produce a knowledge base of entities (people, organizations, places, events, …) with associated attributes and the relationships among them. It will perform functions such as entity extraction, relationship extraction, semantic integration, persistent storage of entities, disambiguation, and related functions (these are defined in the body of the report). The objective of this study is to assess the state-of-the-art and state-of-the-practice in these areas.

(U) The objective of this study is to assess the state-of-the-art and state-of-the-practice in entity extraction and disambiguation in the academic, the government, and the commercial worlds for potential use by the Catalyst Program, a component of DDNI/A’s Analytical Transformation (AT) Program. The AT Program is being executed by a variety of Executive Agents, managed by the DNI/CIO. We interpret this purpose to include all ancillary functions needed to develop an end-to-end system that takes as input unstructured data (primarily free text, with or without document-level metadata) and results in a knowledge base of entities (people, organizations, places, events, etc.) with attributes of these entities and the relationships among these entities. Thus, in addition to entity extraction and disambiguation, an eventual Catalyst capability will need functions such as relationship extraction, semantic integration, persistent storage of entities, and others to provide end-to-end functionality. Note that we are not defining what constitutes a Catalyst system, but rather what capabilities need to be performed by some processing component to result in the kinds of outputs envisioned for Catalyst, which are sets of semantically aligned, integrated, disambiguated entities of interest for a problem area.

(U) We assume that this generic processing starts with unstructured and semi-structured data, such as documents, images, videos, audios, signals, measurements, etc., as well as structured data, that are collected from a wide variety of sources by a variety of methods. We use the term resource to include all of these input data types. The objective of Catalyst’s advanced intelligence processing is to identify the entities—people, places, organizations, events, etc.—in the resources and what the resource says about the entities (the attributes of entities and the relationships among them). This information is made available to users (generally, intelligence analysts) so they can retrieve information about these entities and detect patterns of interest to their analysis mission.

(U) At a high level, there are three steps to the kind of intelligence processing related to Catalyst: (1) describing resources and making them capable of being processed, (2) semantically integrating entities of interest to a specific task (including disambiguation of these entities), and (3) processing the entities to produce some conclusion of interest. The figure below summarizes the three steps of intelligence processing. Each step is expanded upon below.

https://publicintelligence.net/wp-content/uploads/2012/04/lsie.png

 

From the FBI – Fugitive from Washington, D.C. Area Named to FBI’s Ten Most Wanted Fugitives List

The Federal Bureau of Investigation announced today the addition of Eric Justin Toth, aka David Bussone, to its Ten Most Wanted Fugitives list. Toth, a former private school teacher and camp counselor, is being sought for his alleged production and possession of child pornography. The investigation into Toth began in June 2008 after pornographic images were found on a school camera that had been in his possession.

Toth is 6’3” and weighs approximately 155 pounds with brown hair, green eyes, and a medium complexion. He also has a mole under his left eye. Toth was born on February 13, 1982.

Toth has often been described as a computer expert and has demonstrated an above-average knowledge regarding computers, the use of the Internet, and security awareness. He has the ability to integrate into various socio-economic classes and is an expert at social engineering. Toth possesses an educational background conducive to gaining employment in fields having a connection to children. He attended Cornell University for a year and then transferred to Purdue University, where he graduated with a degree in education. He may advertise online as a tutor or male nanny.

Despite being featured on multiple local news reports as well as the America’s Most Wanted television program and the FBI website, Toth has eluded capture. Since June 2008, Toth is believed to have traveled to Illinois, Indiana, Wisconsin, and Minnesota. It is also believed that he lived in Arizona as recently as 2009.

Eric Toth is the 495th person to be placed on the FBI’s Ten Most Wanted Fugitives list, which was established in March 1950. Since then, 465 fugitives have been apprehended or located, 153 of them as a result of citizen cooperation.

The FBI is offering a reward of up to $100,000 for information leading directly to the arrest of Toth.

Unveiled – The Neuroscience of Adam Smith’s ‘Theories of Morality’

https://s3.amazonaws.com/disinfo/wp-content/uploads/2012/04/AdamSmith.jpg

 

“Adam Smith contended that moral sentiments like egalitarianism derived from a ‘fellow-feeling’ that would increase with our level of sympathy for others, predicting not merely aversion to inequity, but also our propensity to engage in egalitarian behaviors,” the researchers wrote. Via ScienceDaily:

The part of the brain we use when engaging in egalitarian behavior may also be linked to a larger sense of morality, researchers have found. Their conclusions, which offer scientific support for Adam Smith’s theories of morality, are based on experimental research published in the latest issue of the Proceedings of the National Academy of Sciences.

The study, coming seven months after the start of the Occupy Wall Street Movement, which has been aimed at addressing income inequality, was conducted by researchers from: New York University’s Wilf Family Department of Politics; the University of Toronto; the University of California, San Diego; the University of California, Davis; and the University of Nebraska, Lincoln.

Previous scholarship has established that two areas of the brain are active when we behave in an egalitarian manner — the ventromedial prefrontal cortex (vmPFC) and the insular cortex, which are two neurological regions previously shown to be related to social preferences such as altruism, reciprocity, fairness, and aversion to inequality. Less clear, however, is how these parts of the brain may also be connected to egalitarian behavior in a group setting…

TOP-SECRET from the NSA – The Zelikow Memo: Internal Critique of Bush Torture Memos Declassified

Washington, DC, April 13, 2012 – The State Department today released a February 2006 internal memo from the Department’s then-counselor opposing Justice Department authorization for “enhanced interrogation techniques” by the CIA. All copies of the memo (Document 1), which reflect strong internal disagreement within the George W. Bush administration over the constitutionality of such techniques, were thought to have been destroyed. But the State Department located a copy and declassified it in response to a Freedom of Information Act request by the National Security Archive.


Philip D. Zelikow, State Department Counselor, 2005-2007

The author of the memo, Philip D. Zelikow, counselor to then-Secretary of State Condoleezza Rice, described the context of the memo in congressional testimony on May 13, 2009, and in an article he had previously published on foreignpolicy.com site on April 21, 2009.

“At the time, in 2005 [and 2006],” he wrote, “I circulated an opposing view of the legal reasoning. My bureaucratic position, as counselor to the secretary of state, didn’t entitle me to offer a legal opinion. But I felt obliged to put an alternative view in front of my colleagues at other agencies, warning them that other lawyers (and judges) might find the OLC views unsustainable.”

OLC refers to the Justice Department’s Office of Legal Counsel.

“My colleagues were entitled to ignore my views,” he continued. “They did more than that: The White House attempted to collect and destroy all copies of my memo. I expect that one or two are still at least in the State Department’s archives.”

Zelikow attached two other memos to his May 2009 congressional testimony (Document 3) that were publicly released at that time (Document 4 and Document 5), but his February 2006 memo remained classified. In later public statements, Zelikow argued that the latter document should also be released since the OLC memos themselves had already been opened to the public by the Obama administration.

The memo released today, labeled “draft,” concludes that because they violate the Constitutional ban on “cruel and unusual punishment,” the CIA techniques of “waterboarding, walling, dousing, stress positions, and cramped confinement” were “the techniques least likely to be sustained” by the courts. Zelikow also wrote that “corrective techniques, such as slaps” were the “most likely to be sustained.” The last sentence of the memo reads: “[C]ontrol conditions, such as nudity, sleep deprivation, and liquid diets, may also be sustainable, depending on the circumstances and details of how these techniques are used.”

According to Zelikow’s accounts, he authored the memo in an attempt to counter the Bush administration’s dubious claim that CIA could still practice “enhanced interrogation” on enemy combatants despite the president’s December 2005 signing into law of the McCain Amendment, which, in Zelikow’s words, “extended the prohibition against cruel, inhuman, or degrading treatment to all conduct worldwide.”

The Zelikow memo becomes the latest addition to The Torture Archive – the National Security Archive’s online institutional memory for issues and documents (including the OLC’s torture memos themselves) relating to rendition, detainees, interrogation, and torture.


DOCUMENTS

Document 1: Philip D. Zelikow, State Department Counselor, Draft Memorandum, “The McCain Amendment and U.S. Obligations under Article 16 of the Convention Against Torture,” Top Secret, February 15, 2006
Source: Freedom of Information Act request

Written following passage of the so-called McCain Amendment against “cruel, inhuman, or degrading treatment or punishment,” this memo offers alternative legal argumentation to the opinions that the Justice Department’s Office of Legal Counsel continued to put forward into 2006. According to Zelikow, he was told that some officials in the Bush administration sought to gather all copies of his memo and destroy them, but the State Department located this one and released it under the Freedom of Information Act.

Document 2: Stephen G. Bradbury, Justice Department, Office of Legal Counsel, Memorandum for John A. Rizzo, “Re: Application of United States Obligations Under Article 16 of the Convention Against Torture to Certain Techniques that May Be Used in the Interrogation of High Value al Qaeda Detainees,” Top Secret, May 30, 2005
Source: The Torture Archive, the National Security Archive

This memo follows up previous OLC opinions on interrogation methods, providing an even more expansive vision of what kinds of “enhanced techniques” would be acceptable against al Qaeda and other detainees. Zelikow specifically refers to this memo in his February 2006 counter-argument.

Document 3: Philip D. Zelikow, Statement before the United States Senate Committee on the Judiciary, Subcommittee on Administrative Oversight and the Courts, Unclassified, May 13, 2009
Source: Provided by Philip Zelikow to the National Security Archive (originally posted online by the Federation of American Scientists)

After the Obama administration declassified the controversial Office of Legal Counsel opinions on so-called “enhanced interrogation techniques,” Congress weighed in on the question. Here, Zelikow lays out his critique of the OLC position in detail.

Document 4: Philip D. Zelikow, State Department Counselor, and Gordon R. England, Deputy Secretary of Defense, “Elements of Possible Initiative,” Sensitive but Unclassified, June 12, 2005
Source: Provided by Philip Zelikow to the National Security Archive (originally posted online by the Federation of American Scientists)

Zelikow and Gordon England, the acting deputy secretary of defense, put together this draft of a possible presidential initiative on detainee treatment and interrogation. The document was appended to Zelikow’s May 2009 congressional testimony. According to his prepared statement, this memo describes a “big bang” approach to dealing with the larger issues, but after Defense Secretary Donald Rumsfeld rejected its ideas, the National Security Council staff decided to pursue each issue piecemeal.

Document 5: Philip D. Zelikow, State Department Counselor, and John B. Bellinger III, State Department Legal Advisor, “Detainees – The Need for a Stronger Legal Framework,” Unclassified, July 2005
Source: Provided by Philip Zelikow to the National Security Archive (originally posted online by the Federation of American Scientists)

In his May 2009 congressional testimony, Zelikow describes this document as part of an attempt by the State Department to enlist other U.S. government agencies to define legal standards for detainee treatment that were less “technical” and more “durable – politically, legally, and among our key allies.” The memo was appended to his testimony.

SECRET – U.S. Special Operations Forces Reference Manual 2nd Edition

https://publicintelligence.net/wp-content/uploads/2012/04/JSOU-SOF-Reference.png

 

This Special Operations Forces Reference Manual provides general information and mission planning data and focuses on U.S. Army, Navy, Marine, and Air Force SOF. More specifically, this document is designed to accomplish four broad purposes:

Provide SOF personnel

a. with a single primary source of fundamental reference material and planning data on all SOF components.

b. Provide newly assigned SOF personnel or non-SOF personnel an overview of special operations and special operations forces in order to facilitate the integration of conventional forces and provide SOF capabilities and planning data to conventional force staff officers who may not routinely use this data.

c. Provide standard SOF reference data to SOF faculty members at PME institutions for use in their instruction.

d. When combined with tactical situations and scenarios, provide SOF commanders and units a vehicle to facilitate unit/staff-level seminar wargames.

The target audience for this manual is Special Operations staff officers and enlisted personnel at USSOCOM, its component and subordinate commands, the Theater Special Operations Commands, and the conventional force headquarters/unified commands and their staffs which may employ SOF in their areas of responsibility.

This reference manual is doctrinally based, drawing information and data from Joint, USSOCOM, and Service publications.

 

https://publicintelligence.net/wp-content/uploads/2012/04/jsou-so.png

 

 

Exposed – Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products Price List

The following price list for Harris Corporation wireless surveillance products was included in contract documentation for the purchase of multiple KingFish Dual Mode wireless measurement systems that went to Maricopa County, Arizona.  This contract was pointed out by Jacob Appelbaum in August 2011, yet Maricopa County responded to the ACLU’s recent information requests by stating that it does not have a wireless tracking program.  For an earlier version of Harris’ Wireless Product Group Pricing Guide, see:

Harris Corporation AmberJack, StingRay, StingRay II, KingFish Wireless Surveillance Products Price List

https://publicintelligence.net/wp-content/uploads/2012/04/Harris-WPG-2010_Page_1-791x1024.jpg

https://publicintelligence.net/wp-content/uploads/2012/04/Harris-WPG-2010_Page_2-791x1024.jpg

https://publicintelligence.net/wp-content/uploads/2012/04/Harris-WPG-2010_Page_3-791x1024.jpg

https://publicintelligence.net/wp-content/uploads/2012/04/Harris-WPG-2010_Page_4-791x1024.jpg

DOWNLOAD THE ORGINAL DOCUMENT HERE

Harris-WPG-2010

TOP-SECRET from the NSA – The most valuable Agents

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB375/soloThumb.jpg

Washington, D.C., April 12, 2012 – The “FBI’s most valued secret agents of the Cold War,” brothers Morris and Jack Childs, together codenamed SOLO, reported back to J. Edgar Hoover starting in 1958 about face-to-face meetings with top Soviet and Chinese Communist leaders including Mao and Khrushchev, while couriering Soviet funds for the American Communist Party, according to newly declassified FBI files cited in the new book by Tim Weiner, Enemies: A History of the FBI(New York: Random House, 2012).

Highlights from the massive SOLO files (which total more than 6,941 pages in 45 volumes declassified in August 2011 and January 2012) appear on the National Security Archive’s Web site today at www.nsarchive.org, together with an overview by Tim Weiner and a new search function, powered by the Archive’s partnership with DocumentCloud, that enables full-text search of the entire SOLO file (instead of the 45 separate PDF searches required by the FBI’s Vault publication at http://vault.fbi.gov/solo).

For more on Enemies, see last night’s broadcast of The Daily Show with Jon Stewart, featuring Tim Weiner, and the reviews by The New York Times Book Review, The Guardian, and The Washington Post.

“SOLO” BY TIM WEINER

FBI Director J, Edgar Hoover’s most valued secret agent was a naturalized citizen of Russian/Ukrainian/Jewish origins named Morris Childs.  He was the first and perhaps the only American spy to penetrate the Soviet Union and Communist China at the highest levels during the Cold War, including having face-to-face conversations with Nikita Khrushchev, Mao Zedong and others in a red-ribbon cast of Communist leaders.

The operation, codenamed SOLO, that the FBI built on his work (and that of his brother, Jack) posed great risks and the promise of greater rewards. The FBI’s first debriefings of Morris Childs were declassified in August 2011 in time for inclusion in the book Enemies.  Even more SOLO debriefings and associated memos – upwards of 45 volumes and thousands of pages – emerged in January 2012.

Researchers have been requesting these documents for years, and with good reason. They are unique records of a crucial chapter in the history of American intelligence. They illuminate several mysteries of the Cold War, including the origins of Hoover’s hatred for Martin Luther King, some convincing reasons for Dwight Eisenhower’s decision to hold off on the CIA’s plans to invade Fidel Castro’s Cuba, and the beginnings of Richard Nixon’s thoughts about a détente with the Soviets.

Morris Childs was an important figure in the Communist Party of the United States in the 1930s and 1940s, serving as the editor of its newspaper, the Daily Worker. He and his brother Jack had fallen out with the Party in 1948. Three years later, the FBI approached him as part of a new program called TOPLEV, in which FBI agents tried to talk top-level Communist Party members and officials into becoming informants.

Childs became a Communist for the FBI. He rejoined the Party and rose higher and higher in its secret hierarchy. In the summer of 1957, the Party’s leaders proposed that he serve as their international emissary in an effort to reestablish direct political and financial ties with the Kremlin. If Moscow approved, Childs would be reporting to Hoover as the foreign secretary of the Communist Party of the United States.

The FBI’s intelligence chief, Al Belmont, could barely contain his excitement over Childs’ cooperation.  If the operation succeeded, he told Hoover, “it would enhance tremendously the Bureau’s prestige as an intelligence agency.”

[See Document 1: Memorandum from A.H. Belmont to L.V. Boardman, “Courier System Between Communist Party, USA, and Communist Party, Soviet Union,” 30 August 1957.  Source: http://vault.fbi.gov/solo/solo-part-01-of/view, page 17.]

On March 5, 1958, the FBI’s top intelligence officials agreed that the operation would work: the Bureau could “guide one of our informants into the position of being selected by the CPUSA as a courier between the Party in this country and the Soviet Union.”

[See Document 2: Memorandum from A.H. Belmont to L.V. Boardman, “Communist Party, USA, International Relations, Internal Security-C,” 5 March 1958.  Source:  http://vault.fbi.gov/solo/solo-part-01-of/view, page 1.]

On April 24, 1958, Childs boarded TWA Flight 824 to Paris, on the first leg of his long trip to Moscow, at the invitation of the Kremlin. He met the Party’s leaders over the course of eight weeks. He learned that his next stop would be Beijing. On July 6, 1958, he had an audience with Chairman Mao Zedong (see pages 13-16 of Document 3B)  Was the United States planning to go to war in Southeast Asia? Mao asked. If so, China intended to fight to the death, as it had during the Korean War. “There may be many Koreas in Asia,” Mao predicted.

[See Documents 3A-B:  A: Childs’ Account of his April 1958 Trip to Soviet Union and China. B:  SAC, New York, to Director, FBI, 23 July 1958 [account of Child’s first trip as a double-agent] Source: http://vault.fbi.gov/solo/solo-part-02-of/view.]

Returning to Moscow that summer, conferring with leaders of the Party and the KGB, Morris received a formal invitation to attend the 21st Congress of the Communist Party of the Soviet Union, and he accepted promises of cash payments for the CPUSA that would come to $348,385 over the next few months. The money was delivered to Morris by a Soviet delegate to the United Nations at a restaurant in Queens, New York.

Though the trips exhausted him, leaving him a physically broken man, Morris Childs went abroad two or three times a year over the course of the next two decades. He undertook fifty- two international missions, befriending the world’s most powerful Communists. He controlled the income of the American Communist Party’s treasury and contributed to the formulation of its foreign policy. His work as SOLO was undetected by the KGB and kept secret from all but the most powerful American leaders.

[See Document 4: Clyde Tolson to the Director, 12 March 1959 [report on Child’s background, how he was recruited, and information from his most recent trip to Moscow] Source: http://vault.fbi.gov/solo/solo-part-11-of-17/view, p. 49.]

SOLO’s intelligence gave Hoover an unquestioned authority in the White House. The United States never had had a spy inside the high councils of the Soviet Union or the People’s Republic of China. Morris Childs would provide the U.S. government with insights no president had ever before possessed.

Hoover briefed President Eisenhower about the SOLO mission repeatedly from November 1958 onwards. For the next two years, Hoover sent summaries of his reporting directly to Eisenhower and Vice President Nixon. Hoover reported that the world’s most powerful Communists– Mao Zedong and Nikita Khrushchev– were at each other’s throats. The breach between Moscow and Beijing was a revelation to Eisenhower. The FBI director also reported that Moscow wanted the CPUSA to support the civil rights movement in the United States. The idea that communism and civil rights were connected through covert operations was electrifying to Hoover.

Hoover told the White House that SOLO had met with Anibal Escalante, a political leader of the newly victorious revolution in Cuba, a confidant to Fidel Castro and the Cuban Communist most highly regarded in Moscow. Escalante said that the Cubans knew the United States was planning a paramilitary attack to overthrow Castro. This reporting gave Eisenhower pause as he weighed the CIA’s proposal to invade the island with a force of anti-Castro Cubans undergoing training in Guatemala. He never approved the plan; that was left to President Kennedy, who went ahead with the disastrous Bay of Pigs invasion.

[See Document 5: Memoranda and Letters to Director/Naval Intelligence, Director/CIA, National Security Adviser, Secretary of State, and Vice President Nixon on Information from Anibal Escalante.  Source: http://vault.fbi.gov/solo/solo-part-21-22-of/view]

Hoover reported directly to Nixon as the vice president prepared to go to Moscow in July 1959, where he would engage Khrushchev in a public discussion on the political and cultural merits of communism and capitalism. SOLO had met with the top Communist Party officials responsible for American affairs. Hoover distilled their thinking about the leading candidates in the 1960 presidential election.

Moscow liked Ike: he understood the meaning of war and he was willing to risk the chances of peace. But Senator Kennedy was judged as “inexperienced” and potentially dangerous. As for Nixon, the Communists thought he would be a capable president, though he was “cunning” and “ambitious.”

[See Document 6: SAC, New York, to Director, FBI, 13 March 1960 [report on Khrushchev’s imminent visit to France and on President Eisenhower’s prospective (later cancelled) trip to Soviet Union].  Source: http://vault.fbi.gov/solo/solo-part-19-20-of/view, pp. 93-98.]

Nixon learned from the SOLO debriefings that Moscow could conduct rational political discourse; a decade later, the lesson served him well as president when he sought détente with the Soviets.

[Adapted from Tim Weiner, Enemies: A History of the FBI, pp. 207-209]


MORE ABOUT SOLO

The SOLO records are an extraordinary new contribution to the history of the FBI and American intelligence. It is worth noting that prior to the new FBI releases, earlier scholars had made important contributions to knowledge of this FBI operation.  Civil rights historian and assiduous FOIA requester David J.Garrow was the first researcher to discover the role of the Childs brothers as FBI double-agents.  In his book, Martin Luther King and the FBI: from ‘Solo’ to Memphis (New York: W. W.  Norton, 1981), Garrow sought to explain why J.Edgar Hoover and the Bureau were such “viciously negative” opponents of King.  Garrow disclosed that the Childs brothers had provided information to the FBI on Stanley Levison, one of King’s key political advisers.  Levison had been active in the U.S. Communist Party during the early 1950s but, as Childs reported, had left the organization because of its political irrelevance. Nevertheless, the FBI saw Levison as a Soviet agent and used his former political connections as leverage to force King to break with his adviser.

Following Garrow’s trail was the late John Barron, a former Naval intelligence officer turned journalist and later a full-time writer for Readers Digest who produced as full an account of “Operation Solo” as was possible in the 1990s.  An expert on the KGB, Barron met numerous former Soviet agents.  One day, Morris Childs and his wife turned up at Barron’s Washington, D.C. office.  Recognizing the Childs’ importance, Barron wanted to tell Morris’ story and did so through interviews with the FBI case officers who had handled contacts with the Childs brothers and their associates.  Barron had no access to the documents, but his book, Operation Solo: The FBI’s Man in the Kremlin (Regnery, 1996), provided the first detailed account of the rise of Morris Childs to an influential role in the U.S. Communist Party, why he secretly broke with the Party, when and how he started to work with the FBI, and how he used his party connections and recurrent travel to Moscow and Beijing to provide current intelligence on developments in those capitals.

William Burr


THE DOCUMENTS

Archive staff have downloaded the SOLO files from the FBI site and launched them in DocumentCloud in order to get a higher-quality full-text (OCR) and keyword search capacity down to the individual page level. The following files correspond to the 45 volumes posted on the FBI’s Vault. To search the entire group, enter terms in the field below and press “Enter.” The results will take you to the correct volume. Repeat your search and the results will take you to the correct page with the term highlighted in yellow.

 

FEMEN uncensored – Alarm, alarm!

http://www.dailymotion.com/video/xq330z_alarm-alarm_news?search_algo=1

April 10 at 10:00 AM 5 beauties of FEMEN imprisoned himself in the bell tower of Saint Sophia Cathedral. By adopting a canonical form, the activist hit all the bells and launched a 7-meter long banner with the slogan “STOP”. Alarm alarm alerted the eternal city of gangster conspiracy of church and state, which aims to impose a government on the control of the sacred feminine gift of procreation. Signified whoring was reflected in the bill number 10 170 on deprivation of women’s right to abortion.

Quo Vadis – Full Movie

QUO VADIS=Whither goest thou?
The film tells the story of a Roman military commander, Marcus Vinicius (Robert Taylor), who is also the legate of the XIV Gemina, returning from the wars, who falls in love with a devout Christian, Lygia (Deborah Kerr), and slowly becomes intrigued by her religion. Their love story is told against the broader historical background of early Christianity and its persecution by Nero (Peter Ustinov).

The film stars Robert Taylor, Deborah Kerr, Leo Genn, Peter Ustinov, with Patricia Laffan, Finlay Currie, Felix Aylmer and Abraham Sofaer. Sophia Loren was cast in the movie as an (uncredited) extra.

TOP-SECRET from the FBI – Three Mortgage Loan Officers Guilty Orchestrating $9 Million Mortgage Fraud Scheme

Preet Bharara, the United States Attorney for the Southern District of New York, announced that three mortgage loan officers, Frederick Warren, Dorian Brown, and Fritz Bonaventure each pled guilty today for their roles in a $9 million mortgage fraud scheme. The defendants pled guilty before U.S. District Judge Naomi Reice Buchwald.

Manhattan U.S. Attorney Preet Bharara said, “Frederick Warren, Dorian Brown, and Fritz Bonaventure betrayed the lending institutions for which they worked, approving loan applications they knew were bogus and would end up in default. Their pleas today are sterling examples of how federal and state authorities can work together to identify, prosecute, and punish those who engage in mortgage fraud.”

According to the indictment previously filed in Manhattan federal court:

Warren, Brown, and Bonaventure, along with nine other individuals, engaged in an illegal scheme to defraud various lending institutions by using fictitious and fraudulent “straw identities” to apply for mortgage loans. Through the scheme, the defendants were able to obtain more than $9 million in mortgage loans for the purchase of dozens of residential properties throughout the New York City metropolitan area and Long Island. Most of these loans quickly went into default. Warren, Brown, and Bonaventure each acted as loan officers who processed the fraudulent mortgage applications.

***

Warren, 38, of Miller Place, New York; and Brown, 38, of Mount Sinai, New York, each pled guilty to one count of conspiracy to commit wire fraud and bank fraud and one count of wire fraud. They face a maximum sentence of 50 years in prison.

Bonaventure, 30, of Lithonia, Georgia, pled guilty to one count of conspiracy to commit wire fraud and bank fraud and faces a maximum sentence of 30 years in prison.

All three defendants will be sentenced by Judge Buchwald: Warren on August 14, 2012; Brown on August 14, 2012; and Bonaventure on September 12, 2012.

Co-defendants Jeffrey Larochelle, Joell Barnett, Foriduzzaman Sarder, Sakat Hossain, and Mikael Huq previously pled guilty in this case. Sarder was sentenced by Judge Buchwald on June 26, 2011 to 78 months in prison. Hossain was sentenced by Judge Buchwald on March 1, 2012 to 29 months in prison. The sentencings of Larochelle, Barnett, and Huq are pending.

Criminal charges remain pending against the following defendants: Eric Finger, Reginald Johnson, Denise Parks, and Brandon Lisi. The trial for these defendants is scheduled to begin on May 7, 2012, and they are presumed innocent unless and until proven guilty.

Mr. Bharara praised the outstanding investigative efforts of the New York Attorney General’s Office, which led the investigation and has collaborated in the prosecution. He also thanked the Federal Bureau of Investigation and the New York State Department of Financial Services for their assistance in this case.

This case is being handled by the Office’s Complex Frauds Unit. Assistant United States Attorneys Michael D. Lockard and Ryan P. Poscablo, and Assistant Attorney General Meryl Lutsky—who is designated as a Special Assistant U.S. Attorney in this case—are in charge of the prosecution.

CONFIDENTIAL – National Level Exercise 2012 Will Focus on Cyber Attacks Against Critical Infrastructure

https://publicintelligence.net/wp-content/uploads/2012/04/FEMA-NLE2012-31.png

 

Public Intelligence

Rather than combating natural disasters or a nuclear detonation in a major U.S. city, this year’s National Level Exercise will focus on cyber threats to critical infrastructure and the “real world” implications for government and law enforcement of large-scale cyber attacks.  National Level Exercise 2012 (NLE 2012) is scheduled to take place in June and will involve emergency response personnel from at least thirteen states, four countries, nearly every major governmental department as well as a number of private companies, non-governmental organizations, institutions of higher education and local fusion centers.  The exercise will span four FEMA regions and will include scenarios affecting the National Capital Region.

Past NLEs have focused primarily on threats related to terrorism or catastrophic natural disasters.  NLE 2010 focused on the hypothetical detonation of an improvised nuclear device (IND) in Las Vegas.  NLE 2011 concerned a massive earthquake occurring in the New Madrid Seismic Zone.  NLE 2012 will be the first exercise in the series to concern itself primarily with cyber threats.  A private sector participant guide released by FEMA states that NLE 2012 “will address cyber and physical response coordination, including resource allocation . . . emergency assistance and disaster relief resources, relative to a cyber event with physical effects.”  Another presentation from FEMA adds that the exercise will evaluate government “roles and responsibilities in coordinating national cyber response efforts and their nexus with physical response efforts.”

While the exact scenario for NLE 2012 is not known, the “high level” goals include simulating a situation where there is an “ambiguous threat landscape with multiple adversary types” that produces “physical impacts resulting from cyber attack and cascading effects” that threaten “critical commercial logistics and data, industrial control systems, and associated operations.”  NLE 2012 will be unique in that there “will be an emphasis on the shared responsibility among the Federal Government; state, local, tribal nations, and territories; the private sector; and international partners to manage risk in cyberspace and respond together to a cyber event with national consequences.”  Due to the “sensitivity of the exercise scenario and the related private sector concerns in terms of media exposure” FEMA has made it clear that the names of private sector participants will not be publicly released.

The exercise will occur amidst a growing climate of panic in Washington regarding the state of U.S. cybersecurity.  The FBI’s top cybersecurity official recently resigned stating that the U.S. is fighting a losing war against hackers: “I don’t see how we ever come out of this without changes in technology or changes in behavior, because with the status quo, it’s an unsustainable model. Unsustainable in that you never get ahead, never become secure, never have a reasonable expectation of privacy or security.”  Former government officials are advocating U.S. Customs “inspect what enters and exits the United States in cyberspace” and calling for prompt action on multiple pieces of cybersecurity legislation passing through the House and Senate.

NLE 2012′s goal of examining physical effects of cyber attacks underscores a comment recently made by the director of the FBI that the “cyber threat” will soon replace terrorism as the country’s highest national security priority.  In March, a multi-agency exercise that included the FBI and NSA simulated a cyber attack capable of crippling the New York power grid during a summer heat wave.  Last September, the Department of Homeland Security issued a warning to members of the “critical infrastructure community” that the hacktivist group Anonymous had expressed interest in industrial control systems.  Computer security researchers have also recently demonstrated a number of techniques for attacking computer systems used in critical infrastructure that reportedly resemble the Stuxnet virus responsible for disrupting Iran’s nuclear program in 2010.

 

See more here

National Level Exercise 2012 Will Focus on Cyber Attacks Against Critical Infrastructure

TOP-SECRET from the FBI – William Colby’s Handwritten and Typed Notes on Sensitive Central Intelligence Agency Activities

Citation: [William Colby’s Handwritten and Typed Notes on Sensitive Central Intelligence Agency Activities]
[Classification Unknown], Notes, May 09, 1973, 14 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00023
Origin: United States. Central Intelligence Agency. Directorate of Operations. Deputy Director
From: Colby, William E.
Individuals/
Organizations Named:
Chile Embassy. United States; Christensen, William H.; Clarke, Bruce C.; Hunt, E. Howard; Investors Overseas Service; Karamessines, Thomas H.; Kruegel [Central Intelligence Agency employee]; Mulholland, Douglas P.; Nixon, Richard M.; O’Neill, Joe; Osborn, Howard J.; Tofte, Hans; United States. Central Intelligence Agency. Directorate of Intelligence. Deputy Director; United States. Central Intelligence Agency. Directorate of Intelligence. Domestic Contact Service; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Logistics; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Central Intelligence Agency. Directorate of Operations. Foreign Resources Division; United States. Central Intelligence Agency. Directorate of Operations. Technical Services Division; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Secret Service; Vesco, Robert L.; Walsh, Paul V.; Washington (D.C.) Metropolitan Police Department; Yale, Thomas B.
Subjects: Alias documentation | Black power movement | Cambodia | Corporations | Covert identities | Diplomatic security | Domestic intelligence | Government appropriations and expenditures | Illegal entry | Interagency cooperation | Police assistance | Political activists | Postal services | Presidential speeches | Students | Telephone monitoring
Abstract: Lists William Colby’s questions and follow-up actions regarding sensitive Central Intelligence Agency activities related to surveillance of dissidents, telephone monitoring, use of Agency budget, alias documentation, and support of local police forces.
Full Text: Document – PDF – this link will open in a new window (832 KB)

Durable URL for this record

TOP-SECRET from the FBI – Eight Individuals Charged and Arrested in Two Separate Corruption Investigations

Wifredo A. Ferrer, United States Attorney for the Southern District of Florida; and Dena E. Choucair, Acting Special Agent in Charge, Federal Bureau of Investigations (FBI), Miami Field Office, announce that eight individuals have been charged in two separate complaints involving public corruption allegations. The first complaint, 12-2494-Garber, charges the lead code compliance inspector for the city of Miami Beach (Jose L. Alberto), four Miami Beach code compliance officers (Willie E. Grant, Orlando E. Gonzalez, Ramon D. Vasallo, Vicente L. Santiesteban), and two Miami Beach firefighters (Henry L. Bryant and Chai D. Footman) for their participation in a scheme to extort cash payments from a South Beach nightclub. The second complaint, 12-2495-Garber, charges Daniel L. Mack, a Miami-Dade police officer, and Henry L. Bryant (who was also charged in the first complaint) for their participation in a drug trafficking conspiracy in which they agreed to transport and protect what they believed to be multiple kilograms of cocaine. The defendants are expected to make their initial appearances in federal court today at 2:00 p.m. before U.S. Magistrate Judge Barry Garber.

U.S. Attorney Wifredo A. Ferrer stated, “When government officials misuse their offices and abuse their power to line their own pockets and satisfy their greed, they erode the public’s trust in good and efficient government. It is incumbent upon all of us to adopt a zero-tolerance policy for corruption, at any level of government. I encourage victims to come forward, report shakedowns of this kind, and help us shine a light on backroom corruption.”

“When corrupt officials break the law for their own personal gain, they breach the public’s trust and violate the very principles they have sworn to uphold,” said Dena E. Choucair, Acting Special Agent in Charge of the FBI’s Miami Division. “This should serve as a reminder to all of our public officials that no one is above the law.”

The first complaint (the extortion complaint) charges Alberto, 41, of Miami Beach; Grant, 56, of Miami; Gonzalez, 32, of Miami; Vasallo, 31, of Miami Beach; Santiesteban, 29, of Miami; Bryant, 45, of Miami Gardens; and Footman, 36, of Miramar, with one count of conspiracy to commit extortion under color of official right, in violation of 18 U.S.C. § 1951(a). If convicted, the defendants face a maximum statutory penalty of up to 20 years’ imprisonment.

Miami Beach nightclubs are subject to inspection by both the city of Miami Beach Code Compliance Division and the city of Miami Beach Fire Department for compliance with municipal code regulations. Both the fire department and the Code Compliance Division can issue citations for code violations. According to the extortion complaint affidavit, in early June 2011, Alberto, the lead code compliance inspector for the city of Miami Beach, solicited a cash pay-off from a Miami Beach nightclub owner in exchange for not enforcing a large fine for a code violation. The nightclub owner reported the alleged extortion to the FBI, which commenced an undercover investigation. During the investigation that followed, an undercover FBI agent posed as the manager of the nightclub and, along with the nightclub owner, made a series of cash pay-offs to Alberto and co-defendants Grant, Gonzalez, Vasallo, Santiesteban, Bryant, and Footman. The purpose of the cash pay-offs was to allow the nightclub to continue operating and to avoid any future potential code violations. According to statements made by Bryant in a recorded conversation, he and Alberto had worked together “for about 12 years on every little gig that [they] had.” Bryant also bragged that he and Alberto had kept another business open despite multiple code violations because the business had paid them “four grand.” Over the course of the investigation, which lasted seven months, the undercover agent paid more than $25,000 in cash pay-offs to the various Miami Beach public employees.

The second complaint (the drug trafficking complaint) charges Mack, 47, of Miami, and Bryant, of Miami Gardens, with conspiring to possess with the intent to distribute more than five kilograms of cocaine, in violation of 21 U.S.C. § 841(a)(1) and 846. If convicted, the defendants face a maximum statutory penalty of up to life imprisonment.

According to the affidavit filed in support of the drug complaint, in early December 2011, the undercover agent and Bryant discussed the possibility of recruiting police officers who could provide protection for the movement of cocaine. Over the following weeks, during recorded meetings and conversations, Bryant explained that he knew police officers that would escort the cocaine and that he would personally move the cocaine in his own vehicle. After reaching an agreement with the undercover agent, Bryant transported what he believed to be cocaine from the nightclub in Miami Beach to pre-determined drop-off points in Miami-Dade County on two separate occasions: on December 21, 2011, the defendants moved approximately nine kilograms of sham cocaine; on January 14, 2012, the defendants moved approximately 10 kilograms of sham cocaine. On both occasions, Bryant picked up the sham cocaine and returned for cash payment. On both occasions, Bryant’s vehicle was escorted by the Miami-Dade Police Department police cruiser assigned to defendant Mack, who had been introduced to the undercover agent as a police officer who would be providing security for the movement of cocaine. At that meeting, Mack wore his Miami-Dade Police Department uniform, was armed, and drove his Miami-Dade police cruiser. For these two transactions, the undercover agent paid the defendants a total of $25,000 in cash pay-offs.

The case was investigated by the FBI Miami-Area Public Corruption Task Force, assisted by the Miami-Dade Police Department Professional Compliance Bureau and United States Customs Border Protection Office of Internal Affairs. These cases are being prosecuted by Assistant U.S. Attorneys Jared E. Dwyer and Robin W. Waugh.

A complaint is only an accusation, and a defendant is presumed innocent until and unless proven guilty.

A copy of this press release may be found on the website of the United States Attorney’s Office for the Southern District of Florida at http://www.usdoj.gov/usao/fls.

The Book of Revelations – Full Movie

The Revelation of Jesus Christ, which God gave unto him, to shew unto his servants things which must shortly come to pass; and he sent and signified it by his angel unto his servant John:
Who bare record of the word of God, and of the testimony of Jesus Christ, and of all things that he saw.
**Blessed is he that readeth, and they that hear the words of this prophecy, and keep those things which are written therein**: for the time is at hand.

Visual adaptation of The Revelation of St John the Divine

Secret – Sex Culture

[Image]In this Wednesday, Dec. 28, 2011 file photo, 15-year-old Sahar Gul, is carried into hospital in Baghlan north of Kabul, Afghanistan. According to officials in northeastern Baghlan province, Gul’s in-laws kept her in a basement for six months, ripped her fingernails out, tortured her with hot irons and broke her fingers _ all in an attempt to force her into prostitution. Police freed her last week after her uncle called authorities.
[Image]In this photo taken Saturday, June 19, 2010, a prostitute peers out from her makeshift shack as she waits for clients in downtown Port-au-Prince. Many prostitutes have begun setting up makeshift brothels in the rubble of the buildings that were destroyed during the Jan. 12 earthquake. (Alexandre Meneghini)
[Image]In this photo taken May 5, 2011, a sex worker dances with a customer at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]In this photo taken Thursday March 1, 2012 , an exotic dancer performs during the 2012 Sex and Entertainment Expo in Mexico City. The Sex and Entertainment Expo is an annual event where vendors in the sex industry promote their goods and local strip clubs offer a glimpse of their establishments. This year is the event’s ninth consecutive year. AP
[Image]In this photo taken May 8, 2011, a sex worker poses for a photo in her cubicle at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]EDS NOTE NUDITY – In this photo taken May 5, 2011, a sex worker finishes her makeup as a coworker dries her hair as they get ready to work at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible demise of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, a $22 billion project that was promised in Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]In this photo taken May 25, 2011, Dara, second right, drinks with a customer as other sex workers get ready at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]A prostitute waits for clients in the Bois de Boulogne, on March 2, 2012 in Paris. Twenty-five suspected prostitutes were arrested during an overnight anti-prostitution operation. Getty [Image below obscured by source.]

[Image]

[Image]In this photo taken May 25, 2011, A sex worker waits for customers at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]In this photo taken May 5, 2011, men sit at a bar as sex workers wait for customers at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]In this photo taken May 5, 2011, a sex worker enters a cubicle where she sees her clients at Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29.(Felipe Dana)
[Image]In this photo taken May 25, 2011, A sex worker, right, dances with a customer at the Vila Mimosa prostitution zone in Rio de Janeiro, Brazil. Spelling the possible end of Vila Mimosa is a high-speed train the government wants to build to link Rio to Sao Paulo, as part of Brazil’s Olympic proposal. The government is expected to open bidding to prospective builders July 29. (Felipe Dana)
[Image]A security guard attempts to control an half naked activist and protestor from the Ukrainian women’s right movement FEMEN, after she whistled and waved a file with a sign reading ‘EURO-2012 without prostitution’ painted on her body, in Kiev, on June 8, 2011, during the countdown event dedicated to the beginning of the official start of the UEFA EURO 2012 European Football Championship which will be hosted in Ukraine and Poland and is planned to kick-off on June 8, 2012. Getty
[Image]In this photo taken Friday June 11, 2010, Majouli Feriz, 20, who works as a prostitute, laughs as she talks to other prostitutes, unseen, in the rubble of a damaged building in downtown Port-au-Prince. Many prostitutes have begun setting up makeshift brothels in the rubble of the buildings that were destroyed during the Jan. 12 earthquake. (Alexandre Meneghini)
[Image]In this photo taken Friday June 25, 2010, men watch a prostitute with a customer at her improvised shelter in downtown Port-au-Prince. Many prostitutes have begun setting up makeshift brothels in the rubble of the buildings that were destroyed during the Jan. 12 earthquake. (Alexandre Meneghini)
[Image]In this photo taken Saturday June 19, 2010, prostitutes relax as they wait for customers in downtown Port-au-Prince. Many prostitutes have begun setting up makeshift brothels in the rubble of the buildings that were destroyed during the Jan. 12 earthquake. (Alexandre Meneghini)
[Image]In this photo taken June 5, 2010, Stephen Clancy Hill, 34, a porn actor suspected of fatally stabbing a former co-worker and wounding two others during a violent rampage threatens to kill himself with a samurai sword as Los Angeles Police Department SWAT team members and crisis counselors attempt to keep him from jumping off a cliff during a dramatic, daylong standoff in Chatsworth, Calif. Saturday afternoon. Clancy later fell to his death when officers moved in. (Axel Koester)
[Image]EDS: NOTE NUDITY — Performers from the Beija Flor samba school parade during carnival celebrations at the Sambadrome in Rio de Janeiro, Brazil, Monday, Feb. 20, 2012. Millions watched the sequin-clad samba dancers at Rio de Janeiro’s iconic Carnival parade. (Victor R. Caivano)
[Image]Prostitutes wear masks as they attend a demonstration ahead of vote on a symbolic resolution to abolish prostitution at the National Assembly in Paris December 6, 2011. French Parliament is to debate abolishing prostitution through a crackdown which would criminalise payment for sex. Reuters
[Image]Romanian students dressed as caged brides attend an event to raise awareness to the risks of human trafficking and sexual exploitation faced by young girls lured by the prospect of a better paying job abroad, in Bucharest, Romania, Saturday, Nov. 19, 2011. The event promoted the Romanian premiere of the movie “If the Seed doesn’t die” by Serb-born director Sinisa Dragin which tells the story of Romanian searching for his daughter, forced into prostitution in Kosovo, and a Serbian seeking the body of his son killed in a car accident in Romania. AP
[Image]In this Saturday, Oct. 19, 2002 file photo, Zakiya, 30, who is accused of adultery, sews while she holds her daughter Zohra, 1, on her lap at the women’s prison in Kabul, Afghanistan. Women interviewed by Human Rights Watch often said they were trying to escape abusive husbands or forced marriages. In some cases, those who had left were assumed to have cheated on their husbands, and therefore were jailed for adultery, which is a criminal offense in Afghanistan. (Lynne Sladky)
[Image]An unidentified Afghan prostitute holds her phones after talking with her friends in her Madame’s house in Kabul, Afghanistan, on Monday, May 26, 2008. Afghanistan is one of the world’s most conservative countries, yet its sex trade appears to be thriving. (Farzana Wahidy)
[Image]In this picture made Friday, May 8, 2009, Eva, left, and Dana, right (full names not given) pose inside the Artemis brothel in Berlin. Like so many other businesses, Europe’s largest legalized prostitution industry is having to adapt to the economic downturn. In response, clubs and brothels are increasingly marketing themselves either as high-class, exclusive spas, or as bargain basements of delight. (Franka Bruns)
[Image]Children in costumes display their placards during an anti-child pornography rally in front of the House of Representatives Wednesday, May 27, 2009 in suburban Quezon City north of Manila, Philippines. The rally conveys a theme as a religious procession called “Flores de Mayo” to claim the legislators to prioritize the passage of the anti-child pornography bill. (Pat Roque)
[Image]Indonesian protesters march against an anti-pornography bill in Denpasar, Bali, Indonesia, Saturday, Oct. 11, 2008. About thousand of people attended a rally opposing the endorsement of the anti- pornography bill by the Indonesian parliament. (Firdia Lisnawati)
[Image]** EDS NOTE: NUDITY ** A visitor poses for a friend’s camera in front of a poster at Lisbon’s International Erotic Exhibition Saturday night, Oct. 31, 2009, in Portugal. (Armando Franca)

 

Cryptome – US Boosts Middle East Oil Deals in Israel

[Federal Register Volume 77, Number 70 (Wednesday, April 11, 2012)] [Notices] [Pages 21748-21750] From the Federal Register Online via the Government Printing Office [www.gpo.gov] [FR Doc No: 2012-8608] ———————————————————————– DEPARTMENT OF COMMERCE International Trade Administration Oil and Gas Trade Mission to Israel AGENCY: International Trade Administration, Department of Commerce. ACTION: Notice. ———————————————————————– Mission Description The United States Department of Commerce (DOC), International Trade Administration (ITA), U.S. and Foreign Commercial Service (CS), is organizing an Executive-led Oil and Gas Trade Mission to Israel, October 27-October 31, 2012. This mission is designed to be led by a Senior Commerce Department official. The purpose of the mission is to introduce U.S. firms to Israel’s rapidly expanding oil and gas market and to assist U.S. companies pursuing export opportunities in this sector. The mission to Israel is intended to include representatives from leading U.S. companies that provide services to oil and gas facilities, from design and construction through to project implementation, maintenance of facilities, and environmental protection. The mission will visit Tel Aviv and Jerusalem, and will include a visit to a to-be-determined site (e.g., port or company office). Mission participants will attend the 2012 Israel Energy and Business Convention. Held for the 10th consecutive year, by Eco Energy and Tachlit Conferences, this is Israel’s major energy forum. The convention assembles representatives of companies and senior Israeli and foreign policy makers, bringing them together with the Israeli financial and business community. The mission will help participating firms gain market insights, make industry contacts, solidify business strategies, and advance specific projects, with the goal of increasing U.S. exports to Israel. The mission will include one-on-one business appointments with pre- screened potential buyers, agents, distributors and joint venture partners; meetings with government officials; and high-level networking events. Participating in an official U.S. industry delegation, rather than traveling to Israel on their own, will enhance the companies’ ability to secure meetings in Israel. Commercial Setting The United States is Israel’s largest single country trade partner. Since the U.S.-Israel Free Trade Agreement entered into force in 1985, U.S.-Israel trade has grown nine-fold. Since 1995 nearly all trade tariffs between the U.S. and Israel have been eliminated. Exports of U.S. goods to Israel in 2010 were $6.7 billion. In September 2010, Israel joined the Organization for Economic Co-operation and Development. Israel has an advanced market economy. As of 2010, Israel has the 24th largest economy in the world. Historically poor in natural resources, Israel depends on imports of petroleum, coal, natural gas and production inputs, though the country’s nearly total reliance on energy imports will likely change with recent discoveries of large natural gas reserves off its coast. In accordance with the OECD’s Green Growth Declaration of 2009, the Government of Israel formed a Green Growth Round Table to bring about regulatory, budgetary and environmental policy changes between 2012 and 2020. Therefore, there may be sub-sector opportunities in environmental protection and pollution treatment, for onshore and offshore activities. Natural Gas In 2009 and 2010, the greatest natural gas discoveries of the decade were made off the coast of Israel: The Tamar and Leviathan fields. These fields may have the capacity to support Israel’s domestic gas consumption with reserves left for exports, and related platform chemicals. The U.S. Geological Survey estimates that there are 122 TCF of recoverable gas in the region, most of it in Israeli waters.\1\ In March 2012, another offshore discovery was made by Modiin and Adira Energy northwest of Tel Aviv, with an estimated 1.8 TCF of natural gas as well as oil.\2\ ————————————————————————— \1\ US Geological Survey. Assessment of Undiscovered Oil and Gas Resources of the Levant Basin Province. <http://pubs.usgs.gov/fs/2010/3014/ pdf/FS10-3014.pdf>. \2\ “Oil and Gas Found at Gabriella, Yitzhak Licenses.” Globes Israel Business News. 13 Mar. 2012. <http://www.globes.co.il/serveen/globes/ docview.asp?did=1000732741>. ————————————————————————— Israel’s offshore natural gas reserves are estimated around 30 trillion cubic feet, however further exploration is needed. The Ministry of Energy and Water Resources’ (MEWR) Petroleum Unit and Petroleum Council are responsible for issuing petroleum prospecting licenses in Israel. After the Tamar and Leviathan discoveries, numerous licenses to initiate petroleum prospecting were granted. According to the Petroleum Law, license owners must begin petroleum prospecting within 4 months of license issuance, commence drilling operations no later than two years following license issuance, and the interval between the drilling of one well and another cannot exceed 4 months. Consequently, it is likely that various drilling operations will commence in 2012. Because Israel does not yet have the physical infrastructure and technical workforce to support this fast growing industry, local companies are eager to team up with U.S. companies. Finally, Minister of Energy and Water Resources, Uzi Landau is committed to bringing foreign companies into Israel for continued gas exploration, and its eventual export. The Committee on Energy Policy, recommends setting aside 50 percent of the Tamar and Leviathan gas resources for export. Final decisions on exports will be made in the coming months. All natural gas export facilities will be located in areas under Israeli control. Opportunities exist for prospectors, operators, pipeline construction, logistical services and ship manufacturers. Technical training services are required to build a workforce and there are opportunities for academic cooperation with local universities and colleges. Oil In March 2010, the U.S. Geological Survey reported that there is an [[Page 21749]] estimated 1.7 billion barrels of recoverable oil in Israel.\3\ The World Energy Council estimates Israel’s shale deposits could ultimately yield as many as 250 billion barrels of oil.\4\ In May 2011, the Russian energy company Inter RAO announced that it had received a license to develop oil shale resources in the Negev desert. In March 2012, another offshore discovery was made by Modiin and Adira Energy northwest of Tel Aviv, with an estimated 128 million barrels of oil, as well as natural gas.\5\ The Meged Field may also contain significant oil reserves. In June 2011, Israeli oil exploration company, Givot Olam, announced that its test production site, Meged 5, was producing 800 barrels a day. According to a report by the international consultancy Baker Hughes, Givot Olam will develop Meged 6 and Meged 7 and perform well stimulation for all its drillings; in the next stage the company will drill up to 40 wells throughout the Meged field.\6\ In February 2012, MEWR approved continued production at Meged 5, and development of Meged 6-14 drillings.\7\ ————————————————————————— \3\ US Geological Survey. Assessment of Undiscovered Oil and Gas Resources of the Levant Basin Province. <http://pubs.usgs.gov/fs/2010/3014/ pdf/FS10-3014.pdf>. \4\ “Oil Shale Country Notes: Israel.” World Energy Council for Sustainable Energy. <http://www.worldenergy.org/publications/survey_of_ energy_resources_2007/oil_shale/country_notes/2005.asp>. \5\ “Oil and Gas Found at Gabriella, Yitzhak Licenses.” Globes Israel Business News. 13 Mar. 2012. <http://www.globes.co.il/serveen/globes/ docview.asp?did=1000732741>. \6\ Meged Field Reserves Classification. Rep. Baker Hughes, Mar. 2011. <http://www.givot.co.il/english/data/images/Media/GIVT0001%20Final %20Report%20rev3.pdf>. \7\ “Energy Ministry Approves Meged Field Development.” Globes Israel Business News, 30 Jan. 2012. <http://www.globes.co.il/serveen/globes/ docview.asp?did=1000720122>. ————————————————————————— Many oil exploration licenses are set to expire in 2012 and 2013. Exploration companies are limited to how many licenses they can hold in Israel, and given the success of several exploration projects, there are opportunities for U.S. companies to enter Israel’s oil exploration market. Mission Goals The mission will help U.S. companies increase their export potential to Israel by identifying profitable opportunities in Israel’s natural gas and oil market. As such, the mission will focus on helping U.S. companies obtain market information, establish business and government contacts, solidify business strategies, and/or advance specific projects. The mission’s goals include: Facilitating first-hand market exposure and access to government decision makers and key private-sector industry contacts, including potential trading partners; Promoting the U.S. energy industry by connecting representatives of U.S. companies with potential trading partners; Helping companies gain valuable international business experience in the rapidly growing energy industry; and, Helping U.S. companies strengthen their engagement in the worldwide marketplace, leading to increased exports and job creation. Mission Scenario Participants will attend country briefings, seminars and meetings with government decision makers and key private-sector industry contacts, including potential trading partners. Participants will also receive briefings on natural gas opportunities in Greece and Cyprus. Networking events will provide mission participants with further opportunities to speak with local business and government representatives, as well as with business executives of major U.S. companies already established in Israel. The mission will begin in Tel Aviv, where participants will receive market briefings and learn about doing business in Israel. Next, the delegates will participate in the Israel Energy and Business Convention 2012, Israel’s major energy forum. Here the participants will be able to learn about the market, meet with potential customers and network with all relevant players from the public and private sector. The convention will include plenary sessions, panel discussions, lectures, investment advice and exhibitions. Commercial Service Tel Aviv will arrange one-on-one business meetings with potential buyers and partners for all trade mission participants. Next, the delegation will be led on a site visit. Probable site visits include Ashdod Port and Noble Energy offices. Finally, the delegation will visit the MEWR in Jerusalem to learn about the state of the oil and gas industry in Israel. The precise agenda will depend upon the availability of local government and private sector officials, as well as on the specific goals and makeup of the mission participants. Notional Timetable ———————————————————————— ———————————————————————— Saturday, October 27, 2012… Tel Aviv. [cir] Participants arrive in the AM. [cir] Afternoon Embassy briefing, doing business in Israel seminar. Sunday, October 28, 2012….. Tel Aviv. [cir] Participation in Israel Energy and Business Convention 2012. [cir] One-on-one meetings. [cir] Dinner with trade mission lead and relevant government of Israel senior officials. Monday, October 29, 2012….. Tel Aviv. [cir] Participation in Israel Energy and Business Convention 2012. [cir] One-on-one meetings. [cir] Networking reception with Israeli companies. Tuesday, October 30, 2012…. Tel Aviv. [cir] Site visit to port, or Noble Energy Inc. offices. [cir] Reception and Ambassador’s residence. Wednesday, October 31, 2012.. Jerusalem. [cir] Relevant government meetings. ———————————————————————— Participation Requirements All parties interested in participating in the trade mission must complete and submit an application package for consideration by DOC. All applicants will be evaluated on their ability to meet certain conditions and best satisfy the selection criteria as outlined below. U.S. companies already doing business with [[Page 21750]] Israel as well as U.S. companies seeking to enter to the Israeli market for the first time may apply. A minimum of 10 and a maximum of 20 companies will be selected for participation in this mission. Fees and Expenses After a company has been selected to participate on the mission, a payment to the DOC in the form of a participation fee is required. The participation fee is $3,285 for large firms and $2,675 for a small or medium-sized enterprise (SME) \8\, which covers one representative. The fee for each additional representative is $500. ————————————————————————— \8\ An SME is defined as a firm with 500 or fewer employees or that otherwise qualifies as a small business under SBA regulations (see http://www.sba.gov/services/contracting_opportunities/sizestandards topics/index.html). Parent companies, affiliates, and subsidiaries will be considered when determining business size. The dual pricing reflects the Commercial Service’s user fee schedule that became effective May 1, 2008 (see http://www.export.gov/newsletter/ march2008/initiatives.html for additional information). ————————————————————————— Participants in Israel Energy and Business Conference will pay show-related expenses directly to the show organizer. Expenses for travel, lodging, meals, and incidentals will be the responsibility of each mission participant. Delegation members will be able to take advantage of U.S. Embassy rates for hotel rooms. Conditions for Participation An applicant must submit a completed and signed mission application and supplemental application materials, including adequate information on the company’s products and/or services, primary market objectives, and goals for participation. If the Department of Commerce receives an incomplete application, the Department may reject the application, request additional information, or take the lack of information into account when evaluating the applications. Each applicant must also certify that the products and services it seeks to export through the mission are either produced in the United States, or, if not, marketed under the name of a U.S. firm and have at least 51 percent U.S. content of the value of the finished product or service. Selection Criteria for Participation Suitability of the company’s products or services to the market. Applicant’s potential for business in the targeted industries in Israel, including likelihood of exports resulting from the mission. Consistency of the applicant’s goals and objectives and business with the stated scope of the mission. Diversity of company size, sector or subsector, and location may also be considered during the review process. Referrals from political organizations and any documents containing references to partisan political activities (including political contributions) will be removed from an applicant’s submission and not considered during the selection process. Timeframe for Recruitment and Applications Mission recruitment will be conducted in an open and public manner, including publication in the Federal Register, posting on the Commerce Department trade mission calendar (http://www.ita.doc.gov/doctm/tmcal.html) and other Internet Web sites, press releases to general and trade media, direct mail, notices by industry trade associations and other multiplier groups, and publicity at industry meetings, symposia, conferences, and trade shows. Recruitment for the mission will conclude no later than August 24, 2012. The U.S. Department of Commerce will review applications and make selection decisions on a rolling basis beginning May 21, 2012, until the maximum of 20 participants is selected. Applications received after August 24, 2012 will be considered only if space and scheduling constraints permit. Contacts U.S. Commercial Service Tel Aviv Ms. Irit van der Veur, Senior Commercial Specialist, 972-3-519- 7540, irit.vanderveur@trade.gov. U.S. Commercial Service Washington, DC Mr. David McCormack, International Trade Specialist, 202.482.2833, david.mccormack@trade.gov. Elnora Moye, Trade Program Assistant. [FR Doc. 2012-8608 Filed 4-10-12; 8:45 am] BILLING CODE 3510-FP-P

Unvealed – TSA Admits $1Billion Nude Body Scanner Fleet Worthless!

The last video demonstrated how easy it is to take a metal object through TSA nude body scanners undetected. In this video, I interviewed an actual TSA screener to hear more about how these machines are an epic fail. “Jennifer,” who asked me not to use her real name or face, has been on the front lines of the TSA’s checkpoints for the last 4 years.

Revealed – What Kind Of Believer Are You? Take The Dawkins Test

Richard Dawkins’ Belief Scale Scoring Rubric

1. Strong Theist: I do not question the existence of God, I KNOW he exists.
2. De-facto Theist: I cannot know for certain but I strongly believe in God and I live my life on the assumption that he is there.
3. Weak Theist: I am very uncertain, but I am inclined to believe in God.
4. Pure Agnostic: God’s existence and non-existence are exactly equiprobable.
5. Weak Atheist: I do not know whether God exists but I’m inclined to be skeptical.
6. De-facto Atheist: I cannot know for certain but I think God is very improbable and I live my life under the assumption that he is not there.
7. Strong Atheist:
I am 100% sure that there is no God.

Do you believe in God? Sometimes this question warrants more than just a yes or no answer. To categorize one’s own beliefs about the possibility of the existence of a deity, Dawkins proposed a “spectrum of probabilities” in his book The God Delusion. This spectrum consists of two extremes — strong theist on one end, and strong atheist on the other. There are a number of milestones in between, which are all charted on a 7-point scale (e.g., “weak atheist”).

Report – Massive Earthquake; Indian Ocean Tsunami Alert

https://upload.wikimedia.org/wikipedia/commons/6/61/Sumatra_Volcanoes.png

A massive earthquake struck off the coast of the Indonesian island of Sumatra on Wednesday afternoon, triggering a tsunami alert for the Indian Ocean.

The quake struck about 434 kilometers (270 miles) southwest of Banda Aceh, the capital of Indonesia’s Aceh province, and had a magnitude of 8.6, the U.S. Geological Survey said. It took place at a depth of 23 kilometers (14 miles).

A second quake, magnitude 8.2, occurred off the west coast of Sumatra about two hours later, the USGS said.

Gary Gibson from the Seismology Research Center in Melbourne, Australia, said the location of the second quake reduces the possibility of a tsunami.

There were no immediate reports of destruction or deaths Wednesday.

Indonesian President Susilo Bambang Yudhoyono said on local television that there were no reports of casualties or damage in Aceh.

The Pacific Tsunami Warning Center issued a tsunami watch for the entire Indian…

SECRET – California State Threat Assessment Center: How Male Gangs Leverage Female Supporters

https://publicintelligence.net/wp-content/uploads/2012/04/STAC-FemaleGangMembers.png

(U//LES) This bulletin provides information regarding the role females, who are not members, play within California gangs. Because females often avoid detection by law enforcement, to mitigate detection, male gangs leverage females to further their criminal activity.

(U) KEY JUDGMENTS

(U//FOUO) The STAC assesses with high confidence that gangs will continue to use females to conduct criminal and non-criminal activity on their behalf because females tend to be overlooked during police encounters with male gang members.

(U//FOUO) In some gang cultures, females are viewed as inferior to their male counterparts or as property; in other gang cultures, females may hold positions of esteem or act on behalf of a “shotcaller.”

(U) SUPPORTS ILLEGAL ACTIVITIES

(U//LES) Females usually start their association to earn respect but often find themselves being used for sex, drug or weapon couriers, and as the admiring audience of the male gang members.1 Female supporters serve additional purposes within gangs, including intelligence gathering. Sometimes they have legitimate sources of income but they may also commit crimes to provide additional financial support for the gang. Gangs commonly employ women to conduct the following:

  • courier weapons, contraband or drugs;
  • facilitate communication among gang members in jail, in prison, or on the streets;
  • smuggle messages, narcotics, or money into jail or prison during visits;
  • launder money;
  • sell counterfeit goods;
  • commit identity and credit card theft;
  • petty or grand theft;
  • prostitute themselves.

As a communications facilitator, females may use their address or a Post Office Box as a central mailing destination where mail then gets repackaged and rerouted to other male gang members. They may also redraft letters on behalf of one gang member and send it to another.

(U) A FEMALE’S ROLE IN DIFFERENT GANG CULTURES

(U//LES) Predominantly Hispanic gangs often give their females, wives, or girlfriends much more latitude than other gangs. Women are typically given the power to run things on behalf of their “man.” They might be used in lieu of the actual shotcaller. The wife of a Mexican Mafia (EME) shotcaller is often referred to as “La Senora” – Mrs. or “La Madrina” – Godmother. A sister or biological daughter might also hold this title. While they are not involved in the commission of criminal acts, they can order gang members to commit the deed. An order given by “La Senora,” is considered equivalent to an order coming directly from the EME shotcaller; a soldier (gang member) cannot disobey her. The wife/girlfriend will often act as a liaison between street members and an incarcerated EME shotcaller to keep him apprised of what is happening on the streets. She also usually controls the gang‟s money (taxesb paid by gang members) and bank account(s).

(U//LES) Among skinhead gangs and outlaw motorcycle gangs (OMGs), women do not typically hold as much prestige as their counterparts associated with Hispanic gangs. OMG women are typically considered to be, referred to as and treated as property. A girlfriend may be shared among members; however, as a wife, she is no longer shared but earns the privilege of patching her riding gear with “Property of” her husband. Another term used by OMGs and skinhead gangs to refer to their girlfriends or wives is “old lady,” indicative of their perceived inferiority. OMGs also use their women to carry weapons or drugs.

(U//LES) In some instances, female skinhead supporters are more dedicated or “down for the cause” than male skinheads, but they are still considered to be disposable.. In one case, an Aryan Brotherhood gang member used a gun, which he borrowed from a female supporter, in the commission of a robbery. When the female confronted the gang member about his illegal use of her gun, he killed her.

DOWNLOAD ORIGINAL DOCUMENT HERE

STAC-FemaleGangMembers

Escape from a “Necrocracy” – by Claire Lambrecht

In North Korea, the hunger games have been raging for quite some time.

Image from Flickr via Tequila Partners

By Claire Lambrecht

What lies 25 miles north of Seoul is something of a mystery. Since the 1950s, the region has fallen out of favor, bringing otherwise-electric conversation to a screeching, brownout halt. Few people, it seems, know exactly where North Korea is, though they know it belongs somewhere near the top-right corner of the map—so far north Sarah Palin could probably see it from her house.

It’s easier, of course, to imagine the country as an army of Team America bobble-head dolls: to call it, as the late Christopher Hitchens did in a 2001 Vanity Fair article, a “necrocracy.” After all, it is not particularly strange that a dead man should rule a country where so many live a half-step from starvation. What’s strange is that, in a time obsessed by undead vampires and zombies, the real thing gathers little attention.

Escape from Camp 14: One Man’s Remarkable Odyssey from North Korea to Freedom in the West (Viking, April 2) is one such story. Despite its vivid details, thriller-novel pacing, and foundation in personal memoir, the book, a product of several interviews between Washington Post writer Blaine Harden and North Korean refugee Shin Dong-hyuk, will likely fall beneath the radar of American audiences; regrettably, with greater ease than Shin struggled through a small opening in an high-voltage fence in 2005.

Though selected as one of Foreign Policy’s “21 books that will matter in 2012,” and a BBC Radio 4 “Book of the Week,” Escape From Camp 14 won’t likely pique the attention of Oprah’s Book Club. It is too blunt an instrument, particularly because it is so unbelievable, so tragic, and – like so many other stories of atrocity—concluded with a question mark.

North Korean labor camps… have lasted twice as long as the Soviet gulag and nearly twelve times longer than Nazi concentration camps.

Born into one of North Korea’s six “complete control districts” (i.e. labor camps), which have remained virtually unnoticed by the global community in spite of their visibility on Google Earth, Shin was stripped of his humanity from the start. Classified as “irredeemable” because of an uncle’s crime against the state (fleeing the country after the Korean War), Shin was regularly overworked, abused, and starved. In Camp 14, an isolated compound about 30 miles long and 15 miles wide, Shin was taught to believe that violence was normal and snitching a duty.

When Shin, at the age of 13, discovered that his mother and older brother were planning an escape attempt, he promptly told a prison guard. Within weeks, Shin’s mother and brother were brought in front of the crowded camp and shot. Though Shin sees this betrayal as the most trying burden his life, at the moment of execution Shin was angry. “He hated his mother and brother with the savage clarity of a wronged and wounded adolescent,” wrote Harden.

This is far from the first story of blatant disregard for humanity (Primo Levy’s Survival In Auschwitz, Jean Amery’s At the Mind’s Limits: Contemplations by a Survivor on Auschwitz and Its Realities, or Hannah Arendt’s Eichmann in Jerusalem), nor, unfortunately, is the physical record of Shin’s abuse unique (Tina Rosenberg’s Children of Cain or Peter Maass’s Love Thy Neighbor). What sets Escape From Camp 14 apart is that the preconditions for Shin’s imprisonment remain intact.

As Harden points out in the book’s introduction, North Korean labor camps—home to 150,000 to 200,000 prisoners according to the U.S. State Department—have lasted twice as long as the Soviet gulag and nearly twelve times longer than Nazi concentration camps. The longevity of the camps, however, provides little excuse for their existence.

“It is unthinkable,” wrote Aleksandr I. Solzhenitsyn in the The Gulag Archipelago, “to fail to distinguish between what constitutes an abominable atrocity that must be prosecuted and what constitutes that ‘past’ which ‘ought not to be stirred up.’”

With the death of Kim Jong-Il in December, these labor camps were passed on to the third generation of the Kim rule. The twenty-something Kim Jong-Un shows no sign of embracing the glasnost-style reforms that eventually led to the 1991 abolition of the Soviet gulag.

The refusal of the North Korean administration to evolve puts Shin in a curious position. As the only known defector born in a “no exit” camp, he faces the modern world with an albatross around his neck: one that no one else can see, and few are willing to acknowledge.

Blaine Harden, the book’s author, will be speaking at the Korea Society of New York on April 12. LiNK, a non-profit providing emergency relief to North Korean refugees, will be premiering their new documentary film, The People’s Crisis, at The New School on April 27.

________________________________________________________________________________________________________

Claire Lambrecht writes about media, education, politics, and culture publications like the New York Times, Slate, Salon, and CBS MoneyWatch.

Readers like you make Guernica possible. Please show your support.

Tags: , , , ,

SECRET – California State Threat Assessment Center: How Male Gangs Leverage Female Supporters

https://publicintelligence.net/wp-content/uploads/2012/04/STAC-FemaleGangMembers.png

 

(U//LES) This bulletin provides information regarding the role females, who are not members, play within California gangs. Because females often avoid detection by law enforcement, to mitigate detection, male gangs leverage females to further their criminal activity.

(U) KEY JUDGMENTS

(U//FOUO) The STAC assesses with high confidence that gangs will continue to use females to conduct criminal and non-criminal activity on their behalf because females tend to be overlooked during police encounters with male gang members.

(U//FOUO) In some gang cultures, females are viewed as inferior to their male counterparts or as property; in other gang cultures, females may hold positions of esteem or act on behalf of a “shotcaller.”

(U) SUPPORTS ILLEGAL ACTIVITIES

(U//LES) Females usually start their association to earn respect but often find themselves being used for sex, drug or weapon couriers, and as the admiring audience of the male gang members.1 Female supporters serve additional purposes within gangs, including intelligence gathering. Sometimes they have legitimate sources of income but they may also commit crimes to provide additional financial support for the gang. Gangs commonly employ women to conduct the following:

  • courier weapons, contraband or drugs;
  • facilitate communication among gang members in jail, in prison, or on the streets;
  • smuggle messages, narcotics, or money into jail or prison during visits;
  • launder money;
  • sell counterfeit goods;
  • commit identity and credit card theft;
  • petty or grand theft;
  • prostitute themselves.

As a communications facilitator, females may use their address or a Post Office Box as a central mailing destination where mail then gets repackaged and rerouted to other male gang members. They may also redraft letters on behalf of one gang member and send it to another.

(U) A FEMALE’S ROLE IN DIFFERENT GANG CULTURES

(U//LES) Predominantly Hispanic gangs often give their females, wives, or girlfriends much more latitude than other gangs. Women are typically given the power to run things on behalf of their “man.” They might be used in lieu of the actual shotcaller. The wife of a Mexican Mafia (EME) shotcaller is often referred to as “La Senora” – Mrs. or “La Madrina” – Godmother. A sister or biological daughter might also hold this title. While they are not involved in the commission of criminal acts, they can order gang members to commit the deed. An order given by “La Senora,” is considered equivalent to an order coming directly from the EME shotcaller; a soldier (gang member) cannot disobey her. The wife/girlfriend will often act as a liaison between street members and an incarcerated EME shotcaller to keep him apprised of what is happening on the streets. She also usually controls the gang‟s money (taxesb paid by gang members) and bank account(s).

(U//LES) Among skinhead gangs and outlaw motorcycle gangs (OMGs), women do not typically hold as much prestige as their counterparts associated with Hispanic gangs. OMG women are typically considered to be, referred to as and treated as property. A girlfriend may be shared among members; however, as a wife, she is no longer shared but earns the privilege of patching her riding gear with “Property of” her husband. Another term used by OMGs and skinhead gangs to refer to their girlfriends or wives is “old lady,” indicative of their perceived inferiority. OMGs also use their women to carry weapons or drugs.

(U//LES) In some instances, female skinhead supporters are more dedicated or “down for the cause” than male skinheads, but they are still considered to be disposable.. In one case, an Aryan Brotherhood gang member used a gun, which he borrowed from a female supporter, in the commission of a robbery. When the female confronted the gang member about his illegal use of her gun, he killed her.

Unveiled – The Hunger Games In North Korea

Grimly close to a real-life version of everyone’s favorite dystopian novel/movie? Guernicaon author Shin Dong-hyuk, who in 2005 slipped out of North Korea through a hole in an high-voltage fence:

Born into one of North Korea’s six “complete control districts” (labor camps), which have remained virtually unnoticed by the global community despite their visibility on Google Earth, Shin was born stripped of his humanity. Classified as “irredeemable” because of an uncle’s crime against the state (fleeing the country after the Korean War), Shin was regularly overworked, abused, and starved. In Camp 14, an isolated compound about 30 miles long, Shin was taught to believe that violence was normal and snitching a duty.

When. at the age of 13, he discovered that his mother and older brother were planning an escape attempt, he promptly told a prison guard. Shin’s mother and brother were brought in front of the crowded camp and shot.

 

CONFIDENTIAL – American Universities Infected by Foreign Spies

Photo: Lovelac7 (CC)

 

Michigan State University President Lou Anna K. Simon contacted the Central Intelligence Agency in late 2009 with an urgent question.

The school’s campus in Dubai needed a bailout and an unlikely savior had stepped forward: a Dubai-based company that offered to provide money and students.

Simon was tempted. She also worried that the company, which had investors from Iran and wanted to recruit students from there, might be a front for the Iranian government, she said. If so, an agreement could violate federal trade sanctions and invite enemy spies.

The CIA couldn’t confirm that the company wasn’t an arm of Iran’s government. Simon rejected the offer and shut down undergraduate programs in Dubai, at a loss of $3.7 million.

Hearkening back to Cold War anxieties, growing signs of spying on U.S. universities are alarming national security officials. As schools become more global in their locations and student populations, their culture of openness and international collaboration makes them increasingly vulnerable to theft of research conducted for the government and industry.

“We have intelligence and cases indicating that U.S. universities are indeed a target of foreign intelligence services,” Frank Figliuzzi, Federal Bureau of Investigation assistant director for counterintelligence, said in a February interview in the bureau’s Washington headquarters…

TOP-SECRET from the FBI – Brothers Who Defrauded Nordstrom with Online Reward Scheme Plead Guilty to Wire Fraud

Two brothers pleaded guilty today to wire fraud in connection with their scheme to defraud Nordstrom of more than $1.4 million in commissions and rebates. Andrew S. Chiu, 29, of Anaheim, California; and Allen J. Chiu, 37, of Dallas, Texas, pleaded guilty today in U.S. District Court in Seattle. The brothers devised a scheme to defraud Nordstrom after they had already been barred for purchasing any goods from the Nordstrom.com website. Because Nordstrom quickly notified law enforcement, the U.S. Attorney’s Office was able to seize more than $970,000 in illegally derived assets which will be applied toward the restitution owed to Nordstrom. U.S. District Judge Ricardo S. Martinez is scheduled to sentence the Chiu brothers on July 13, 2012.

According to records filed in the case, in 2008 the Chiu brothers were barred from ordering merchandise from Nordstrom.com because of excessive claims for refunds based on representations that merchandise had never been delivered. However, both brothers continued to try to place orders with Nordstrom.com. Both men belong to FatWallet Inc., a membership-based shopping community website that promotes various online retailers by providing coupons and cash back incentives for purchases. FatWallet paid cash back rewards to the Chiu brothers for purchases made at various online retailers, including Nordstrom.com. In January 2010, the brothers discovered they could exploit a computer programming error in Nordstrom’s ordering system by placing orders that would ultimately be blocked by Nordstrom. No merchandise would ship and nothing would be charged to their credit card. However, Nordstrom would unknowingly continue to compensate FatWallet for the order, and the brothers would still receive the cash back credit from FatWallet. Between January 2010 and continuing through October 2011, the Chiu brothers collectively placed more than $23 million in fraudulent orders through Nordstrom.com. The fraudulent ordering resulted in Nordstrom paying $1.4 million in rebates and commissions, with more than $650,000 in fraudulent cash back payments going directly to the brothers. The error that permitted the continued payment of rebates in the ordering system has since been fixed.

Under the terms of the plea agreement, prosecutors will recommend a sentence of no more than 30 months in prison, and the brothers can request no less than 24 months in prison. However, Judge Martinez is not bound by the recommendations and can impose any sentence allowed by law up to the maximum 20 years in prison and a $250,000 fine.

The case was investigated by the FBI. The case was prosecuted by Assistant United States Attorneys Katheryn Kim Frierson and Francis Franze-Nakamura.

SECRET – Democratic People’s Republic of Korea Prepares Missile Launch

[Image]
[Image]
[Image]
[Image]
[Image]A North Korean cameraman films a map with the site of launch pad of the rocket Unah-3 at the Tongchang-ri space center on April 8, 2012. North Korea’s long-range rocket is on its launch platform, AFP reporters said Sunday, as the regime again insisted it was to send a peaceful satellite and not a missile. The usually secretive North organised an unprecedented visit for foreign reporters to Tongchang-ri space centre in an effort to show its Unha-3 rocket is not a disguised ballistic missile, as claimed by the US and its allies. Getty
[Image]North Korean officials and foreign journalists leave the launch pad after a visit to see the rocket Unha-3 in Tangachai -ri space center on April 8, 2012. North Korea has confirmed their intentions to launch the rocket next week despite international condemnations. Getty
[Image]The North Korean Unha-3 rocket is pictured at Tangachai -ri space center on April 8, 2012. North Korea has confirmed their intention to launch the rocket next week despite international condemnations. Getty
[Image]North Korean soldiers stand guard in front of the Unha-3 rocket at Tangachai -ri space center on April 8, 2012. North Korea has confirmed their intention to launch the rocket next week despite international condemnations. Getty
[Image]Engineers are seen checking the Unha-3 (Milky Way 3) rocket sitting on a launch pad at the West Sea Satellite Launch Site, during a guided media tour by North Korean authorities in the northwest of Pyongyang April 8, 2012. North Korea has readied a rocket for a launch from a forested valley in its remote northwest this week that will showcase the reclusive state’s ability to fire a missile with the capacity to hit the continental United States. Picture taken April 8, 2012. Getty
[Image]The North Korean rocket Unha-3 rocket is pictured at the Tongchang-ri space center on April 8, 2012. North Korea’s long-range rocket is on its launch platform, AFP reporters said Sunday, as the regime again insisted it was to send a peaceful satellite and not a missile. The usually secretive North organised an unprecedented visit for foreign reporters to Tongchang-ri space centre in an effort to show its Unha-3 rocket is not a disguised ballistic missile, as claimed by the US and its allies. Getty
[Image]Scientists are seen monitoring the Unha-3 (Milky Way 3) rocket in a control room at the West Sea Satellite Launch Site during a guided media tour by North Korean authorities in the northwest of Pyongyang April 8, 2012. North Korea has readied a rocket for a launch from a forested valley in its remote northwest this week that will showcase the reclusive state’s ability to fire a missile with the capacity to hit the continental United States. The Korean characters on the banner read “Let us occupy the high target of building a powerful nation by relying on the strength of science and technology!” Picture taken April 8, 2012. Reuters
[Image]Scientists are seen monitoring the Unha-3 (Milky Way 3) rocket in a control room at the West Sea Satellite Launch Site during a guided media tour by North Korean authorities in the northwest of Pyongyang April 8, 2012. North Korea has readied a rocket for a launch from a forested valley in its remote northwest this week that will showcase the reclusive state’s ability to fire a missile with the capacity to hit the continental United States. Picture taken April 8, 2012. Reuters
[Image]Mobile Patriot missile launchers, center, are set up at a Japan Air Self-Defense Force base on Miyakojima island in Okinawa Prefecture, southwestern Japan, Monday, April 9, 2012 in preparation for North Korea’s rocket launch slated between April 12 and 16. North Korean space officials moved all three stages of a long-range rocket into position for a controversial launch, vowing to push ahead with their plan in defiance of international warnings against violating a ban on missile activity.
[Image]U.S. Navy’s guided-missile cruiser USS Shiloh (CG 67) sails in the East China Sea, about 90 kilometers (56 miles) northeast of Miyakojima island in Okinawa Prefecture, southwestern Japan, Monday, April 9, 2012. North Korean space officials moved all three stages of a long-range rocket into position for a controversial launch slated between April 12 and 16 towards south over the East China Sea and the Pacific.

 

Die STASI-“GoMoPa”-Fälschungen – Beispiele Wirecard und Meridian Capital

 

 

Hier sind die Links

 

http://www.meridiancapital.wordpress.com/

http://www.handelsblatt.com/finanzen/aktien/aktien-im-fokus/wirecard-kurssturz-wenn-short-seller-jojo-spielen/3402446.html

http://www.handelsblatt.com/finanzen/boerse-maerkte/boerse-inside/marktgeruechte-finanzaufsicht-untersucht-kursachterbahn-bei-wirecard/3406252.html

The Public Intelligence – National Gang Intelligence Center Street Gangs Involved in Tax Fraud Schemes

https://publicintelligence.net/wp-content/uploads/2012/03/NGIC-GangTaxFraud.png

(U//LES) The National Gang Intelligence Center (NGIC) assesses with medium confidence that street and prison gangs are expanding their criminal activities to include schemes to obtain illegitimate tax refunds, as it has proven to be very profitable and a low-risk crime.

(U//LES) According to the Internal Revenue Service (IRS), incidents of tax return fraud have increased in recent years, and gang involvement in this criminal activity mirrors that trend. Gangs perpetrate tax return fraud by utilizing facilitators, such as employees of tax preparation companies. Prison gangs often employ females or other facilitators on the street to assist them, and communicate by legal mail to avoid law enforcement detection. While some of the fraud is committed using gang members’ information, gangs are also threatening and/or paying individuals a fixed amount for the personal identifying information and committing identity theft. The illicit revenues from these schemes are subsequently used to supplement traditional criminal activities and in overall furtherance of the gang.

• (U//LES) According to FBI source reporting in July 2011, new inmates are constantly threatened by the Arizona Aryan Brotherhood (AAB) to provide their social security numbers and other personally identifiable information to file fraudulent tax returns. Female counterparts on the streets file the returns on their behalf, and they use legal mail to avoid detection. The source also reported that the AAB will continue to perpetrate income tax fraud schemes because it generates significant revenue for the gang.
• (U//LES) According to FBI source reporting as of June 2011, money derived from an income tax fraud and identity theft ring in Statesboro, Georgia is being used to purchase guns and drugs for the Bloods street gang. Individuals involved in the scheme are collecting personal information of people they encounter in their places of employment and storing it until the following tax season, when a tax return is filed using the stolen information.
• (U//LES) According to FBI source reporting as of May 2011, income tax fraud is widespread amongst Gangster Disciple sets in western Tennessee. Gang members work with at least one outside employee of a tax filing company to submit fraudulent federal income tax statements despite having no legitimate work history or earnings.
• (U//LES) In December 2010, prison staff at California State Prison-Corcoran found a Black Guerilla Family (BGF) gang member at disseminating information to other inmates outlining the process to file fraudulent tax returns. The inmate was also directing that they use the “legal mail” process to avoid detection by staff.
• (U//FOUO) In May 2010, an FBI source indicated that a member of the AAB was committing fraudulent income tax schemes for members of the AAB and Arizona Mexican Mafia (AMM), by creating false W-2 forms and placing tax refunds on prepaid credit cards to be used by AAB and AMM members accordingly.
• (U//LES) According to source reporting as of April 2010, inmates at Clallam Bay Corrections Center with ties to the Aryan Family are funding drug purchases with money obtained by committing federal income tax fraud. To perpetrate this criminal activity, inmates’ personal information and power of attorney forms are mailed to outside facilitators to file the tax returns and cash the refund checks. The proceeds are split between gang members and facilitators and are subsequently used to smuggle methamphetamine into the facility through legal mail to avoid monitoring by corrections personnel.

(U//LES) Outlook

(U//LES) Instances of tax return fraud committed by gangs will likely increase as they seek out opportunities to commit low-risk crimes and as they become aware of the fraud’s potential profits. Gangs may initially perpetrate this crime by filing returns for themselves or other gang members; however, once it is determined to be a financially viable endeavor, gangs will likely resort to intimidation tactics, committing identity theft, and forming alliances of opportunity with individuals and other criminal enterprises to continue to receive illegitimate refunds. Furthermore, gangs may seek out individuals such as employees of tax preparation companies to use their tax knowledge and expertise to identify and exploit new methods and tactics to commit tax fraud.

Unveiled – How the Cold War Was Won … by the French

 

When a KGB colonel decided to pass on secrets that would devastate the Soviet Union he turned to Paris, a new film reveals

By John Lichfield

James Bond and George Smiley can eat their hearts out. Who really won the Cold War for the democratic world? The French, naturellement. This rather startling claim is made by the publicity for a brooding, brilliant, French spy movie which reaches cinemas next week. Although somewhat far-fetched, the boast that French intelligence “changed the world” does have some basis in fact.

The story of L’Affaire Farewell, how a French mole in the KGB leaked information so devastating that it hastened the implosion of the Soviet Union, is comparatively little known in Britain or even in France.

Due credit is given to the French, the once-reviled “surrender monkeys”, by, of all sources, the Central Intelligence Agency. The CIA’s official website still carries a compelling essay, written soon after the affair was declassified in 1996, by Gus Weiss, the American official who ran the Washington end of the case. He concludes: “[The] Farewell dossier… led to the collapse of a crucial [KGB spying] programme at just the time the Soviet military needed it… Along with the US defence build-up and an already floundering Soviet economy, the USSR could no longer compete.”

The official version of events shows that the French taupe, or mole, was Colonel Vladimir Vetrov of Directorate T, the industrial spying arm of the KGB. In 1981-82, he gave French intelligence more than 3,000 pages of documents and the names of more than 400 Soviet agents posted abroad. The information, shared by Paris with its Nato allies, was deeply alarming but also hugely encouraging.

Colonel Vetrov, codenamed Farewell by the French, laid bare the successful Soviet strategies for acquiring, legally and illegally, advanced technology from the West. He also exposed the abject failure of the Communist system to match rapid Western advances in electronic micro-technology.

The case directly influenced President Ronald Reagan’s decision to launch the “Star Wars” programme in 1983: a hi-tech bluff which would drag the USSR into an unaffordable, and calamitous, attempt to keep up with the democratic world.

Raymond Nart, the French intelligence officer who handled the case from Paris, reported that Colonel Vetrov approached the French because he had once been stationed in Paris and loved the French language. His original contact was a French businessman in Moscow and then a French military attaché and his wife. He passed on secrets by exchanging shopping baskets with the wife in a Moscow market.

The Russian never asked for money or for a new life in the West. He was an “uncontrollable man, who oscillated between euphoria and over-excitement”, said Mr Nart. He appears to have been motivated by frustration with the Soviet system and, maybe, a personal grudge. He was eventually caught, and executed, after stabbing his mistress and killing a policeman in a Moscow park in February 1982. The case remains deeply sensitive, and mysterious, in Russia and France. The democratic Russia of Vladimir Putin (ex-KGB) and Dimitry Medvedev brought pressure on a celebrated Russian actor, Sergei Makovetsky, to withdraw from the French film, L’Affaire Farewell, which premieres at the Toronto film festival this week. A request to film in Russia was refused.

Former French intelligence officers came forward to try to sidetrack the film’s director, Christian Carion (who made the Oscar-nominated Joyeux Noel about the fraternisation in the trenches in December 1914). The ex-agents told him that the Farewell case was not what it seemed. The whole affair, they said, had been concocted by the CIA to test the loyalty to the West of the Socialist president, François Mitterrand, after he was elected in May 1981.

Even Mitterrand came to believe this version of events, and fired a senior French intelligence chief in 1985. These allegations, officially denied in Washington and Paris, are almost certainly driven by jealousy among competing French spy services. Farewell was “run” – at the mole’s own insistence – by a relatively small, French counter-espionage agency, the Direction de la Surveillance du Territoire (DST), which was not supposed to operate abroad.

The former French foreign minister, Hubert Védrine, a diplomatic adviser to President Mitterrand at the time, is in no doubt that Farewell existed. “It was one of the most important spy cases of the 20th century,” he said. “At no other time since 1945 was the Soviet system exposed to the light of day so completely.”

Mr Védrine rejects the implication – in the publicity surrounding the film rather than the film itself – that the Farewell case caused the collapse of the Soviet Union. But he, like the senior US official, Mr Weiss, argues that the information provided by the KGB mole was one of the catalysts for the demise of the USSR, nine years later. By making it even harder for the Soviets to compete with the West, the affair magnified doubts and tensions within the Communist hierarchy and assisted the rise – but also undermined the work – of the would-be reformer, Mikhail Gorbachev.

The film, L’Affaire Farewell, made in Russian, French and English, stars the Bosnian actor, Emir Kusturica, as the KGB mole and Willem Dafoe as the head of the CIA. To allow the researcher-scriptwriter, Eric Raynaud, cinematic licence with the story, Colonel Vetrov has been renamed, Serguei Grigoriev. The French agents are telescoped into one man, a reluctant businessman-turned-spy called Pierre Froment, played by Guillaume Canet.

The film, which has received glowing advance reviews, is far from being a James Bond car-chase thriller. It is more like a Gallic John Le Carré: part historical essay, part psycho-drama about the relationship between professional Russian spy and amateur French agent. The director, Carion, admits that he has guillotined parts of the story. He left out the professional French agent and his wife and he left out Farewell’s attempt to stab his mistress as “too confusing”. The effect is to downplay Colonel Vetrov’s murky side and make the story one of anguished heroism, on both sides.

Russia’s refusal to co-operate in the making of the movie is easily explained, Carion says. In 1983, 47 Soviet diplomats and journalists, identified as spies by Farewell, were expelled from Paris. Among them was a young diplomat called Alexander Avdeev. When the film was being planned, Mr Avdeev was back in Paris as the Russian ambassador. He has since returned to Moscow as Minister of Culture.

How significant was the Farewell affair? In the essay on the CIA web-site, Mr Weiss, a member of Ronald Reagan’s National Security Council in 1981, gives a lengthy account of its importance to the US. Mr Weiss, who was put in charge of the US response to the Farewell leaks, was an intelligence officer for almost half a century. His words need to be treated with caution but he suggests that Farewell played a pivotal role in the winning of the Cold War.

“Reading the material caused my worst nightmares to come true,” he said. The Soviet Union, under the cover of detente had extracted so many technical secrets from the West, openly and illegally, that in the 1970s “our science was supporting their national defence”.

At the same time, the Farewell File revealed that the USSR was much further behind the West in computer technology than the CIA had believed possible. The US used the information to turn the tables, Mr Weiss said, “and conduct economic warfare of our own”.

Sabotaged pieces of technology were leaked to Moscow “designed so that… they would appear genuine but would later fail”; “contrived [unreliable] computer chips found their way into Soviet military equipment, flawed turbines were installed on a gas pipeline (which later exploded) and defective plans disrupted the output of chemical plants and a tractor factory”.

The former French foreign minister, Mr Vedrine, believes that the Soviet empire was already close to collapse in the early 1980s. Its economic model was no longer working. The Afghan war and military expenditure had crippled state finances. The value of oil exports had plummeted. Farewell, he says, did not cause the end of the USSR but it did “hasten the system towards its end”.

Gus Weiss reaches the same conclusion. Unlike Mr Védrine, he will never see the cinematic version of events. He died in November 2003 in mysterious circumstances, officially classified as suicide. Mr Weiss, who had split with the Bush administration over Iraq, fell from the windows of his apartment in Washington. The apartment was in the Watergate building.

Unvealed – Ikea Used Political Prisoners of the STASI As Slave Labor

Like many global companies mass producing goods, Ikea has a past of unjust labor. The Telegraph reports:

Ikea developed strong links with the communist state in the 1970s, opening a number of manufacturing facilities, one of which, according to Stasi records discovered by German television company WDR, used political prisoners to construct sofas.

The factory in Waldheim stood next to a prison, and inmates were used as unpaid labour, it is claimed. Gaols in the Democratic Republic housed significant numbers of political prisoners, with some estimates indicating they made up at least 20 per cent of the entire prison population.

Quoted in a Stasi file, Ingvar Kamprad, Ikea’s founder, said while he had no official knowledge of the use of prison labour, if it did indeed exist “in the opinion of Ikea it would be in society’s interests.”

 

Link to the Telegraph article

 

http://www.telegraph.co.uk/news/worldnews/europe/sweden/8742172/Ikea-used-political-prisoners-in-GDR-as-slave-labour.html

Editorial – Internet Eyes Citizen Spy Game – The New Stasi?

Liberty lies in the hearts of men and women; when it dies there, no constitution, no law, no court can save it…
– Judge Learned Hand, ‘The Spirit of Liberty’ speech (1944)

The launch of Internet Eyes on 4th October (as part of a three month trial) marks another disturbing chapter in Britain’s surveillance society.

Internet EyesIn the autumn of 2009 Internet Eyes Limited hit the headlines when they announced their desire to launch a CCTV game that they were keen to claim was not a game. Private individuals would subscribe to private camera feeds connected to the internet and spy on people going about their business, with a cash prize each month for the person who reports the most infringements. The game is now being launched as part of a three month trial at 12 shops (including Costcutter and Spar franchises) in towns including Reading, Wokingham and Newton Abbott.

The UK’s Information Commissioner has put private profit above personal privacy in allowing a private company to launch its Stasi style citizen spy game rather than defending the rights of British citizens. This is the privatisation of the surveillance society – a private company asking private individuals to spy on each other using private cameras connected to the internet. Internet Eyes must be challenged.

Texas Virtual Border

In the United States in 2008 a similar hair-brained project, called the ‘Texas Virtual Border Watch Program’ [1] was launched which allows anyone in the world to log on via the internet and watch a live feed of the Texas border to supposedly report suspicious activity (which in reality consists mainly of birds or deer lurking with intent).

A July 2009 Homeland Security Newswire article ‘Virtual border system ineffective, out of cash’ [2] details a few of the reports made by Texas Virtual Border Patrol viewers:

Some, such as Phyllis Waller of Bartlesville, Oklahoma, reported precisely what they saw. “Cow or deer walked by; now out of screen,” she wrote. Another activity report simply read, “armadillo by the water.”

One border watcher offered some advice: “Just a word of warning: A moment ago I saw a spider crawl across the top of the camera. You might want to try and prevent any webs from being spun across the lens area by treating with repellent or take other measures.”

Much like the failed US citizen spy system Internet Eyes viewers will be watching nothing much going on, in this case in shops – just people going about their daily business: buying a pint of milk, standing in a queue or choosing a chocolate bar.

Citizen spies

There have been other citizen spy pilots such as the cable TV channel in East London that showed live feeds of CCTV cameras in the area. All of these seek to outsource surveillance monitoring to members of the public, making members of the public the watchers and consequently part of the surveillance state. In doing so they hope to normalise people to surveillance and aim to make people ignore the uses to which constant monitoring can be put by the state or corporations. Not to mention the appalling impact this disconnect has on society.

Last year a BBC television programme, ‘Inside Out’ [3] described Internet Eyes as a “revolution” in CCTV despite the fact that it had not yet launched and that the Texas virtual border patrol to which they compared it was an enormously expensive failure ($2 million dollars spent in the first year for just 12 arrests).

people on raftOf course none of this was mentioned in the BBC’s programme. At one point the presenter says that he has logged on to the Texas Virtual Border Watch website. Next we see him watching a video and he tells us: “There’s a family here in a raft and it’s amazing to think that by clicking a link here in London I can have border patrol go out and stop them”. It really would have been amazing – because the footage was not streaming live but was from the BorderWatch Archives section of their website [4].

Numerous studies (including those commissioned by the Home Office) have shown that CCTV does not have a significant effect on crime, so such “revolutions” are ways of ensuring that the public does not focus on the lie that they have been sold. Creating systems that encourage people to watch the world through a monitor and report those they see on the screen actually discourages them from interacting with real people and participating in the community in which they live.

One of the claims made by Internet Eyes is that the reason CCTV doesn’t work is because there is hardly anyone watching them in real time. This just isn’t true. The vast majority of council/police cameras in the UK are watched 24 hours a day by trained staff. It is these cameras that have been subject to the most studies and have been shown to be ineffective.

ICO complaint

No CCTV along with Privacy International issued a joint complaint [5] to the Information Commissioner’s Office (ICO) last year as we believe that as well as being a ludicrous gimmick the game breaches the Data Protection Act. We laid out in detail the ways in which Internet Eyes breaches the Act but the ICO refused to block the launch of Internet Eyes and in fact bent over backwards to help the private company squeeze it’s game into the existing legal framework.

Section 8.2 of the ICO CCTV guidelines [6] states: “[…] it would not be appropriate to disclose images of identifiable individuals to the media for entertainment purposes or place them on the internet”. Despite claims of technical safeguards Internet Eyes Ltd have no way of knowing who is viewing their images and they have no way of controlling where such images are stored or distributed. For instance an internet viewer could simply use a video camera to record images from a CCTV feed and then keep those images permanently or distribute them as they see fit.

The thinking behind the Information Commissioner, Christopher Graham’s failure to block the launch of Internet Eyes was revealed when he appeared before the House of Commons Justice Committee session on ‘Justice issues in Europe’ in January of this year [7], Graham told MPs:

I think there are differences of view within the European Union and some of my colleagues, some of the data protection authorities take not just a purist view but see it as their role to stop things happening whereas I think in the UK we take a more practical approach where we say here are tremendous opportunities provided by modern technology and the question is finding the balance between getting the best out of the opportunities that the technology provides and the necessary protection of privacy. If you simply begin by saying privacy is an absolute and we must stop things in the name of privacy, you do not get anything done. It is much more of a challenge to come up with that balance between getting the utility from technology while protecting privacy.

Graham’s claim of balance between privacy and technology is not viable. In reality every new technology erodes privacy – if as each new technology comes along a new “balance” is sought then a bit more privacy is given away and privacy never gets to regain lost ground.

Much of the media coverage around the launch has suggested that the Information Commissioners Office (ICO) has in some way approved Internet Eyes. This is not quite true. The ICO was not willing to prevent Internet Eyes from launching. They have advised the company about data protection compliance and the company has made some changes to its service. Once the service has launched the ICO will have to respond to complaints and should it be found that the service breaches the Data Protection Act then they will have to take action.

Internet Eyes is a very grave concern and we call on those affected by the citizen spy game to contact us with a view to legal action.

As Sir Ken MacDonald, former Director of Public Prosecutions warned at a CPS lecture in 2008 [8]: “… we should take very great care to imagine the world we are creating before we build it. We might end up living with something we can’t bear.”

Endnotes:

Carpocrates – Orgies for Jesus

Orgy

 

The following is an excerpt from the new Disinformation title 50 Things You’re Not Supposed To Know: Religion, authored by Daniele Bolelli.]

What if Christian theology dismissed the virgin birth and other miracles as fairy tales? What if your pastor/priest told you to flush the Ten Commandments down the toilet and instead live life to the fullest? What if Sunday service at your local church consisted in a juicy orgy? All of this could have happened had Carpocrates had his way.

Carpo … who? The lead character in our story was the leader of a second century Christian community based in the Greek islands. Back in those days, early Christians couldn’t agree on just about anything. Official Christian doctrine hadn’t been fully established yet, so an extremely wide range of opinions and teachings fell under the label of “Christianity.” The only thing they had in common was that they all thought Jesus was a cool guy. Other than that, everything else was up for debate since they couldn’t even agree on which books should become official scriptures. Some Christians believed their religion was to remain exclusively for Jewish people. Others wanted to open it to all ethnicities. Some believed Jesus and God were one. Others were far from sold about this. Some were strict ascetics. Others enjoyed a very sensual life. Some promoted women as leaders within their groups. Others felt women were good to cook dinner and make babies, but religious leaders? Ha!

In the midst of this very chaotic beginning, Carpocrates emerged as a particularly charismatic preacher, who soon attracted enough of a following as to give birth to his own branch of Christianity. His ideas were just a tad on the wild side. Jesus—Carpocrates argued—was as human as anyone else. He was a visionary whose brilliance and wisdom put him in touch with God, but was not God himself. This didn’t diminish Jesus’s status in Carpocrates’s eyes, since it set him up as a model of behavior that regular human beings could hope to emulate. The whole story of the virgin birth made Carpocrates laugh. In his view, good old Jesus was conceived in the old fashioned way: through sweaty sex. The depth of Jesus’s wisdom was enough for Carpocrates to admire and love him, so he felt no need for any supernatural special effects.

Since this beginning was apparently not controversial enough, Carpocrates promptly taught his followers to reject Mosaic Law as well as the prevailing morality of his times as mere human opinions, not divine commandments. A goodie-goodie morality was according to Carpocrates nothing but a cage built by those who were too scared by life’s intensity. The soul could only achieve freedom and fulfillment by experiencing all of life, without discriminating too much. Only in this way, it would free itself from the cycle of reincarnation …

Oh, yeah, did I forget to mention that? Carpocrates’s followers—like the members of many other early Christian sects—fully believed in reincarnation. And just like several tantric schools found in the history of both Hinduism and Buddhism, they also believed that human beings should explore every emotion without holding back. Sensual pleasure in their eyes was not any less sacred than the most spiritual practices, so good food, sex and every other earthly joy was embraced as a stepping stone toward liberation.

This determination to live life to the fullest went hand in hand with another radical notion. Carp considered differences in wealth and social class as unnatural perversions. Since everyone is born naked and equal in front of God, human attempts to gain status at the expense of others were misguided and ultimately against God’s plan. The cure for the very human tendency toward ego aggrandizing was to discourage the evil of private property. Instead, everything—from material possessions to sexual partners—was to be held in common. Coupled with Carp’s insistence on indulging in sensual pleasures, this idea led his followers to regularly stage sexual orgies as part of their spiritual practices … which makes you wonder: just how different would the world be had mainstream forms of Christianity decided to embrace Carpocrates rather than stern moralists like Saint Paul and Saint Augustine? I think it’s a safe bet that church attendance would be much higher.

Revealed – Prosecution of Accused CIA Leaker Will Face Legal Hurdles

Former CIA officer John C. Kiriakou was indicted yesterday on charges of leaking classified information to the press in violation of the Espionage Act and the Intelligence Identities Protection Act.  He had been charged on January 23 but the indictment was not filed and unsealed until yesterday.

Kiriakou is accused of violating the Intelligence Identities Protection Act for allegedly disclosing the identity of a covert CIA officer, and of violating the Espionage Act for allegedly disclosing national defense information to persons not authorized to receive it. He is further accused of making false statements to the CIA Publications Review Board in connection with a manuscript he intended to publish.

While the indictment is a daunting blow to Mr. Kiriakou, who must mobilize an expensive and burdensome defense, it is challenging in a different way for the prosecution, which will face a variety of substantive and procedural hurdles.

For one thing, it remains to be shown that the “covert officer” whose identity was allegedly disclosed to a reporter by Kiriakou actually falls within the ambit of the Intelligence Identities Protection Act.  To be subject to the Act’s penalties, the covert officer in question — whose identity has not been publicly revealed — must not only be under cover but must also have served abroad within the past 5 years.

But the prosecution’s biggest challenge, which may well be insurmountable, will be to demonstrate to a jury that Mr. Kiriakou actually intended to harm the United States or to assist a foreign nation by committing an unauthorized disclosure.

The new indictment asserts generally that Kiriakou “had reason to believe [the information] could be used to the injury of the United States and to the advantage of any foreign nation,” which is an element of the crime set forth in the Espionage Act (18 USC 793).

Yet the meaning of this provision was construed by Judge T.S. Ellis III in a 2006 opinion in a way that would seem to make the prosecution of Mr. Kiriakou particularly difficult. In light of that opinion, the government will have to prove not merely that Kiriakou “had reason to believe” some harm to the United States could possibly result from his action, but that he deliberately intended to cause such harm.

This follows from the (alleged) fact that Kiriakou disclosed classified “information” rather than classified “documents,” as well as from the seemingly duplicative Espionage Act use of the terms willfulness and reason to believe, which Judge Ellis interpreted thus:

“If a person transmitted classified documents relating to the national defense to a member of the media despite knowing that such an act was a violation of the statute, he could be convicted for ‘willfully’ committing the prohibited acts even if he viewed the disclosure as an act of patriotism,” Judge Ellis wrote. “By contrast, the ‘reason to believe’ scienter requirement that accompanies disclosures of information requires the government to demonstrate the likelihood of defendant’s bad faith purpose to either harm the United States or to aid a foreign government.”  (see pp. 33-34).

But there is no known indication that Mr. Kiriakou, a former CIA counterterrorism operations officer, had a bad faith purpose to harm the United States, and every indication of the opposite.

“For more than 14 years, John worked in the field and at home, under conditions of great peril and stress and at great personal sacrifice, dedicating himself to protecting America and Americans from harm at home and abroad,” states a new website devoted to his cause.

Public Intelligence – U.S. Army Tactical Site Exploitation and Evidence Collection Handbook

https://publicintelligence.net/wp-content/uploads/2012/03/CALL-SiteExploitation.png

 

This handbook was written to assist Soldiers and leaders at the platoon, company, and battalion level to better understand the importance of their actions on an objective, as well as to teach the fundamentals of tactical site exploitation (TSE) and cache search operations. While selecting the right Soldiers to be on a TSE team is important, the Soldiers and leaders must also understand the importance of the TSE process and the end results of their efforts. Proper TSE fuels the intelligence-operations cycle and may quickly answer the commander’s critical information requirements and assist in the criminal prosecution of detainees.

If done correctly and patiently, TSE focuses units on operations that have a higher chance of follow-on success and thus serves as a force multiplier. When not conducted correctly or when the enemy situation does not allow TSE, an attack, find, or event becomes a singular occurrence in yet another operation or platoon mission, and it becomes harder for Soldiers to understand the purpose of what they are doing. Teaching Soldiers and leaders the importance of proper intelligence and evidence procedures enables them to think on a multifaceted scale, to see the details they missed before, and to better understand the commander’s intent and their operational environment.

To that end, teaching Soldiers and leaders time-proven cache search fundamentals; principles; and tactics, techniques, and procedures furthers this education. Soldiers and leaders start to think about how their enemy thinks and how to get inside his operational cycle and force him into the open to be killed or captured.

Tactical site exploitation (TSE) is the action taken to ensure that documents, material, and personnel are identified, collected, protected, and evaluated in order to facilitate follow-on actions. TSE focuses on the actions taken by Soldiers and leaders at the point of initial contact. When conducted correctly, TSE can provide further intelligence for future operations, answer information requirements, and provide evidence to keep detainees in prison.

TSE, which includes tactical questioning (TQ), at the squad and platoon levels feeds intelligence/evidence up the chain of command to the company and battalion, where it is exploited for immediate operations. Subsequently, the information is processed at the brigade or theater fusion cells for further analysis and exploitation with specialized teams/assets. This analysis fuels future operations, which in turn produces more intelligence, constantly fueling the targeting cycle. This cycle can quickly take apart the network of an insurgency or at least damage it to such an extent as to make it a low-level threat.

For example, the documents or equipment found in a cache produce fingerprints. A follow-up cordon and knock operation in the vicinity of the cache and the proper use of biometrics equipment produce a matching set of fingerprints from a detainee. Thorough TQ of the detainee produces a name and a meeting location. A surveillance operation of the meeting location produces further intelligence and a subsequent raid, which produces more intelligence and evidence. Without proper TSE at the cache, the fingerprints would have been destroyed, and no subsequent operations would have been identified through the targeting process.

 

https://publicintelligence.net/wp-content/uploads/2012/03/call-evidence.png

DOWNLOAD THE ORIGINAL DOCUMENT HERE

CALL-SiteExploitation

The CIA reports – [Description of Activities of Covert Personnel in East Asia Division of Central Intelligence Agency

Citation: [Description of Activities of Covert Personnel in East Asia Division of Central Intelligence Agency; Attached to Divider Sheet]
Secret, Report, May 09, 1973, 2 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00046
Origin: United States. Central Intelligence Agency. Directorate of Operations. East Asia Division
Individuals/
Organizations Named:
United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Federal Bureau of Investigation
Subjects: Communists and Communist countries | Covert identities | Covert operations | Political activists
Abstract: Describes covert information collection on “American radical, leftists and communist targets” and notes possibility that covert Central Intelligence Agency operatives might be exposed or defect.
Full Text: Document – PDF – this link will open in a new window (53 KB)

Durable URL for this record

The Lives of Others – das Leben der Anderen – Full Movie – Ganzer Film

 

The Lives of Others

The Lives of Others (German: Das Leben der Anderen) is a 2006 German drama film, marking the feature film debut of filmmaker Florian Henckel von Donnersmarck. The film involves the monitoring of the cultural scene of East Berlin by agents of the Stasi, the GDR‘s secret police. It stars Ulrich Mühe as Stasi Captain Gerd Wiesler, Ulrich Tukur as his boss Anton Grubitz, Sebastian Koch as the playwright Georg Dreyman, and Martina Gedeck as Dreyman’s lover, a prominent actress named Christa-Maria Sieland.

The film was released in Germany on 23 March 2006. At the same time, the screenplay was published by Suhrkamp Verlag. The Lives of Others won the 2006 Academy Award for Best Foreign Language Film. The film had earlier won seven Deutscher Filmpreis awards – including those for best film, best director, best screenplay, best actor, and best supporting actor – after setting a new record with 11 nominations. It was nominated for Best Foreign Language Film at the 64th Golden Globe Awards. The Lives of Others cost 2 million USD[2] and grossed more than 77 million USD worldwide as of November 2007[update].[3]

 

The NSA – The Pursuit of Justice in Guatemala

Brigadier General José Efraín Ríos Montt, flanked by General Horacio Egberto Maldonado Schaad and Colonel Francisco Luis Gordillo Martínez, at their first post-coup press conference on March 23, 1982, National Palace, Guatemala City. ©Jean-Marie Simon

Washington, DC, April 8, 2012 — Today marks the 30th anniversary of the coup that propelled General Efraín Ríos Montt to power and launched the most violent period of the 36-year internal armed conflict in Guatemala. The National Security Archive and the North American Congress on Latin America (NACLA) mark the coup anniversary with the publication today of NACLA Report on the Americas, “Central America: Legacies of War,” containing feature article by National Security Archive’s Kate Doyle on “Justice in Guatemala.”

The entire NACLA Report on the Americas is available, here.

January 26 marked a watershed in Guatemalan history. That evening, after more than eight hours of arguments from prosecutors and defense lawyers, retired army general Efraín Ríos Montt—the military leader who presided over the most intense and bloody period of state repression in the country’s modern history—was formally charged by Judge Carol Patricia Flores with genocide and crimes against humanity. Ríos Montt now faces the real possibility of a criminal trial. Inside the courtroom on the 15th floor of the Tribunal Tower in Guatemala City, the verdict was met with the mechanical gasp of a dozen camera shutters clicking simultaneously. Downstairs, in the plaza outside the building, hundreds of massacre survivors and families of victims were watching the proceedings on open-air screens. They cheered, applauded, and wept at the astonishing news.

The criminal acts at the heart of the indictment took place 30 years ago, in 1982–83, when Ríos Montt’s armed forces unleashed a savage counterinsurgency campaign that massacred thousands of unarmed Mayan civilians in the country’s northwestern department of Quiché. Investigations into his regime’s scorched-earth operations prompted the Historical Clarification Commission (CEH)—Guatemala’s truth commission—to declare in 1999 that “acts of genocide” had taken place in the Quiché’s Ixil region and other areas during the 36-year internal conflict. The finding opened the door to the possible prosecution of senior army officers and their commander in chief. But for years, Ríos Montt avoided facing charges, thanks to judicial inaction, elite complicity, and political immunity, frustrating efforts by human rights lawyers representing the affected communities to mount a legal case. The ruling on January 26 changed everything.

In her decision, Flores discounted the defense posed by Ríos Montt’s legal team that civilian deaths took place in the heat of battle through the errors of field commanders, rather than as a result of government policy. In particular, she rejected the argument of Ríos Montt’s lawyer Gonzalo Rodríguez Gálvez, that because the former dictator was not physically present “in any confrontation against the guerrillas,” he could not be held accountable for the actions of his officers. Flores found, instead, that “the extermination of the civilian population was the result of military plans, and that these plans were executed under the command of Ríos Montt.”1

Ríos Montt himself chose not to speak in his own defense during the hearing. Just as the armed forces have kept quiet over the 16 years since the war ended in the 1996 peace accord, Ríos Montt told the judge and assembled spectators in the courtroom, “I prefer to remain silent.”

There are two winds blowing in Guatemala today. One is the gale force of the country’s newly named public prosecutor, Claudia Paz y Paz, whose determination to pursue the masterminds of the army’s war on its citizens has led to groundbreaking indictments, including Ríos Montt’s. The other is the rising storm of right-wing outrage and resistance, which helped to sweep President Otto Pérez Molina into office in November. Pérez Molina, another retired general, had a long and varied career in the military, culminating in his role as one of the government’s negotiators in the peace talks that led to the accord. He also served as one of Ríos Montt’s field commanders, in Nebaj, a town in the heart of the country’s Ixil region.

Impunity in Guatemala has long been a stumbling block to consolidating the rule of law following the end of the civil conflict. In 1994, government peace negotiators were careful to design the mandate of the future truth commission in order to avoid “individualizing responsibility” and to delink it from the judicial process.2 When the final accord was signed two years later, Congress quickly passed the National Reconciliation Law, granting limited amnesty for crimes connected to the war. Early efforts to try human rights perpetrators were messy, frustrating affairs. The trial of army officers and civilians in the 1998 assassination of Bishop Juan José Gerardi, for example, led to the unprecedented convictions of three military men and a priest in 2001, but only after prosecutors overcame a tortuous series of legal obstacles and fraudulent “experts” presented by the defense. It still remains unclear who masterminded the killing. An equally groundbreaking 2002 conviction against Colonel Juan Valencia Osorio, for the 1990 stabbing death of anthropologist Myrna Mack, was torpedoed days later when Valencia turned fugitive by “escaping” from house arrest, while under police custody.

Human rights groups and communities affected by violence continued to investigate historic abuses despite setbacks. In Huehuetenango, Chimaltenango, Quiché, and Verapaces—regions of the countryside hardest hit by the army during the war—local organizations helped exhumation teams identify mass graves. They also gathered testimonies and preserved documents that could be used in future prosecutions. In Xamán, Alta Verapaz, survivors of a massacre that killed 11 residents in 1995 became the first indigenous plaintiffs in a criminal case charging members of the military with human rights crimes. Despite constant threats to witnesses and judicial authorities, the case resulted in the 2004 sentencing of 13 soldiers and one officer to 40 years in prison each for their roles in the massacre.

Another breakthrough in human rights litigation took place in 2009, after Guatemala’s Constitutional Court ruled that forced disappearance was a “permanent crime” due to the lack of a body and was therefore not restricted by a statute of limitations. Immediately following the decision, two separate trials resulted in long sentences for military perpetrators: military commissioner Felipe Cusanero was found guilty of the forced disappearance of six indigenous residents of Choatalúm, Chimaltenango, between 1982 and 1984, and a court in Chiquimula convicted Colonel Marco Antonio Sánchez Samayoa and three military commissioners for the disappearance of eight family members in the village of El Jute in October 1981. In the case of El Jute, Sánchez Samayoa—chief of the Zacapa military zone and indicted for his command authority in the area rather than his material involvement in the crime—lost the amnesty protection he was initially granted under the National Reconciliation Law on the grounds that it did not apply to internationally recognized crimes against humanity.

If the permanent commitment of local human rights activists contributed to their successes in court, so too did the increasing engagement of the country’s judicial institutions. International actors helped prod the courts and the Public Ministry into action. In 2010, the United Nations institutionalized what had been an ongoing effort to strengthen Guatemala’s legal system by launching its Transitional Justice Program (PAJUST) with support from a group of interested governments, including Denmark, Holland, Sweden, and the United States. PAJUST seeks to improve investigations into some of the most pressing human rights cases from the past through funding for the Public Ministry, the Peace Secretariat, and other agencies and nongovernmental groups.3 In October 2010, government prosecutors won a conviction against two police agents for the 1984 forced disappearance of labor leader Edgar Fernando García, largely owing to records found in the Historic Archives of the National Police (which is funded by PAJUST) and used as evidence in the trial.

Guatemala’s President Under the Lens

In 1992, Guatemalan rebel commander Efraín Bámaca Velásquez of the Revolutionary Organization of the Armed People (ORPA) was captured in a clash with the military and subjected to months of interrogation and torture before being disappeared. Although Guatemalan president Otto Pérez Molina has repeatedly denied any acknowledge of Bámaca’s fate, there is extensive evidence that the Intelligence Directorate (D-2)-which Pérez Molina headed at the time-commanded Bámaca’s secret detention, controlled and monitored his torture, and chose when and how he was killed.

Bámaca’s widow, U.S. lawyer Jennifer Harbury, has fought for years to obtain information about her husband’s disappearance and has filed a series of criminal cases against the alleged perpetrators, including Pérez Molina. The evidence she has introduced against the president is culled from witness testimonies, Guatemalan army records, and declassified U.S. documents, including the following:

    • A document signed by a group of unidentified Guatemalan military officers and given to the U.S. embassy in Guatemala describing the presence of Pérez Molina at a meeting of 50 senior army officers on March 12, 1992, the day that Bámaca was captured. The meeting, which took place at the military base where Bámaca was taken after he was detained, was subsequently confirmed in confidential Guatemalan army telegrams submitted as evidence before the Inter-American Court of Human Rights in 1998.
    • A report from the CIA station in Guatemala dated March 18, 1992, revealing that the ORPA commander was captured in the department of Retalhuleu, alive and in good health. The army planned to hold him secretly to fully exploit the intelligence they would get from him. [Document]
    • Accounts of former prisoners of the Guatemalan army, submitted to the United Nations, describing Bámaca’s secret detention and torture by intelligence officers acting under orders of the D-2.
    • A declassified Defense Intelligence Agency (DIA) cable dated November 3, 1994, on the capture, interrogation, and “elimination” of Bámaca. According to the DIA’s source, intelligence specialists sought to move the guerrilla leader to the San Marcos military base for further interrogation, a request that was “approved by the Directorate of Intelligence Division (MI), which had responsibility for collecting intelligence on the different guerrilla organizations.” [Document]
  • In 1995, after news reports identified one of Bámaca’s torturers to be a paid CIA asset inside the Guatemalan army named Colonel Julio Roberto Alpírez, President Bill Clinton ordered a government-wide review of records on U.S. intelligence operations in Guatemala. As a result of the review, the CIA Inspector General issued an extensive report into U.S. support of Guatemalan intelligence, including the examination of the known facts in the Bámaca case. The report cites five separate CIA and U.S. embassy documents confirming that the army moved Bámaca around the country in order to protect the interrogation, until he was transferred to a D-2 installation in Guatemala City. What happened to him after the D-2 took him away is still unknown, though U.S. intelligence documents are clear that he was killed. [Document]

Harbury is waging a fierce battle to persuade the Guatemalan Supreme Court to proceed with a case she filed in March 2011 accusing Pérez Molina of her husband’s forced disappearance. Although the Inter-American Court of Human Rights has forcefully ordered Guatemala to reopen investigations into Bámaca’s case, the Court has failed to act. -Kate Doyle

But it was the appointment of Paz y Paz at the end of 2010 that has transformed the Public Ministry and demolished the business-as-usual attitude of indifference and scorn normally reserved by the country’s most notorious human rights violators for the demand for justice. In her brief term in office so far, Paz y Paz has overseen the capture of five senior military and police officers, including Ríos Montt and another former head of state, Óscar Mejía Víctores (1983–86), for gross human rights abuses. With the exception of Mejía Víctores, who has been declared mentally incompetent, all are under preventative detention or house arrest awaiting trial dates. Paz y Paz’s lawyers also won convictions against former members of the Kaibil Special Forces for their roles in the brutal Dos Erres massacre of 1982, a case that had languished for almost 15 years through the inaction of her predecessors. In a stunning affirmation of the prosecution’s case, the first circuit court sentenced the four Kaibiles to 6,060 years in prison: a total of 30 years each for each of the documented 201 men, women, and dozens of children slaughtered by the special unit, plus 30 years for crimes against humanity.

Paz y Paz was an unlikely choice for the highest judicial office in Guatemala. She was an academic with the Institute of Comparative Studies in Criminal Sciences. She taught law in the national university and had a record of human rights work, including a stint in the Archbishop’s Office of Human Rights in the 1990s.4 During the selection process, her candidacy was promoted by human rights organizations and other civil society groups, but she was only named after a nasty scandal shook the UN-sponsored International Commission against Impunity in Guatemala (CICIG), paving the way for her appointment.

Established in late 2007 as a multinational investigative body designed to ferret out corruption and expose organized crime, CICIG has worked with Guatemalan police, prosecutors, and judges to assemble some of the most sensitive criminal cases, often targeting the country’s most powerful and well-connected figures. In May 2010, a new public prosecutor, Conrado Reyes, began firing staff and dismantling corruption investigations painstakingly built by his ministry over two years of collaboration with the UN unit. CICIG’s director, Carlos Castresana, retaliated by abruptly announcing his resignation during an explosive press conference in which he revealed evidence linking Reyes to organized crime. Days later in a second press conference Castresana also exposed a smear campaign directed against him. Within a week of Castresana’s resignation, Guatemala’s Supreme Court had removed Reyes and ordered a new selection process to begin for his post. That June, the United Nations named Francisco Dall’Anese Ruiz, a former Costa Rican attorney general with experience in government corruption cases, to take over CICIG. In December, President Álvaro Colom announced that Paz y Paz would lead the prosecutor’s office.

Since then, Paz y Paz has cast her net wide, with spectacular results. In collaboration with the Minister of Interior, Carlos Menocal, her investigators have hunted down major drug criminals, capturing five of the country’s 10 most-wanted narco-traffickers, disrupting the Sinaloa Cartel’s operations in Guatemala, and arresting associates of the Mexican Zetas. She has gone after corruption, cleaning her own house first by launching an evaluation system within the Public Ministry soon after taking office and using the results to suspend and fire dozens of incompetent or venal prosecutors. Nationally, the ministry’s corruption probes have reached the highest circles of power, including an investigation that led to arrest warrants for Gloria Torres—sister of Sandra Torres, ex-wife of former president Colom—and her two daughters on money-laundering charges.5 The judicial system’s rapid response to serious crimes, such as the beheading of 27 farm workers in the northern department of the Petén last May and the assassination of the beloved Argentine musician Facundo Cabral when he was touring Guatemala in July, has led to the arrest of suspects within days, in sharp contrast to past practices.

To what extent these improvements are sustainable remains an open question. It is not even clear whether or not Paz y Paz will keep her job. Two thousand and eleven was an election year, and as the public prosecutor and her allies labored to advance the rule of law, Pérez Molina and his right-wing Patriotic Party campaigned across the country on his plans to solve the security crisis with an “iron fist” (mano dura). On November 6, Pérez Molina won a strong victory over his rival, politician and businessman Manuel Balidzón, and on January 14 he was sworn in as Guatemala’s newest president. His election has dismayed human rights advocates who hold him responsible for the same genocidal crimes committed in the Quiché that will be debated in the coming Ríos Montt trial.

 The public biography of Pérez Molina is silent on the matter.6 The little that is known about his past reflects the career of a talented and ambitious military man. He was an operations officer who came of age in the 1970s and rose from unit commander to Director of Operations (D-3), chief of the Kaibil training center and head of the Presidential General Staff. He was a product of the U.S. School of the Americas and left a trail of high marks and glowing evaluations. In the early 1990s, a power struggle inside the army landed him as head of the Intelligence Directorate, where he made his first real impression on the wider public when then president Jorge Serrano attempted an autogolpe, or internal coup, in 1993. Pérez Molina’s successful opposition to Serrano’s power grab made him stand out as a moderate among extremists, pitting him against the cabal of powerful intelligence officers known as the Cofradía (Brotherhood) that backed Serrano.

The United States took notice, and reports from U.S. defense attachés posted in Guatemala in the mid-1990s bubbled with enthusiasm and praise: one of the “Best and the Brightest,” said one cable, “intelligent, hard-working, dedicated and principled . . . unflappable under pressure, has strong command presence and possesses great self-confidence.” U.S. officials also noticed his role in the counterinsurgency, calling him one of a group of military progressives “with blood stains on their hands.”7 He was a “reformer,” not a hard-liner, a strategist, not a tactician, who believed in stabilization and pacification, what Guatemala scholar Jennifer Schirmer has called the “enlightened repression” of brutal military violence combined with population control, civic action, and development: the “Beans and Bullets” strategy of the Ríos Montt regime.8

There is no public information about where Pérez Molina served during the scorched-earth campaigns. He claims he arrived in Nebaj after the massacres in late 1982 with the goal of protecting devastated villagers, though he has refused to confirm the exact dates of his deployment.9 But the army’s own records of Operación Sofía, a violent counterinsurgency sweep through the Ixil triangle in July and August 1982, contain evidence of his presence on the field of battle. A report written on July 22 describes then major Pérez Molina and another officer, Major Arango Barrios—both listed as “paracaidistas,” the special airborne troops that led Sofía—attached to a patrol in a confrontation with “the enemy” near the settlements of Salquil and Xeipum. According to the document, the patrol killed four civilians in the clash, and “captured” 18 old people and 12 children. In a second Operación Sofía document, Pérez Molina appears as his alias, Major Tito, being transported by helicopter with another Paracaidista officer on July 27 between villages inside the killing zone.10

The Operación Sofía records, along with a key military strategy document called Plan Victoria 82 that prosecutors obtained after years of litigation, now serve as evidence in the criminal case against Ríos Montt. But by and large the Guatemalan army has successfully maintained its iron grip on its files and has avoided releasing information about the war on “national security” grounds. When Colom declared in 2008 that he believed historic military records should be available to the public, the Defense Ministry responded by creating a Commission on Military Archives that reviewed the army’s holdings for disclosure. In June the military opened what it says are 11,000 documents and established a reading room where the public can consult the material. It is a limited step toward accountability, to say the least. Although there is no guide or index explaining the contents of the archive, the army has already admitted that it includes no records from the critical period from 1980 to 1985.

Ever the operator, Pérez Molina has found a way to use the military’s continued secrecy to undermine the history of the war as established by the truth commission. In a televised conversation in July with Martín Rodríguez, director of the online news service Plaza Público, the retired general argued that precisely because the army refused to engage with the CEH and would not turn over its records to investigators, the commission was unable to arrive at the truth of what happened.

 “I was the principal critic of the army!” he said. “The army should have come, spoken, responded to and participated in the CEH. The army silenced itself and did not explain what Plan Victoria 82 was. It let [the commissioners] make their own interpretations. It didn’t explain what the situation was in the country’s highlands. It didn’t explain how the EGP [Guerrilla Army of the Poor] worked, for example. What the EGP did was involve the entire family . . . they even involved women and children. And if you look at where the massacres were concentrated, they were concentrated in EGP areas.”11

In spite of Pérez Molina’s critique, his comments show just how far the tireless efforts of human rights groups have pushed the debate. The military and political right in Guatemala can no longer deny the existence of massacres. The trials have derailed that narrative.

An alarmed and angry right wing has begun to push back, often appropriating the tactics and language of the same human rights organizations that they oppose.12 One week after Pérez Molina’s presidential victory, some 200 retired military men and their families staged a march in Guatemala City demanding “Freedom for those who fought for our freedom.”

Three legal complaints have been filed since November accusing dozens of individuals on the left and in civil society of acts of terrorism and “crimes against humanity” committed during the conflict. In one, the son of Ríos Montt’s interior minister identifies 26 people he claimed engineered his kidnapping (or “attempted disappearance,” as he calls it) by guerrillas in 1982. Another, introduced by coffee businessman Theodore Plocharski, seeks indictments against 52 people for the kidnapping and execution of one Guatemalan and nine foreign diplomats, including U.S. Ambassador John Gordon Mein, who died in a botched kidnap attempt by the Revolutionary Armed Forces (FAR) in 1968. When asked by the Guatemalan newspaper El Periódico to explain his lawsuit, Plocharski said he sought to reveal “the truth about the war.” The complaints appear to be hastily composed and poorly conceived—those accused include well-known guerrilla leaders, human rights activists, elected members of Congress, former first lady Sandra Torres, U.S. photographer Jean-Marie Simon, and journalist Marielos Monzón, who, as she has pointed out, was born three years after the Mein assassination. The roll call more closely resembles death-squad lists from past decades than legitimate legal accusations. But the political motives are clear. All three lawsuits accuse relatives of Paz y Paz, including her father, a former head of the FAR.

“Members of the Army face accusations of war crimes,” said Plocharski. “Now the Public Ministry should investigate the criminal acts of the guerrillas.”13

Pérez Molina has suggested that Paz y Paz, whose supporters include U.S. secretary of state Hillary Clinton and UN secretary-general Ban Ki-moon, can remain as long as she performs her job with impartiality. He has given similar qualified approval to the continued presence of the international investigative unit, CICIG. But as he has assembled his government and launched his earliest initiatives to address Guatemala’s security crisis, he has already begun wielding the mano dura he promised during his campaign. The president appointed Colonel Ulises Anzueto, a retired Kaibil, as his minister of defense and placed the reviled special forces unit in charge of the fight against narcotrafficking, despite well-documented links between former Kaibiles and some of the region’s leading cartels. His interior minister, retired general Mauricio López Bonilla, is another former army commander, who will oversee the hiring of thousands of new police officers to combat drugs and organized crime. To help pay for his security program, he plans to ask the United States to lift its ban on military aid.

The Ríos Montt trial will unfold within this polarized climate. The aging dictator’s defense lawyers will undoubtedly try to derail the case through pointless appeals, challenges of the court’s competence, and other legal maneuvers. But it will be impossible to halt altogether without provoking a storm of national and international outrage. Now that the indictment has been issued—making Guatemala one of only three countries in Latin America with the wherewithal to charge a head of state with human rights crimes (along with Peru and Uruguay)—the whole world is watching.

There is nothing more electrifying than seeing a former strongman forced to face his accusers in a court of law. Unless it is seeing an image of his younger self as it appeared 30 years ago, when he was at the height of his powers, projected by prosecutors onto the courtroom wall above him. The year was 1982, the interviewer was a young documentary filmmaker, and Ríos Montt was angrily denying the existence of military repression in Guatemala.14 His words now serve as evidence of his command authority over the scorched earth campaigns.

 “If I can’t control the army,” he told his visitor, “then what am I doing here?”

_________________________________________________________________________

Kate Doyle is a senior analyst and director of the Guatemala Documentation Project at the National Security Archive. In May she will receive the ALBA/Puffin Foundation Award for Human Rights Activism.

 

Footnotes

1. Ustream broadcast the proceedings live on January 26; quotes are excerpted from that broadcast. An audiotape of the hearing is archived by the Center for Human Rights Legal Action at caldh.org.

2. See Secretaría de la Paz, Presidencia de la Republica de Guatemala, Acuerdo sobre el Establecimiento de la Comisión para el Esclarecimiento Histórico de las Violaciones de los Derechos Humanos y los Hechos de Violencia que Han Causado Sufrimientos a la Población Guatemalteca, Oslo, Norway, June 23, 1994, Funcionamiento, III, available here.

3. For a good description of PAJUST, see the 2011 report of one of its grantees, the Forensic Anthropology Foundation of Guatemala, “Informe Programa PAJUST,” April 2011, available at fafg.org.

4. Luis Ángel Sas, “La fiscal que movió el árbol,” Plaza Pública, June 29, 2011, available at plazapublica.com.gt.

5. Natalie Kitroeff, “Justice in Guatemala,” Americas Quarterly, January 9, 2012, americasquarterly.org/node/3189.

6. For example, the profile posted during his presidential run: Elecciones Guatemala, “Otto Pérez Molina,” April 11, 2011, available at eleccionesguatemala.org.

7. These biographical details come not from Guatemalan records but from declassified U.S. documents released to the National Security Archive under the Freedom of Information Act and available in the Archive’s holdings. “Best and the Brightest”: Defense Intelligence Agency (DIA), “A Guatemalan Army Trilogy, Part 2, The Colonels (Part 2 of [Deleted] Swan Song),” January 4, 1994; ‘Blood stains’: DIA, “Colonel Otto Pérez Molina Today,” April 20, 1994.

8. Jennifer Schirmer, A Violence Called Democracy: The Guatemalan Military Project (University of Pennsylvania Press, 1998), 44.

9. See Mica Rosenberg and Mike McDonald, “Special Report: New Guatemala Leader Faces Questions about the Past,” Reuters, November 11, 2011.

10. The files of Operación Sofía were given to the National Security Archive by a confidential source in 2009 and subsequently provided to the lawyers in the genocide case. See the Archive’s website, National Security Archive, Operación Sofía, Part 4, July 22 report, page 20; Helicopter log: page 41, available at gwu.edu/~nsarchiv.

11. Martín Rodríguez Pellecer, “Quiero que alguien me demuestre que hubo genocidio,” Plaza Pública, July 25, 2011, available at plazapublica.com.gt; go to 26:00 of the archived broadcast of the conversation between Martín Rodríguez Pellecer and Otto Pérez Molina to hear Pérez Molina discuss the work of the CEH.

12. For a discussion of the regional right-wing push to co-opt human rights language and tactics, see “The Politics of Human Rights,” NACLA Report on the Americas 44, no. 5 (September/October 2011).

13. Byron Rolando Vásquez, “Denuncian a hermana de Colom y a primas de la Fiscal,” Siglo 21 (Guatemala City), November 3, 2011; Jerson Ramos, “Theodore Plocharski ‘Intento que se conozca la verdad de la guerra,’” El Periódico (Guatemala City), December 15, 2011, available at elperiodico.com.gt.

14. The 1982 clip appears in Granito: How to Nail a Dictator, a documentary film by Pamela Yates, Paco de Onis, and Peter Kinoy (2011). Interview by Yates.

The Passion of the Christ 2004 – FULL MOVIE – HD – by Mel Gibson

 

The Passion of the Christ (sometimes referred to as The Passion[1]) is a 2004 American drama film directed by Mel Gibson and starring Jim Caviezel as Jesus Christ. It depicts the Passion of Jesus largely according to the New Testament Gospels of Matthew, Mark, Luke and John. It also draws on other devotional writings, such as those disputedly attributed to Anne Catherine Emmerich.[2][3][4][5]

The Passion of the Christ covers the final 12 hours of Jesus’ life beginning with the Agony in the Garden and ending with a brief depiction of his resurrection. Flashbacks of Jesus as a child and as a young man with his mother, giving the Sermon on the Mount, teaching the Twelve Apostles, and at the Last Supper are also included. The dialogue is entirely in reconstructed Aramaic and Latin with vernacular subtitles.

The film was a major commercial hit, grossing in excess of $600 million during its theatrical release, becoming the highest grossing non-English language film of all time.[6] The film has also been highly controversial and received mixed reviews, with some critics claiming that the extreme violence in the movie “obscures its message.”[7][8][9][10] Catholic sources have questioned the authenticity of the non-biblical material the film drew on

http://en.wikipedia.org/wiki/The_Passion_of_the_Christ

TOP-SECRET – The Zelikow Memo: Internal Critique of Bush Torture Memos Declassified

Washington, DC, April 7, 2012 – The State Department today released a February 2006 internal memo from the Department’s then-counselor opposing Justice Department authorization for “enhanced interrogation techniques” by the CIA. All copies of the memo (Document 1), which reflect strong internal disagreement within the George W. Bush administration over the constitutionality of such techniques, were thought to have been destroyed. But the State Department located a copy and declassified it in response to a Freedom of Information Act request by the National Security Archive.


Philip D. Zelikow, State Department Counselor, 2005-2007

The author of the memo, Philip D. Zelikow, counselor to then-Secretary of State Condoleezza Rice, described the context of the memo in congressional testimony on May 13, 2009, and in an article he had previously published on foreignpolicy.com site on April 21, 2009.

“At the time, in 2005 [and 2006],” he wrote, “I circulated an opposing view of the legal reasoning. My bureaucratic position, as counselor to the secretary of state, didn’t entitle me to offer a legal opinion. But I felt obliged to put an alternative view in front of my colleagues at other agencies, warning them that other lawyers (and judges) might find the OLC views unsustainable.”

OLC refers to the Justice Department’s Office of Legal Counsel.

“My colleagues were entitled to ignore my views,” he continued. “They did more than that: The White House attempted to collect and destroy all copies of my memo. I expect that one or two are still at least in the State Department’s archives.”

Zelikow attached two other memos to his May 2009 congressional testimony (Document 3) that were publicly released at that time (Document 4 and Document 5), but his February 2006 memo remained classified. In later public statements, Zelikow argued that the latter document should also be released since the OLC memos themselves had already been opened to the public by the Obama administration.

The memo released today, labeled “draft,” concludes that because they violate the Constitutional ban on “cruel and unusual punishment,” the CIA techniques of “waterboarding, walling, dousing, stress positions, and cramped confinement” were “the techniques least likely to be sustained” by the courts. Zelikow also wrote that “corrective techniques, such as slaps” were the “most likely to be sustained.” The last sentence of the memo reads: “[C]ontrol conditions, such as nudity, sleep deprivation, and liquid diets, may also be sustainable, depending on the circumstances and details of how these techniques are used.”

According to Zelikow’s accounts, he authored the memo in an attempt to counter the Bush administration’s dubious claim that CIA could still practice “enhanced interrogation” on enemy combatants despite the president’s December 2005 signing into law of the McCain Amendment, which, in Zelikow’s words, “extended the prohibition against cruel, inhuman, or degrading treatment to all conduct worldwide.”

The Zelikow memo becomes the latest addition to The Torture Archive – the National Security Archive’s online institutional memory for issues and documents (including the OLC’s torture memos themselves) relating to rendition, detainees, interrogation, and torture.


DOCUMENTS

Document 1: Philip D. Zelikow, State Department Counselor, Draft Memorandum, “The McCain Amendment and U.S. Obligations under Article 16 of the Convention Against Torture,” Top Secret, February 15, 2006
Source: Freedom of Information Act request

Written following passage of the so-called McCain Amendment against “cruel, inhuman, or degrading treatment or punishment,” this memo offers alternative legal argumentation to the opinions that the Justice Department’s Office of Legal Counsel continued to put forward into 2006. According to Zelikow, he was told that some officials in the Bush administration sought to gather all copies of his memo and destroy them, but the State Department located this one and released it under the Freedom of Information Act.

Document 2: Stephen G. Bradbury, Justice Department, Office of Legal Counsel, Memorandum for John A. Rizzo, “Re: Application of United States Obligations Under Article 16 of the Convention Against Torture to Certain Techniques that May Be Used in the Interrogation of High Value al Qaeda Detainees,” Top Secret, May 30, 2005
Source: The Torture Archive, the National Security Archive

This memo follows up previous OLC opinions on interrogation methods, providing an even more expansive vision of what kinds of “enhanced techniques” would be acceptable against al Qaeda and other detainees. Zelikow specifically refers to this memo in his February 2006 counter-argument.

Document 3: Philip D. Zelikow, Statement before the United States Senate Committee on the Judiciary, Subcommittee on Administrative Oversight and the Courts, Unclassified, May 13, 2009
Source: Provided by Philip Zelikow to the National Security Archive (originally posted online by the Federation of American Scientists)

After the Obama administration declassified the controversial Office of Legal Counsel opinions on so-called “enhanced interrogation techniques,” Congress weighed in on the question. Here, Zelikow lays out his critique of the OLC position in detail.

Document 4: Philip D. Zelikow, State Department Counselor, and Gordon R. England, Deputy Secretary of Defense, “Elements of Possible Initiative,” Sensitive but Unclassified, June 12, 2005
Source: Provided by Philip Zelikow to the National Security Archive (originally posted online by the Federation of American Scientists)

Zelikow and Gordon England, the acting deputy secretary of defense, put together this draft of a possible presidential initiative on detainee treatment and interrogation. The document was appended to Zelikow’s May 2009 congressional testimony. According to his prepared statement, this memo describes a “big bang” approach to dealing with the larger issues, but after Defense Secretary Donald Rumsfeld rejected its ideas, the National Security Council staff decided to pursue each issue piecemeal.

Document 5: Philip D. Zelikow, State Department Counselor, and John B. Bellinger III, State Department Legal Advisor, “Detainees – The Need for a Stronger Legal Framework,” Unclassified, July 2005
Source: Provided by Philip Zelikow to the National Security Archive (originally posted online by the Federation of American Scientists)

In his May 2009 congressional testimony, Zelikow describes this document as part of an attempt by the State Department to enlist other U.S. government agencies to define legal standards for detainee treatment that were less “technical” and more “durable – politically, legally, and among our key allies.” The memo was appended to his testimony.

Dear Readers, Liebe Leser – Perspectives for a Free Germany – Perspektiven für ein freies Deutschland

Dear Readers, liebe Leser,

since 2 decades the communist regime is over in East Germany but still their heirs keep doing their best job – spying, infiltrating and murdering –  for clients and on their own behalf – in reality and in the virtual reality.

Seit 2 Jahrzehnten ist die kommunistische Herrschaft in Ostdeutschland gebrochen, doch deren STASI-Schergen tun weiter das, was sie am besten können: Spionieren, Infiltrieren und Morden – im Auftrag und auf eigene Rechnung – im Cyberspace und im realen Leben.

To make a long story short as well as we keep fighting against the Nazi rebirth in Germany – we keep fighting against their red partners.

Um eine lange Geschichte kurz zu machen, ebenso wie wir weiter die Neonazis in Deutschland bekämpfen, werden wir die Neo-STASI weiter bekämpfen.

This fight is most crucial in the financial industry because these henchmen of Hitler and Stalin and their heirs get their fundings hereof.

Diese Aufklärung zielt insbesondere auf die deutsche Finanzindustrie, die Hitler und Stalins Erben weiter finanziert.

We focus in the next months more and more on the international investment industry to make sure they do not cooperate with Hitlers and Stalins heirs in Germany.

Wir werden in den kommenden Monaten unser Haupt-Augenmerk insbesondere auf internationale Investoren richten, um diese aufzuklären, nicht mit Hitlers und/oder Stalins Erben zu kooperieren.

My warmest regards

Herzlichst

Bernd Pulch

Magister Artium of Media, German Studies and International Literature

Magister Artium der Publizistik, Germanistik und Komparatistik

SECRET from the CIA Crown Jewels – Involvement in Sensitive Domestic Activities

Citation: Involvement in Sensitive Domestic Activities
[Central Intelligence Agency Office of Planning, Programming, and Budgeting Activities; Attached to Routing Slip; Includes Memorandum Entitled “Watergate/Ellsberg and Like Matters”], Secret, Memorandum, May 08, 1973, 5 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00015
Origin: United States. Central Intelligence Agency. Planning, Programming, and Budgeting. Science and Technology Group
To: Schlesinger, James R.
Individuals/
Organizations Named:
Ellsberg, Daniel; Helms, Richard M.; Mitchell, John N.; Ober, Richard; Rand Corporation; Rayborn, William F.; United States. Central Intelligence Agency. Directorate of Intelligence; United States. Central Intelligence Agency. Directorate of Intelligence. Office of Current Intelligence; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Medical Services; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Central Intelligence Agency. Planning, Programming, and Budgeting; United States. Federal Bureau of Investigation; Young, David R.
Subjects: Agricultural products | Biographical intelligence | Chicago (Illinois) | Communists and Communist countries | Counterintelligence | Data processing | Domestic intelligence | Government appropriations and expenditures | Narcotics | New York | Pentagon Papers | Physicians | Police assistance | Political activists | Project Often | Psychological assessments | Satellite reconnaissance | Soviet Union | Terrorism | United States citizens | Watergate Affair (1972-1974)
Abstract: Describes Central Intelligence Agency Office of Planning, Programming, and Budgeting data processing support of “sensitive” activities, including surveillance of U.S. citizens, doctors, and travelers to Communist countries, and police and Federal Bureau of Investigation assistance.
Full Text: Document – PDF – this link will open in a new window (139 KB)

Durable URL for this record

Uncensored Femen: Paris Nudite

Femen Paris topless performance protest demanding from world leaders to protect the fundamental rights of women in the Middle East, to protect them from stone killers as carefully as they protect themselves from terrorist threats emanating from radical Islam. In the protest took part Iranian human rights
activist Mariam Namazi, a popular Lebanese actress Darina Al Jondy, well-known French feminist Arabian.

TOP-SECRET – FBI Mara Salvatrucha (MS-13) International Assessment

https://publicintelligence.net/wp-content/uploads/2012/03/FBI-MS13.png

 

(U) The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment (see Appendix A).

(U) Key Judgements

  • Available law enforcement information indicates that there are approximately 8,000-10,000 active MS-13 members in the United States. However, due to diverse law enforcement gang membership criteria and migration issues, the exact number of MS-13 gang members in this country is unknown.
  • (U) In the United States, MS-13 has an identified presence in 33 states and the District of Columbia. FBI information indicates that MS-13 is considered highly active in California, Maryland, North Carolina, New Jersey, New York, Texas, Virginia, and Washington.
  • (U//LES) Although leaders of several cliques may work together occasionally to achieve a common goal, a single national or international MS-13 gang leader has not been identified within the United States or abroad. The autonomy of the gang’s cliques makes them difficult to target as there is no centralized leadership. The structure of the cliques varies based on membership, criminal activity, and the background of the clique’s founding members.
  • (U//LES) As of July 2005, the Federal Bureau of Prisons (BOP) had identified 127 incarcerated MS-13 members. The majority of these individuals are El Salvadoran nationals; however, some are also US citizens.
  • (U//LES) MS-13 members in the United States are actively involved in drug related criminal activity in Georgia, Massachusetts, North Carolina, Indiana, Nevada, Arkansas, California, Tennessee, New York, New Jersey, Oklahoma, Nebraska, Washington, Virginia and Maryland.
  • (U) According to intelligence analysis and source reporting, the formation of MS-13 cliques (groups of individuals joined together in a region) is often the result of MS-13 member migration to new areas. The migration of individuals is based on factors such as job availability, avoidance of law enforcement, family connections, and prison sentencing.
  • (U//LES) US-based MS-13 members have been arrested for violent crimes including murder, robbery, drive-by-shootings, stabbings, assault, rape, witness intimidation, extortion, malicious wounding, and threats against law enforcement. MS-13 cliques will adapt their criminal activity based on the opportunities available in a specific area.
  • (U//LES) In December 2004, the El Salvador Policia Nacional Civil (PNC) reported a total of 126 active MS-13 cliques in El Salvador. These cliques are generally well-organized with a defined leader and several “national” leaders. In El Salvador, an MS-13 clique’s primary financial gain is through drug sales and extortionate activities. However, MS-13 gang members are best known for their violence and are responsible for more homicides than other El Salvadoran gangs combined.
  • (U//LES) Both US and foreign law enforcement agencies have documented communications between MS-13 members in El Salvador, Honduras, and Mexico with members in the United States. Additionally, telephone calls and money transfers have been documented between US and El Salvador members.
  • (U//LES) The Honduras Policia Preventiva (HPP) has identified 13 active MS-13 cliques in five sectors of Honduras: San Pedro Sula, La Ceiba, Comayagua, Tegucigalpa, and Choluteca.
  • (U//LES) In Honduras, the HPP has identified a five- level structure within the MS-13 gang which includes aspiring members, sympathizers, new members, permanent members, and leaders. MS-13 is accused of murdering civilians to protest political decisions. Five of the key MS-13 members implicated in a 23 December 2004 bus massacre in Honduras (which killed 28 civilians) had documented links to the United States.
  • (U//LES) Cellular telephones are the most common communication method used by MS-13 members both internationally and domestically. Telephone calls between Honduras and the United States have been documented by law enforcement and corrections agencies in both countries.
  • (U//LES) Analysis of source and law enforcement reporting indicates that MS-13 members in Honduras are more financially stable than MS-13 members in other countries. This may be partially due to the nature of MS-13 criminal activities in Honduras and the fact that some members have obtained wealth from legitimate business or family inheritance.
  • (U//LES) The city of Tapachula, on the border with Guatemala, has the largest concentration of MS-13 members in Chiapas, Mexico. Membership among incarcerated adult members in Chiapas consists primarily of transient MS-13 members from Central American countries in route to the United States. Most of the criminal activity revolves around the location of railroad lines. Other immigrants are the primary victims of MS-13 criminal activities in this area.
  • (U) Although MS-13 is active in the Chiapas area, particularly along the border and near railroads, there is no evidence to support the allegation that they “control” the area.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

FBI-MS13

The Jesus Movie 1979 – Full Film

The Jesus Movie 1979
Jesus of Nazareth,the son of God raised by a Jewish carpenter. Based on the gospel of Luke in the New Testament,here is the life of Jesus from the miraculous virgin birth to the calling of his disciples, public miracles and ministry, ending with his death by crucifixion at the hands of the Roman empire and resurrection on the third day.

TOP-SECRET – San Diego Fusion Center Terrorism Imagery Recognition

https://publicintelligence.net/wp-content/uploads/2012/03/SDLECC-TerroristImagery.png

Group logos, flags, and other extremist imagery are prevalent throughout most terrorist and extremist groups. Imagery provides a means of evoking existing emotional and historical memories in addition to communicating ideas to potential recruits. Logos and symbols are often used as visual representation of groups and/or their ideology. Print, internet propaganda, tattoos, clothing and accessories, stickers, and other graphic media are the most common representations of extremist imagery. First responders need to be aware of common extremist imagery as it may indicate involvement or support for a particular domestic extremist organization or international terrorist group.

This product provides law enforcement and homeland security partners with information drawn from open source materials including online editions of printed newspapers and relevant counterterrorism sites.

https://publicintelligence.net/wp-content/uploads/2012/03/alf-imagery.png

https://publicintelligence.net/wp-content/uploads/2012/03/quran-imagery.png

DOWNLOAD THE ORIGINAL DOCUMENT HERE

SDLECC-TerroristImagery

The CIA reports – Iran Expanded its Nuclear Program in 2011

CIA: Iran Expanded its Nuclear Program in 2011

In 2011, Iran expanded its nuclear program, and continued to enrich uranium and develop its nuclear facilities – thus stated a report from the CIA that was presented to the US Congress.

According to the report, Iran has successfully produced approximately 4,900 kg of low-level enriched uranium, and continued its development of the nuclear facilities constructed throughout the country, as well as is heavy water research. The report determined that Iran’s actions were carried out in contrast to the UN decisions that Iran must halt their nuclear activities.

The CIA further determined that Iran has continued the development of the underground facilities in Natanz, and even developed more advanced centrifuges, which were already tested at an unknown destination in the country. Iran’s stockpiles possess approximately 80 kg of enriched uranium at a level approaching 20% (a level suitable for a nuclear bomb).

The report also noted that while the number of centrifuges in Iran’s possession has dropped from 8,900 to 8,000, the number of active centrifuges has skyrocketed from 3,800 in August 2010 to a present figure of 6,200.

In addition, according to the report, one of the most important facilities in Iran’s nuclear program is the Fordo facility near the city of Qom, where Iran is enriching uranium at a level of “nearly 20%.”

The CIA is also stating that while the Bushehr nuclear reactor started producing nuclear fuel last year, it is still not acting at full capacity. However, it should be noted that the report does not deal with the topic of Iran’s military nuclear program. While it provides figures of the country’s uranium stockpiles, it does not associate this stockpile, or any other, with the Islamic Republic’s plans for developing military nuclear capabilities.

The agency also determined that Tehran is continuing the development and expansion of its missile program. They are continuing the development of short and medium-ranged missiles, and focusing on the ability to launch missiles into space as well – so that they can develop missiles with exceptionally long ranges.

Eastern in the Holy Land – Eve of Holiday with an Eve of War Atmosphere

Israel: The chief task facing the newly appointed Head of the IDF’s Planning Branch, Major General Nimrod Shefer, is to restart the debates in the General Staff for consolidating the IDF’s new multi-year plan, codenamed “Halamish.”

The plan was supposed to enter effect at the start of 2012 and be implemented at least by the end of 2016. However, its implementation was postponed by a year due to the arguments over the defense budget and the upheavals in the Middle East.

The arguments began as a result of the summer protests and the need to allocate budgets for implementing the recommendations of the Trachtenberg committee.
As with all the IDF’s previous multi-year plans (the last one, Tefen, which was  intended for 2007-2011, was the first in decades to be materialized in its entirety, without being cut in the middle), the Halamish plan is based on “reference scenarios.” This essentially refers to the worst scenario, to which the IDF builds its forces accordingly. However, this doesn’t necessarily mean that the IDF is preparing for the worst-case scenario.

When Halamish was launched, back when Amir Eshel was still the Head of the Planning Branch (Eshel will soon be appointed the Air Force Commander), the Middle East truly seemed different. The peace agreements with Egypt were stable, even if the risk of war with Iran, Syria, Hezbollah, and Hamas was already discernible over the horizon.

The strengthening of the threat posed by the “Iranian Axis,” in parallel to the strategic change in the southern arena, demanded that the assumptions of the Halamish plan be examined from the ground up. However, the suitable conditions for that don’t exist now. Due to a gap of at least six billion NIS between the defense establishment’s budgetary demands and the budget as it exists on paper (at least for the time being), the defense establishment is largely managing from hand to mouth at the moment, like a family going through hardships, or a business with financial problems maneuvering payments to its suppliers.

Merkava, with No End

Take the affair of the Merkava project as an example. The project was worthy of an in-depth examination concerning the question of whether the IDF should invest most of its allocated ground resources in a heavy armored vehicle, or in lighter vehicles with active protection. An examination is actually being done by a special committee, which includes the economist Liora Meridor and the former commander of the Combat Corps Headquarters, Major General (Res.) Emanuel Sakal.

According to the decisions made in the framework of the previous plan, Tefen, the IDF invests approximately two billion NIS annually over a ten-year period for construction of tanks and APCs. Nearly half of the sum is funded by the US taxpayer, in the framework of the Namer production efforts being done in the US. The other half is in NIS, providing a livelihood to approximately 200 factories involved with the Merkava tank, and a much smaller number of factories providing Namer components.

Several weeks ago, the Ministry of Defense completely halted new orders in the framework of the Merkava tank and APC project. In the past few days, it seems that the most predictable thing happened: small factories, most of them in the periphery, reached the brink of collapse. An uproar came from the heads of the periphery municipalities, including Kiryat Shmona, Nahariya, Sderot, and Netivot.

On Wednesday, the Director General of the Ministry of Defense, Udi Shani, approved the freeing of 50 million NIS for orders from 15 factories facing the most distress. The rest of the factories are still crying out for orders (primarily those that don’t have orders many years in advance). An essential debate concerning the fate of the project is sluggishly taking place (due to previous commitments, its closure could end up costing even more money in the coming years than its continuation).

There are no differences of opinion in the defense establishment concerning the necessity of the new tanks and APCs. The chief question is whether or not the ordered amount is excessive, and if the budgets can’t be utilized in a more efficient manner.

The political echelon is urging that the number of APCs intended for production in the coming years be cut by half. The Chief of Staff, Lt. Gen. Benny Gantz (who didn’t hesitate when it came to slashing the armored ORBAT while he was Ground Force Commander, prior to the Second Lebanon War) would apparently be happy to make the significant cut to the project. The problem is that the Ministry of Defense committed to GDLS – which constructed a Namer assembly line in the US city of Lima. In the contract, it stipulated that a minimal number of APCs be produced in two stages. The IDF is considering canceling the second stage, but it’s doubtful that they could do it, from a legal perspective.

The Southern Danger

Despite the cuts, the IDF is very much operating these days in an eve of war atmosphere. Even if there won’t eventually be a war with Iran in the summer, there’s a possibility that a significant front will erupt in 2012 against the Gaza Strip or in the north against Hezbollah. A conflict with Syria is neither fictitious.

The solemn atmosphere was also sensed at the forum of hundreds of operational commanders that gathered this week at the IDF’s Glilot base. In contrast to the mood in the IDF, the public finds it preferable to repress things. Even during tension-filled times, it is the nature of the media to deal with short, specific events more than with fateful processes that occur over time.

One example of this is the rocket fired at Eilat this week – an episode that will soon be forgotten. The rocket was a result of the Egyptian military’s difficulty in controlling events in Sinai, and the presence of numerous terrorist groups throughout the vast peninsula.

The Muslim Brotherhood’s decision last weekend to run for elections for the presidency of Egypt is an example of a far more significant event. However, it’s doubtful that even a small percentage of the Israeli public noticed it. This is a surprising decision, from many aspects, as the previous assessment was that the Brotherhood would avoid a direct conflict over the regime in the coming years. The movement’s very decision to run for office has a considerable significance. Have you considered a scenario in which the Muslim Brotherhood wins the elections, selects a religious president in Egypt, and de-facto cancels the peace agreement with Israel? This is not farfetched. The IDF, which decreased its forces in the south during the stable period during the Egyptian peace process, must prepare for that scenario as well.

The SIBAT Convention: No Party

The eve of Passover is a period for meetings and proposing toasts. Such was the atmosphere at the conference held on Thursday morning by SIBAT, the Ministry of Defense’s defense export and cooperation division, which saw the participation of senior officials from the Israeli defense industries.

SIBAT is the branch tasked with promoting Israel’s defense exports. The more that the Israeli defense industries sell overseas, the more they can afford to develop additional developments for the IDF at a lower cost.

However, there is no festive mood in the defense export arena. The cuts to the defense budgets in Western countries, primarily in the US, are leaving their mark. Data for 2011 has yet to be completely compiled, but it is likely that defense exports saw a specific decline compared to 2010 (although it is still high – nearly $7 billion).

The combination of global budgetary cuts (the US companies, now hungrier than ever, have increased the competition against Israeli companies in East-Asian markets) and the frugality of the Ministry of Defense is no simple matter. Elbit has already started cutting hundreds of employees from its manpower quotas (a process expected to continue after the holiday). Rafael and IAI have stopped recruiting new employees. Plasan Sasa is suffering from the decline in vehicle protection orders for the US Army. Moreover, the situation is even more complicated in small and medium-sized companies, which have fewer layers of fat to trim.

Eyes Towards the Comptroller

After the holdiday, Lt. General (Res.) Gabi Ashkenazi, Minister of Defense Ehud Barak, and the other heroes of the Galant document affair will submit their references to the State Comptroller’s draft report on the affair.

In addition, a full report will be published after the holiday on another issue: the conduct of the political echelons and the defense establishment concerning the flotilla of the Turkish ship Marmara in May 2010. An interesting topic will be addressed in the report – should the Head of the National Security Council take an active part in the sensitive deliberations of the security cabinet, as stated in the NSC law? Or should he be compartmentalized out of some of these debates, as is actually taking place?

Top-Secret from the NSA – Reagan On The Falkland/Malvinas: “Give Maggie enough to carry on…”

U.S. Secretary of State Alexander Haig [right] seen here with Argentine dictator General Leopoldo Galtieri [left] and Argentine Foreign Minister Nicanor Costa Mendez [center] in April 1982 during a visit to Buenos Aires as part of the U.S. Shuttle Diplomacy to deescalate the conflict. [Photo graciously provided by Diario Clarin, Argentina]

Washington, D.C., April 6, 2012 – The United States secretly supported the United Kingdom during the early days of the Falklands/Malvinas Island war of 1982, while publicly adopting a neutral stance and acting as a disinterested mediator in the conflict, according to recently declassified U.S. documents posted today by the National Security Archive.

On the 30th anniversary of the war, the Archive published a series of memoranda of conversation, intelligence reports, and cables revealing the secret communications between the United States and Britain, and the United States and Argentina during the conflict.

At a meeting in London on April 8, 1982, shortly after the war began, Prime Minister Margaret Thatcher expressed concern to U.S. Secretary of State Alexander Haig about President Ronald Reagan’s recent public statements of impartiality. In response, according to a previously secret memorandum of the conversation, The Secretary said that he was certain the Prime Minister knew where the President stood. We are not impartial.”

On April 2, 1982, Argentine forces under de facto President Leopoldo Galtieri seized the Falkland/Malvinas Islands militarily from the U.K. The U.S. launched a major shuttle diplomacy mission, sending Secretary Haig numerous times to London and Buenos Aires to de-escalate the conflict. Though the U.S. did not formally announce support for the U.K. until April 30, newly released documents show that Washington sided with the British from the beginning, providing substantial logistical and intelligence support. In a conversation with British officials at the end of March, Haig declared that the U.S. diplomatic effort “will of course, have a greater chance of influencing Argentine behavior if we appear to them not to favor one side or the other.”

At the same time, the White House recognized that British intransigence would create problems for the U.S. in its dealings with Latin America.  President Reagan, reacting to Haig’s secret reports on the British position, wrote to the secretary“[Your report] makes clear how difficult it will be to foster a compromise that gives Maggie enough to carry on and at the same time meets the test of ‘equity’ with our Latin neighbors.”

Under Thatcher’s leadership, the U.K. launched a large-scale military expedition that proved a logistical, communications, and intelligence challenge for the British Air Force and Navy. It would take the task force almost a month to traverse the 8,000 miles between England and the Falklands and prepare for combat around the South Atlantic islands. For the British, the expedition would not be justified without retaking the Falkland Islands and returning to the status quo ante. An analysis from the Department of State’s Bureau of Intelligence and Research predicted on April 6 that “the effectiveness of the fleet, far from its maintenance bases, will rapidly deteriorate after its arrival on station. [Thatcher’s] damaged leadership could not survive a futile ‘voyage to nowhere.'”

“The Prime Minister has the bit in her teeth,” Haig reported to President Reagan on April 9, after the Argentine attack on the islands. “She is clearly prepared to use force. Though she admits her preference for a diplomatic solution, she is rigid in her insistence on a return to the status quo ante, and indeed seemingly determined that any solution involve some retribution.”

Haig’s report continued: “It is clear that they had not thought much about diplomatic possibilities. They will now, but whether they become more imaginative or instead recoil will depend on the political situation and what I hear in Argentina.”

The documents reveal that initial covert U.S. support for Britain was discussed quite openly between the two nations. During the first meeting with Haig on April 8, [Thatcher] expressed appreciation for U.S. cooperation in intelligence matters and in the use of [the U.S. military base at] Ascension Island.” A series of CIA aerial photography analyses showed the level of detail of U.S. surveillance of Argentine forces on the ground: “Vessels present include the 25 de Mayo aircraft carrier with no aircraft on the flight-deck,” reads one; “at the airfield [redacted] were parked in the maintenance area [….] 707 is on a parking apron with its side cargo door open,” reads another.

With Argentina mired in economic stagnation, Galtieri’s military campaign tried to rally support from large sectors of Argentine society. But U.S. observers foresaw serious problems for him ahead. A top secret State Department intelligence analysis reported: “[Galtieri] wants to hold on to the Army’s top slot through 1984 and perhaps the presidency through 1987. The Argentine leader may have been excessively shortsighted, however. The popular emotion that welcomed the invasion will subside.”

A White House cable stated, “Galtieri’s problem is that he has so excited the Argentine people that he has left himself little room for maneuver. He must show something for the invasion. or else he will be swept aside in ignominy.”

This collection of 46 documents was obtained through the Freedom of Information Act and extensive archival research. It offers a previously unavailable history of the exchanges between key British, American, and Argentine officials in a conflict that pitted traditional Cold War alliances against important U.S. regional relationships.


DOCUMENTS

The following documents have been obtained through Freedom of Information Act and Mandatory Declassification Review requests to numerous U.S. government agencies, research at the U.S. National Archives, and others gathered with the help of the staff at the Ronald Reagan Presidential Library.

Chronological references have been inserted in bold face to assist readers in placing the documents in context.

* * *

MID MARCH 1982 – TALKS ON THE ISLANDS BETWEEN GREAT BRITAIN AND ARGENTINA, WHICH BEGAN ON FEBRUARY, COLLAPSE.

March 31, 1982 –  Letter From the Secretary to Lord Carrington
White House, Secret Situation Room immediate cable

U.S. Secretary of State Alexander Haig writes to his British counterpart, Foreign Secretary Lord Peter Carrington:

“The situation which has developed in the last few days on South Georgia Island is indeed serious, and I want you to know that we will do everything we can to assist in its resolution.”

“[W]e will of course, have a greater chance of influencing Argentine behavior if we appear to them not to favor one side or the other. We will continue quietly to try and move the Argentines away from taking further steps which would make a peaceful resolution more difficult to achieve.”

April 1, 1982 – Presidential Message To Mrs. Thatcher On Falkland Island Dispute
White House, Secret Situation Room immediate cable

President Reagan writes to Prime Minister Thatcher:

“Dear Margaret, I have your urgent message of March 31 over Argentina’s apparent moves against the Falkland Islands. We share your concern over the disturbing military steps which the Argentines are taking and regret the negotiations have not succeeded in defusing the problem.”

“Accordingly, we are contacting the Argentine Government at the highest levels to urge them not to take military measures…I want you to know that we have valued your cooperation on the challenges we both face in many different parts of the world. We will do what we can to assist you here. Sincerely, Ron”

EARLY APRIL 1982 – U.S. SECRETLY BEGINS TO RESPOND TO U.K. REQUESTS FOR INTELLIGENCE, COMMUNICATIONS, AND LOGISTICAL SUPPORT. US SATELLITES ARE FOCUSED ON THE FALKLAND ISLANDS.

April 2, 1982 – President’s Conversation with Argentine President Galtieri
Department of State, Secret cable

The State Department informed the U.S. Embassy in Buenos Aires:

“The President telephoned Argentine President Galtieri at 2030 EST [on April 1] to discuss threat of Argentine military action against Falkland Islands. The President stated that the USG [U.S. Government] had solid information that Argentina was planning to take military action to take control of the islands…The President made a personal appeal to Galtieri not to take any military steps against the Falkland Islands chain and offered the USG’s [U.S. Government] good offices, including his willingness to send Vice President Bush to Buenos Aires.” [….]

“[Galtieri] went on to refuse Presidents offer of good offices and said the U.S. appeal had been simply overtaken by events.

“When Pressed whether Argentine military would take action in the morning, Galtieri stated that GOA [Government of Argentina] had full freedom to use force at the moment it judges opportune.”

APRIL 2, 1982 – 2,000 ARGENTINE TROOPS OCCUPY THE FALKLAND ISLANDS [ISLAS MALVINAS].  FOUR ARGENTINES ARE KILLED BY THE BRITISH GARRISON STATIONED ON THE ISLAND.

April 2, 1982 – Quick Intelligence Assessment on Falkland Affairs (April 2, 1982)
CIA, Secret Intelligence Report

CIA Director William Casey sends a “quick assessment on possible military aspects of the Falkland affair, the forces in or available in the area” to Secretary of State Haig:

“The Argentines successfully invaded the Falkland Islands this morning; some 200-350 Argentine Marines with armored vehicles evidently went ashore near Port Stanley and airborne units reportedly secured the local airfield. There is also information that three Argentine ships are in the harbor at nearby Port Williams. The Argentines may be debarking as many as 500-1000 well-armed troops from the task force, [four lines excised].” [….]

“We also do not believe the Argentines would fare well in a full scale-naval engagement with the British, particularly in view of the nature of the forces the British are preparing to send to the Falklands.” [….]

“The invasion has probably strengthened Galtieri’s standing within the military, especially the Navy and among predominantly nationalist political opponents who have long advocated invading the Falklands. We expect this support to continue…Like Thatcher, Galtieri probably calculates that he will have to avoid appearing to waver or risk serious domestic and international political costs. The Argentines see a direct correlation between a tough – and successful – effort on the Falklands and success in their Beagle dispute with Chile. Similarly, they believe a defeat on the Falklands would be an enormous setback in the Chile dispute, thus doubling their stake in the current confrontation. ”

April 2, 1982 – Falklands Islands Situation Report # 4
CIA, Top Secret Situation Report

This report begins with an excision of more than twenty lines and continues with two veiled sections about Argentine forces on the ground:

“2. Argentine military forces on the main islands continue to dig in.”

[Eight lines excised] [….]

“Comment: The Argentines continue to prepare for the arrival of British forces in the area later this month.”

[Six lines excised]”

April 2, 1982 – The Falklands Dispute, A Historical Perspective
National Security Council, Confidential Summary

The importance of the Islands to Argentina and Britain is highlighted in this report, stating that:

“The growing economic potential of the island area heightened diplomatic tensions in the mid-1970’s. In 1974 a geological survey determined that the Falklands could be the center of a vast pool of oil – perhaps nine times the size of the North Sea fields.”

In early 1982, during a renewed wave of negotiations, Galtieri “pressed for a permanent negotiating commission…The British refused, the talks floundered and the incident at South Georgia that began on March 19, escalated into confrontation and the Argentine invasion Friday.”

April 3, 1982 – Situation in Falkland Islands as of 700 EST
Department of State, Confidential Situation Report

“Embassy Buenos Aires reports that Argentina expects Soviet and perhaps Chinese support in the UN Security Council, and hopes that the U.S. will limit its role to ‘tacit diplomatic support’ for the British… A vote on the UK resolution is expected at today’s Security Council meeting, with outcome uncertain and a Soviet or Chinese veto possible.” [….]

“In a preliminary assessment, Embassy Buenos Aires suggests that President Galtieri gambled that a successful invasion of the Falklands would solidify his authority and help him remain in office through 1987.”

APRIL 3, 1982 – UN SECURITY COUNCIL PASSES RESOLUTION 502 DEMANDING AN IMMEDIATE CESSATION OF HOSTILITIES AND AN IMMEDIATE WITHDRAWAL OF ALL ARGENTINE FORCES FROM THE FALKLAND ISLANDS (ISLAS MALVINAS). ARGENTINA REFUSES TO COMPLY.

APRIL 3, 1982 –  ARGENTINA GAINS CONTROL OF THE SOUTH GEORGIA AND SOUTH SANDWICH ISLANDS, 864 MILES EAST-SOUTHEAST OF THE FALKLAND ISLANDS.

APRIL 3, 1982 – THE FIRST MEMBERS OF THE ROYAL NAVY TASK FORCE LEAVE BRITAIN. THIS TASK FORCE, BY THE END OF THE WAR, WOULD INCLUDE 51 WARSHIPS INCLUDING 23 DESTROYERS AND 5 SUBMARINES, 54 CIVILIAN SHIPS, AND 9,000 MEN. THE AIR FORCE WOULD CONTRIBUTE 38 HARRIERS AND 140 HELICOPTERS.

APRIL 5, 1982 – FOREIGN SECRETARY LORD CARRINGTON RESIGNS. FRANCIS PYM WILL REPLACE HIM.

April 6, 1982 – Argentina: Falkland Fallout
Department of State, Top Secret Summary

“Argentina’s drubbing on the April 4 UNSC resolution probably surprised Buenos Aires. The extensive planning for the occupation of the Falkland Islands does not appear to have adequately addressed the international aspects. Calculations of short-term domestic benefits undoubtedly outweighed all else in Argentina’s decision.” [….]

“Argentina’s UNSC defeat indicates diplomatic efforts did not keep pace with military planning.” [….]

“President and Army Commander Galtieri had a personal as well as an institutional interest in exploiting the Falkland Island situation. He wants to hold on to the Army’s top slot through 1984 and perhaps the presidency through 1987. The Argentine leader may have been excessively shortsighted, however. The popular emotion that welcomed the invasion will subside…”

April 6, 1982 – UK: Thatcher’s Falkland Dilemma
Department of State, Confidential Bureau of Intelligence and Research (INR) analysis

“The British Fleet will reach the Falkland area around April 20. We believe that Thatcher will be under heavy pressure to order it into action if no compromise has been negotiated or is in prospect … the effectiveness of the fleet, far from its maintenance bases, will rapidly deteriorate after its arrival on station. [Thatcher’s] damaged leadership could not survive a futile ‘voyage to nowhere.'” [….]

“Argentina’s invasion of the Falkland Islands puts at risk Thatcher’s own position.” [….]

“If Thatcher fails to redeem her reputation and the Nation’s honor, she could be finished as a Tory leader and Prime Minister.” [….]

“During the next two weeks, Thatcher will search for a political solution that does not appear to reward Argentine aggression … [T]he British insist on principle that an Argentine withdrawal must form a part [of a diplomatic solution] … On the diplomatic front, the British will look to their allies to help pressure Argentina economically and politically.”

APRIL 7, 1982 – PRESIDENT REAGAN APPROVES SECRETARY OF STATE ALEXANDER HAIG’S SHUTTLE DIPLOMACY THAT WILL TAKE HIM REPEATEDLY TO LONDON AND BUENOS AIRES.

April 7, 1982 – The Falkland Islands Crisis
Department of State, Secret report by the Bureau of Intelligence and Research (INR)

“According to Embassy London… Tory moderates and Foreign Office are concerned that Prime Minister Thatcher has been listening largely to the Ministry of Defense, especially senior naval officers, and may not adequately be considering non-military options.” [….]

“[U.S. Buenos Aires] Embassy Comment: British pressure has made the Argentines more disposed to negotiate than they were four days ago. As the British fleet approaches, the fear to appear cowardly could make the Argentine’s position intractable. While concessions on the rights of the Falklanders are possible, agreement to withdraw in return for renewed negotiation on the transfer of sovereignty would be unlikely, though still conceivable. The Argentines would be unlikely to accept the US as a mediator if we participate in the British sanctions against them.”

APRIL 8-9, 1982 – THE U.S. SECRETARY OF STATE IS IN LONDON TO MEET WITH PRIME MINISTER THATCHER.

April 8, 1982 – Falklands Dispute
Department of State, Secret cable

The Secretary of State informs the U.S. Embassy in Buenos Aires that:

“[Argentine Foreign Minister] Costa Mendez phoned the Secretary [Haig] last night April 6 to say Argentina accepted U.S. offer of assistance… and that he would be welcome to come to Buenos Aires.” [….]

“Let us know (report to London) if you pick up signals different than those Costa Mendez is giving off – that is that a form of word can be found on sovereignty, but that retention of an Argentine administrative presence on the islands is important…”

April 8, 1982 – Falkland Island Dispute
U.S. Embassy Buenos Aires, Secret cable

U.S. Ambassador in Buenos Aires Harry Shlaudeman writes that Argentine Deputy Foreign Minister Enrique Ros “emphasized that the Foreign Ministry wants and has always wanted a negotiated solution.

“The problem is that Ros and [Argentine Foreign Minister] Costa Mendez do not speak for the Navy. We are getting ultra-tough sounds out of that quarter, including statements that the Secretary should not come here … One bitter complaint for the marine branch of that service is that the commandos failed to have complete surprise and thus took casualties in their Malvinas landing because we had given the British advance intelligence obtained by ‘satellite.'”

April 9, 1982 (1:31 EST) – Memo to the President: Discussions in London
White House, Top Secret Situation Room flash cable

Secretary of State Alexander Haig reports to President Reagan on the round of conversations he just ended with British Prime Minister Margaret Thatcher:

“I spent five hours with Prime Minister Thatcher, the first hour with her and Foreign Secretary, Pym, alone, followed by a working dinner which included the Defense Minister, Nott [British Secretary of State for Defense], and senior officials.” [….]

“The Prime Minister has the bit in her teeth… She is clearly prepared to use force. Though she admits her preference for a diplomatic solution, she is rigid in her insistence on a return to the status quo ante, and indeed seemingly determined that any solution involve some retribution.” [….]

“[W]e got no give in the basic British position, and only the glimmering of some possibilities… It is clear that they had not thought much about diplomatic possibilities. They will now, but whether they become more imaginative or instead recoil will depend on the political situation and what I hear in Argentina.” [….]

“If the Argentines give something to work with…It may then be necessary for me to ask you to apply unusual pressure on Thatcher… I cannot presently offer much optimism, even if I get enough in Buenos Aires to justify a return to London. This is clearly a very steep uphill struggle, but essential given the enormous stakes.”

April 9, 1982  (10:00 EST) – Talks with Thatcher on Falklands
White House, Top Secret Situation Room immediate cable

As part of Secretary Haig’s diplomatic team, National Security Council staffer Jim Rentschler informs Deputy National Security Adviser Robert McFarlane:

“I assume that you and the Judge [National Security Advisor William P. Clark] will have seen the Secretary’s unvarnished report to the President on his protracted discussions with Mrs. Thatcher … You should know that his views very accurately summarize the mood and mind-set of HMG [Her Majesty’s Government] at this critical point in the South Atlantic caper and delineate our rather limited room for maneuver … However the situation turns out, it will clearly be a ‘close run thing’ – In fact Mrs. Thatcher herself may have recognized when she pointedly showed us portraits in Number 10 not only of Nelson but also Wellington.”

April 9, 1982 (16:40 EST) – Your Discussions in London
White House, Top Secret Situation Room cable

President Ronald Reagan responds to Secretary Haig’s meeting with Thatcher:

“The report of your discussion in London  makes clear how difficult it will be to foster a compromise that gives Maggie enough to carry on and at the same time meets the test of ‘equity’ with our Latin Neighbors. As you expected there isn’t much room for maneuver in the British position. How much this ‘going-in’ position can be influenced is unclear…”

APRIL 9-11, 1982 –SECRETARY OF STATE HAIG IS IN BUENOS AIRES FOR DISCUSSIONS WITH PRESIDENT GALTIERI AS PART OF THE U.S. DIPLOMATIC SHUTTLE MISSION.

April 9, 1982 – Argentine/UK: Situation Update
Top Secret CIA Situation Update [misdated April 9, 1981]

This CIA document from April 9th, issued a week after Argentine forces occupied the Islands and days after elements of the British task force left their bases, contains intelligence information on the location of both Argentine aircraft in Port Stanley and British aircraft on the US owned airfields of the Ascension Islands.

“[A] military clash is possible early next week… [eight lines excised] …the Argentines are reportedly lengthening the air strip in Port Stanley to accommodate A-4, MIRAGE, PUCARA, and C-130 aircraft and reinforcing the island with additional troops and air defense equipment…” [Two lines excised]

The intelligence further states that British “aircraft have insufficient range to fly cargo from the Ascension Islands to Port Stanley and as a result, the RAF is considering alternative air routes which would include refueling stops at several US airfields, Tahiti, Easter Island and Chile.”

April 10, 1982 – Memcon: Secretary’s Meeting with Prime Minister Thatcher April 8: Falkland Islands Crisis
Department of State, Secret Cable

In this 12-page official memo of conversation between Haig and Thatcher on April 8, the Prime Minister says that “The U.K. had been having good talks with Argentina and was extremely surprised by the actions of that government. No one had anticipated them. After the Secretary said the U.S., too, was surprised…”

“Thatcher reportedly remarked support calls from numerous European countries including France and Germany, the latter expressing that “unprovoked aggression if not turned back could lead to problems everywhere there are borders disputes. Unless we stop the Argentines from succeeding we are all vulnerable.” [….]

“The Prime Minister made clear her view that it was impossible to be neutral in the face of unprovoked aggression. In reviewing the bidding, she said the fleet was en route, an exclusion zone has been established and Britain hopes for a diplomatic solution…

“She noted that concern had been stirred by the President’s off the cuff remarks about not taking sides. She said she understood it was off the cuff and not a carefully conceived remark. At the same time, she expressed appreciation for U.S. cooperation in intelligence matters and in the use of Ascension Island.

“The Secretary said that he was certain the Prime Minister knew where the President stood. We are not impartial. […] The Secretary said that we face a critical common problem: ‘we must do all we can to strengthen you and your government.’ Having analyzed the situation very carefully, the Secretary said he thought there had been an intelligence failure.”

APRIL 12-13, 1982 –SECRETARY OF STATE HAIG RETURNS TO LONDON FOR FURTHER DISCUSSIONS WITH THE BRITISH GOVERNMENT.

APRIL 12, 1982 – THE U.K. DECLARES A 200-MILE MARITIME EXCLUSION ZONE AROUND THE FALKLAND ISLANDS.

April 12, 1982 (2:29 EST) – Memorandum for the President
White House, Secret Situation Room immediate cable

Coming from his first meeting with President Galtieri in Buenos Aires the Secretary of State writes to President Reagan:

“I am convinced that Mrs. Thatcher wants a peaceful solution and is willing to give Galtieri a fig leaf provided she does not have to violate in any fundamental way her pledge to Parliament… Her strategy remains one of pressure and threat; by and large, it’s working.” [….]

“Galtieri’s problem is that he has so excited the Argentine people that he has left himself little room for maneuver. He must show something for the invasion — which many Argentines, despite their excitement, think was a blunder — or else he will be swept aside in ignominy. But if he is humiliated militarily, the result will be the same.” [….]

“We will soon learn whether Mrs. Thatcher is ready to deal. If she is, I believe what I am taking to London provides a basis for a solution. But progress must come swiftly. We cannot count on Mrs. Thatcher to hold her fire as our diplomacy proceeds and any hostilities — even an incident – would change the picture radically.”

April 12, 1982 (15:54 EST) – Falkland Crisis
White House, Secret Situation Room immediate cable

Secretary of State Haig asks the  U.S. Embassy in Buenos Aires to deliver a message in person to President Galtieri:

“I have introduced ideas here [in London] along the lines discussed at the [Argentine] presidential palace Saturday night… The talks have been exceedingly difficult, but some progress has been made. I hope to leave here this evening for Buenos Aires… Time is of the essence. The British will not withhold the use of force in the exclusion zone unless and until there is an agreement. I hope to bring to Buenos Aires a U.S. proposal that holds the prospect of agreement, thus averting war.”

APRIL 13, 1982 – THE ORGANIZATION OF AMERICAN STATES (OAS) ISSUES A RESSOLUTION CALLING FOR A PEACEFUL SETTLEMENT OF THE FLAKLANDS/MALVINAS CONFLICT.

April 13, 1982 – ABC World News Tonight – Communications during the Crisis, 7:00 PM [Excerpts]

April 13, 1982 – Nightline – U.S. and the Falklands, 11:30 PM [Excerpts]
ABC News Broadcast Transcripts released by the CIA

The CIA followed international news sources which reported on important intelligence information. In these news transcripts, released by the CIA and excerpted here for copyright reasons, reporters from ABC break a story at 7 pm that they have learned through U.S. government officials that the US is providing Britain with communications, military intelligence, weather forecasting, and extensive supplies on Ascension Island. “The United States has mounted what officials say is a huge intelligence survey of Argentine military activity, and has passed on virtually every piece of significant information to the British. That information included early photographic evidence suggesting the possibility of an Argentine invasion of the Falklands.”

Nevertheless, the journalists also report that a few minutes before the broadcast of this news several top-level US officials telephoned ABC news and made statements that the reports were incorrect.

By air time of the Nightline report, just four and a half hours later, ABC reported that the White House officials who had denied the previous story had called the station to retract their statements and to simply declare “no comment”.

April 14, 1982 – Falklands Dispute: GOA Version of Haig Mission
Department of State, Confidential Cable

The US Embassy in Buenos Aires sends the Department of State an article published in the Argentine newspaper Clarin that they take “to reflect the Argentine [Government] position” of doubting Haig’s role as an impartial negotiator.

“He [Haig] also carried a ‘working draft’ which was analyzed only by advisers from both sides here, and was not examined at the presidential level or by Foreign Minister Costa Mendez”

“Secretary Haig sought to use that draft – which at no time became an official document of the Argentine government – in his conversations with British authorities…With this draft the United States became a defender of Prime Minister Thatcher, instead of a friendly broker.”

Circa April 15 – 1982 – British Options in the Falklands Islands Dispute
Joint Chiefs of Staff, Secret report

“The UK will continue to seek a diplomatic solution during the lengthy transit of the Royal Navy Task Force. This effort will likely continue for a while after the task force is in the area… If some amenable compromise cannot be achieved within reasonable time, however, London appears intent on military action….”

“Although the Royal Navy enjoys a surface force superiority, it will be severely constrained by inadequate air cover and stretched supply lines. It is 4,000 miles to the small US facility on Ascension Island… The Royal Air Force will probably stage some items there for resupply as the task force passes by, however the distance precludes continuous effective resupply during operations.  The British are looking at the possibility of obtaining base rights closer to the Falklands, however, there is little likelihood of this. Brazil and Uruguay have already stated they would not grant such a request. Chile has remained silent… Santiago is unlikely to provide logistical support to the Royal Navy. However, should the British inflict substantial damage to the Argentine fleet, Chile may become more receptive to a British request.”

APRIL 15-19, 1982 – SECRETARY OF STATE HAIG RETURNS TO BUENOS AIRES FOR FURTHER DISCUSSIONS AS PART OF HIS DIPLOMATIC SHUTTLE MISSION.

April 15, 1982 (0:40 EST) – Falklands Dispute: Argentine Proposal
U.S. Embassy  Buenos Aires, Secret cable

The U.S. Embassy in Buenos Aires forwards to the Department of State the latest Argentine government’s proposal for a settlement with the U.K. Item 3 reads:

“The British government shall adopt measures necessary to comply, with respect to the Malvinas, South Georgia and South Sandwich Islands, with Resolution 1514 (XV) of the General Assembly of the United Nations, completing the decolonization of the same by 31 December 1982…”

April 15, 1982 (15:30 EST) – Falklands Islands Dispute
White House, Secret Situation Room immediate cable

Secretary Haig informs U.S. Embassy London that “the Argentines have now provided us with their language on decolonization.  As promised, we are providing it to HMG [Her Majesty’s Government].”  He then writes to U.K. Foreign Secretary Francis Pym: “The problems with this language are all too obvious. Nevertheless, perhaps taking as a starting point the language we left on Tuesday morning, we would appreciate receiving a formulation without delay so that we can try to bring the Argentines to it.”

APRIL 17, 1982 – THE REMAINING BRITISH SHIPS ARRIVE AT THE ASCENSION ISLANDS TO COMPLETE THE TASK FORCE. BRITISH GENERALS SET A TIMETABLE TO DEPLOY BRIGADES TO THE FALKLAND ISLANDS.

APRIL 17, 1982 –SECRETARY OF STATE HAIG PRESENTS THE ARGENTINE JUNTA WITH A 5-POINT PLAN, WHICH INCLUDES PROVISIONS FOR ARGENTINE INVOLVEMENT WITH THE BILATERAL ADMINISTRATION OF THE ISLANDS, MUTUAL WITHDRAWAL OF TROOPS, AND A START TO UK-ARGENTINE NEGOTIATIONS ON THE FUTURE OF THE ISLANDS.

April 17, 1982 (4:04 EST) –  Message To Foreign Secretary Pym
White House, Secret Situation Room flash cable

Secretary of State Haig to U.K. Foreign Secretary Pym:

“Tonight, Foreign Minister Costa Mendez and his team met with President Galtieri and his entire Junta. At 10:40 pm local time we received a very discouraging response which I have asked to discuss tomorrow morning with the Junta and the President. I will advise you of the results of this meeting.”

April 17, 1982 – [British Joint Intelligence Committee “Immediate Assessment / JIC(82)  (IA) 29 prepared by the Latin America Current Intelligence Group]
White House, Top Secret Codeword Situation Room cable

This highly classified (Top Secret Umbra) cable draws on British intelligence and reports that “Argentina has prepared a draft note for invoking action under the Rio Treaty. The Soviet Union is reported to be ready to offer Argentina ships, aircraft and land based missiles in exchange for grain. The Argentine Foreign Ministry has denied in a telegram to the Argentine Embassy in Venezuela that the Soviet Union is providing intelligence material. The high level of Soviet photographic coverage of the area is unusual.” [….]

“Argentina, which  is a subscriber to the LANDSAT project, has made a request to the United States for the LANDSAT photographic satellite to be tasked to cover the Falkland Islands on 21-23 April… We doubt whether Argentina would be able to derive any military information of value from this satellite on this occasion. But if the United States grants this request the political significance would outweigh the military.”

April 18, 1982 – Message to Judge Clark
White House, Secret Situation Room flash cable

Secretary Haig writes to National Security Advisor Clark:

“I called you on open line with clear recognition that the Argentines would monitor. In order to break impossible impasse this morning on force withdrawal modalities, I created the impression that British military action was about to take place. While somewhat over-theatrical, it has the virtue of being true in the context of first British units steaming toward South Georgia Island. Fortunately, the ploy worked and it is vital that I leave here with an assessment by the Argentines not only that the British are going to attack but we are only hours away from such event. You handled it on the phone precisely as I had hoped. Warm regards, Al”

APRIL 19, 1982 – ARGENTINA REJECTS HAIG’S 5-POINT PLAN.

April 19, 1982 – (16:20 EST) Mletter [sic] to Pym

April 19, 1982 (17:54 EST) – Annotations of Draft Text Worked Out in Buenos Aires
White House, Secret Situation Room flash cables

Secretary Haig has sent the latest Argentine proposal to Minister Pym:

“My own disappoint [sic] with this text prevents me from attempting to influence you in any way. As you will see, there are significant steps back from the text you and I discussed in London…”

APRIL 22, 1982 – THE FIRST BRITISH TASK FORCE SHIPS ENTER THE WATERS OF THE FALKLAND ISLANDS.

April 22, 1982 – A Considered Argentine View of the Situation
U.S. Embassy Buenos Aires, Confidential cable

The U.S. Embassy sends a report containing numerous fine tuned perceptions by a secret Argentine source of how the crisis will unfold in Argentina and the repercussions for Galtieri’s future. Among other things, the source, “A well informed politician who has served in and generally supports the military government” speculates, “If there is a major incident  in which large numbers of Argentines are killed (“A ship is sunk and 400 die”) the public will be uncontrollable. Among their targets will be the U.S. Embassy, he said.”

APRIL 25, 1982 – BRITISH TROOPS RETAKE THE SOUTH GEORGIA ISLANDS AFTER SINKING THE ARGENTINE SUBMARINE SANTA FE. THE BRITISH TAKE 189 ARGENTINE PRISONERS OF WAR.

April 27, 1982 – The Falklands Conflict: HMG Ponders Additional Military Measures
White House, Secret Situation Room immediate cable

This message is from the U.S. Ambassador in London:

“Summary: With South Georgia retaken, HMG [Her Majesty’s Government] is now looking toward additional military steps to build pressure for a settlement on British terms. For the moment Mrs. Thatcher has a relatively free hand. Given her own uncompromising mood, we expect her to force the military race. Choosing additional steps in the near term to minimize risk and maximize public impact. End summary.

“We believe that HMG considers an all out assault on the Falklands a last resort. To keep military pressure on the Argentines HMG could follow up the South Georgia success with a series of military actions including one or more of the following:

  1. Unconventional warfare.
  2. Targets of opportunity: With the maritime and perhaps, air exclusion area now established, the British have the capability to attack Argentine naval vessels in the exclusion zone… We suspect that the British hope that the Argentines offer such targets of opportunity over the next few days…”

APRIL 27, 1982 – SECRETARY HAIG RELEASES HIS FINAL PROPOSAL TO OFFICIALS IN LONDON AND BUENOS AIRES: AN IMMEDIATE CESSATION OF HOSTILITIES, ARGENTINE REPRESENTATION IN ISLAND ADMINISTRATION, AND FUTURE NEGOTIATIONS ABOUT SOVEREIGNTY.

APRIL 28, 1982 – THE OAS PASSES A RESOLUTION CONDEMNING SANCTIONS IMPOSED ON ARGENTINA AND DECLARES ARGENTINA’S RIGHT TO SOVEREIGNTY.

April 28, 1982 – Falkland Islands
Department of State, Confidential Briefing Paper

After visiting London and Buenos Aires twice and consulting with top political leaders, “the Secretary has developed a US proposal which would provide an equitable solution. This proposal has been transmitted to both HMG and the Argentine government. Neither has yet accepted.”

“Meanwhile, the conflict threatens to worsen. We are concerned that if the conflict drags on, [the Argentine government] might turn to the Soviet Union for military, economic, or political help. Such a development would have serious consequences for Argentina and the strategic security of the Western Hemisphere.”

APRIL 29, 1982 – ARGENTINA REJECTS HAIG’S FINAL PROPOSAL.

APRIL 30, 1982 – HAIG ANNOUNCES U.S. SUPPORT FOR THE U.K. AND SANCTIONS AGAINST ARGENTINA.

APRIL 30, 1982 – THE BRITISH ANNOUNCE THAT THE MARITIME EXCLUSION ZONE AROUND THE FALKLAND ISLANDS IS NOW A TOTAL EXCLUSION ZONE, MAKING IT APPLICABLE TO AIRCRAFT.

April 30, 1982 (5:27 EST) – Falklands Crisis: Prospective US Measures
U.S. Embassy Buenos Aires, Secret cable

As the full British task force is on the Falklands’ waters, U.S. Ambassador to Argentina reports that “I asked to see President Galtieri and was received at midnight [April 29]. ARMA [Army Attaché] accompanied me…”

“Both ARMA and I… bore down very heavily on the absolute necessity for Argentina not to take the first offensive action. Galtieri said that he had already stopped such actions three times in the last few days, but indicated that he could not do so for much longer. He made a point, as we all know, that the Navy is hungry for action.”

MAY 1, 1982 – “BLACK BUCK 1,” THE FIRST AERIAL ATTACK OF THE WAR, IS EXECUTED BY THE BRITISH AIR FORCE ON THE MAIN RUNWAY OF THE PORT STANLEY AIRPORT.

May 1, 1982 – Falkland Islands Dispute
Department of State, Top Secret Current Report from the Bureau of Intelligence and Research (INR)

On the first half on this two-page document, Argentine Air Force Chief Juan Garcia informs the U.S. Deputy Chief of Mission in Argentina, Claus W. Russer, that “Argentina would not be the first to open fire” in the upcoming confrontation with the British for the islands. “But there is considerable pressure from the Argentine Navy to attempt a major strike before all units of the British task force have reached the scene.”

The second half of the first page is completely excised but has the heading “Argentine Naval Moves.”

MAY 2, 1982 – THE ARGENTINE NAVY CRUISER GENERAL BELGRANO IS SUNK 30 MILES OUTSIDE THE EXCLUSION ZONE BY THE BRITISH SUBMARINE CONQUEROR ON THE ORDERS OF PRIME MINISTER THATCHER AND THE WAR CABINET, WHO CLAIMED SELF-DEFENSE. MORE THAN 300 ARGENTINES DIE.

U.S. intelligence estimate of last reported location  of General Belgrano [Highlighted in red] outside the U.K. Exclusion Zone

May 3, 1982 – Falkland Islands Dispute
Department of State, Top Secret Current Report from the Bureau of Intelligence and Research (INR)

The title of this INR report is out of place; the Falkland “dispute” has become a war. The excised and still classified report is likely to analyze the British forces’ sinking on May 2 of Argentine cruiser General Belgrano – the bloodiest event during the conflict which cost 323 Argentine lives.

MAY 4, 1982 – ARGENTINES SINK THE BRITISH HMS SHEFFIELD. 20 BRITISH MEN DIE.

May 4, 1982 – Sinking of the Belgrano – Alleged US Role
Department of State, Secret cable

Just two days following the controversial sinking of the Argentine cruiser General Belgrano, the U.S. Embassy in Buenos Aires addresses circulating Argentine reports of U.S. intelligence assistance to the British to help them carry out this military attack. Ambassador Shlaudeman (U.S. Ambassador to Argentina) writes that the Argentine government “is carrying a story quoting an unnamed informant in the Pentagon to the effect that the US has ‘at least one spy satellite’ in the south Atlantic and that a great part of the information which it obtains is transmitted to the U.K”. The Argentines also cited Secretary of Defense Caspar Weinberger as saying that the U.S. would assist the British with any type of support they might need.

May 4, 1982 – [Last Reported Location of General Belgrano]
Department of State, Top Secret Current Report from the Bureau of Intelligence and Research (INR)

Two days after the sinking of the Argentine cruiser General Belgrano, another almost completely redacted U.S. intelligence report highlights that the ship was outside the U.K. Designated Maritime Exclusion Zone [highlighted in red]. With the General Belgrano went any serious consideration for a negotiated settlement of the conflict.

MAY 7, 1982 – BRITAIN EXTENDS EXCLUSION ZONE TO WITHIN 12 MILES OF THE ARGENTINE SHORE.

May 7, 1982 – Latin American Reaction to South Atlantic Crisis
Department of State, Confidential cable

Signed by Secretary of State Haig, this review is sent to all U.S. diplomats in Latin America with copies to diplomats in NATO countries, plus the Southern Command and the Atlantic command.  It reads, in part:

“Summary: Popular opinion throughout Latin America has supported Argentina’s claim to the Falkland/Malvinas islands, but hemisphere governments have been reluctant to legitimize the use of force. With the announcement of U.S. support for the U.K. April 30 and the sinking of General Belgrano May 2 Latin sentiment for Argentina has solidified. The Anglo-Argentine conflict has divided Spanish speaking countries from the English speaking Caribbean, jeopardized the Inter-American system, provided Cuba the opportunity to repair relations with Argentina and adopt the mantle of Latin American solidarity, ignited nationalist feelings throughout the hemisphere, and revived latent anti-Americanism, which has yet to erupt widely in public but is simmering beneath the surface.”

May 14, 1982 – US Actions in the South Atlantic Crisis
National Security Council, Top Secret National Security Council Directive Number 34

On May 14th the National Security Council outlined measures with regards to U.S.-declared support for Britain in the Falklands crisis, which included “suspension of all military exports to Argentina,” removal of their certification to receive military sales, and “withholding of new Export-Import bank credits” to Argentina.

MAY 21, 1982 – BRITISH TROOPS FIRST LAND ON THE FALKLAND ISLANDS.

May 24, 1982 – UK-Argentina: Probable British Strategy
CIA, Top Secret National Intelligence Daily Cable

In a report prepared four days before the first land battle of the Falklands war at Goose Green, U.S. military officials outline how the British plan to press forward in the war towards surrender.

“While the  main British force is moving toward Stanley, small units probably will raid Argentine positions on both Easy and West Falkland to destroy Argentine aircraft, ammunition, and supplies…Difficult terrain and poor weather may slow the British advance from Darwin/Goose Green to Stanley. British forces on the move will be at high risk from Argentine aircraft, and Harriers from the British aircraft carriers or possibly from the field at San Carlos will have to provide protection.” [….]

“Prime Minister Thatcher could call early elections in the event of success, but a serious military setback or stalemate would probably result in her replacement.”

MAY 26, 1982 – UN SECURITY COUNCIL RESOLUTION 505 IS PASSED, CALLING FOR BOTH BRITAIN AND ARGENTINA TO WORK WITH THE UN SECRETARY GENERAL TO ACHIEVE A CEASFIRE.

MAY 28-29, 1982 – THE FIRST LAND BATTLE OF GREEN GOOSE AND DARWIN TAKES PLACE. ARGENTINE TROOPS SURRENDER AFTER BEING UNPREPARED FOR AN ATTACK FROM THE WEST. FIFTY ARGENTINE AND 17 BRITISH TROOPS DIE.

May 28, 1982 – Increased Defensive Measures

May 28, 1982 – Argentine Naval Combatants

May 1982 (circa May 28) – Military Forces, Argentina
CIA, Secret Intelligence Reports

Three intelligence reports on or before May 28 of CIA satellite imaging of the Port Stanley area show the high level of detail in U.S. surveillance of Argentine forces. The reports are issued around May 28th, the first day of a two-day battle in which the British retook Goose Green and Darwin by land, the first land battle of the war.

The first document notes the location and quantity of Argentine troops in the area, emphasizing their “improved defensive positions.” It also lists the Argentine aircrafts stationed at the Stanley airfield at the time.

The second document provides specifics on Argentine ships stationed at Puerto Belgrano. “Vessels present include the 25 de mayo aircraft carrier with no aircraft on the flight-deck, one guppy-class attack submarine, one type 209-class attack submarine in drydock, one type-42 guided missile destroyer helicopter…”

The third document outlines in great detail the aircraft stationed at an Argentine base. “Two Guarani-II utility aircraft and one C-47 are in the military area…two of the 14 IA-58 Puchara, observed at the airfield [redacted] were parked in the maintenance area…the 707 is on a parking apron with its side cargo door open.”

MAY 29, 1982 – THE OAS CALLS FOR THE UNITED STATES TO LIFT ITS ECONOMIC SANCTIONS ON ARGENTINA AND TO END ITS SUPPORT OF BRITAIN. THE RESOLUTION ALSO CALLS FOR SOUTH AMERICAN COUNTRIES TO SUPPORT ARGENTINA IN WHATEVER MANNER THEIR GOVERNMENTS SEE FIT.

May 29, 1982 – UK-Argentina: British Military Gains
CIA, Top Secret National Intelligence Daily Cable

Four days after the conclusion of the Battle of Goose Green and two weeks before the end of the war, U.S. intelligence outlines how the British plan to move towards Stanley and recapture the port. The report notes that “the British needed to defeat the Argentine forces in the Darwin-Goose Green area before they could fully develop their main thrust toward Stanley.”  It also explains the Argentine reliance on their air capabilities as their navy is outnumbered by the British, but that this air-based strategy could not sustain itself for more than a few days.

JUNE 3, 1982 – THE U.S. AND THE U.K. VETO A U.N. RESOLUTION DRAFTED BY PANAMA AND SPAIN THAT CALLS FOR AN IMMEDIATE CEASEFIRE.

JUNE 11-14 1982 – BRITISH FORCES ATTACK AND TAKE PORT STANLEY, BRINGING AN END TO THE FALKLANDS WAR. TOTAL DEATHS FOR THE FALKLANDS WAR ARE APPROXIMATELY 650 ARGENTINES AND 250 BRITISH. 3 FALKLAND RESIDENTS DIED DURING THE CONFRONTATION. OVER 11,500 ARGENTINE SOLDIERS ARE TAKEN AS PRISONERS OF WAR.

June 15, 1982 – UK-Argentina: Surrender Announced
CIA, Top Secret National Intelligence Daily Cable

“Argentine forces on both East and West Falkland surrendered last night at 2000 EDT…The commander of British ground forces on the islands reported that arrangements were in hand to assemble the Argentine troops for return to Argentina.”

The FBI – Defendants Accused of Defrauding Investors of $26 Million

Three principals of a company that imported paving stones from Australia were charged with conspiracy, securities fraud, and money laundering in an indictment unsealed today in federal court in Central Islip, New York. The charges against Eric Aronson, Vincent Buonauro, and Fredric Aaron arose from their solicitation of investor money for, and their operation of, Permapave Industries and Permapave USA (“Permapave”). Permapave marketed porous paving stones in the United States that were manufactured in Australia.

The defendants are scheduled to be arraigned this afternoon before United States Magistrate Judge Gary R. Brown at the United States Courthouse at 100 Federal Plaza, Central Islip, New York.

The charges were announced by Loretta E. Lynch, United States Attorney for the Eastern District of New York, and Janice K. Fedarcyk, Assistant Director in Charge, Federal Bureau of Investigation, New York Field Office. The criminal case has been assigned to United States District Judge Arthur D. Spatt.

According to the indictment, the defendants issued promissory notes to investors and promised to use the proceeds to finance shipments of Permapave paving stones from Australia to the United States. The indictment and court filings charge that from 2006 to 2010, the defendants operated Permapave as a Ponzi scheme, raising approximately $26 million through false representations and paying back some investors from the investments of other investors because of the minimal revenues Permapave generated. The government’s pleadings also allege that the defendants converted more than $3 million of investor funds for their personal use, including home mortgage payments, down payment on a residence, automobile payments, and credit card purchases for watches, jewelry, clothing, vacation resorts, and air travel.

“The defendants allegedly abused the trust placed in them by their investors by lying and stealing the investors’ money. They promised a sound investment in a quality product but instead shuttled the investors from one deceptive securities offering to another in an attempt to maintain their house of cards. This office is committed to protecting the investing public and will tirelessly investigate and prosecute those who defraud investors who believed they were investing in a legitimate enterprise,” stated United States Attorney Lynch.

FBI Assistant Director in Charge Fedarcyk stated, “The defendants are alleged to have misled investors and, in paying some of them with proceeds from others, engaged in a Ponzi scheme to conceal how flimsy the investment was. The FBI is always at the ready to uncover unscrupulous investment schemes.”

The charges in the indictment are merely allegations, and the defendants are presumed innocent unless and until proven guilty. If convicted, each defendant faces a maximum of 20 years’ imprisonment on the most serious count.

The government’s case is being prosecuted by Assistant United States Attorneys William P. Campos and Karen Hennigan.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency task force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes.

The Defendants:

Eric Aronson, age 43
Vincent Buonauro, age 40
Fredric Aaron, age 48

Revealed – Secrets of World War II — What Really Happened to Rommel

Secrets of World War II — What Really Happened to Rommel
This film chronicles the career of Germany’s most brilliant World War II tactician. Field Marshall Erwin Rommel (1891-1944) was nicknamed the “Desert Fox” for his brilliant leadership of German troops in North Africa. He had an unbroken string of victories until defeated by General Montgomery’s much larger forces in Egypt. This documentary contains film clips of the famed “Ghost Division” and rare footage of Rommel’s state funeral. The question of Rommel’s fate is addressed: was he murdered, or did he commit suicide? It is known that he became convinced that Germany would lose the war and that Hitler should relinquish power. Rommel’s involvement in the plot to oust Hitler is examined, along with the intrigue surrounding Rommel’s death.

Confidential from the FBI – Major Financial Crime Using Intelligence and Partnerships to Fight Fraud Smarter

Robert S. Mueller, III.jpg
FBI Director Robert S. Mueller address the Miami Chamber of Commerce.

 

Homeowners tricked into signing away the deeds to their own homes. The elderly and vulnerable used to make a fast and illegal buck, even by very people who take care of them. Billions in hard-earned investor dollars vanishing in a seeming flash, sometimes through a single scam.

Financial crime is a real and insidious threat—one that takes a significant toll on the economy and its many victims. Today, Director Robert S. Mueller talked about the impact of financial crime and the Bureau’s longstanding role in combating it in a keynote speech before the Miami Chamber of Commerce.

 Inside Financial Crime

More recent stories detailing our role in fighting financial frauds:

The State of Financial Crime
Forensic Accountants Follow the Money
Investigating Financial Crime: A Retrospective
Financial Intelligence Center: Getting Ahead of Crime

The Director explained that even in the post 9/11 world—with its needed focus on terrorism and other national security threats—the FBI continues to take its criminal responsibilities seriously. “What has changed,” he said, “is that we make greater use of intelligence and partnerships to better focus our limited resources where we can have the greatest impact—for example, on combating large-scale financial fraud.”

It’s all about working smarter, using new information-sharing efforts, intelligence-driven investigations, and task force-based approaches to leverage the talents and resources within and among agencies to get a bigger bang for the buck, so to speak, in fighting financial fraud.

Among the innovations and initiatives outlined by the Director:

  • Three years ago, we established the Financial Intelligence Center to strengthen our financial intelligence collection and analysis. “This center helps us to see the entire picture of financial crimes. It provides tactical analysis of financial intelligence data, identifies potential criminal enterprises, and enhances investigations. It also coordinates with FBI field offices to complement their resources and to identify emerging economic threats.”
  • Today, we have more than 500 agents and analysts using intelligence to identify emerging health care fraud schemes, and field offices target fraud through coordinated initiatives, task forces and strike teams, and undercover operations.
  • The Miami office has led the way by creating the first Health Care Fraud Strike Force, which is now a national initiative. Through the strike force, the Bureau works closely with federal, state, local, and private sector partners to uncover fraud and recover taxpayer funds. “Last year, our combined efforts returned $4.1 billion dollars to the U.S. Treasury, to Medicare, and to other victims of fraud.”
  • As the result of a new forensic accountant program, we now have 250 forensic accountants “trained to catch financial criminals” and “ready to respond quickly to high-profile financial investigations across the country.”
  • In the last four years, we have nearly tripled the number of special agents investigating mortgage fraud. “Our agents and analysts are using intelligence, surveillance, computer analysis, and undercover operations to identify emerging trends and to find the key players behind large-scale mortgage fraud.”
  • In 2010, the FBI began embedding agents at the Securities and Exchange Commission (SEC). “This allows us to see tips about securities fraud as they come into the SEC’s complaint center…to identify fraud trends more quickly and to push intelligence to our field offices.”

Everyone has a role in fighting fraud, including business and community leaders. “You can learn to recognize financial fraud and unscrupulous business practices, to better protect yourself and your companies,” Mueller said. “And you can alert us when you see these activities take place.”

Please do. To report fraud, visit our tips page or contact your nearest FBI office.

 

SOURCE: THE FBI

The CIA reports – Support Furnished to Elements of the Government outside of the Intelligence Community

Citation: Support Furnished to Elements of the Government outside of the Intelligence Community
[Interagency Audio Surveillance Countermeasures Training Center; Attached to Routing and Record Sheet], Confidential, Memorandum, TS CC-D-386, May 08, 1973, 3 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00016
Origin: United States Intelligence Board. Technical Surveillance Countermeasures Committee. Chairman
From: Roosevelt, Cornelius V.S.
To: Schlesinger, James R.; Schlesinger, James R.
Individuals/
Organizations Named:
United States Embassy. Soviet Union; United States Intelligence Board. Security Committee; United States. Air Force; United States. Army; United States. Central Intelligence Agency; United States. Defense Intelligence Agency; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Department of State; United States. Department of Transportation; United States. Internal Revenue Service; United States. National Security Agency; United States. National Security Council. Special Committee on Technical Surveillance Countermeasures; United States. Navy; United States. Secret Service; United States. White House Communications Agency
Subjects: Communications interception | Surveillance countermeasures
Abstract: Describes establishment of the Interagency Audio Surveillance Countermeasures Training Center and training provided to other agencies.
Full Text: Document – PDF – this link will open in a new window (90 KB)

Durable URL for this record – this link will open in a new window

Public Intelligence – Joint Special Operations University Report on Convergence of Special Forces and Civilian Law Enforcement

https://publicintelligence.net/wp-content/uploads/2012/03/JSOU-CivilMilitaryConvergence.png

 

In recent years there has been an apparent convergence of the operations conducted by Special Operations Forces (SOF) and those of civilian law enforcement agencies (LEAs), especially Special Weapons and Tactics (SWAT) units, in what were formerly separate and distinct missions. The requirements to obtain warrants prior to execution of raids for high-value targets, collect and preserve evidence for criminal prosecution, and on occasion present testimony in courts of law are new missions for SOF. They are not relatively simple changes in the rules of engagement or comparable techniques. As far as can be determined, previously no U.S. military combat arms unit has ever been tasked with such a mission during combat operations. The thesis is straightforward; if such missions are to continue, then consideration must be given to adequate training for them.

In addition, the dangers faced by civilian LEAs in the U.S. have been constantly escalating. Many criminals are equipped with fully automatic weapons and in some areas conducting small-unit operations. The response to these threats requires additional SOF-like civilian units within LEAs. As such, SOF and LEAs will be competing for personnel from a limited subset of the American population.

The purpose of this monograph is to examine the elements precipitating this circumstance, provide SOF with a better understanding of changing domestic threats and operational capabilities of LEAs, and draw insights from the similarities and challenges imposed by transnational gangs and terrorists both domestically and abroad. The monograph will argue that SOF need new skills and training to assume the law-enforcement-like missions they are being assigned. In addition, it will provide leaders of major LEAs a better understanding of special operations and potentially facilitate a basis for future cooperation and mutual support. The monograph is written as a forward-looking document and a harbinger of emerging trends; some are quite clear, and others more subtle, but all worth contemplating, especially by those engaged in planning for the future of SOF. It is also argued that the public attitude toward conflict is changing and perhaps the legal underpinnings on use of force as well.

An important issue surfaced while conducting interviews with special operations personnel from various elements concerning assigned missions. That topic was how many of them reported being asked to conduct functions in Iraq that were very similar to those found in U.S. civilian law enforcement. These assignments were found at various operational levels from those involved in direct action and capture of high-value targets to liaison with Iraqi law enforcement at varying levels of headquarters. It is noted some officers believe such tasks and constraints to be inappropriate for SOF; however, that discussion is not relevant to this monograph. The missions have occurred, are ongoing, and likely to represent a trend for the future. Those SOF having been assigned law enforcement-like missions were asked about any police techniques training they had received prior to arrival in country; they usually responded that they had none. A few, mostly from the reserve components, were civilian law enforcement officers recalled to active duty and had been trained through police academies. The majority of respondents, however, indicated they had learned on the job. It is only because SOF are inherently adaptive and innovative that they were able to perform as well as they did.

The military aspect of this trend was also noted in a U.S. Marine Corps War College student paper in 2008. Both authors—Alan Ivy, a supervisory special agent in the FBI, and COL Ken Hurst, a Special Forces commander—had extensive experience in Iraq and encountered these situations. In their paper they correctly asserted:

The merging of law enforcement and combat operations is producing a fundamental change in how the Department of Defense (DoD) is conducting combat operations. The global war on terrorism (GWOT) is forcing combat soldiers to collect evidence and preserve combat objectives as crime scenes in order to prevent captured enemy forces from returning to the field of battle. The military has been slow to codify the doctrinal and equipment changes that support the incorporation of law enforcement techniques and procedures into military operations.

CRPTOME – Lynnae Williams v. CIA Court Documents

Lynnae Williams on Twitter: https://twitter.com/#!/wlynnae

 


Lynnae Williams sends:

Here are the documents I filed in US District Court for the Eastern District of Virginia and responses from the U.S. Attorney’s Office to my complaint against the CIA. I still need to breakdown the Government’s response into smaller files so I can email them. Thank you for publishing my information on Cryptome and don’t hesitate to contact me if there is further information I can provide.

Best regards,

Lynnae

Williams-Redacted-Amended-Complaint-1.pdf (521KB)

USDisCtFilingFeeReceipt.pdf (159KB)

USDistrictCourtFilingWaiverDenial.pdf (1.3MB)

US-District-Court-Order.pdf (552KB)

SummonsForms.pdf (696KB)

DoJ-Notice-Of-Appearance.pdf (506KB)

USDistCourtEmergencyMotionSeal.pdf (4.2MB)

TOP-SECRET – National Gang Intelligence Center Juggalos Intelligence Report

https://publicintelligence.net/wp-content/uploads/2012/03/NGIC-Juggalos.png

 

(U//FOUO) Increasing criminal activity among Juggalos is of concern due to the ease with which these transitory and loosely affiliated criminal sub-sets are able to form and break off of the well established Juggalo sub-culture of over one million followers. Their crimes are characterized by acts of violence and destruction directed against law enforcement, members of the community, public/private property, and other members of their group. Juggalos are classified as a gang in the states of Arizona, California, Pennsylvania and Utah. Despite this narrow classification, Juggalo-related crime has been documented in at least 20 other states according to law enforcement and open-source reporting.

Key Findings:

(U) Juggalo criminal groups generally engage in assault, robbery, theft, drug possession/sales, vandalism, and to a lesser extent murder. On average, these criminal groups consist of Caucasian males ages 16 to 26. There is little to no structure within the group, and there is no formalized leadership. Due to this lack of structure and absence of leadership, most crimes are not committed on behalf of the group; rather they are more sporadic and individualistic in nature.

(U) The Juggalo criminal element has been well documented in the states of Arizona, California, Pennsylvania, and Utah. However, law enforcement reporting suggests that criminal activity in Juggalo groups has grown over the past six years and has spread to several other states in which Juggalo-related crime is becoming a mounting concern in the community and among law enforcement.

(U) Juggalo sub-sets are beginning to evolve and take on more of a gang-like resemblance. Establishment and organization within these sub-sets is discernable and set apart from the loosely affiliated Juggalo groups. This evolution may be attributed to a sub-sets affiliation with an already established local/national street gang or gang members that have infiltrated the Juggalo criminal group.

..

(U//LES) Juggalos exist nationwide and exhibit many of the same characteristics as a traditional gang such as throwing hand signs, wearing matching tattoos, and dressing in similar clothing. Over the years, two sides to the Juggalo sub-culture have emerged. According to an admitted Juggalo gang member, there are two active but very different factions of the Juggalos: the music fans and the criminal street gang.

(U//LES) The nationwide Juggalo membership, believed to be over one million fans/followers, vehemently reject the gang label they have received in recent years. The majority of the Juggalo sub-culture following, which constitutes the non-criminal element, likens themselves to a “family”.

(U//LES) The sub-set groups constituting the criminal element have broken off of the mainstream Juggalo subculture. These individuals have been identified as a younger generation taking the sub-culture to a different level, evolving the group into gangs or cliques. Most criminally-active Juggalos claim that their identity as a member of the Juggalo community is a lifestyle society has placed upon them.

(U//LES) Juggalo criminal activity presents a threat to law enforcement, schools, and the community. Juggalo criminal groups operate in multiple states, not just the ones that classify them as a gang. According to law enforcement reporting, police departments in at least 13 states have identified established, criminal Juggalo sub-sets. These states include: Arizona, California, Colorado, Florida, Kansas, North Carolina, Oklahoma, Oregon, Pennsylvania, Tennessee, Texas, Utah, and Washington. Although many of these states do not officially recognize the Juggalos as a gang, police departments in all of these states have documented criminal activity with the respective Juggalo groups operating in their area.

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE

NGIC-Juggalos

Uncensored – Full Movie – Hitler’s Warriors – Udet The Devil’s General – by Guido Knopp

For More Great Documentaries please visit http://www.DocuFans.com and support the site
There are lots of World War II and Guido Knopp documentaries.

“I believed, I erred” – the belated regret by Hitler’s field marshal Keitel before the Nuremberg Tribunal stood out as a lone exception in facing the atrocities of the German military. Most of the high-ranking officers who aided the dictator in his war of aggression pleaded that they were obeying orders and denied any personal guilt. In post-war Germany, where there was an atmosphere of repression rather than inquiry, they contrived the myth of a “clean” military which supposedly was neither involved in the mass murders of the regime nor was aware of them. In fact, many aristocrats in the military regarded the Nazi-Ideology with reserve, but their resistance, also in clear sight of the horrendous crimes carried out by the regime, was confined to a small circle. No active field marshal rose to support the men of the failed assassination attempt of July 20, 1944. Erich von Manstein, for instance, categorically declined the recruiting efforts of the conspirators with the words: “German field marshals do not mutiny”.Profiling these men, the series asks why it all happened. Rommel, Keitel, Paulus, Udet, Canaris and Manstein – six careers caught in the tangle between obedience and crime. What led all these officers to put their military talents at the service of a murderous dictator? To what depth was their involvement in Hitler´s crimes? To what limits did their obedience lead them?

Unveiled – Elbit to Defend IEC Against Cyber-Attacks

The Reading Power station (Photo: Wikipedia)
The Reading Power station

Elbit Systems has decided to define the field of cyber warfare as one of its primary expansion goals for the coming years. Dozens of experts have already been recruited to the cyber department headed by Brigadier General (Res.) Yair Cohen, former commander of the central collection unit 8200 in the IDF’s intelligence branch.

“The cyber field completely blurs the distinctions between the classic defense field, the military-defense sector, and the civilian sector,” Cohen said during the Central Cyber Session in December 2011. The session was held in the framework of the Globes Israel Business Conference, sponsored by IsraelDefense and the Yuval Ne’eman Science, Technology, and Security Workshop at Tel-Aviv University.

“Even if we come from the incorrect assumption that Israel’s air force branch is completely sealed, it still needs to receive water and electricity from external sources, and if the Mekorot water company or the Israel Electric Corporation (IEC) were to be stopped, it would affect them as well. You can unleash an unparalleled catastrophe upon a powerful country and military,” he said.

“In Brazil, there are constant attacks against the electric grid. There is a very high probability that these are cyber-attacks, which resulted in 60 million Brazilians being cut off from electricity in November 2009. I don’t want to think about what would happen in the Tel Aviv Metropolitan Area in Israel if there was no electricity for two hours,” Cohen added.

In order to prevent such scenarios from happening in Israel, Elbit and the IEC are preparing for the construction of an extensive defense layout aimed at covering all of the company’s facilities and computer systems. The intent is to replicate this layout in the future and suit it for other large entities in Israel and around the world.

The IEC is considered one of Israel’s essential national infrastructure organizations, with dozens of sites across Israel. The company’s Chairman, Major General (Res.) Yiftach Ron Tal, even recently revealed that the company identified several cyber-attack attempts, which were unsuccessful.

TOP-SECRET – Activities Possibly outside CIA’s Legislative Charter

Citation: Activities Possibly outside CIA’s Legislative Charter
[Central Intelligence Agency Directorate of Intelligence Sensitive Activities; Attached to Cover Sheet; Includes Memoranda Entitled “DCS Domestic Activity”; “Activity Related to Domestic Events” [Four Versions]; “Contacts with David Young”; “Involvement in Domestic Affairs [Excised]”; “Questionable NPIC Projects”; and “Sensitive Activities”], Top Secret, Memorandum, May 08, 1973, 25 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00020
Origin: United States. Central Intelligence Agency. Directorate of Intelligence. Deputy Director
From: Proctor, Edward W.
To: Schlesinger, James R.
Individuals/
Organizations Named:
Al-Amin, Jamil; Anderson, Jack; Bush, Archer; Carmichael, Stokely; Clark, Ramsey; Cleaver, Eldridge; Colby, William E.; Columbia University; Eisenbeiss, Harry; Fonda, Jane; Helms, Richard M.; Hunt, E. Howard; Lehman, Richard; Mitchell, John N.; Murphy, James R.; Nixon, Richard M.; Rostow, Walt W.; Smith, R. Jack; Students for a Democratic Society; United States Intelligence Board; United States. Central Intelligence Agency. Directorate of Intelligence; United States. Central Intelligence Agency. Directorate of Intelligence. Assistant Deputy Director; United States. Central Intelligence Agency. Directorate of Intelligence. Central Reference Service; United States. Central Intelligence Agency. Directorate of Intelligence. Domestic Contact Service; United States. Central Intelligence Agency. Directorate of Intelligence. National Photographic Interpretation Center; United States. Central Intelligence Agency. Directorate of Intelligence. Office of Current Intelligence; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Communications; United States. Central Intelligence Agency. Directorate of Management and Services. Office of Security; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Central Intelligence Agency. Directorate of Operations. Covert Action Staff; United States. Central Intelligence Agency. Directorate of Operations. Deputy Director; United States. Central Intelligence Agency. General Counsel; United States. Department of Justice; United States. Department of Justice. Attorney General; United States. Department of Justice. Bureau of Narcotics and Dangerous Drugs; United States. Federal Bureau of Investigation; United States. Foreign Broadcast Information Service; United States. Marine Corps; United States. National Aeronautics and Space Administration; United States. National Foreign Intelligence Board. Committee on Imagery Requirements Exploitation; United States. National Security Agency; United States. National Security Council; United States. National Security Council. 40 Committee; United States. Special Assistant to the President for National Security Affairs; United States. White House; White, Lawrence K.; Young, David R.
Subjects: Arabic language | Argentina | Awards | Biographical intelligence | Black power movement | Caribbean Region | Chinese language | Civil unrest | Communists and Communist countries | Courts-martial | Cuba | Defectors | Domestic intelligence | Ellsberg, Daniel Psychiatrist’s Office Burglary (1971) | Executive Order 11652 (1972) | Hanoi (North Vietnam) | Information security | Intellectual property rights | ITAR-TASS (Soviet Union news agency) | Libel | Military training | Motion pictures | Narcotics | National Security Act (1947) | Natural disasters | New China News Agency | New York | Opium production | Photographic intelligence | Political activists | Prisoners of war | Radio broadcasts | Records management | Satellite reconnaissance | Students | Taiwan | Telephone monitoring | United States citizens | Vietnamese Conflict protest movements | Watergate Affair (1972-1974) | Yugoslavia
Abstract: Describes Central Intelligence Agency Directorate of Intelligence activities possibly outside CIA’s charter, including monitoring narcotics trade, overseas telephone calls, Caribbean nationalist movements, student and anti-war groups, and other U.S. citizens; telephone and satellite surveillance; and linguistic services to outside agencies; indicates that John Mitchell received secret daily intelligence briefings.
Full Text: Document – PDF – this link will open in a new window (711 KB)

Durable URL for this record

Top Secret from the FBI – Valley Pair Plead Guilty to $5.3 Million Mortgage Fraud Conspiracy

PHOENIX—A Valley mortgage broker and her former associate have each admitted to conspiring to commit a multiple-transaction mortgage fraud that federal law enforcement calculates resulted in a loss to defrauded financial institutions of approximately $5,300,000. Michele Mitchell, 45, of Glendale, Arizona, entered a guilty plea to one count of conspiracy to commit wire fraud in federal court on April 2, 2012. Jeremy Pratt, 33, also of Glendale, had previously entered his guilty plea to one count of conspiracy to commit wire fraud on January 13, 2012.

Mitchell held herself out to be a mortgage broker, loan officer, and real estate investor. She was president of Golden Opportunity Investments, which was located in Scottsdale, Arizona. Pratt operated a construction and remodeling company, Arizona Cooling Control Plus. Both admitted that between May 2005, and February 2007, they conspired to recruit straw buyers with good credit scores to purchase residential properties for purported investment purposes. In order to qualify for mortgage financing, they had the straw buyers submit loan applications and supporting documents that misrepresented their incomes, assets, liabilities, employment status, and intent to occupy the premises. At the close of escrow, Mitchell and Pratt obtained a portion of the loan proceeds as “cash back” to be used for mortgage payments and for their own personal enrichment.

Mitchell and Pratt each admitted that their fraudulent scheme resulted in the purchase of at least 17 residential properties by obtaining loans from financial institutions in the total amount of nearly $17 million. The residential properties were located in the Valley cities of Glendale, Scottsdale, Surprise, Goodyear, and Peoria. All 17 properties went into foreclosure when neither Mitchell nor the straw buyers made the necessary mortgage payments. The total amount of “cash back” fraudulently obtained by Mitchell and Pratt from these transactions was $2.46 million and federal law enforcement calculates the loss to the financial institutions, that is, the difference between the total loan amounts and the total sales prices obtained at foreclosure sales, at approximately $5.3 million.

A conviction for conspiracy carries a maximum penalty of five years in prison, a $250,000 fine, or both. Pratt’s plea agreement provides that his sentence will not exceed 24 months. Mitchell’s plea agreement contains no such restriction. In determining an actual sentence, the court will consult the U.S. Sentencing Guidelines, which provide appropriate sentencing ranges. United States District Judge James A. Teilborg, however, is bound by neither the plea agreement nor the guidelines in determining a sentence.

Pratt is scheduled to be sentenced by Judge Teilborg on May 29, 2012. Mitchell is scheduled to be sentenced by Judge Teilborg on June 18, 2012.

The investigation in this case was conducted by the Federal Bureau of Investigation and the Internal Revenue Service, Criminal Investigations. The prosecution is being handled by Frank T. Galati, Assistant U.S. Attorney, District of Arizona, Phoenix.

Confidential by Public Intelligence – Central Florida Intelligence Exchange

https://publicintelligence.net/wp-content/uploads/2012/03/CFIX-CopBlock.png

 

On 28 June 2011, a guest author posted an article entitled “When Should You Shoot A Cop” on the official website for the Cop Block project. In the article the author poses the question of when it is acceptable to forcibly resist law enforcement officials.

Throughout the article the author makes mention of the “tyranny and oppression” imposed by law enforcement officers and highlights that “far more injustice, violence, torture, theft and outright murder has been committed IN THE NAME of ‘law enforcement,’ than has been committed in spite of it”. He goes on to state that the regimes of “Stalin, or Lenin or Chairman Mao, or Hitler…or any number of other tyrants in history” carried out their atrocities in the name of ‘law enforcement’. The author believes that the world would have been less gruesome if there “had been a lot MORE ‘cop-killers’ around”.

[Analyst Notes] Cop Block, based on the description on their Facebook page, is a “decentralized project supported by a diverse group of individuals united by their shared goals of police accountability, education of individual rights and the dissemination of effective tactics to utilize while filming police.” The project was founded in 2010 by an individual who started Cop Block due to his personal experiences with law enforcement when he was “a victim of the war on drugs, twice”.

In addition to posting information about incidents involving police actions [articles, photos, and/or videos], the contributors to the site also call for those interested in helping “the cause” to participate in “call floods”, in which numerous ‘activists’ call a specific agency to “express [their] disapproval [of] the police for their actions”. In December 2010, Cop Block activists, in association with the Bradley Manning Support Network, call flooded the offices of the Quantico Base Commander and the Marine Brig Commanding Officer demanding that Manning be released immediately and to inform them that “exposing the crimes of a government is heroic”.

In order to raise money, as well as promote the project, Cop Block offers items that can be purchased for donations [i.e. stickers, t-shirts, dime cards, etc]. One of the products is a business card which is meant to be distributed not only to “like-minded activists”, but also to law enforcement: “See a police cruiser parked where you’d be ticketed? Leave a card to remind the driver that they have no extra rights.”

Currently there is no specific threat to law enforcement personnel based on this article; however, this bulletin is being provided for situational awareness. Although it is unclear exactly how many individuals are involved in the Cop Block project, the forum on the official website has 127 members and their Facebook group has been “liked” by over 10,000 people.

In order to protect the online identity of you and your agency, the utilization of an anonymizer is recommended when viewing information on this site and others like it.

Uncensored Full Movie – Hitler’s Warriors – Rommel The Hero by Guido Knopp

 

For More Great Documentaries please visit http://www.DocuFans.com and support the site
There are lots of World War II and Guido Knopp documentaries.

“I believed, I erred” – the belated regret by Hitler’s field marshal Keitel before the Nuremberg Tribunal stood out as a lone exception in facing the atrocities of the German military. Most of the high-ranking officers who aided the dictator in his war of aggression pleaded that they were obeying orders and denied any personal guilt. In post-war Germany, where there was an atmosphere of repression rather than inquiry, they contrived the myth of a “clean” military which supposedly was neither involved in the mass murders of the regime nor was aware of them. In fact, many aristocrats in the military regarded the Nazi-Ideology with reserve, but their resistance, also in clear sight of the horrendous crimes carried out by the regime, was confined to a small circle. No active field marshal rose to support the men of the failed assassination attempt of July 20, 1944. Erich von Manstein, for instance, categorically declined the recruiting efforts of the conspirators with the words: “German field marshals do not mutiny”.Profiling these men, the series asks why it all happened. Rommel, Keitel, Paulus, Udet, Canaris and Manstein – six careers caught in the tangle between obedience and crime. What led all these officers to put their military talents at the service of a murderous dictator? To what depth was their involvement in Hitler´s crimes? To what limits did their obedience lead them?

 

The CIA Crown Jewels – The Watergate Affair

Citation: Response to Press Inquiries concerning Mr. Hunt’s Grand Jury Testimony
[Attached to Cover Memorandum], [Classification Unknown], Statement, May 08, 1973, 2 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00033
Origin: United States. Central Intelligence Agency. General Counsel
Individuals/
Organizations Named:
Colby, William E.; Cushman, Robert E., Jr.; Ellsberg, Daniel; Hersh, Seymour M.; Houston, Laurence R.; Hunt, E. Howard; Schlesinger, James R.; Thuermer, Angus; United States. Central Intelligence Agency. Director; United States. Central Intelligence Agency. Directorate of Intelligence. Office of Intelligence Coordination; United States. Department of Justice
Subjects: Ellsberg, Daniel Psychiatrist’s Office Burglary (1971) | Investigations | News media | Watergate Affair (1972-1974)
Abstract: Provides guidance for responding to press questions on Howard Hunt’s grand jury testimony denying advance Central Intelligence Agency knowledge of Daniel Ellsberg’s psychiatrist’s office break-in, and cites Seymour Hersh’s assertion to the contrary.
Full Text: Document – PDF – this link will open in a new window (42 KB)

Durable URL for this record – this link will open in a new window

The FBI reports – Atlanta Man Convicted of Billing $32.9 Million for Worthless Services

ROME, GA—George Dayln Houser, 63, of Atlanta, has been convicted on charges of conspiring with his wife to defraud the Medicare and Medicaid programs by billing them for “worthless services” in the operation of three deficient nursing homes between July 2004 and September 2007. Medicare and Medicaid paid Houser more than $32.9 million during that time for food, medical care, and other services for nursing home residents that he either did not provide or that were so deficient that they were worthless. This is the first time that a defendant has been convicted after a trial in federal court for submitting claims for payment for worthless services.

Houser was convicted by United States District Judge Harold L. Murphy, who issued an order with findings of fact and conclusions of law on Monday, April 2, 2012. Houser had requested a bench trial, which Judge Murphy conducted from January 30, 2012 through February 28, 2012. In addition to the health care fraud count, Houser was also convicted of eight counts of failing to pay over $800,000 in his nursing home employees’ payroll taxes to the IRS and failing to file personal income tax returns in 2004 and 2005.

“It almost defies the imagination to believe that someone would use millions of dollars in Medicare and Medicaid money to buy real estate for hotels and a house while his elderly and defenseless nursing home residents went hungry and lived in filth and mold,” said United States Attorney Sally Quillian Yates. “We will continue to aggressively protect our most vulnerable citizens and hold accountable those who prey on the elderly and steal precious healthcare dollars.”

Brian D. Lamkin, Special Agent in Charge, FBI Atlanta Field Office, stated, “While the FBI works tirelessly to protect the federally funded Medicare and Medicaid programs from abuse, we are also working hard to protect those that these much needed health care programs were intended to serve. The Housers’ actions have left an indelible mark on all of those individuals who assisted in bringing this matter forward. The level of greed and lack of compassion for others that was seen in this case reflect the very reason that the FBI, in working with its many and varied law enforcement partners, dedicates vast investigative resources in combating health care fraud.”

“To see nursing homes residents subjected to such horrendous conditions, while Mr. Houser used Medicare and Medicaid funds as his personal piggy bank, is a travesty,” said Derrick L. Jackson, Special Agent in Charge of the U.S. Department of Health and Human Services, Office of Inspector General for the Atlanta region. “The Office of Inspector General and our law enforcement partners will aggressively investigate and then bring these criminals to justice.”

“The guilty verdict in this case is an important victory for the American taxpayer,” said Rodney E. Clarke, IRS Criminal Investigation Special Agent in Charge. “The IRS, along with our law enforcement partners, will vigorously pursue individuals who victimize the less fortunate in our society while holding positions of trust. I believe justice has been served in this case, and the defendant will now be held accountable for his actions.”

According to United States Attorney Yates, the charges, and other information presented in court, or contained in Judge Murphy’s findings of fact and conclusions of law: Houser and his wife ran two nursing homes in Rome, Georgia between July 2004 and July 2007, known as Mount Berry and Moran Lake. Each home had approximately 100 residents. They also ran a home known as Wildwood in Brunswick, Georgia from September 2004 until September 2007, and it had the capacity for 204 residents. Between July 2004 and September 2007, Houser billed Medicare and Medicaid approximately $39.4 million, and they paid him $32.9 millionm based on his certifications and promises that he was providing the residents with a safe, clean, physical environment, nutritional meals, medical care, and services that would promote or enhance the residents’ quality of life.

In sharp contrast to the pretenses under which Houser accepted Medicare and Medicaid payments, the court concluded that the evidence showed “a long-term pattern and practice of conditions at defendant’s nursing homes that were so poor, including food shortages bordering on starvation, leaking roofs, virtually no nursing or housekeeping supplies, poor sanitary conditions, major staff shortages, and safety concerns, that, in essence, any services that defendant actually provided were of no value to the residents.” The court further found that “the supposed ‘care’ defendant provided to residents during the relevant time period was so deficient that the bundle of services had no medical value.”

During the trial, the government introduced evidence that instead of providing sufficient care for the nursing home residents, Houser diverted slightly more than $8 million of Medicare and Medicaid funds to his personal use. Houser spent more than $4.2 million on real estate for a hotel complex that he planned to build in Rome, and he also had plans to develop hotels in Atlanta and Brunswick. Houser also bought his ex-wife a house in Atlanta for $1.4 million, and instead of paying her alimony, he paid her a salary as a nursing home employee, though she never worked at any of the homes. Houser also used the nursing homes’ corporate bank accounts for personal expenses, such as Mercedes-Benz automobiles, furniture, and vacations.

The trial evidence showed several examples of the deficiencies at Houser’s nursing homes, including:

Inadequate staffing: Houser failed to maintain a nursing staff that was sufficient to take proper care of the residents. Staffing shortages started plaguing the homes after Houser started writing bad paychecks to his employees, which resulted in numerous staff resignations. Houser also withheld health insurance premiums from his employees, but let the insurance lapse for non-payment, leaving many employees with large unpaid medical bills for surgery and treatment. The payroll and insurance problems and unpaid garnishments prompted many employees to seek work elsewhere and discouraged new applicants.

Inadequate physical environments: The roofs in two homes were so leaky that employees used 55-gallon barrels and plastic sheeting to catch and divert the rainwater. The leaks worsened over time, but Houser never replaced the roofs, nor did he repair or replace broken air conditioning and heating units. Fiberglass ceiling tiles would become saturated with water until they fell out of the ceiling, occasionally on residents’ beds. The residents kept their windows open to vent the foul odors in the homes, but flies, other insects, and rodents easily entered the homes through ill-fitting screens and doors. The insect problems were aggravated by mounds of rotting garbage, which piled up around the dumpsters near the homes because Houser failed to pay the trash collection services. The moisture and inability to control the humidity in the homes gave rise to rampant mold and mildew growth.

Failure to pay vendors: The Medicare and Medicaid programs require nursing homes to provide sufficient dietary, pharmaceutical, and environmental service to care for their residents’ needs. Houser failed to provide these services, in part by failing to pay food suppliers and vendors of pharmacy and clinical laboratory services, medical waste disposal, trash disposal, and nursing supplies, and in part by failing to repair washing machines and dryers, water heaters, air conditioners, and leaking roofs. The nursing homes suffered continual food shortages, and employees spent their own money to buy milk, bread, and other groceries so that residents would not starve. Employees also bought nursing supplies for the residents and cleaning supplies for the homes, and they also washed the residents’ laundry in laundromats or their homes. One nursing home resident testified that residents used to pass the time by making bets on which service or utility would be the next to be cut off for nonpayment.

The Georgia Department of Human Resources (DHR) Office of Regulatory Services (ORS) received many complaints about the Housers’ nursing home from families, staff, and vendors. After giving the nursing homes many opportunities to correct deficiencies, the ORS closed the two nursing homes in Rome in June 2007, and it closed the Brunswick home in September 2007. One state surveyor inspected the Moran Lake home in Rome in late May 2007, and she testified that the heat, flies, filth, and stench made for an environment best described as “appalling” and “horrendous.”

In addition to the health care fraud count, Houser was convicted of eight counts of deducting $806,305 in federal payroll taxes from his employees’ paychecks but not paying that money over to the IRS. Houser wrote worthless checks to the IRS worth hundreds of thousands of dollars at the same time that he was using the nursing homes’ funds to buy real estate. Houser was also convicted of failing to file personal income tax returns for 2004 and 2005.

Houser and his wife Rhonda Washington Houser, 48, of Atlanta, were indicted on April 14, 2010 and charged with conspiring to defraud Medicare and Medicaid in the operation of two nursing homes in Rome, Georgia and another in Brunswick, Georgia. Rhonda Washington Houser pleaded guilty to misprison of the felony of health care fraud in December 2011, and she awaits sentencing. Houser’s sentencing is tentatively scheduled for June 2012.

The health care fraud charge against Houser carries a maximum sentence of 20 years in prison and a fine of $250,000. The eight counts that charge Houser with failing to pay over payroll taxes to the IRS each carry a maximum sentence of five years in prison and a fine of $10,000 per count. The charges that Houser failed to file tax returns carries a maximum sentence of one year in prison and a fine of $25,000. In determining the actual sentence, the court will consider the United States Sentencing Guidelines, which are not binding but provide appropriate sentencing ranges for most offenders.

This case was investigated by special agents of the Federal Bureau of Investigation, Health and Human Services Inspector General, and IRS Criminal Investigation.

Assistant United States Attorneys Glenn Baker and William Traynor are prosecuting the case.

Top-Secret – Ronaldo Cardonetti life in danger in Brazil

Date: Wed, 04 Apr 2012 06:44:40 -0400
From: brasil[at]wikileaks.com.br
To:
Subject: Fwd: Re: Ronaldo Cardonetti life in danger in Brazil

Caro Sr. Joao Carlos Saad:

Bom dia!

Nos encontramos no voo para SP da American Airlines aonde tive o prazer de servi-lo assim como sua esposa na classe executiva e deve se recordar que mencionei a voce que sou conhecido do Boris Casoy e vendi equipamento para tratamento de coluna para ele que me visitou na casa de minha Maezinha na Rua Sao Joao Batista n. 119, Cambuci _SP 01527-010.

Sou ativista digital nas horas de folga e ajudo ativistas do Brasil e dos Estados Unidos dando-lhes hospedagem de sites gratuitamente. A ABUSANDO (Associação Brasileira de Usuários de Numeração IP & Assinantes de Domínios) presidida por mim investiga ha anos as acoes do CGI (Comite Gestor da Internet) que nao tem personalidade juridica e nem representa o governo legalmente mesmo assim, atua coordenando a Internet no Brasil cobrando taxas de dominios que nao receberam a apreciacao do congresoo nacional.

Favor informar Boris Casoy e equipe de jornalismo da Band para acompanhar este caso pois estou sendo perseguido pelo Dirceu, Getschko e Getschko por denunciar falcatruas do PT usando a maquina do registro de dominios e alocacoes de IP’s no Brasil.

Voce pode acompanhar tudo no like ABUSANDO no meu site

http://www.wikileaks.com.br

ou diretamente pelo link:

http://www.abusando.org/nada/inicio.html

Um de meus amigos foi preso pela Policia Federal a mando do Ze Dirceu e PT (sob acusacao de crime contra a seguranca nacional) e foi interrogado pela PF quando os delegados tentaram incrimina-lo usando de metodos ilegais.

O nome dele e’ Nuno Moreira Pereira de Souza e o mesmo tambem e’ ativista digital que denunciou as falcatruas de Demi Getschko e Joze Dirceu dentro do registro.br que e’ comandado pela ONG particular presidida por Demi Getschko, laranja do PT denominada NIC.br e toda a receita dos milhoes de dominios estao sendo controlada pelo Demi Getschko que presta contas aos homens da linha de frente do PT em SP.

Poderei ser preso a qualquer momento tambem sob acusacao de crime contra a seguranca nacional e poderei ter o mesmo fim de Celso Daniel portanto favor investigar esse caso, pois apos minha prisao pela PF podera ser tarde demais.

Telefone para contato no Brasil e exterior:

Ronaldo Cardonetti

011 8706-0201
EUA +1 305 781-3331
+1 305 762-2105

Jorge Modesto (secretario da ABUSANDO)

041 3209-9099 / 041 8843-5117 (claro)

ou Laura TIM 041 9922-3058

Jan Struiving (vice-presidente da ABUSANDO)

Claro    041    8850-9600
OI       041    8435-0420
TIM      041    9937-2250
TIM      041    9903-1089
TIM      041    9705-9626
Vivo     041    9136-1424

Rogerio Gonçalves (ativista digital)

Skype = tele171 .tel.

(21) 2576-3511.

Delegado Castilho (PF Parana)

041 9615-3000

No mais, caso nao venha a acontecer minha prisao, vale a pena investigar apenas para garantir e salvaguardar o direito de liberdade de expressao e jornalismo no nosso querido Brasil com S.

Cordialmente.

Ronaldo Cardonetti

http://wikileaks.com.br

Unveiled – Nuclear Spent Fuel Storage Installation Error

[Federal Register Volume 77, Number 65 (Wednesday, April 4, 2012)]
[Notices]
[Pages 20438-20440]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-8114]


-----------------------------------------------------------------------

NUCLEAR REGULATORY COMMISSION

[Docket Nos. 72-1030, 72-56; 50-338 and 50-339: NRC-2012-0084]


Independent Spent Fuel Storage Installation, Virginia Electric 
and Power Company: North Anna Power Station Units 1 and 2

AGENCY: Nuclear Regulatory Commission.

ACTION: Issuance of an environmental assessment and finding of no 
significant impact.

-----------------------------------------------------------------------

FOR FURTHER INFORMATION CONTACT: Jennie Rankin, Project Manager, 
Division of Spent Fuel Storage and Transportation, Office of Nuclear 
Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, 
Washington, DC 20555. Telephone: (301) 492-3268; Fax number: (301) 492-
3342; email: jennivine.rankin@nrc.gov.

SUPPLEMENTARY INFORMATION: 

I. Introduction

    The Nuclear Regulatory Commission (NRC or Commission) is 
considering issuance of a one-time exemption to Virginia Electric and 
Power Company (Dominion or licensee) pursuant to 10 CFR 72.7 from the 
requirements of 10 CFR 72.212(b)(3) and the portion of 72.212(b)(11) 
which requires compliance with the terms, conditions, and 
specifications of the CoC. Dominion submitted its exemption request by 
letter dated July 21, 2011, as supplemented September 28, 2011. 
Dominion has loaded spent nuclear fuel into Transnuclear, Inc. (TN) 
NUHOMS[supreg] HD Storage System (HD-32PTH) dry storage casks, under 
the Certificate of Compliance (CoC or Certificate) No. 1030, Amendment 
No. 0. The licensee inadvertently reversed the upper and lower zones 
while preparing the dry shielded canister (DSC) loading maps. This 
resulted in twelve fuel assemblies being loaded into seven DSCs with 
decay heat greater than the levels specified in the CoC. Dominion 
requests a one-time exemption to the 10 CFR part 72 requirements to 
continue storage of the affected DSCs with serial numbers DOM-32PTH-
004-C, -005-C, -007-C, -010-C, -013-C, -019-C and GBC-32PTH-011-C in 
their current condition at the Independent Spent Fuel Storage 
Installation (ISFSI) associated with the operation of Dominion's 
nuclear power reactors, North Anna Power Station Units 1 and 2, located 
in Louisa County, Virginia.

II. Environmental Assessment (EA)

    Identification of Proposed Action: The CoC is the NRC approved 
design for each dry storage cask system. The proposed action would 
grant Dominion a one-time exemption from the requirements of 10 CFR 
72.212(b)(3) and from the portion of 72.212(b)(11) that states the 
licensee shall comply with the terms, conditions, and specifications of 
the CoC, to the extent necessary to enable Dominion to continue storage 
of the seven DSCs in their current condition at the ISFSI associated 
with North Anna Power Station Units 1 and 2. These regulations 
specifically require storage of spent nuclear fuel under a general 
license in dry storage casks approved under the provisions of 10 CFR 
part 72, and compliance with the terms and conditions set forth in the 
CoC for each dry spent fuel storage cask used by an ISFSI general 
licensee.
    The TN NUHOMS[supreg] HD dry cask storage system CoC provides 
requirements, conditions and operating limits in Attachment A, 
Technical Specifications (TS). The TS restrict the decay heat in lower 
Zone ``1a'' locations to <= 1.05 kW and the upper Zone ``1b'' locations to <= 0.8 kW. The applicant inadvertently reversed the upper and lower zones while preparing the DSC loading maps. This resulted in twelve fuel assemblies being loaded into seven DSCs (serial numbers DOM-32PTH- 004-C, -005-C, -007-C, -010-C, -013-C, -019-C and GBC-32PTH-011-C) with decay heat greater than specified in the CoC. The maximum decay heat of the misloaded fuel assemblies at the time of loading was 0.859 kW, which exceeded the Zone ``1b'' limit mentioned above by 59 watts. Currently, the twelve affected fuel assemblies have been in storage for a minimum of 1.3 years and have decayed to meet the required decay heat limits of the CoC. The proposed action would grant Dominion a one-time exemption from the requirements of 10 CFR 72.212(b)(3) and the portion of 72.212(b)(11) which requires compliance with the terms, conditions, and specifications of a CoC, in order to allow continued storage of the seven affected DSCs in their current condition. This exemption approval is only valid for DSCs with serial numbers DOM-32PTH-004-C, -005-C, - 007-C, -010-C, -013-C, -019-C and GBC-32PTH-011-C, at the North Anna Power Station ISFSI. [[Page 20439]] Need for the Proposed Action: Dominion requested this exemption in order to continue storage of seven as-loaded DSCs containing twelve fuel assemblies which exceeded the CoC decay heat limits at the time of loading. Dominion, with the assistance of TN, has provided an evaluation and thermal analysis which shows that the affected DSCs remain bounded by the system's design basis limits and that the 
continued storage of the fuel in the as-loaded configuration is safe.
    Dominion has considered an alternative to the proposed action, 
which would correct the condition by reloading the affected DSCs to be 
in compliance with CoC No. 1030. This would involve retrieving each of 
the DSCs from their Horizontal Storage Modules (HSM), unloading the 
spent fuel assemblies from the DSC, performing inspections of various 
DSC components, reloading the spent fuel assemblies into the used DSC 
or a new DSC (if there was damage noted on the used DSC) in accordance 
with CoC No. 1030, performing the DSC closing procedures, and 
transferring the DSC back to the ISFSI for re-insertion into the HSM.
    Dominion estimates this alternative action of loading and unloading 
operations would increase personnel exposures by 250 mRem per affected 
DSC. In addition, Dominion states the alternative to the proposed 
action would generate radioactive contaminated material and waste 
during loading and unloading operations and disposal of the used DSCs 
if the DSCs were damaged during the unloading process. The licensee 
estimates the alternative to the proposed action would cost an 
estimated $300,000 for unloading and reloading operations of each 
affected DSC and also necessitate additional fuel handling operations. 
If the DSC was damaged during unloading, the licensee estimates an 
additional $1,000,000 for purchase of a new DSC and $200,000 for 
disposal of the used DSC.
    The proposed action is necessary to document the acceptability and 
safety basis for storage of the DSCs in the as-loaded configuration, 
thus precluding the need to unload the seven DSCs.
    Environmental Impacts of the Proposed Action: The NRC staff has 
determined that the proposed action would not endanger life or 
property. The potential impact of using the NUHOMS[supreg] HD dry cask 
storage system was initially presented in the Environmental Assessment 
(EA) for the rulemaking to add the TN NUHOMS[supreg] HD Horizontal 
Modular Storage System for Irradiated Nuclear Fuel to the list of 
approved spent fuel storage casks in 10 CFR 72.214 (71 FR 25740, dated 
May 2, 2006 (Direct Final Rule), and 71 FR 71463, dated December 11, 
2006 (Final Rule)).
    The licensee submitted TN Calculation No. 10494-174, which 
performed bounding thermal analysis using ANSYS finite element software 
to evaluate the misloading events. The licensee concluded the maximum 
fuel cladding temperature for the as loaded DSCs remained below the 
fuel cladding temperature limit used in the Updated Safety Analysis 
Report dated October 2, 2009. The NRC staff performed an independent 
safety evaluation of the proposed exemption and determined that loading 
of the spent nuclear fuel with higher than allowable decay heat loads 
did not exceed the structural and shielding design basis and that the 
fuel cladding temperatures are below the temperature limit at the time 
of loading. The fuel assemblies have since decayed to meet the CoC 
limits. There are no changes being made in the types or amounts of any 
radiological effluents that may be released offsite, and there is no 
significant increase in occupational or public radiation exposure as a 
result of the proposed activities. Therefore, there are no significant 
radiological environmental impacts associated with the proposed action. 
The proposed action only affects the requirements associated with the 
fuel assemblies already loaded into the casks and does not affect non-
radiological plant effluents, or any other aspects of the environment. 
Therefore, there are no significant non-radiological impacts associated 
with the proposed action.
    Accordingly, the Commission concludes that there are no significant 
environmental impacts associated with the proposed action.
    Alternative to the Proposed Action: Because there is no significant 
environmental impact associated with the proposed action, alternatives 
with equal or greater environmental impact were not evaluated. As an 
alternative to the proposed action, the NRC staff considered denial of 
the proposed action which would involve reloading the affected DSCs as 
described previously. Denial of the exemption would result in an 
increase in radiological exposure to workers, a small potential for 
radioactive releases to the environment due to radioactive material 
handling, additional opportunities for accidents, and increased cost to 
the licensee. Therefore, the NRC staff has determined that approving 
the proposed action has a lesser environmental impact than denying the 
proposed action.
    Agencies and Persons Consulted: The environmental assessment 
associated with this exemption request was sent to Ms. Ellie Irons of 
the Virginia Department of Environmental Quality in the Office of 
Environmental Impact Review, by letter dated November 14, 2011 
(ML113180477). The state response was received by a letter dated 
December 14, 2011 (ML120030312). The letter states that the proposed 
action is unlikely to have significant effects on ambient air quality, 
historic resources, surface waters, and wetlands. The letter also 
states that it is unlikely to adversely affect species of plants or 
insects listed by state agencies as rare, threatened, or endangered. 
Furthermore, the Virginia Department of Health considered the 
alternative to the proposed action of reloading the casks presents 
several risks, namely additional radiation exposure to workers and 
potential accidents that may lead to dispersal of radiation to the 
environment. Thus, the Virginia Department of Health states that it 
supports the exemption without reservation. The NRC staff has 
determined that a consultation under Section 7 of the Endangered 
Species Act is not required because the proposed action will not affect 
listed species or a critical habitat. The NRC staff has also determined 
that the proposed action is not a type of activity having the potential 
to cause effects on historic properties. Therefore, no consultation is 
required under Section 106 of the National Historic Preservation Act.

III. Finding of No Significant Impact

    The environmental impacts of the proposed action have been reviewed 
in accordance with the requirements set forth in 10 CFR Part 51. Based 
upon the foregoing Environmental Assessment, the Commission finds that 
the proposed action of granting the one-time exemption from the 
requirements of 10 CFR 72.212(b)(3) and the portion of 72.212(b)(11) 
which requires compliance with the terms, conditions, and 
specifications of the CoC in order to allow Dominion to store spent 
fuel assemblies in DSCs with serial numbers DOM-32PTH-004-C, -005-C, -
007-C, -010-C, -013-C, -019-C and GBC-32PTH-011-C in the as-loaded 
configuration at the ISFSI associated with North Anna Power Station 
Units 1 and 2, will not significantly impact the quality of the human 
environment. Accordingly, the Commission has determined that an 
environmental impact statement for the proposed exemption is not 
warranted and that a finding of no significant impact is appropriate.

[[Page 20440]]

IV. Further Information

    In accordance with 10 CFR 2.390 of NRC's ``Rules of Practice,'' final NRC records and documents regarding this proposed action are publicly available in the records component of NRC's Agencywide 
Documents Access and Management System (ADAMS). The request for 
exemption dated July 21, 2011 (ML11208C453), as supplemented September 
28, 2011 (ML11286A143), was docketed under 10 CFR 50, Docket Nos. 50-
338 and 50-339, and under 10 CFR 72, Docket No. 72-56. These documents 
may be inspected at NRC's Public Electronic Reading Room at http://www.nrc.gov/reading-rm/adams.html. 
These documents may also be viewed electronically on the public computers 
located at the NRC's Public Document Room (PDR), O1F21, One White Flint 
North, 11555 Rockville Pike, Rockville, MD 20852. The PDR reproduction 
contractor will copy documents for a fee. Persons who do not have access 
to ADAMS, or who encounter problems in accessing the documents located 
in ADAMS, should contact the NRC PDR Reference staff by telephone at 
1-800-397-4209, or (301) 415-4737, or by email to pdr@nrc.gov.

    For the Nuclear Regulatory Commission.

    Dated at Rockville, Maryland, this 26th day of March, 2012.
Jennie Rankin,
Project Manager, Licensing Branch, Division of Spent Fuel Storage and 
Transportation, Office of Nuclear Material Safety and Safeguards.
[FR Doc. 2012-8114 Filed 4-3-12; 8:45 am]
BILLING CODE 7590-01-P


 
[Federal Register Volume 77, Number 65 (Wednesday, April 4, 2012)]
[Notices]
[Pages 20440-20442]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-8111]


-----------------------------------------------------------------------

NUCLEAR REGULATORY COMMISSION

[Docket Nos. 72-1030, 72-55, 50-280 and 50-281; NRC-2012-0085]


Independent Spent Fuel Storage Installation, Virginia Electric 
and Power Company, Surry Power Station Units 1 and 2

AGENCY: Nuclear Regulatory Commission.

ACTION: Issuance of an environmental assessment and finding of no 
significant impact.

-----------------------------------------------------------------------

FOR FURTHER INFORMATION CONTACT: Jennie Rankin, Project Manager, 
Division of Spent Fuel Storage and Transportation, Office of Nuclear 
Material Safety and Safeguards, U.S. Nuclear Regulatory Commission, 
Washington, DC 20555. Telephone: (301) 492-3268; Fax number: (301) 492-
3342; email: jennivine.rankin@nrc.gov.

SUPPLEMENTARY INFORMATION: 

I. Introduction

    The Nuclear Regulatory Commission (NRC or Commission) is 
considering issuance of a one-time exemption to Virginia Electric and 
Power Company (Dominion or licensee) pursuant to 10 CFR 72.7 from the 
requirements of 10 CFR 72.212(b)(3) and the portion of 72.212(b)(11) 
which requires compliance with the terms, conditions, and 
specifications of the CoC. Dominion submitted its exemption request by 
letter dated July 21, 2011, as supplemented September 28, 2011. 
Dominion has loaded spent nuclear fuel into Transnuclear, Inc. (TN) 
NUHOMS[supreg] HD Storage System (HD-32PTH) dry storage casks, under 
the Certificate of Compliance (CoC or Certificate) No. 1030, Amendment 
No. 0. The licensee inadvertently reversed the upper and lower zones 
while preparing the dry shielded canister (DSC) loading maps. This 
resulted in five fuel assemblies being loaded into four DSCs with decay 
heat greater than the levels specified in the CoC. Dominion requests a 
one-time exemption to the 10 CFR Part 72 requirements to continue 
storage of the affected DSCs with serial numbers DOM-32PTH-001-C, -002-
C, -003-C, and -009-C in their current condition at the Independent 
Spent Fuel Storage Installation (ISFSI) associated with the operation 
of Dominion's nuclear power reactors, Surry Power Station Units 1 and 
2, located in Surry County, Virginia.

II. Environmental Assessment (EA)

    Identification of Proposed Action: The CoC is the NRC approved 
design for each dry storage cask system. The proposed action would 
grant Dominion a one-time exemption from the requirements of 10 CFR 
72.212(b)(3) and from the portion of 72.212(b)(11) that states the 
licensee shall comply with the terms, conditions, and specifications of 
the CoC, to the extent necessary to enable Dominion to continue storage 
of the four DSCs in their current condition at the ISFSI associated 
with Surry Power Station Units 1 and 2. These regulations specifically 
require storage of spent nuclear fuel under a general license in dry 
storage casks approved under the provisions of 10 CFR part 72, and 
compliance with the terms and conditions set forth in the CoC for each 
dry spent fuel storage cask used by an ISFSI general licensee.
    The TN NUHOMS[supreg] HD dry cask storage system CoC provides 
requirements, conditions and operating limits in Attachment A, 
Technical Specifications (TS). The TS restrict the decay heat in lower 
Zone ``1a'' locations to <= 1.05 kW and the upper Zone ``1b'' locations to <= 0.8 kW. The applicant inadvertently reversed the upper and lower zones while preparing the DSC loading maps. This resulted in five fuel assemblies being loaded into four DSCs (serial numbers DOM-32PTH-001-C, -002-C, -003-C, and -009-C) with decay heat greater than specified in the CoC. The maximum decay heat of the misloaded fuel assemblies at the time of loading was 0.806 kW, which exceeded the Zone ``1b'' limit mentioned above by six watts. Currently, the five affected fuel assemblies have been in storage for a minimum of 2.5 years and have decayed to meet the required decay heat limits of the CoC. The proposed action would grant Dominion a one-time exemption from the requirements of 10 CFR 72.212(b)(3) and the portion of 72.212(b)(11) which requires compliance with the terms, conditions, and specifications of a CoC, in order to allow continued storage of the four affected DSCs in their current condition. This exemption approval is only valid for DSCs with serial numbers DOM-32PTH-001-C, -002-C, - 003-C, and -009-C, at the Surry Power Station ISFSI. Need for the Proposed Action: Dominion requested this exemption in order to continue storage of four as-loaded DSCs containing five fuel assemblies which exceeded the CoC decay heat limits at the time of loading. Dominion, with the assistance of TN, has provided an evaluation and thermal analysis which shows that the affected DSCs remain bounded by the system's design basis limits and that the 
continued storage of the fuel in the as-loaded configuration is safe.
    Dominion has considered an alternative to the proposed action, 
which would correct the condition by reloading the affected DSCs to be 
in compliance with CoC No. 1030. This would involve retrieving each of 
the DSCs from their Horizontal Storage Modules (HSM), unloading the 
spent fuel assemblies from the DSC, performing inspections of various 
DSC components, reloading the spent fuel assemblies into the used DSC 
or a new DSC (if there was damage noted on the used DSC) in accordance 
with CoC No. 1030, performing the DSC closing procedures, and 
transferring the DSC back to the ISFSI for re-insertion into the HSM.
    Dominion estimates this alternative action of loading and unloading 
operations would increase personnel exposures by 250 mRem per affected 
DSC. In addition, Dominion states the alternative to the proposed 
action would generate radioactive contaminated

[[Page 20441]]

material and waste during loading and unloading operations and disposal 
of the used DSCs if the DSCs were damaged during the unloading process. 
The licensee estimates the alternative to the proposed action would 
cost an estimated $300,000 for unloading and reloading operations of 
each affected DSC and also necessitate additional fuel handling 
operations. If the DSC was damaged during unloading, the licensee 
estimates an additional $1,000,000 for purchase of a new DSC and 
$200,000 for disposal of the used DSC.
    The proposed action is necessary to document the acceptability and 
safety basis for storage of the DSCs in the as-loaded configuration, 
thus precluding the need to unload the four DSCs.
    Environmental Impacts of the Proposed Action: The NRC staff has 
determined that the proposed action would not endanger life or 
property. The potential impact of using the NUHOMS[supreg] HD dry cask 
storage system was initially presented in the Environmental Assessment 
(EA) for the rulemaking to add the TN NUHOMS[supreg] HD Horizontal 
Modular Storage System for Irradiated Nuclear Fuel to the list of 
approved spent fuel storage casks in 10 CFR 72.214 (71 FR 25740, dated 
May 2, 2006 (Direct Final Rule), and 71 FR 71463, dated December 11, 
2006 (Final Rule)).
    The licensee submitted TN Calculation No. 10494-174, which 
performed bounding thermal analysis using ANSYS finite element software 
to evaluate the misloading events. The licensee concluded the maximum 
fuel cladding temperature for the as loaded DSCs remained below the 
fuel cladding temperature limit used in the Updated Safety Analysis 
Report dated October 2, 2009. The NRC staff performed an independent 
safety evaluation of the proposed exemption and determined that loading 
of the spent nuclear fuel with higher than allowable decay heat loads 
did not exceed the structural and shielding design basis and that the 
fuel cladding temperatures are below the temperature limit at the time 
of loading. The fuel assemblies have since decayed to meet the CoC 
limits. There are no changes being made in the types or amounts of any 
radiological effluents that may be released offsite, and there is no 
significant increase in occupational or public radiation exposure as a 
result of the proposed activities. Therefore, there are no significant 
radiological environmental impacts associated with the proposed action. 
The proposed action only affects the requirements associated with the 
fuel assemblies already loaded into the casks and does not affect non-
radiological plant effluents, or any other aspects of the environment. 
Therefore, there are no significant non-radiological impacts associated 
with the proposed action.
    Accordingly, the Commission concludes that there are no significant 
environmental impacts associated with the proposed action.
    Alternative to the Proposed Action: Because there is no significant 
environmental impact associated with the proposed action, alternatives 
with equal or greater environmental impact were not evaluated. As an 
alternative to the proposed action, the NRC staff considered denial of 
the proposed action which would involve reloading the affected DSCs as 
described previously. Denial of the exemption would result in an 
increase in radiological exposure to workers, a small potential for 
radioactive releases to the environment due to radioactive material 
handling, additional opportunities for accidents, and increased cost to 
the licensee. Therefore, the NRC staff has determined that approving 
the proposed action has a lesser environmental impact than denying the 
proposed action.
    Agencies and Persons Consulted: The environmental assessment 
associated with this exemption request was sent to Ms. Ellie Irons of 
the Virginia Department of Environmental Quality in the Office of 
Environmental Impact Review, by letter dated November 14, 2011 
(ML113180499). The state response was received by letter dated December 
14, 2011 (ML120030312). The letter states that the proposed action is 
unlikely to have significant effects on ambient air quality, historic 
resources, surface waters, and wetlands. The letter also states that it 
is unlikely to adversely affect species of plants or insects listed by 
state agencies as rare, threatened, or endangered. Furthermore, the 
Virginia Department of Health considered the alternative to the 
proposed action of reloading the casks presents several risks, namely 
additional radiation exposure to workers and potential accidents that 
may lead to dispersal of radiation to the environment. Thus, the 
Virginia Department of Health states that it supports the exemption 
without reservation. The NRC staff has determined that a consultation 
under Section 7 of the Endangered Species Act is not required because 
the proposed action will not affect listed species or a critical 
habitat. The NRC staff has also determined that the proposed action is 
not a type of activity having the potential to cause effects on 
historic properties. Therefore, no consultation is required under 
Section 106 of the National Historic Preservation Act.

III. Finding of No Significant Impact

    The environmental impacts of the proposed action have been reviewed 
in accordance with the requirements set forth in 10 CFR part 51. Based 
upon the foregoing Environmental Assessment, the Commission finds that 
the proposed action of granting the one-time exemption from the 
requirements of 10 CFR 72.212(b)(3) and the portion of 72.212(b)(11) 
which requires compliance with the terms, conditions, and 
specifications of the CoC in order to allow Dominion to store spent 
fuel assemblies in DSCs with serial numbers DOM-32PTH-001-C, -002-C, -
003-C, and -009-C in the as-loaded configuration at the ISFSI 
associated with Surry Power Station Units 1 and 2, will not 
significantly impact the quality of the human environment. Accordingly, 
the Commission has determined that an environmental impact statement 
for the proposed exemption is not warranted and that a finding of no 
significant impact is appropriate.

IV. Further Information

    In accordance with 10 CFR 2.390 of NRC's ``Rules of Practice,'' final NRC records and documents regarding this proposed action are publicly available in the records component of NRC's Agencywide 
Documents Access and Management System (ADAMS). The request for 
exemption dated July 21, 2011 (ML11208B629), as supplemented September 
28, 2011 (ML11286A115), was docketed under 10 CFR part 50, Docket Nos. 
50-280 and 50-281, and under 10 CFR 72, Docket No. 72-55. These 
documents may be inspected at NRC's Public Electronic Reading Room at http://www.nrc.gov/reading-rm/adams.html. 
These documents may also be viewed electronically on the public computers 
located at the NRC's Public Document Room (PDR), O1F21, One White Flint 
North, 11555 Rockville Pike, Rockville, MD 20852. The PDR reproduction 
contractor will copy documents for a fee. Persons who do not have access 
to ADAMS, or who encounter problems in accessing the documents located 
in ADAMS, should contact the NRC PDR Reference staff by telephone at 
1-800-397-4209, or (301) 415-4737, or by email to pdr@nrc.gov.

    Dated at Rockville, Maryland, this 26th day of March, 2012.


[[Page 20442]]


    For the Nuclear Regulatory Commission.
Jennie Rankin,
Project Manager, Licensing Branch, Division of Spent Fuel Storage and 
Transportation, Office of Nuclear Material Safety and Safeguards.
[FR Doc. 2012-8111 Filed 4-3-12; 8:45 am]
BILLING CODE 7590-01-P


Public Intelligence – Meet Catalyst: IARPA’s Entity and Relationship Extraction Program

https://publicintelligence.net/wp-content/uploads/2012/04/dni-entityextraction.png

 

A slide from a presentation by the Chief Information Officer of the Office of the Director of National Intelligence depicts examples of “entity extraction” and “relationship extraction” from a piece of intelligence.

 

Public Intelligence

The Office of the Director of National Intelligence (ODNI) is building a computer system capable of automatically analyzing the massive quantities of data gathered across the entire intelligence community and extracting information on specific entities and their relationships to one another.  The system which is called Catalyst is part of a larger effort by ODNI to create software and computer systems capable of knowledge management, entity extraction and semantic integration, enabling greater analysis and understanding of complex, multi-source intelligence throughout the government.

The intelligence community has been working for years to develop software and analytical frameworks capable of large-scale data analysis and extraction. Technological advances have now made it possible for spy agencies to not just capture the incredible amount of data flowing through public and private networks around the world, but to parse, contextualize and understand the intelligence that is being gathered.  Automated software programs are now capable of integrating data into semantic systems, providing context and meaning to names, dates, photographs and practically any kind of data you can imagine.

Many agencies within the intelligence community have already created systems to do this sort of semantic integration.  The Office of Naval Intelligence uses a system called AETHER “to correlate seemingly disparate entities and relationships, to identify networks of interest, and to detect patterns.”  The NSA runs a program called APSTARS that provides “semantic integration of data from multiple sources in support of intelligence processing.”  The CIA has a program called Quantum Leap that is designed to “find non-obvious linkages, new connections, and new information” from within a dataset. Several similar programs were even initiated by ODNI including BLACKBOOK and the Large Scale Internet Exploitation Project (LSIE).

Catalyst is an attempt to create a unified system capable of automatically extracting complex information on entities as well as the relationships between them while contextualizing this information within semantic systems.  According to its specifications, Catalyst will be capable of creating detailed histories of people, places and things while mapping the interrelations that detail those entities’ interactions with the world around them. A study conducted by IARPA states that Catalyst is designed to incorporate data from across the entire intelligence community, creating a centralized repository of available information gathered from all agencies:

Many IC organizations have recognized this problem and have programs to extract information from the resources, store it in an appropriate form, integrate the information on each person, organization, place, event, etc. in one data structure, and provide query and analysis tools that run over this data. Whereas this is a significant step forward for an organization, no organization is looking at integration across the entire IC. The DNI has the charter to integrate information from all organizations across the IC; this is what Catalyst is designed to do with entity data. The promise of Catalyst is to provide, within the security constraints on the data, access to “all that is known” within the IC on a person, organization, place, event, or other entity. Not what the CIA knows, then what DIA knows, and then what NSA knows, etc., and put the burden on the analyst to pull it all together, but have Catalyst pull it all together so that analysts can see what CIA, DIA, NSA, etc. all know at once. The value to the intelligence mission, should Catalyst succeed, is nothing less than a significant improvement in the analysis capability of the entire IC, to the benefit of the national security of the US.

To fully grasp the capabilities of such a system, it is important to understand the concepts of “semantic integration” and “entity extraction” that Catalyst will perform.  Using an example described in the IARPA study, we will follow data through the stages of processing in a Catalyst system:

For example, some free text may include “… Joe Smith is a 6’11″ basketball player who plays for the Los Angeles Lakers…” from which the string “Joe Smith ” may be delineated as an entity of class Athlete (a subclass of People) having property Name with value JoeSmith and Height with value 6’11″ (more on this example below). Note that it is important to distinguish between an entity and the name of the entity, for an entity can have multiple names (JoeSmith, JosephSmith, JosephQSmith, etc.).

Once entities and their associated relationship values are determined, the information is then integrated into a knowledge base to produce a semantic graph:

To continue the example, one entry in the knowledge base is the entity of class Athlete with (datatype property) Name having value JoeSmith, another is the entity of class SportsFranchise with Name having value Lakers, and another is an entity of class City having value LosAngeles. If each of these is viewed as a node in a graph, then an edge connecting the node (entity) with Name JoeSmith to the node with Name Lakers is named MemberOf and the edge connecting the node with Name Lakers to the node with Name LosAngeles is named LocatedIn. Such edges, corresponding to relationships (object properties) and have a direction; for example, JoeSmith is a MemberOf the Lakers, but the Lakers are not a MemberOf JoeSmith (there may be an inverse relationship, such as HasMember, that is between the Lakers and JoeSmith.).

Data that has been extracted and integrated can then produce patterns that determine unknown relations between an entity and other entities that may be of concern to a particular intelligence agency:

Another simple pattern could be: JoeSmith Owns Automobile, or Person Owns an instance of the class Automobile with Manufacturer Lexus and LicensePlate VA-123456 or even JoeSmith has-unknown-relationship-with an instance of the class Automobile with Manufacturer Lexus and LicensePlate VA-123456. In these last three examples, one of the entities or the relationship is uninstantiated. Note that JoeSmith Owns an instance of the class Automobile with Manufacturer Lexus and LicensePlate VA-123456 is not a pattern, for it has no uninstantiated entities or relationships. A more complex pattern could be: Person Owns Automobile ParticipatedIn Crime HasUnknownRelationshipWith Organization HasAffiliationWith TerroristOrganization. Any one or more of the entities and the has-unknown-relationship-with relationship (but not all) can be instantiated and it would still be a pattern, such as JoeSmith Owns Automobile ParticipatedIn Crime PerpetratedBy Organization HasAffiliationWith HAMAS.

While this example only provides a limited view of Catalyst functionality, it nonetheless helps to demonstrate the potential capabilities of the system.  Far more detailed explanations of the system, as well as a useful overview of similar government systems across the intelligence community, are provided in IARPA’s one-hundred and twenty-two page study.

 

YOU CAN SEE THE STUDY HERE

Meet Catalyst: IARPA’s Entity and Relationship Extraction Program

TOP-SECRET – Chinese Cyberstasi Capabilities for Computer Network Operations and Cyber Espionage

https://publicintelligence.net/wp-content/uploads/2012/03/USCC-ChinaCyberEspionage.png

The PLA’s sustained modernization effort over the past two decades has driven remarkable transformation within the force and put the creation of modern command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) infrastructure at the heart of the PLA’s strategic guidelines for long term development. This priority on C4ISR systems modernization, has in turn been a catalyst for the development of an integrated information warfare (IW) capability capable of defending military and civilian networks while seizing control of an adversary’s information systems during a conflict.

Information Warfare Strategy

PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground, occupying which has become just as important for controlling the battlespace as its geographic equivalent in the physical domain.

The PLA has not publicly disclosed the existence of a computer network operations strategy distinct from other components of IW, such as electronic warfare, psychological operations, kinetic strike, and deception, but rather appears to be working toward the integration of CNO with these components in a unified framework broadly known as “information confrontation.” This concept, as discussed by the PLA, seeks to integrate all elements of information warfare—electronic and non-electronic—offensive and defensive under a single command authority.

Earlier in the past decade, the PLA adopted a multi-layered approach to offensive information warfare that it calls Integrated Network Electronic Warfare or INEW strategy. Now, the PLA is moving toward information confrontation as a broader conceptualization that seeks to unite the various components of IW under a single warfare commander. The need to coordinate offensive and defensive missions more closely and ensure these missions are mutually supporting is driven by the recognition that IW must be closely integrated with PLA campaign objectives. The creation of what a probable information assurance command in the General Staff Department bureaucracy suggests that the PLA is possibly creating a more centralized command authority for IW that will possibly be responsible for coordinating at least network defense throughout the PLA.

As Chinese capabilities in joint operations and IW strengthen, the ability to employ them effectively as either deterrence tools or true offensive weapons capable of degrading the military capabilities of technologically advanced nations or hold these nations’ critical infrastructure at risk in ways heretofore not possible for China will present U.S. leaders and the leaders of allied nations with a more complex risk calculus when evaluating decisions to intervene in Chinese initiated conflicts such as aggression against Taiwan or other nations in the Western Pacific region.

Chinese Use of Network Warfare Against the United States

Chinese capabilities in computer network operations have advanced sufficiently to pose genuine risk to U.S. military operations in the event of a conflict. A defense of Taiwan against mainland aggression is the one contingency in the western Pacific Ocean in which success for the United States hinges upon the speed of its response and the ability of the military to arrive on station with sufficient force to defend Taiwan adequately. PLA analysts consistently identify logistics and C4ISR infrastructure as U.S. strategic centers of gravity suggesting that PLA commanders will almost certainly attempt to target these system with both electronic countermeasures weapons and network attack and exploitation tools, likely in advance of actual combat to delay U.S. entry or degrade capabilities in a conflict.

The effects of preemptive penetrations may not be readily observable or detected until after combat has begun or after Chinese computer network attack (CNA) teams have executed their tools against targeted networks. Even if circumstantial evidence points to China as the culprit, no policy currently exists to easily determine appropriate response options to a large scale attack on U.S. military or civilian networks in which definitive attribution is lacking. Beijing, understanding this, may seek to exploit this gray area in U.S. policymaking and legal frameworks to create delays in U.S. command decision making.

Key Entities and Institutions Supporting Chinese Computer Network Operations

The decision to employ computer network operations and INEW capabilities rests with the senior political and military leadership and would be part of a larger issue of employing force during a crisis. Once that decision was made, however, the operational control for the military use of CNO rests with the PLA’s Third and Fourth Departments of the General Staff Department (GSD). The Third Department (3PLA), China’s primary signals intelligence collector is likely tasked with the network defense and possibly exploitation missions. The Fourth Department (4PLA), the traditional electronic warfare arm of the PLA, likely has the responsibility for conducting network attack missions.

The PRC government actively funds grant programs to support CNO related research in both offensive and defensive in orientation at commercial IT companies and civilian and military universities. A review of PRC university technical programs, curricula, research foci, and funding for research and development in areas contributing to information warfare capabilities illustrates the breadth and complexity of the relationships between the universities, government and military organizations, and commercial high-tech industries countrywide.

YOU CAN DOWNLOAD THE FULL REPORT HERE

USCC-ChinaCyberEspionage

Secret from the FBI – Three New Jersey Men Plead Guilty to Stealing $1.4 Million from New York-Based Defense Contractor

TRENTON—A former insurance agent for a New York-based defense contractor and his two friends today admitted stealing $1.4 million from the company, U.S. Attorney Paul J. Fishman announced.

Daniel Tumminia, 49, of Millstone, New Jersey; Michael Feuer, 47, of Freehold, New Jersey; and Dennis Mannarino, 45, of Manalapan, New Jersey, pleaded guilty before U.S. District Judge Joel A. Pisano in Trenton federal court to informations charging them with conspiracy to commit wire fraud.

According to documents filed in this case and statements made in court:

Fastener Dimensions (“Fastener”) was a New York-based manufacturer and distributor of aircraft, aerospace, and military components and hardware. Tumminia was an insurance agent for Massachusetts Mutual Life Insurance Co. (“MassMutual”) who represented Fastener and its president as an agent for MassMutual, handling all pension and profit sharing accounts and life insurance policies for Fastener’s employees.

From July 2004 through August 2010, Tumminia and his two friends—Feuer, a practicing attorney from 1990 through 2001 and the owner of Cypress Lawn Care, a landscaping company in New Jersey; and Mannarino, the owner of J&D Italian Specialty Meats, delicatessens located in New Jersey and New York—enriched themselves by diverting life insurance premium payments and pension and profit sharing checks belonging to Fastener’s employees into bank accounts that they controlled. In April 2008, Feuer incorporated and listed himself as the registered agent and officer of MassMutual Contracting Corp., a limited liability company that never performed any services for Fastener or any other clients, but was created by Feuer and Tumminia solely to falsely represent to Fastener that it was the real MassMutual. Feuer and Tumminia deposited $574,279 from Fastener into the MassMutual Contracting Corp. bank account.

Tumminia, Feuer, and Mannarino conducted 133 transactions, including interstate wire transfers, totaling $1,437,542 in deposits into bank accounts that they controlled. They then used the diverted funds for personal expenditures, including ATM cash withdrawals in New Jersey, rent, cable, utility, and grocery bills.

As part of their guilty pleas, Tumminia, Feuer, and Mannarino have agreed to make full restitution for all losses resulting from their crimes to the employees of Fastener Dimensions. Tumminia has agreed to forfeit $1,198,278 to the United States. Feuer has agreed to forfeit $115,963 and Mannarino has agreed to forfeit $10,000.

The conspiracy to commit wire fraud charges carry a maximum potential penalty of 20 years in prison and a $250,000 fine or twice the pecuniary gain or loss resulting from the conspiracy. The sentencings are scheduled for July 9, 2012.

U.S. Attorney Fishman credited special agents of the FBI working out of the Red Bank resident agency, under the direction of Special Agent in Charge Michael B. Ward, for the investigation leading to today’s guilty pleas.

The government is represented by Assistant U.S. Attorney Aaron Mendelsohn of the U.S. Attorney’s Office Economic Crimes Unit in Newark.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force. President Obama established the interagency Financial Fraud Enforcement Task Force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes.

Uncensored – Full Movie – Hitler’s Warriors – Manstein The Strategist

“I believed, I erred” – the belated regret by Hitler’s field marshal Keitel before the Nuremberg Tribunal stood out as a lone exception in facing the atrocities of the German military. Most of the high-ranking officers who aided the dictator in his war of aggression pleaded that they were obeying orders and denied any personal guilt. In post-war Germany, where there was an atmosphere of repression rather than inquiry, they contrived the myth of a “clean” military which supposedly was neither involved in the mass murders of the regime nor was aware of them. In fact, many aristocrats in the military regarded the Nazi-Ideology with reserve, but their resistance, also in clear sight of the horrendous crimes carried out by the regime, was confined to a small circle. No active field marshal rose to support the men of the failed assassination attempt of July 20, 1944. Erich von Manstein, for instance, categorically declined the recruiting efforts of the conspirators with the words: “German field marshals do not mutiny”.Profiling these men, the series asks why it all happened. Rommel, Keitel, Paulus, Udet, Canaris and Manstein – six careers caught in the tangle between obedience and crime. What led all these officers to put their military talents at the service of a murderous dictator? To what depth was their involvement in Hitler´s crimes? To what limits did their obedience lead them?

Cryptome unveils – Coast Guard Security for Republican Convention

[Federal Register Volume 77, Number 64 (Tuesday, April 3, 2012)]
[Proposed Rules]
[Pages 19970-19975]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2012-7921]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

Coast Guard

33 CFR Part 165

[Docket No. USCG-2011-0922]
RIN 1625-AA87


Security Zones; 2012 Republican National Convention, Captain of 
the Port St. Petersburg Zone, Tampa, FL

AGENCY: Coast Guard, DHS.

ACTION: Notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: The Coast Guard proposes to establish seven temporary security 
zones on the waters and adjacent land 20 feet shoreward of the mean 
high water marks of Garrison Channel, Hillsborough River, Seddon 
Channel, Sparkman Channel, the unnamed channel north of Davis Islands, 
Ybor Channel, and Ybor Turning Basin in the vicinity of Tampa, Florida 
during the 2012 Republican National Convention. The 2012 Republican 
National Convention will be held at the Tampa Bay Times Forum building 
and other venues from August 27, 2012 through August 31, 2012. The 
Department of Homeland Security has designated the 2012 Republican 
National Convention as a National Special Security Event. The security 
zones are necessary to protect convention delegates, official parties, 
dignitaries, the public, and surrounding waterways from terrorist acts, 
sabotage or other subversive acts, accidents, or other causes of a 
similar nature.

DATES: Comments and related material must be received by the Coast 
Guard on or before June 4, 2012. Requests for public meetings must be 
received by the Coast Guard on or before May 3, 2012.

ADDRESSES: You may submit comments identified by docket number USCG-
2011-0922 using any of the following methods:
    (1) Federal eRulemaking Portal: http://www.regulations.gov.
    (2) Fax: (202) 493-2251.
    (3) Mail: Docket Management Facility (M-30), U.S. Department of 
Transportation, West Building Ground Floor, Room W12-140, 1200 New 
Jersey Avenue SE., Washington, DC 20590-0001.
    (4) Hand delivery: Same as mail address above, between 9 a.m. and 5 
p.m., Monday through Friday, except Federal holidays. The telephone 
number is (202) 366-9329.
    To avoid duplication, please use only one of these four methods. 
See the ``Public Participation and Request for

[[Page 19971]]

Comments'' portion of the SUPPLEMENTARY INFORMATION section below for 
instructions on submitting comments.

FOR FURTHER INFORMATION CONTACT: If you have questions on this proposed 
rule, call or email Marine Science Technician First Class Nolan L. 
Ammons, Sector St. Petersburg Prevention Department, Coast Guard; 
telephone (813) 228-2191, email D07-SMB-Tampa-WWM@uscg.mil. If you have 
questions on viewing or submitting material to the docket, call Renee 
V. Wright, Program Manager, Docket Operations, telephone (202) 366-
9826.

SUPPLEMENTARY INFORMATION:

Public Participation and Request for Comments

    We encourage members of the public and others who are interested in 
or affected by this proposal to participate in this rulemaking by 
submitting comments and related materials. All comments received will 
be posted without change to http://www.regulations.gov and will include 
any personal information you have provided.

Submitting Comments

    If you submit a comment, please include the docket number for this 
rulemaking (USCG-2011-0922), indicate the specific section of this 
document to which each comment applies, and provide a reason for each 
suggestion or recommendation. You may submit your comments and material 
online (via http://www.regulations.gov) or by fax, mail, or hand 
delivery, but please use only one of these means. If you submit a 
comment online via www.regulations.gov, it will be considered received 
by the Coast Guard when you successfully transmit the comment. If you 
fax, hand deliver, or mail your comment, it will be considered as 
having been received by the Coast Guard when it is received at the 
Docket Management Facility. We recommend that you include your name and 
a mailing address, an email address, or a telephone number in the body 
of your document so that we can contact you if we have questions 
regarding your submission.
    To submit comments online, go to http://www.regulations.gov, click 
on the ``submit a comment'' box, which will then become highlighted in 
blue. In the ``Document Type'' drop down menu select ``Proposed Rule'' 
and insert ``USCG-2011-0922'' in the ``Keyword'' box. Click ``Search'' 
then click on the balloon shape in the ``Actions'' column. Comments 
submitted by mail or hand delivery must be in an unbound format, no 
larger than 8\1/2\ by 11 inches, suitable for copying and electronic 
filing. If you submit comments by mail and would like to know that they 
reached the Facility, please enclose a stamped, self-addressed postcard 
or envelope. We will consider all comments and material received during 
the comment period and may change the rule based on your comments.

Viewing Comments and Documents

    To view comments, as well as documents mentioned in this preamble 
as being available in the docket, go to http://www.regulations.gov, 
click on the ``read comments'' box, which will then become highlighted 
in blue. In the ``Keyword'' box insert ``USCG-2011-0922'' and click 
``Search.'' Click the ``Open Docket Folder'' in the ``Actions'' column. 
You may also visit the Docket Management Facility in Room W12-140 on 
the ground floor of the Department of Transportation West Building, 
1200 New Jersey Avenue SE., Washington, DC 20590, between 9 a.m. and 5 
p.m., Monday through Friday, except Federal holidays. The Coast Guard 
has an agreement with the Department of Transportation to use the 
Docket Management Facility.

Privacy Act

    Anyone can search the electronic form of comments received into any 
of our dockets by the name of the individual submitting the comment (or 
signing the comment, if submitted on behalf of an association, 
business, labor union, etc.). You may review a Privacy Act notice 
regarding our public dockets in the January 17, 2008, issue of the 
Federal Register (73 FR 3316).

Public Meeting

    We do not anticipate convening public meetings regarding this 
proposal. You may, however, submit a request for a public meeting on or 
before May 3, 2012 using one of the four methods specified under 
ADDRESSES. Please explain why you believe a public meeting would be 
beneficial. If we determine that a public meeting would aid this 
rulemaking, a meeting will be convened at a time and place announced in 
a subsequent notice in the Federal Register.

Basis and Purpose

    The legal basis for the proposed rule is the Coast Guard's 
authority to establish regulated navigation areas and other limited 
access areas: 33 U.S.C. 1226, 1231; 46 U.S.C. Chapter 701, 3306, 3703; 
50 U.S.C. 191, 195; 33 CFR 1.05-1, 6.04-1, 6.04-6, 160.5; Pub. L. 107-
295, 116 Stat. 2064; Department of Homeland Security Delegation No. 
0170.1.
    The purpose of this proposed rule is to provide for the safety and 
security of convention delegates official parties, dignitaries, and the 
public during the 2012 Republican National Convention.

Discussion of Proposed Rule

    From August 27, 2012 through August 30, 2012, the 2012 Republican 
National Convention will be held in Tampa, Florida. Primary venues for 
the 2012 Republican National Convention are the Tampa Bay Times Forum 
building and the Tampa Convention Center, both of which are located 
adjacent or proximate to Garrison Channel, Hillsborough River, Seddon 
Channel, Sparkman Channel, the unnamed channel north of Davis Islands, 
Ybor Channel, and Ybor Turning Basin in Tampa, Florida. Secondary 
venues and venues hosting convention-related activities will take place 
in other locations throughout Tampa, Florida on or in close proximity 
to navigable waters.
    The Secretary of the Department of Homeland Security has designated 
the 2012 Republican National Convention as a National Special Security 
Event. National Special Security Events are significant events, which, 
due to their political, economic, social, or religious significance, 
may render them particularly attractive targets of terrorism or other 
criminal activity. The Federal government provides support, assistance, 
and resources to state and local governments to ensure public safety 
and security during National Special Security Events.
    The Coast Guard has conducted threat, vulnerability, and risk 
analyses relating to the maritime transportation system and 2012 
Republican National Convention activities. Threats confronting the 2012 
Republican National Convention assume two primary forms: homeland 
security threats and violent or disruptive public disorder. The 2012 
Republican National Convention is expected to draw widespread protests 
by persons dissatisfied with national and foreign policy and the 
Republican Party agenda. This politically-oriented event has the 
potential to attract anarchists and others intent on expressing their 
opposition through violence and criminal activity. The 2012 Republican 
National Convention also presents an attractive target for terrorist 
and extremist organizations.
    Considerable law enforcement on land may render maritime approaches 
an attractive alternative. Tampa has

[[Page 19972]]

significant critical infrastructure in its port area, which is 
proximate to the downtown area and the Convention's main venues. The 
Port of Tampa is an industrial-based port, with significant storage and 
shipment of hazardous materials.
    The Department of Homeland Security Small Vessel Security Strategy 
sets forth several threat scenarios that must be mitigated in the 
maritime security planning for the 2012 Republican Convention. These 
threats include the potential use of a small vessel to: (1) Deliver a 
weapon of mass destruction; (2) launch a stand-off attack weapon; or 
(3) deliver an armed assault force. 2012 Republican National Convention 
maritime security planning anticipates these threats, while minimizing 
the public impact of security operations.
    The proposed security zones and accompanying security measures have 
been specifically developed to mitigate the threats and vulnerabilities 
identified in the analysis set forth above. Security measures have been 
limited to the minimum necessary to mitigate risks associated with the 
identified threats. The Coast Guard considered establishing a waterside 
demonstration area. However, due to the proximity of the main venue 
area, the geography of the area in question, the associated threats to 
the convention, and the potential to interfere with law enforcement and 
security operations, the Coast Guard determined that establishing such 
an area would not be feasible. The Coast Guard expects ample landside 
demonstration areas to be available.
    The Coast Guard, on behalf of the 2012 Republican National 
Convention Public Safety Committee, has initiated an outreach program 
to inform maritime stakeholders within Tampa of potential disruptions 
to normal maritime activities during the convention. On January 27, 
2012, outreach efforts to the local community began with a presentation 
to the Tampa Bay Harbor Safety and Security Committee. Additional 
meetings were held with businesses that operate in the vicinity of the 
main venue. On February 1, 2012 and February 29, 2012, public meetings 
were held. At each of these meetings, the Coast Guard presented: (1) 
General information on National Special Security Events; (2) an 
overview of the 2012 Republican National Convention; (3) a description 
of the organization of the public safety committee and subcommittees 
established for the convention; (4) a brief discussion of the proposed 
security zones, along with likely limitations on vessel movements and 
enhanced security measures; and (5) the threat, vulnerability and risk 
analysis of the convention from a maritime perspective.
    Responses to information presented by the Coast Guard were 
generally positive and supportive. The majority of questions were 
requests for additional details, such as exactly when the security zone 
would be in effect and what size vessels will be allowed to transit the 
zone or use the docks in the primary venue area. Several people asked 
questions seeking to clarify the restrictions, such as whether boat 
owners would be able to access their vessels, or whether commercial 
traffic would be allowed to operate in Sparkman Channel. There were two 
questions concerning the sufficiency of planned security measures on 
the south and east sides of Harbour Island.
    The Coast Guard responded to all inquiries by stating that the 
details of the security zones were still under development and were 
subject to change. At each meeting, the Coast Guard reminded attendees 
to review the notice of proposed rulemaking when it is published in the 
Federal Register, and encouraged attendees to submit comments to the 
docket if they had concerns or questions.
    The proposed rule would establish seven temporary security zones in 
the Captain of the Port St. Petersburg Zone during the 2012 Republican 
National Convention in Tampa, Florida. The security zones would be 
enforced from 12:01 p.m. on August 25, 2012 through 11:59 a.m. on 
August 31, 2012. The security zones are listed below. All coordinates 
are North American Datum 1983.
    (1) Garrison Channel. All waters of Garrison Channel, including 
adjacent land 20 feet shoreward of the mean high water mark of Garrison 
Channel. All persons and vessels would be prohibited from entering or 
transiting the security zone unless authorized by the Captain of the 
Port St. Petersburg or a designated representative. Vessels with 
permanent moorings in the security zone would not be permitted to move 
during the enforcement period. Vessels remaining in the security zone 
during the enforcement period would be subject to inspection and 
examination by Coast Guard and other law enforcement officials. Persons 
desiring to access their vessels within the security zone would be 
subject to security screenings.
    (2) Hillsborough River. All waters of Hillsborough River, including 
adjacent land 20 feet shoreward of the mean high water mark of 
Hillsborough River, south of an imaginary line between the following 
points: Point 1 in position 27[deg]56'44'' N, 82[deg]27'37'' W; and 
Point 2 in position 27[deg]56'44'' N, 82[deg]27'33'' W. All persons and 
vessels would be prohibited from entering or remaining within the 
security zone unless authorized by the Captain of the Port St. 
Petersburg or a designated representative.
    (3) Seddon Channel. All waters of Seddon Channel, including 
adjacent land 20 feet shoreward of the mean high water mark of Seddon 
Channel, north of an imaginary line between the following points: Point 
1 in position 27[deg]55'52'' N, 82[deg]27'13'' W; and Point 2 in 
position 27[deg]55'54'' N, 82[deg]27'08'' W. All persons and vessels 
would be prohibited from entering or remaining within the security zone 
unless authorized by the Captain of the Port St. Petersburg or a 
designated representative.
    (4) Sparkman Channel. All waters of Sparkman Channel, including 
adjacent land 20 feet shoreward of the mean high water mark of Sparkman 
Channel, north of an imaginary line between the following points: Point 
1 in position 27[deg]55'51'' N, 82[deg]26'54'' W; and Point 2 in 
position 27[deg]55'50'' N, 82[deg]26'45'' W. Recreational vessels would 
be prohibited from entering or remaining in Sparkman Channel unless 
authorized by the Captain of the Port St. Petersburg or a designated 
representative. Commercial vessels would be authorized to enter or 
transit Sparkman Channel, subject to compliance with security protocols 
established by the Captain of the Port St. Petersburg, including: (a) 
Advance notice of intent to transit; (b) inspection and examination of 
all commercial vessels and persons requesting authorization to transit 
the security zone (including positive identification checks); and (c) 
embarkation of law enforcement personnel during authorized security 
zone transits.
    (5) Unnamed Channel North of Davis Islands. All waters of the 
unnamed channel north of Davis Islands, including adjacent land 20 feet 
shoreward of the mean high water mark of the unnamed channel north of 
Davis Islands, east of an imaginary line between the following points: 
Point 1 in position 27[deg]56'16'' N, 82[deg]27'40'' W; and Point 2 in 
position 27[deg]56'18'' N, 82[deg]27'43'' W. All persons and vessels 
would be prohibited from entering or remaining within the security zone 
unless authorized by the Captain of the Port St. Petersburg or a 
designated representative.
    (6) Ybor Channel. All waters of Ybor Channel, including adjacent 
land 20 feet shoreward of the mean high water mark of Ybor Channel. 
Recreational vessels

[[Page 19973]]

would be prohibited from entering or remaining in Ybor Channel unless 
authorized by the Captain of the Port St. Petersburg or a designated 
representative. Commercial vessels would be authorized to enter or 
transit Ybor Channel, subject to compliance with security protocols 
established by the Captain of the Port St. Petersburg, including: (a) 
Advance notice of intent to transit; (b) inspection and examination of 
all commercial vessels and persons requesting authorization to transit 
the security zone (including positive identification checks); and (c) 
embarkation of law enforcement personnel during authorized security 
zone transits.
    (7) Ybor Turning Basin. All waters of Ybor Turning Basin, including 
adjacent land 20 feet shoreward of the mean high water mark of Ybor 
Turning Basin. Recreational vessels would be prohibited from entering 
or remaining in Ybor Turning Basin unless authorized by the Captain of 
the Port St. Petersburg or a designated representative. Commercial 
vessels would be authorized to enter or transit Ybor Turning Basin, 
subject to compliance with security protocols established by the 
Captain of the Port St. Petersburg, including: (a) Advance notice of 
intent to transit; (b) inspection and examination of all commercial 
vessels and persons requesting authorization to transit the security 
zone (including positive identification checks); and (c) embarkation of 
law enforcement personnel during authorized security zone transits.
    All persons and vessels desiring to enter or remain within the 
regulated areas may contact the Captain of the Port St. Petersburg by 
telephone at (727) 824-7524, or a designated representative via VHF 
radio on channel 16, to request authorization. If authorization to 
enter or remain within the regulated areas is granted by the Captain of 
the Port St. Petersburg or a designated representative, all persons and 
vessels receiving such authorization must comply with the instructions 
of the Captain of the Port St. Petersburg or a designated 
representative. Recreational vessels authorized to enter or remain 
within the regulated areas may be subject to boarding and inspection of 
the vessel and persons onboard.
    A Port Community Information Bulletin (PCIB) will be distributed by 
Coast Guard Sector St. Petersburg. The PCIB will be available on the 
Coast Guard internet web portal at http://homeport.uscg.mil. PCIBs are 
located under the Port Directory tab in the Safety and Security Alert 
links. The Coast Guard would provide notice of the security zones by 
Local Notice to Mariners, Broadcast Notice to Mariners, public 
outreach, and on-scene designated representatives.

Regulatory Analyses

    We developed this proposed rule after considering numerous statutes 
and executive orders related to rulemaking. Below we summarize our 
analyses based on 13 of these statutes or executive orders.

Regulatory Planning and Review

    Executive Orders 13563, Improving Regulation and Regulatory Review, 
and 12866, Regulatory Planning and Review, direct agencies to assess 
the costs and benefits of available regulatory alternatives and, if 
regulation is necessary, to select regulatory approaches that maximize 
net benefits (including potential economic, environmental, public 
health and safety effects, distributive impacts, and equity). Executive 
Order 13563 emphasizes the importance of quantifying both costs and 
benefits, of reducing costs, of harmonizing rules, and of promoting 
flexibility. This proposed rule has not been designated a significant 
regulatory action under section 3(f) of Executive Order 12866. 
Accordingly, the Office of Management and Budget has not reviewed this 
proposed rule under Executive Order 12866.
    The economic impact of this proposed rule is not significant for 
the following reasons: (1) The security zones would be enforced for a 
total of 144 hours; (2) the security zones would be in a location where 
commercial vessel traffic is expected to be minimal; (3) commercial 
vessel traffic would be authorized to transit the security zones to the 
extent compatible with public safety and security; (4) persons and 
vessels would be able to operate in the surrounding area adjacent to 
the security zones during the enforcement period; (5) persons and 
vessels would be able to enter or remain within the security zones if 
authorized by the Captain of the Port St. Petersburg or a designated 
representative; and (6) the Coast Guard would provide advance 
notification of the security zones to the local community by Local 
Notice to Mariners, Broadcast Notice to Mariners, and public outreach.

Small Entities

    Under the Regulatory Flexibility Act (5 U.S.C. 601-612), we have 
considered whether this proposed rule would have a significant economic 
impact on a substantial number of small entities. The term ``small 
entities'' comprises small businesses, not-for-profit organizations 
that are independently owned and operated and are not dominant in their 
fields, and governmental jurisdictions with populations of less than 
50,000.
    The Coast Guard certifies under 5 U.S.C. 605(b) that this proposed 
rule would not have a significant economic impact on a substantial 
number of small entities. This proposed rule may affect the following 
entities, some of which may be small entities: the owners or operators 
of vessels intending to enter or remain within those portions of 
Garrison Channel, Hillsborough River, Seddon Channel, Sparkman Channel, 
unnamed channel north of Davis Islands, Ybor Channel, and Ybor Turning 
Basin encompassed within the proposed security zones from 12:01 p.m. on 
August 25, 2012 through 11:59 a.m. on August 31, 2012. For the reasons 
discussed in the Regulatory Planning and Review section above, this 
proposed rule would not have a significant economic impact on a 
substantial number of small entities.
    If you think that your business, organization, or governmental 
jurisdiction qualifies as a small entity and that this proposed rule 
would have a significant economic impact on it, please submit a comment 
(see ADDRESSES) explaining why you think it qualifies and how and to 
what degree this proposed rule would economically affect it.

Assistance for Small Entities

    Under section 213(a) of the Small Business Regulatory Enforcement 
Fairness Act of 1996 (Pub. L. 104-121), we want to assist small 
entities in understanding this proposed rule so that they can better 
evaluate its effects on them and participate in the rulemaking. If the 
proposed rule would affect your small business, organization, or 
governmental jurisdiction and you have questions concerning its 
provisions or options for compliance, please contact Marine Science 
Technician First Class Nolan L. Ammons, Sector St. Petersburg 
Prevention Department, Coast Guard; telephone (813) 228-2191, email 
D07-SMB-Tampa-WWM@uscg.mil. The Coast Guard will not retaliate against 
small entities that question or complain about this proposed rule or 
any policy or action of the Coast Guard.

Collection of Information

    This proposed rule would call for no new collection of information 
under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501-3520).

[[Page 19974]]

Federalism

    A rule has implications for federalism under Executive Order 13132, 
Federalism, if it has a substantial direct effect on State or local 
governments and would either preempt State law or impose a substantial 
direct cost of compliance on them. We have analyzed this proposed rule 
under that Order and have determined that it does not have implications 
for federalism.

Unfunded Mandates Reform Act

    The Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1531-1538) 
requires Federal agencies to assess the effects of their discretionary 
regulatory actions. In particular, the Act addresses actions that may 
result in the expenditure by a State, local, or Tribal government, in 
the aggregate, or by the private sector of $100,000,000 or more in any 
one year. Though this proposed rule would not result in such an 
expenditure, we do discuss the effects of this proposed rule elsewhere 
in this preamble.

Taking of Private Property

    This proposed rule would not cause a taking of private property or 
otherwise have taking implications under Executive Order 12630, 
Governmental Actions and Interference with Constitutionally Protected 
Property Rights.

Civil Justice Reform

    This proposed rule meets applicable standards in sections 3(a) and 
3(b)(2) of Executive Order 12988, Civil Justice Reform, to minimize 
litigation, eliminate ambiguity, and reduce burden.

Protection of Children

    We have analyzed this proposed rule under Executive Order 13045, 
Protection of Children from Environmental Health Risks and Safety 
Risks. This proposed rule is not an economically significant rule and 
would not create an environmental risk to health or risk to safety that 
might disproportionately affect children.

Indian Tribal Governments

    This proposed rule does not have Tribal implications under 
Executive Order 13175, Consultation and Coordination with Indian Tribal 
Governments, because it would not have a substantial direct effect on 
one or more Indian Tribes, on the relationship between the Federal 
Government and Indian Tribes, or on the distribution of power and 
responsibilities between the Federal Government and Indian Tribes.

Energy Effects

    We have analyzed this proposed rule under Executive Order 13211, 
Actions Concerning Regulations That Significantly Affect Energy Supply, 
Distribution, or Use. We have determined that it is not a ``significant 
energy action'' under that order because it is not a ``significant 
regulatory action'' under Executive Order 12866 and is not likely to 
have a significant adverse effect on the supply, distribution, or use 
of energy. The Administrator of the Office of Information and 
Regulatory Affairs has not designated it as a significant energy 
action. Therefore, it does not require a Statement of Energy Effects 
under Executive Order 13211.

Technical Standards

    The National Technology Transfer and Advancement Act (NTTAA) (15 
U.S.C. 272 note) directs agencies to use voluntary consensus standards 
in their regulatory activities unless the agency provides Congress, 
through the Office of Management and Budget, with an explanation of why 
using these standards would be inconsistent with applicable law or 
otherwise impractical. Voluntary consensus standards are technical 
standards (e.g., specifications of materials, performance, design, or 
operation; test methods; sampling procedures; and related management 
systems practices) that are developed or adopted by voluntary consensus 
standards bodies.
    This proposed rule does not use technical standards. Therefore, we 
did not consider the use of voluntary consensus standards.

Environment

    We have analyzed this proposed rule under Department of Homeland 
Security Management Directive 023-01 and Commandant Instruction 
M16475.lD, which guide the Coast Guard in complying with the National 
Environmental Policy Act of 1969 (NEPA) (42 U.S.C. 4321-4370f), and 
have made a preliminary determination that this action is one of a 
category of actions that do not individually or cumulatively have a 
significant effect on the human environment. A preliminary 
environmental analysis checklist supporting this determination is 
available in the docket where indicated under ADDRESSES. This proposed 
rule involves establishing seven temporary security zones, as described 
in paragraph 34(g) of the Instruction that will be enforced for a total 
of 144 hours. We invite any comments or information that may lead to 
the discovery of a significant environmental impact from this proposed 
rule.

List of Subjects in 33 CFR Part 165

    Harbors, Marine safety, Navigation (water), Reporting and 
recordkeeping requirements, Security measures, Waterways.

    For the reasons discussed in the preamble, the Coast Guard proposes 
to amend 33 CFR part 165 as follows:

PART 165--REGULATED NAVIGATION AREAS AND LIMITED ACCESS AREAS

    1. The authority citation for part 165 continues to read as 
follows:

    Authority:  33 U.S.C. 1231; 46 U.S.C. Chapter 701, 3306, 3703; 
50 U.S.C. 191, 195; 33 CFR 1.05-1, 6.04-1, 6.04-6, 160.5; Pub. L. 
107-295, 116 Stat. 2064; Department of Homeland Security Delegation 
No. 0170.1.

    2. Add a temporary Sec.  165.T07-0922 to read as follows:


Sec.  165.T07-0922  Security Zones; 2012 Republican National 
Convention, Captain of the Port St. Petersburg Zone, Tampa, FL.

    (a) Regulated Areas. The following regulated areas are security 
zones. All coordinates are North American Datum 1983.
    (1) Garrison Channel. All waters of Garrison Channel, including 
adjacent land 20 feet shoreward of the mean high water mark of Garrison 
Channel. All persons and vessels are prohibited from entering or 
transiting the regulated area unless authorized by the Captain of the 
Port St. Petersburg or a designated representative. Vessels with 
permanent moorings in the regulated area are not permitted to move 
during the enforcement period. Vessels remaining in the regulated area 
during the enforcement period are subject to inspection and examination 
by Coast Guard and other law enforcement officials. Persons desiring to 
access their vessels within the regulated area are subject to security 
screenings.
    (2) Hillsborough River. All waters of Hillsborough River, including 
adjacent land 20 feet shoreward of the mean high water mark of 
Hillsborough River, south of an imaginary line between the following 
points: Point 1 in position 27[deg]56'44'' N, 82[deg]27'37'' W; and 
Point 2 in position 27[deg]56'44'' N, 82[deg]27'33'' W. All persons and 
vessels are prohibited from entering or remaining within the regulated 
area unless authorized by the Captain of the Port St. Petersburg or a 
designated representative.
    (3) Seddon Channel. All waters of Seddon Channel, including 
adjacent land 20 feet shoreward of the mean high water mark of Seddon 
Channel, north of an imaginary line between the following

[[Page 19975]]

points: Point 1 in position 27[deg]55'52'' N, 82[deg]27'13'' W; and 
Point 2 in position 27[deg]55'54'' N, 82[deg]27'08'' W. All persons and 
vessels are prohibited from entering or remaining within the regulated 
area unless authorized by the Captain of the Port St. Petersburg or a 
designated representative.
    (4) Sparkman Channel. All waters of Sparkman Channel, including 
adjacent land 20 feet shoreward of the mean high water mark of Sparkman 
Channel, north of an imaginary line between the following points: Point 
1 in position 27[deg]55'51'' N, 82[deg]26'54'' W; and Point 2 in 
position 27[deg]55'50'' N, 82[deg]26'45'' W. Recreational vessels are 
prohibited from entering or remaining in the regulated area unless 
authorized by the Captain of the Port St. Petersburg or a designated 
representative. Commercial vessels are authorized to enter or transit 
the regulated area, subject to compliance with security protocols 
established by the Captain of the Port St. Petersburg, including: (a) 
Advance notice of intent to transit; (b) inspection and examination of 
all commercial vessels and persons requesting authorization to transit 
the regulated area (including positive identification checks); and (c) 
embarkation of law enforcement personnel during authorized regulated 
area transits.
    (5) Unnamed Channel North of Davis Islands. All waters of the 
unnamed channel north of Davis Islands, including adjacent land 20 feet 
shoreward of the mean high water mark of the unnamed channel north of 
Davis Islands, east of an imaginary line between the following points: 
Point 1 in position 27[deg]56'16'' N, 82[deg]27'40'' W; and Point 2 in 
position 27[deg]56'18'' N, 82[deg]27'43'' W. All persons and vessels 
are prohibited from entering or remaining within the regulated area 
unless authorized by the Captain of the Port St. Petersburg or a 
designated representative.
    (6) Ybor Channel. All waters of Ybor Channel, including adjacent 
land 20 feet shoreward of the mean high water mark of Ybor Channel. 
Recreational vessels are prohibited from entering or remaining in Ybor 
Channel unless authorized by the Captain of the Port St. Petersburg or 
a designated representative. Commercial vessels are authorized to enter 
or transit Ybor Channel, subject to compliance with security protocols 
established by the Captain of the Port St. Petersburg, including: (a) 
Advance notice of intent to transit; (b) inspection and examination of 
all commercial vessels and persons requesting authorization to transit 
the regulated area (including positive identification checks); and (c) 
embarkation of law enforcement personnel during authorized regulated 
area transits.
    (7) Ybor Turning Basin. All waters of Ybor Turning Basin, including 
adjacent land 20 feet shoreward of the mean high water mark of Ybor 
Turning Basin. Recreational vessels are prohibited from entering or 
remaining in Ybor Turning Basin unless authorized by the Captain of the 
Port St. Petersburg or a designated representative. Commercial vessels 
are authorized to enter or transit Ybor Turning Basin, subject to 
compliance with security protocols established by the Captain of the 
Port St. Petersburg, including: (a) Advance notice of intent to 
transit; (b) inspection and examination of all commercial vessels and 
persons requesting authorization to transit the security zone 
(including positive identification checks); and (c) embarkation of law 
enforcement personnel during authorized regulated area transits.
    (b) Definition. The term ``designated representative'' means Coast 
Guard Patrol Commanders, including Coast Guard boat coxswains, petty 
officers, and other officers operating Coast Guard vessels, and 
Federal, state, and local officials designated by or assisting the 
Captain of the Port St. Petersburg in the enforcement of the regulated 
areas.
    (c) Regulations. (1) All persons and vessels desiring to enter or 
remain within the regulated areas may contact the Captain of the Port 
St. Petersburg by telephone at (727) 824-7524, or a designated 
representative via VHF radio on channel 16, to request authorization.
    A Port Community Information Bulletin is available on the Coast 
Guard internet web portal at http://homeport.uscg.mil. Port Community 
Information Bulletins are located under the Port Directory tab in the 
Safety and Security Alert links.
    (2) If authorization to enter or remain within the regulated areas 
is granted by the Captain of the Port St. Petersburg or a designated 
representative, all persons and vessels receiving such authorization 
must comply with the instructions of the Captain of the Port St. 
Petersburg or a designated representative. Recreational vessels 
authorized to enter the regulated areas may be subject to boarding and 
inspection of the vessel and persons onboard.
    (3) The Coast Guard will provide notice of the regulated areas by 
Local Notice to Mariners, Broadcast Notice to Mariners, public 
outreach, and on-scene designated representatives.
    (d) Effective Date. This rule is effective from 12:01 p.m. on 
August 25, 2012 through 11:59 a.m. on August 31, 2012.

    Dated: March 13, 2012.
S.L. Dickinson,
Captain, U.S. Coast Guard, Captain of the Port St. Petersburg.
[FR Doc. 2012-7921 Filed 4-2-12; 8:45 am]
BILLING CODE 9110-04-P

Unveiled – Google Advertising Based on Environmental Conditions Patent

https://publicintelligence.net/wp-content/uploads/2012/03/GoogleEnvironmentalAds.png

 

On-line advertisements allow advertisers to reach a wide range of viewers through the Internet. The selection of advertisements for display, such as with search results and other information, and the ordering of those advertisements, may be achieved by various techniques. In one example, an initial determination is made to identify all advertisements that are a match or near match for the applied search terms or other query items or information. The match may be made, for example, between one or more words in a query, and key words identified by an advertiser and associated with a particular advertisement or group of advertisements, such as a campaign. For example, a company selling fishing tackle may have a line of large lures, and may thus identify terms such as “lunker,” “sturgeon,” and “muskie fever” as keywords to associate with their advertisements for such large lures. Those advertisements may then be considered by the system for display when a search results are displayed to a user who enters such terms. The comparison may also be made between a search or query, and the text in an advertisement or the text in a target of a hyperlink in an advertisement, or to a combination of keywords, target text, and advertisement text, among other possible techniques. For example, the system may effectively select terms from an advertisement as key words so that the advertisement is selected for possible display when a search or other user action associated with the key words is submitted. An advertisement may be selected for possible display if there is a “near” match also, for example, if a query includes terms that are known synonyms or mistypings/misspellings of the key word terms for an advertisement.

This document describes a system for allowing advertisers to target on-line advertisements based on environmental factors of end users. When determining what ads to serve to end users, the environmental factors can be used independently or in combination with matching of keywords associated with the advertisements and keywords in user search queries. A web browser or search engine located at the user’s site may obtain information on the environment (e.g., temperature, humidity, light, sound, air composition) from sensors. Advertisers may specify that the ads are shown to users whose environmental conditions meet certain criteria. For example, advertisements for air conditioners can be sent to users located at regions having temperatures above a first threshold, while advertisements for winter overcoats can be sent to users located at regions having temperatures below a second threshold.

Implementations may include one or more of the following features. The sensor can include an environmental sensor that provides information about the environmental condition. The sensor can be part of or coupled to a machine used by the user for accessing the network. At the server, the advertisement can be identified from among a plurality of advertisements by matching an environmental condition associated with the advertisement with the environmental condition of the user. The environmental condition can include at least one of temperature, humidity, sound, light, air composition, location, and speed of movement. The environmental condition can include at least one of soil, crop, or livestock conditions. The advertisement can be associated with a predetermined temperature condition, and the server can provide the advertisement to the user when the temperature at the user’s site or at a geographical location of the user meets the predetermined temperature condition. The advertisement can be associated with a predetermined sound level condition, and the server provides the advertisement to the user when the ambient sound level at the user’s site meets the predetermined sound level condition.

Public Intelligence – Department of Justice Online Investigative Principles for Federal Law Enforcement Agents

https://publicintelligence.net/wp-content/uploads/2012/03/DoJ-OnlineInvestigations.png

The following guide to principles used in online investigations conducted by federal law enforcement agents was authored by a special working group convened by the Department of Justice in 1999.  The working group included members of the FBI, Treasury, Secret Service, IRS, ATF, Air Force and even NASA who worked to create a standard guide for federal agents engaged in online criminal investigations.

PRINCIPLE 1
OBTAINING INFORMATION FROM UNRESTRICTED SOURCES

Law enforcement agents may obtain information from publicly accessible online sources and facilities under the same conditions as they may obtain information from other sources generally open to the public. This Principle applies to publicly accessible sources located in foreign jurisdictions as well as those in the United States.

PRINCIPLE 2
OBTAINING IDENTIFYING INFORMATION ABOUT USERS OR NETWORKS

There are widely available software tools for obtaining publicly available identifying information about a user or a host computer on a network. Agents may use such tools in their intended lawful manner under the same circumstances in which agency rules permit them to look up similar identifying information (e.g., a telephone number) through non-electronic means. However, agents may not use software tools _ even those generally available as standard operating system software _ to circumvent restrictions placed on system users.

PRINCIPLE 3
REAL-TIME COMMUNICATIONS

An agent may passively observe and log real-time electronic communications open to the public under the same circumstances in which the agent could attend a public meeting.

PRINCIPLE 4
ACCESSING RESTRICTED SOURCES

Law enforcement agents may not access restricted online sources or facilities absent legal authority permitting entry into private space.

PRINCIPLE 5
ONLINE COMMUNICATIONS GENERALLY

Law enforcement agents may use online services to communicate as they may use other types of communication tools, such as the telephone and the mail. Law enforcement agents should retain the contents of a stored electronic message, such as an e-mail, if they would have retained that message had it been written on paper. The contents should be preserved in a manner authorized by agency procedures governing the preservation of electronic communications.

PRINCIPLE 6
UNDERCOVER COMMUNICATIONS

Agents communicating online with witnesses, subjects, or victims must disclose their affiliation with law enforcement when agency guidelines would require such disclosure if the communication were taking place in person or over the telephone. Agents may communicate online under a non-identifying name or fictitious identity if agency guidelines and procedures would authorize such communications in the physical world. For purposes of agency undercover guidelines, each discrete online conversation constitutes a separate undercover activity or contact, but such a conversation may comprise more than one online transmission between the agent and another person.

PRINCIPLE 7
ONLINE UNDERCOVER FACILITIES

Just as law enforcement agencies may establish physical-world undercover entities, they also may establish online undercover facilities, such as bulletin board systems, Internet service providers, and World Wide Web sites, which covertly offer information or services to the public. Online undercover facilities, however, can raise novel and complex legal issues, especially if law enforcement agents seek to use the system administrator’s powers for criminal investigative purposes. Further, these facilities may raise unique and sensitive policy issues involving privacy, international sovereignty, and unintended
harm to unknown third parties.

Because of these concerns, a proposed online undercover facility, like any undercover entity, may be established only if the operation is authorized pursuant to the agency’s guidelines and procedures for evaluating undercover operations. In addition, unless the proposed online undercover facility would merely provide information to members of the public or accounts to law enforcement agents, the agency or federal prosecutor involved in the investigation must consult in advance with the “Computer and Telecommunications Coordinator” (CTC) in the United States Attorney’s office in the district in which the operation will be based or with the Computer Crime and Intellectual Property Section (CCIPS) of the Justice Department’s Criminal Division. An attorney from the Section can be reached at (202) 514-1026 or through the Justice Command Center at (202) 514-5000.

Agencies that already consult with the Justice Department as part of their internal review process for undercover operations may comply with this requirement by providing an extra copy of the undercover proposal to the CTC or to CCIPS, as appropriate.

PRINCIPLE 8
COMMUNICATING THROUGH THE ONLINE
IDENTITY OF A COOPERATING WITNESS, WITH CONSENT

Law enforcement agents may ask a cooperating witness to communicate online with other persons in order to further a criminal investigation if agency guidelines and procedures authorize such a consensual communication over the telephone. Law enforcement agents may communicate using the online identity of another person if that person consents, if the communications are within the scope of the consent, and if such activity is authorized by agency guidelines and procedures. Agents who communicate through the online identity of a cooperating witness are acting in an undercover capacity.

PRINCIPLE 9
APPROPRIATING ONLINE IDENTITY

“Appropriating online identity” occurs when a law enforcement agent electronically communicates with others by deliberately assuming the known online identity (such as the username) of a real person, without obtaining that person’s consent. Appropriating identity is an intrusive law enforcement technique that should be used infrequently and only in serious criminal cases. To appropriate online identity, a law enforcement agent or a federal prosecutor involved in the investigation must obtain the concurrence of the United States Attorney’s Office’s “Computer and Telecommunications Coordinator” (CTC) or the Computer Crime and Intellectual Property Section. An attorney from the Section can be reached at (202) 514-1026 or through the Justice Command Center at (202) 514-5000. In rare instances, it will be  necessary for law enforcement agents to appropriate online identity immediately in order to take advantage of a perishable opportunity to investigate serious criminal activity. In those circumstances, they may
appropriate identity and notify the Computer Crime and Intellectual Property Section within 48 hours thereafter.

PRINCIPLE 10
ONLINE ACTIVITY BY AGENTS DURING PERSONAL TIME

While not on duty, an agent is generally free to engage in personal online pursuits. If, however, the agent’s off-duty online activities are within the scope of an ongoing investigation or undertaken for the purpose of developing investigative leads, the agent is bound by the same restrictions on investigative conduct as would apply when the agent is on duty.

PRINCIPLE 11
INTERNATIONAL ISSUES

Unless gathering information from online facilities configured for public access, law enforcement agents conducting online investigations should use reasonable efforts to ascertain whether any pertinent computer system, data, witness, or subject is located in a foreign jurisdiction. Whenever any one of these is located abroad, agents should follow the policies and procedures set out by their agencies for international investigations.

 

 

Uncensored – Adolf Hitler’s Henchmen – Speer – The Architect

 

 

Adolf Hitler (20 April 1889 — 30 April 1945) was an Austrian-born German politician and the leader of the National Socialist German Workers Party (German: Nationalsozialistische Deutsche Arbeiterpartei, abbreviated NSDAP), commonly known as the Nazi Party. He was Chancellor of Germany from 1933 to 1945, and served as head of state as Führer und Reichskanzler from 1934 to 1945.A decorated veteran of World War I, Hitler joined the precursor of the Nazi Party (DAP) in 1919, and became leader of NSDAP in 1921. He attempted a failed coup d’etat known as the Beer Hall Putsch, which occurred at the Bürgerbräukeller beer hall in Munich on November 8–9, 1923. Hitler was imprisoned for one year due to the failed coup, and wrote his memoir, “My Struggle” (in German Mein Kampf), while imprisoned. After his release on December 20, 1924, he gained support by promoting Pan-Germanism, anti-semitism, anti-capitalism, and anti-communism with charismatic oratory and propaganda. He was appointed chancellor on January 30, 1933, and transformed the Weimar Republic into the Third Reich, a single-party dictatorship based on the totalitarian and autocratic ideology of Nazism. Hitler ultimately wanted to establish a New Order of absolute Nazi German hegemony in continental Europe. To achieve this, he pursued a foreign policy with the declared goal of seizing Lebensraum (“living space”) for the Aryan people; directing the resources of the state towards this goal. This included the rearmament of Germany, which culminated in 1939 when the Wehrmacht invaded Poland. In response, the United Kingdom and France declared war against Germany, leading to the outbreak of World War II in Europe.Within three years, German forces and their European allies had occupied most of Europe, and most of Northern Africa, and the Japanese forces had occupied parts of East and Southeast Asia and the Pacific Ocean. However, with the reversal of the Nazi invasion of the Soviet Union, the Allies gained the upper hand from 1942 onwards. By 1944, Allied armies had invaded German-held Europe from all sides. Nazi forces engaged in numerous violent acts during the war, including the systematic murder of as many as 17 million civilians,including an estimated six million Jews targeted in the Holocaust and between 500,000 and 1,500,000 Roma,dded to the Poles, Soviet civilians, Soviet prisoners of war, people with disabilities, homosexuals, Jehovah’s Witnesses, and other political and religious opponents.n the final days of the war, during the Battle of Berlin in 1945, Hitler married his long-time mistress Eva Braun and, to avoid capture by Soviet forces, the two committed suicide less than two days later on 30 April 1945.While Hitler is most remembered for his central role in World War II and the Holocaust, his government left behind other legacies as well, including the Volkswagen,the Autobahn,jet aircraft and rocket technology.

Cryptome – Postal Digital Spying

Cryptome welcomes information on, examples of, postal digital spying: cryptome[at]earthlink.net

Before email, social media, hacking, anonymizers and back-doored encryption took their place, postal services (most of them also ran telecommunications) were the prime means of official and commercial spying. The freedom-promising Internet’s ease and ubiquity of digital spying worldwide for a while made paper mail more secure, used even by officials and the military who knew digital communications favored its operators over users. That short-lived, somewhat safe postal means of comms — along with courier and delivery services — now looks to be again doing do-gooders’ triple-crossing evil.

In our NYC 72-unit condo, an in-house digital tracking, security video and notification system records the last-few-feet spying node supplementing an all-building cable-tv-phone-internet rig with handy tap-panel in the basement and a perp-IDing in-home converter box surveilling and archiving futile surfing for escape.

 


Date: Sun, 01 Apr 2012 20:07:10 +0200
From: “Erich M.” <me[at]quintessenz.org>
To: nettime-l[at]kein.org
Subject: Re: <nettime> The (Letter-) Post Office’s last stand … in Florida(WSJ)

On 03/30/2012 01:57 PM, John Young wrote:

> The postal system remains the most secure public communication
> system for all its faults and invasive letter opening and craven
> cooperation with official spies and their corporate cohorts.

Servus John et al,

Ack to all you wrote with a single exception, squire John. The first paragraph ought to be in past tense. I just started digging into that topic, what I already know is: Address scanning/reading in, applying 2-D Codes and timestamps at every stage of transportation. When post office cars or private delivery services stop in front of my house here in .AT my signature is performed on an electronic pad.

At first sight I’d say massive datasets generated by snail mail and packet sorting and processing systems are generously inviting companies to spy on each other and combat competitors abroad. Analysis of delivery cycles, timely detection of hostile marketing campaigns, tracking and blocking delivery of goods under patent/copyright claims or whatever the clone offsprings of ancient DMCA ACTA/TPP/SOPA/PIPA require.

What a nice topic to dig – ahem – to dive into, methinks. Not forgetting my nose clamp I remain

humbly yours

Erich M.

> All digital comsec is faulty — by design so its designers say to
> aid sysadministration and security/privacy updates. No official
> agency has ever had such intimate sustained access to those
> willing to barter digital hawking-gawking for instant full-body
> cat-scan diagnosis.

http://fm4.ORF.at/erichmoechel

http://moechel.com/kontakt.html        PGP KEY 0xEA7DC174
fingerprint 02AA B2E7 C609 307D 34FE 4B5C ACC6 A796 EA7D C174

–… …–   -.. .   . .-. .. -.-. ….   — . …– . — -…

#  distributed via <nettime>: no commercial use without permission
#  <nettime>  is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: http://mx.kein.org/mailman/listinfo/nettime-l
#  archive: http://www.nettime.org contact: nettime[at]kein.org

Uncensored – FEMEN Protest Islam Oppression of Women in Paris

[Image]Topless activists of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]Topless activists of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]Topless activists of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]Topless activists of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]Topless activists of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]A topless activist of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]A topless activist of the Ukrainian women movement Femen holds a placard as she protests against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws. Getty
[Image]Topless activists of the Ukrainian women movement Femen hold placards as they protest against anti women’s politic of Islam on March 31, 2012 in front of the Eiffel tower at the Trocadero in Paris. The idea of protest is to call muslim women to fight againsts Sharia laws.

Die STASI-Fälschungen der “GoMoPa” – über 5.000 Fälle Wirecard, Meridian Capital, Loipfinger, Minister Stelter, Daum etc pp

Liebe Leser,

die STASI-Fälschungen der selbsternannten “Nachrichtenagentur” “GoMoPa” – angeblich aus New York, in Wirklichkeit mutmasslich in Verden an der Aller bzw. Ost-Berlin ansässig, werden immer absurder.

Nach den bekannten Fällen

– Wirceard

– Ethikbank

– Professor Minister Stelter

– Ex-Justiz-Senator Braun

– Immovation

– WGF

und 5.000 Personen und Firmen auf der fingierten STASI-Warnliste kommen jetzt noch die Fälle Loipfinger und Daum auf das Konto der wegen Betruges am eigenen Anleger vorbestraften “GoMoPa” hinzu. Auf eigene Rechnung oder auf fremde Rechnung – nur das ist hier die Frage.

Auch ich habe diese perfiden anonymen E-Mails der “GoMoPa” alias Dave U Random erhalten und wurde ebenfalls massivst gestalkt und geschädigt.

Deswegen wehre ich mich gegen diese Typen – ich weiss aber auch ganz sicher:

In den nächsten Tagen kommen garantiert die nächsten Personen und Firmen, die von “GoMoPa” entsprechend behandelt werden, weil sie so ihr Geld verdienen – siehe die zahlreichen Presse-Artikel über “GoMoPa”.

Dies führt zwangsläufig dazu, dass die “GoMoPa”-Lage und die ihrer Auftraggeber, Helfershelfer und Mitgenossen immer prekärer wird.

Die fingierten Pressemeldungen und getarnten Stalking-Seiten der “GoMoPa”, in denen ihren Gegnern Ungeheurliches vorgeworfen wird,  sollen doch nur von diesen Tatsachen ablenken.

Dabei werden die wahren Tatsachen bösartig verdreht

– siehe Meridian Capital

– siehe Ethik Bank

– siehe Wirecard

– siehe Immovation

– siehe WGF

– siehe Ex-Justiz-Senator Braun

– siehe – Professor Minister Stelter

– siehe “GoMoPa”-Kinder-Portal

An dieser Stelle könnte ich eine ganze Enzyklopädie aufführen..

Dabei heiligt der Zweck die unheiligen Mittel.

Das setzen die Stasi-Stalker um, wie sie es einst gelernt haben.

Etwas anderes z.B.  konstruktiv agieren, können diese Typen nicht.

Herzlichst Ihr

Bernd Pulch

Magister Artium der Publizistik, Germanistik und Komparatistk

Uncensored – Hitler’s Henchmen – The Admiral – Karl Doenitz

“Hitler’s Henchmen” is a six-part series that portrays the men who aided Adolf Hitler in his rise to power and serviced the infernal machinery of the Third Reich. The Nuremberg Trials play an important role here: in a historical first, the International War Crimes Tribunal passed judgment on leading Nazi paladins for their unparalleled atrocities while exposing to the world the infamy of the Hitler regime and its leaders. ZDF uses newly discovered archive material and interviews with surviving family members and Nazi insiders to draw historical psychograms of Hitler’s closest aides. Conceived as a sequel to our six-part series “Hitler,” “Hitler’s Henchmen” offers in-depth personal and political profiles of six men who became architects of the destruction of Europe. Portraits of the men who carried out Hitler’s plans: ZDF’s sequel about the men who consolidated Hitler’s reign and turned his plans into action. They wove the complicities and plots without which Hitler could have never perpetrated the crime of the century. They helped to sway the judges and the bureaucrats, the armed forces and the police, the scientists and the industrialists, the students and their teachers to the regime’s ways of thinking. What kind of people were they? What inspired them to serve a corrupt administration with such enthusiasm and devotion? How did their careers unfold and their fates end? The series answers these and other questions by examining six of Hitler’s cohorts. The portraits of these aides-de-camp provide viewers with a revealing psychogram of “Hitler’s willing executors.” The films present for the first time newly discovered film clips and sound recordings from international archives. Recent revelations provided by historical research and interviews with former coworkers, relatives, and victims are also shown.
Hitler’s Henchmen 1 Episodes:
1. The Propagandist/Firebrand – Joseph Goebbels – German with English Subtitles
2. The Marshall – Hermann Goering – German with English Subtitles
3. The Deputy – Rudolf Hess – German with English Subtitles
4. The Executioner – Heinrich Himmler – German with English Subtitles
5. The Admiral – Karl Doenitz – German with English Subtitles
6. The Architect – Albert Speer – German with English Subtitles
Hitler’s Henchmen II Episodes:
1. Bureaucrat of Murder – Adolf Eichmann – German with English Subtitles
2. The Secretary – Martin Bormann – German with English Subtitles
3. The Corruptor of Youth – Baldur von Schirach – German with English Subtitles
4. Diplomat of Evil – Joachim von Ribbentrop – German with English Subtitles
5. Doctor of Death – Josef Mengele – German and English with Swedish Subtitles
6. Arbitrator over Death and Life – Roland Freisler – German with English Subtitles

Serien-Rufmorde der STASI”GoMoPa” – NDR berichtet über die Hass-Verbrechen an kritischen Journalisten

http://www.ndr.de/fernsehen/sendungen/zapp/medien_politik_wirtschaft/verleumdung101.html

Zitat:


“Verlage und Sender werden systematisch mit Post überflutet: immer derselbe, anonyme Brief. Vom Intendanten über den Fernsehdirektor bis in alle möglichen Redaktionen. Aufgemacht als einfache Zuschauermail, garniert mit Attacken. Von “Lügen und Manipulationen aus der Feder des Herrn Loipfinger” ist die Rede.

Es geht auch schärfer: In einer ebenfalls anonymen Mail, massenhaft versandt an Geschäftspartner, Journalisten und auch seine Familie, heißt es: “Staranalyst Stefan Loipfinger ist ein Kinderschänder”. Es folgen perverse Sex-Fanatasien, angeblich Loipfingers. Dann heißt es: “Du Stricher! (…) Für das, was du getan hast, wirst du bezahlen.” Und weiter: “Wir machen Dich fertig, Du Hurensohn! Dich […] und Deine ganze dreckige Verwandtschaft gleich mit!”. Auch so etwas findet sich mittlerweile im Internet.”

Die Bilanz der “GoMoPa” – GmbH 2008

GoMoPa GmbH

Berlin

Jahresabschluss zum Geschäftsjahr vom 12.02.2008 bis zum 31.12.2008

Bilanz

Aktiva

31.12.2008

EUR

A. Anlagevermögen 19.818,00
I. Immaterielle Vermögensgegenstände 3.356,00
II. Sachanlagen 16.462,00
B. Umlaufvermögen 19.914,20
I. Forderungen und sonstige Vermögensgegenstände 8.869,83
II. Kassenbestand, Bundesbankguthaben, Guthaben bei Kreditinstituten und Schecks 11.044,37
C. nicht durch Eigenkapital gedeckter Fehlbetrag 44.190,46
Bilanzsumme, Summe Aktiva 83.922,66

Passiva

31.12.2008

EUR

A. Eigenkapital 0,00
I. gezeichnetes Kapital 50.000,00
II. Jahresfehlbetrag 94.190,46
III. nicht gedeckter Fehlbetrag 44.190,46
B. Rückstellungen 1.400,00
C. Verbindlichkeiten 82.522,66
davon mit Restlaufzeit bis 1 Jahr 6.189,32
Bilanzsumme, Summe Passiva 83.922,66

Anhang

Allgemeine Angaben

Der Jahresabschluss der Gesellschaft wurde auf der Grundlage der Rechnungslegungsvorschriften des Handelsgesetzbuchs aufgestellt.

Soweit Wahlrechte für Angaben in der Bilanz oder im Anhang ausgeübt werden können, wurde der Vermerk in der Bilanz gewählt.

Für die Gewinn- und Verlustrechnung wurde das Gesamtkostenverfahren gewählt.

Nach den in § 267 HGB angegebenen Größenklassen ist die Gesellschaft eine kleine Kapitalgesellschaft.

Angaben zur Bilanzierung und Bewertung einschließlich der Vornahme steuerrechtlicher Maßnahmen

Bilanzierungs- und Bewertungsgrundsätze

Der Jahresabschluss der Gesellschaft wurde auf der Grundlage der Rechnungslegungsvorschriften des Handelsgesetzbuchs aufgestellt.

Ergänzend zu diesen Vorschriften waren die Regelungen des GmbH-Gesetzes zu beachten.

Erworbene immaterielle Anlagewerte wurden zu Anschaffungskosten angesetzt und sofern sie der Abnutzung unterlagen, um planmäßige Abschreibungen vermindert.

Das Sachanlagevermögen wurde zu Anschaffungs- bzw. Herstellungskosten angesetzt und soweit abnutzbar, um planmäßige Abschreibungen vermindert.

Die planmäßigen Abschreibungen wurden nach der voraussichtlichen Nutzungsdauer der Vermögensgegenstände und entsprechend den steuerlichen Vorschriften linear und degressiv vorgenommen.

Der Übergang von der degressiven zur linearen Abschreibung erfolgt in den Fällen, in denen dies zu einer höheren Jahresabschreibung führt.

Bewegliche Gegenstände des Anlagevermögens bis zu einem Wert von € 150,- wurden im Jahr des Zugangs aktiviert und planmäßig abgeschrieben.

Die Finanzanlagen wurden wie folgt angesetzt und bewertet:

Beteiligungen zu Anschaffungskosten
Anteile an verbundenen Unternehmen zu Anschaffungskosten
Ausleihungen zum Nennwert
Sonstige Wertpapiere zu Anschaffungskosten

Soweit erforderlich, wurde der am Bilanzstichtag vorliegende niedrigere Wert angesetzt.

Die Vorräte wurden zu Anschaffungs- bzw. Herstellungskosten angesetzt. Sofern die Tageswerte am Bilanzstichtag niedriger waren, wurden diese angesetzt.

Forderungen und Wertpapiere wurden unter Berücksichtigung aller erkennbaren Risiken bewertet.

Die Steuerrückstellungen beinhalten die das Geschäftsjahr betreffenden, noch nicht veranlagten Steuern.

Die sonstigen Rückstellungen wurden für alle weiteren ungewissen Verbindlichkeiten gebildet. Dabei wurden alle erkennbaren Risiken berücksichtigt.

Verbindlichkeiten wurden zum Rückzahlungsbetrag angesetzt. Sofern die Tageswerte über den Rückzahlungsbeträgen lagen, wurden die Verbindlichkeiten zum höheren Tageswert angesetzt.

Abschreibungen des Geschäftsjahres nach allein steuerrechtlichen Vorschriften

In den Abschreibungen sind Abschreibungen nach allein steuerlichen Vorschriften nicht enthalten.

Angaben und Erläuterungen zu einzelnen Posten der Bilanz- und Gewinn- und Verlustrechnung

Bruttoanlagenspiegel

Die Aufgliederung und Entwicklung der Anlagenwerte ist aus dem dem Jahresabschluss beigefügtem Anlagespiegel zu entnehmen.

Geschäftsjahresabschreibung

Die Geschäftsjahresabschreibung je Posten der Bilanz ist aus dem Anlagenverzeichnis zu entnehmen

Aktivierte Disagiobeträge

Aktivierte Disagiobeträge sind nicht vorhanden.

Betrag der Verbindlichkeiten und Sicherungsrechte mit einer Restlaufzeit von mehr als 5 Jahren

Der Gesamtbetrag der bilanzierten Verbindlichkeiten mit einer Restlaufzeit von mehr als 5 Jahren beträgt € 0,00.

Haftungsverhältnisse aus nicht bilanzierten Verbindlichkeiten gemäß § 251 HGB

Neben den in der Bilanz aufgeführten Verbindlichkeiten sind keine weiteren Haftungsverhältnisse zu vermerken:

Vorschlag der Ergebnisverwendung

Die Geschäftsführung schlägt den Gesellschaftern vor, das Jahresergebnis in voller Höhe auf neue Rechnung vorzutragen.

Namen der Geschäftsführer

Während des abgelaufenen Geschäftsjahrs wurden die Geschäfte des Unternehmens durch folgende Personen geführt:

Geschäftsführer: Peter Reski

 

Verden, 10. Dezember 2009

Der Geschäftsführer

Peter Reski

Angabe der Ausleihungen, Forderungen und Verbindlichkeiten gegenüber Gesellschaftern

Der Betrag der Verbindlichkeiten gegenüber Gesellschaftern beträgt 76.333,34 EUR. Der Betrag der Forderungen und sonstigen Vermögensgegenstände gegenüber Gesellschaftern beträgt 4.214,30 EUR.

 

QUELLE:

https://www.unternehmensregister.de/ureg/result.html;jsessionid=0F1601118B6C1EEB4CC59BD0438D2AAB.www01-1?submitaction=showDocument&id=4501358

HIER KÖNNEN SIE DIE “GoMoPa”-BILANZ 2008 DOWNLOADEN

GoMoPa Bilanz 2008

 

Die Bilanz der “GoMoPa” – GmbH 2009

GoMoPa GmbH

Berlin

Jahresabschluss zum Geschäftsjahr vom 01.01.2009 bis zum 31.12.2009

Bilanz

Aktiva

31.12.2009EUR 31.12.2008EUR
A. Anlagevermögen 17.211,00 19.818,00
I. Immaterielle Vermögensgegenstände 2.649,00 3.356,00
II. Sachanlagen 14.562,00 16.462,00
B. Umlaufvermögen 6.895,87 19.914,20
I. Forderungen und sonstige Vermögensgegenstände 5.133,27 8.869,83
II. Kassenbestand, Bundesbankguthaben, Guthaben bei Kreditinstituten und Schecks 1.762,60 11.044,37
C. nicht durch Eigenkapital gedeckter Fehlbetrag 74.443,27 44.190,46
Bilanzsumme, Summe Aktiva 98.550,14 83.922,66

Passiva

31.12.2009EUR 31.12.2008EUR
A. Eigenkapital 0,00 0,00
I. gezeichnetes Kapital 50.000,00 50.000,00
II. Verlustvortrag 94.190,46 0,00
III. Jahresfehlbetrag 30.252,81 94.190,46
IV. nicht gedeckter Fehlbetrag 74.443,27 44.190,46
B. Rückstellungen 1.400,00 1.400,00
C. Verbindlichkeiten 97.150,14 82.522,66
davon mit Restlaufzeit bis 1 Jahr 15.302,14 6.189,32
Bilanzsumme, Summe Passiva 98.550,14 83.922,66

Anhang

Allgemeine Angaben

Der Jahresabschluss der Gesellschaft wurde auf der Grundlage der Rechnungslegungsvorschriften des Handelsgesetzbuchs aufgestellt.

Soweit Wahlrechte für Angaben in der Bilanz oder im Anhang ausgeübt werden können, wurde der Vermerk in der Bilanz gewählt.

Für die Gewinn- und Verlustrechnung wurde das Gesamtkostenverfahren gewählt.

Nach den in § 267 HGB angegebenen Größenklassen ist die Gesellschaft eine kleine Kapitalgesellschaft.

Angaben zur Bilanzierung und Bewertung einschließlich der Vornahme steuerrechtlicher Maßnahmen

Bilanzierungs- und Bewertungsgrundsätze

Der Jahresabschluss der Gesellschaft wurde auf der Grundlage der Rechnungslegungsvorschriften des Handelsgesetzbuchs aufgestellt.

Ergänzend zu diesen Vorschriften waren die Regelungen des GmbH-Gesetzes zu beachten.

Erworbene immaterielle Anlagewerte wurden zu Anschaffungskosten angesetzt und sofern sie der Abnutzung unterlagen, um planmäßige Abschreibungen vermindert.

Das Sachanlagevermögen wurde zu Anschaffungs- bzw. Herstellungskosten angesetzt und soweit abnutzbar, um planmäßige Abschreibungen vermindert.

Die planmäßigen Abschreibungen wurden nach der voraussichtlichen Nutzungsdauer der Vermögensgegenstände und entsprechend den steuerlichen Vorschriften linear und degressiv vorgenommen.

Der Übergang von der degressiven zur linearen Abschreibung erfolgt in den Fällen, in denen dies zu einer höheren Jahresabschreibung führt.

Bewegliche Gegenstände des Anlagevermögens bis zu einem Wert von € 150,- wurden im Jahr des Zugangs aktiviert und planmäßig abgeschrieben.

Die Finanzanlagen wurden wie folgt angesetzt und bewertet:

Beteiligungen zu Anschaffungskosten
Anteile an verbundenen Unternehmen zu Anschaffungskosten
Ausleihungen zum Nennwert
Sonstige Wertpapiere zu Anschaffungskosten

Soweit erforderlich, wurde der am Bilanzstichtag vorliegende niedrigere Wert angesetzt.

Die Vorräte wurden zu Anschaffungs- bzw. Herstellungskosten angesetzt. Sofern die Tageswerte am Bilanzstichtag niedriger waren, wurden diese angesetzt.

Forderungen und Wertpapiere wurden unter Berücksichtigung aller erkennbaren Risiken bewertet.

Die Steuerrückstellungen beinhalten die das Geschäftsjahr betreffenden, noch nicht veranlagten Steuern.

Die sonstigen Rückstellungen wurden für alle weiteren ungewissen Verbindlichkeiten gebildet. Dabei wurden alle erkennbaren Risiken berücksichtigt.

Verbindlichkeiten wurden zum Rückzahlungsbetrag angesetzt. Sofern die Tageswerte über den Rückzahlungsbeträgen lagen, wurden die Verbindlichkeiten zum höheren Tageswert angesetzt.

Abschreibungen des Geschäftsjahres nach allein steuerrechtlichen Vorschriften

In den Abschreibungen sind Abschreibungen nach allein steuerlichen Vorschriften nicht enthalten.

Angaben und Erläuterungen zu einzelnen Posten der Bilanz- und Gewinn- und Verlustrechnung

Bruttoanlagenspiegel

Die Aufgliederung und Entwicklung der Anlagenwerte ist aus dem dem Jahresabschluss beigefügtem Anlagespiegel zu entnehmen.

Geschäftsjahresabschreibung

Die Geschäftsjahresabschreibung je Posten der Bilanz ist aus dem Anlagenverzeichnis zu entnehmen

Aktivierte Disagiobeträge

Aktivierte Disagiobeträge sind nicht vorhanden.

Betrag der Verbindlichkeiten und Sicherungsrechte mit einer Restlaufzeit von mehr als 5 Jahren

Der Gesamtbetrag der bilanzierten Verbindlichkeiten mit einer Restlaufzeit von mehr als 5 Jahren beträgt € 0,00.

Haftungsverhältnisse aus nicht bilanzierten Verbindlichkeiten gemäß § 251 HGB

Neben den in der Bilanz aufgeführten Verbindlichkeiten sind keine weiteren Haftungsverhältnisse zu vermerken:

Vorschlag der Ergebnisverwendung

Die Geschäftsführung schlägt den Gesellschaftern vor, das Jahresergebnis in voller Höhe auf neue Rechnung vorzutragen.

Namen der Geschäftsführer

Während des abgelaufenen Geschäftsjahrs wurden die Geschäfte des Unternehmens durch folgende Personen geführt: Geschäftsführer: Peter Reski

Verden, 13. Dezember 2010

Geschäftsführer

Angabe der Ausleihungen, Forderungen und Verbindlichkeiten gegenüber Gesellschaftern

1.1.2009 – 31.12.2009

Der Betrag der Verbindlichkeiten gegenüber Gesellschaftern beträgt 81.848,00 EUR. Der Betrag der Forderungen und sonstigen Vermögensgegenstände gegenüber Gesellschaftern beträgt 0,00 EUR.

12.2.2008 – 31.12.2008

Der Betrag der Verbindlichkeiten gegenüber Gesellschaftern beträgt 76.333,34 EUR. Der Betrag der Forderungen und sonstigen Vermögensgegenstände gegenüber Gesellschaftern beträgt 4.214,30 EUR.

QUELLE:

https://www.unternehmensregister.de/ureg/result.html;jsessionid=0F1601118B6C1EEB4CC59BD0438D2AAB.www01-1?submitaction=showDocument&id=6163764

HIER KÖNNEN SIE DIE “GoMoPa”-BILANZ 2009 DOWNLOADEN

GoMoPa Bilanz 2009

Die Geschäftsführung der “GoMoPa” GmbH – angeblich in New York – mutmasslich in Verden

Amtsgericht Charlottenburg (Berlin) Aktenzeichen: HRB 114153 B

Bekannt gemacht am: 07.03.2011 12:00 Uhr

 

 

In () gesetzte Angaben der Anschrift

und des Geschäftszweiges erfolgen

ohne Gewähr.

Veränderungen
03.03.2011
GoMoPa GmbH, Berlin, Unter den Linden 21, 10117 Berlin.

Nicht mehr Geschäftsführer:; 1. Reski, Peter; Geschäftsführer:;

2. Vornkahl, Mark, *11.04.1973, New York/USA;

mit der Befugnis die Gesellschaft allein zu vertreten mit der Befugnis

Rechtsgeschäfte mit sich selbst oder als Vertreter Dritter abzuschließen.

QUELLE: https://www.unternehmensregister.de

/ureg/result.html;jsessionid=A13E0B7A14801B600FCB79BD27892BAE.www02-1?submitaction=showDocument&id=6898089

DIE BILANZ DER “GoMoPa”-GmbH 2010

GoMoPa GmbH

Berlin

Jahresabschluss zum Geschäftsjahr vom 01.01.2010 bis zum 31.12.2010

Bilanz

Aktiva

31.12.2010EUR
A. Anlagevermögen 13.555,00
I. Immaterielle Vermögensgegenstände 1.942,00
II. Sachanlagen 11.613,00
B. Umlaufvermögen 19.639,88
I. Forderungen und sonstige Vermögensgegenstände 2.258,80
II. Kassenbestand, Bundesbankguthaben, Guthaben bei Kreditinstituten und Schecks 17.381,08
C. nicht durch Eigenkapital gedeckter Fehlbetrag 34.173,60
Bilanzsumme, Summe Aktiva 67.368,48

Passiva

31.12.2010EUR
A. Eigenkapital 0,00
I. gezeichnetes Kapital 50.000,00
II. Verlustvortrag 124.443,27
III. Jahresüberschuss 40.269,67
IV. nicht gedeckter Fehlbetrag 34.173,60
B. Rückstellungen 1.400,00
C. Verbindlichkeiten 65.968,48
Bilanzsumme, Summe Passiva 67.368,48

Anhang

Allgemeine Angaben

Der Jahresabschluss der Gesellschaft wurde auf der Grundlage der Rechnungslegungsvorschriften des Handelsgesetzbuchs aufgestellt.

Soweit Wahlrechte für Angaben in der Bilanz oder im Anhang ausgeübt werden können, wurde der Vermerk in der Bilanz gewählt.

Für die Gewinn- und Verlustrechnung wurde das Gesamtkostenverfahren gewählt.

Nach den in § 267 HGB angegebenen Größenklassen ist die Gesellschaft eine kleine Kapitalgesellschaft.

Angaben zur Bilanzierung und Bewertung einschließlich der Vornahme steuerrechtlicher Maßnahmen

Bilanzierungs- und Bewertungsgrundsätze

Der Jahresabschluss der Gesellschaft wurde auf der Grundlage der Rechnungslegungsvorschriften des Handelsgesetzbuchs aufgestellt.

Ergänzend zu diesen Vorschriften waren die Regelungen des GmbH-Gesetzes zu beachten.

Erworbene immaterielle Anlagewerte wurden zu Anschaffungskosten angesetzt und sofern sie der Abnutzung unterlagen, um planmäßige Abschreibungen vermindert.

Das Sachanlagevermögen wurde zu Anschaffungs- bzw. Herstellungskosten angesetzt und soweit abnutzbar, um planmäßige Abschreibungen vermindert.

Die planmäßigen Abschreibungen wurden nach der voraussichtlichen Nutzungsdauer der Vermögensgegenstände und entsprechend den steuerlichen Vorschriften linear und degressiv vorgenommen.

Der Übergang von der degressiven zur linearen Abschreibung erfolgt in den Fällen, in denen dies zu einer höheren Jahresabschreibung führt.

Bewegliche Gegenstände des Anlagevermögens bis zu einem Wert von € 410,- wurden im Jahr des Zugangs aktiviert und planmäßig abgeschrieben.

Die Finanzanlagen wurden wie folgt angesetzt und bewertet:

Beteiligungen zu Anschaffungskosten
Anteile an verbundenen Unternehmen zu Anschaffungskosten
Ausleihungen zum Nennwert
Sonstige Wertpapiere zu Anschaffungskosten

Soweit erforderlich, wurde der am Bilanzstichtag vorliegende niedrigere Wert angesetzt.

Die Vorräte wurden zu Anschaffungs- bzw. Herstellungskosten angesetzt. Sofern die Tageswerte am Bilanzstichtag niedriger waren, wurden diese angesetzt.

Forderungen und Wertpapiere wurden unter Berücksichtigung aller erkennbaren Risiken bewertet.

Die Steuerrückstellungen beinhalten die das Geschäftsjahr betreffenden, noch nicht veranlagten Steuern.

Die sonstigen Rückstellungen wurden für alle weiteren ungewissen Verbindlichkeiten gebildet. Dabei wurden alle erkennbaren Risiken berücksichtigt.

Verbindlichkeiten wurden zum Rückzahlungsbetrag angesetzt. Sofern die Tageswerte über den Rückzahlungsbeträgen lagen, wurden die Verbindlichkeiten zum höheren Tageswert angesetzt.

Abschreibungen des Geschäftsjahres nach allein steuerrechtlichen Vorschriften

In den Abschreibungen sind Abschreibungen nach allein steuerlichen Vorschriften nicht enthalten.

Angaben und Erläuterungen zu einzelnen Posten der Bilanz- und Gewinn- und Verlustrechnung

Bruttoanlagenspiegel

Die Aufgliederung und Entwicklung der Anlagenwerte ist aus dem dem Jahresabschluss beigefügtem Anlagespiegel zu entnehmen.

Geschäftsjahresabschreibung

Die Geschäftsjahresabschreibung je Posten der Bilanz ist aus dem Anlagenverzeichnis zu entnehmen

Aktivierte Disagiobeträge

Aktivierte Disagiobeträge sind nicht vorhanden.

Betrag der Verbindlichkeiten und Sicherungsrechte mit einer Restlaufzeit von mehr als 5 Jahren

Der Gesamtbetrag der bilanzierten Verbindlichkeiten mit einer Restlaufzeit von mehr als 5 Jahren beträgt € 0,00.

Haftungsverhältnisse aus nicht bilanzierten Verbindlichkeiten gemäß § 251 HGB

Neben den in der Bilanz aufgeführten Verbindlichkeiten sind keine weiteren Haftungsverhältnisse zu vermerken:

Vorschlag der Ergebnisverwendung

Die Geschäftsführung schlägt den Gesellschaftern vor, das Jahresergebnis in voller Höhe auf neue Rechnung vorzutragen.

Namen der Geschäftsführer

Während des abgelaufenen Geschäftsjahrs wurden die Geschäfte des Unternehmens durch folgende Personen geführt:   Geschäftsführer: Peter Reski

Verden, 06. September 2011 ………………..………………….

Geschäftsführer

sonstige Berichtsbestandteile

Angaben zur Feststellung:

Der Jahresabschluss wurde zur Wahrung der gesetzlich vorgeschriebenen Offenlegungsfrist vor der Feststellung offengelegt.

«

HIER KÖNNEN SIE DIE “GoMoPa”-BILANZ 2010 DOWNLOADEN

GoMoPa Bilanz 2010

Unveiled – Israeli Airbases in Azerbaijan

Israeli Airbases in Azerbaijan

Is Israel maintaining airbases in Azerbaijan? “Foreign Policy Magazine” is reporting that Israel has obtained permission from the Azerbaijani government to use four abandoned air force bases, located close to Iran’s border.

According to US sources, these are abandoned bases from the soviet era in the country. A former US intelligence senior official told the magazine, “It’s not certain that there’s a signed agreement between Jerusalem and Baku. However, I’m sure that if Israel wants to use those bases as part of an attack on Iran – no one in Azerbaijan would have an issue with it. After all, the countries have had strong ties for two decades.”

“We are following the developments between Israel and Azerbaijan,” said another source in the US administration, “and we are not happy over them.” A source in the CIA told the magazine that in his opinion, Israel would not use the airbases in the framework of the initial attack of Iran’s nuclear facility. Rather, they would be used in the event of another attack.

UNCENSORED – Hitler’s Henchmen – The Corruptor of Youth – Baldur von Schirach

“Hitler’s Henchmen” is a six-part series that portrays the men who aided Adolf Hitler in his rise to power and serviced the infernal machinery of the Third Reich. The Nuremberg Trials play an important role here: in a historical first, the International War Crimes Tribunal passed judgment on leading Nazi paladins for their unparalleled atrocities while exposing to the world the infamy of the Hitler regime and its leaders. ZDF uses newly discovered archive material and interviews with surviving family members and Nazi insiders to draw historical psychograms of Hitler’s closest aides. Conceived as a sequel to our six-part series “Hitler,” “Hitler’s Henchmen” offers in-depth personal and political profiles of six men who became architects of the destruction of Europe. Portraits of the men who carried out Hitler’s plans: ZDF’s sequel about the men who consolidated Hitler’s reign and turned his plans into action. They wove the complicities and plots without which Hitler could have never perpetrated the crime of the century. They helped to sway the judges and the bureaucrats, the armed forces and the police, the scientists and the industrialists, the students and their teachers to the regime’s ways of thinking. What kind of people were they? What inspired them to serve a corrupt administration with such enthusiasm and devotion? How did their careers unfold and their fates end? The series answers these and other questions by examining six of Hitler’s cohorts. The portraits of these aides-de-camp provide viewers with a revealing psychogram of “Hitler’s willing executors.” The films present for the first time newly discovered film clips and sound recordings from international archives. Recent revelations provided by historical research and interviews with former coworkers, relatives, and victims are also shown.
Hitler’s Henchmen 1 Episodes:
1. The Propagandist/Firebrand – Joseph Goebbels – German with English Subtitles
2. The Marshall – Hermann Goering – German with English Subtitles
3. The Deputy – Rudolf Hess – German with English Subtitles
4. The Executioner – Heinrich Himmler – German with English Subtitles
5. The Admiral – Karl Doenitz – German with English Subtitles
6. The Architect – Albert Speer – German with English Subtitles
Hitler’s Henchmen II Episodes:
1. Bureaucrat of Murder – Adolf Eichmann – German with English Subtitles
2. The Secretary – Martin Bormann – German with English Subtitles
3. The Corruptor of Youth – Baldur von Schirach – German with English Subtitles
4. Diplomat of Evil – Joachim von Ribbentrop – German with English Subtitles
5. Doctor of Death – Josef Mengele – German and English with Swedish Subtitles
6. Arbitrator over Death and Life – Roland Freisler – German with English Subtitles

TOP-SECRET – Areas of Possible Embarrassment to the Agency

Citation: Areas of Possible Embarrassment to the Agency
[Includes Attachments Entitled “Telephone Conversation of General Cushman and Someone in White House, 23/7/71”; “Nixon Puts an Eye on His Brother”; “Nixon Kin Is Mum on Vesco Cash Gift”; and “Vesco Arrest Warrant Issued by Federal Judge for Grand Jury Inquiry”; “Intelligence Evaluation Committee”; and Table of Contents], Secret, Memorandum, May 08, 1973, 8 pp.
Collection: The CIA Family Jewels Indexed
Item Number: FJ00057
Origin: United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff. Chief
From: Angleton, James
To: United States. Central Intelligence Agency. Directorate of Operations. Deputy Director
Individuals/
Organizations Named:
Anderson, Jack; Cushman, Robert E., Jr.; Dean, John Wesley III; Dietrich, Noah; Dougherty, John; Ehrlichman, John D.; Ellsberg, Daniel; Fielding, Fred F.; Figueres, Jose; Finkelstein, Ray; Haldeman, H.R.; Helms, Richard M.; Hoover, J. Edgar; Hughes, Howard; International Controls Corporation; Investors Overseas Service; Liddy, G. Gordon; Mardian, Robert C.; Marriott, J. Willard; Marriott Corporation; Nixon, Donald; Nixon, Donald, Jr.; Nixon, Edward C.; Nixon, Richard M.; Ober, Richard; Olson, William J.; Onassis, Aristotle; Pappas, Thomas A.; Rayhill, James W.; Ryan Aeronautical Company; Sears, Harry L.; Sherwood, Jack; Straub, Gilbert; Sullivan, William C.; United States. Central Intelligence Agency. Deputy Director; United States. Central Intelligence Agency. Directorate of Operations. Counterintelligence Staff; United States. Department of Defense; United States. Department of Justice; United States. Department of State; United States. Department of the Treasury; United States. Federal Bureau of Investigation; United States. Intelligence Evaluation Committee; United States. National Security Agency; United States. Secret Service; United States. Securities and Exchange Commission; United States. White House; Vesco, Robert L.; Wells, Bernard A.; Williams, Edward Bennett
Subjects: Biographical intelligence | Classified information | Costa Rica | Counterintelligence | Domestic intelligence | Election campaign funds | Election campaigns | Extradition | Grand juries | Greece | Information leaks | Information security | Interagency cooperation | Investigations | Military governments | Nassau (Bahamas) | News media | Pentagon Papers | United Kingdom
Abstract: Describes Central Intelligence Agency and Federal Bureau of Investigation concerns about Investors Overseas Service and Robert Mardian; provides background information about Intelligence Evaluation Committee and news clippings about financial mismanagement allegations against Robert Vesco and Richard Nixon’s brothers, Donald and Edward.
Full Text: Document – PDF – this link will open in a new window (297 KB)

Durable URL for this record

Uncensored – Hitler’s Henchmen – The Propagandist/Firebrand – Joseph Goebbels

“Hitler’s Henchmen” is a six-part series that portrays the men who aided Adolf Hitler in his rise to power and serviced the infernal machinery of the Third Reich. The Nuremberg Trials play an important role here: in a historical first, the International War Crimes Tribunal passed judgment on leading Nazi paladins for their unparalleled atrocities while exposing to the world the infamy of the Hitler regime and its leaders. ZDF uses newly discovered archive material and interviews with surviving family members and Nazi insiders to draw historical psychograms of Hitler’s closest aides. Conceived as a sequel to our six-part series “Hitler,” “Hitler’s Henchmen” offers in-depth personal and political profiles of six men who became architects of the destruction of Europe. Portraits of the men who carried out Hitler’s plans: ZDF’s sequel about the men who consolidated Hitler’s reign and turned his plans into action. They wove the complicities and plots without which Hitler could have never perpetrated the crime of the century. They helped to sway the judges and the bureaucrats, the armed forces and the police, the scientists and the industrialists, the students and their teachers to the regime’s ways of thinking. What kind of people were they? What inspired them to serve a corrupt administration with such enthusiasm and devotion? How did their careers unfold and their fates end? The series answers these and other questions by examining six of Hitler’s cohorts. The portraits of these aides-de-camp provide viewers with a revealing psychogram of “Hitler’s willing executors.” The films present for the first time newly discovered film clips and sound recordings from international archives. Recent revelations provided by historical research and interviews with former coworkers, relatives, and victims are also shown.
Hitler’s Henchmen 1 Episodes:
1. The Propagandist/Firebrand – Joseph Goebbels – German with English Subtitles
2. The Marshall – Hermann Goering – German with English Subtitles
3. The Deputy – Rudolf Hess – German with English Subtitles
4. The Executioner – Heinrich Himmler – German with English Subtitles
5. The Admiral – Karl Doenitz – German with English Subtitles
6. The Architect – Albert Speer – German with English Subtitles
Hitler’s Henchmen II Episodes:
1. Bureaucrat of Murder – Adolf Eichmann – German with English Subtitles
2. The Secretary – Martin Bormann – German with English Subtitles
3. The Corruptor of Youth – Baldur von Schirach – German with English Subtitles
4. Diplomat of Evil – Joachim von Ribbentrop – German with English Subtitles
5. Doctor of Death – Josef Mengele – German and English with Swedish Subtitles
6. Arbitrator over Death and Life – Roland Freisler – German with English Subtitles

Confidential -U.S. Marine Corps Information Operations in Afghanistan Lessons Learned Report

https://publicintelligence.net/wp-content/uploads/2012/03/MCCLL-AfghanIO.png

 

Lessons and Observations from 2d Marine Expeditionary Brigade (MEB) as MEB – Afghanistan and I Marine Expeditionary Force (Fwd) as Regional Command – South West March 2009 through October 2010

(U) Purpose: To inform Deputy Commandants (DCs) Combat Development and Integration (CD&I), Plans, Policies, and Operations (PP&O), Aviation, Installations and Logistics (I&L), Commanding General (CG), Training and Education Command (TECOM), Director of Intelligence, operating forces, and others on results of a Marine Corps Center for Lessons Learned (MCCLL) collection conducted in September and October 2010 to document lessons and observations from former members of the 2d MEB as MEB-A staff, and I MEF (Forward) as Regional Command -Southwest (RC(SW) staff regarding planning and conduct of information operations (IO) in Afghanistan.

Bottom Line Up Front:

(U//FOUO) The effective employment of IO to influence primary target audiences, including the population, local leaders, host nation security forces, government officials, and insurgents, is a key component of counterinsurgency (COIN) operations.

(U//FOUO) MEB-A and later RC(SW) intent was that all operations be planned, coordinated and executed within the framework of gaining influence among the target audiences. Three key elements of the approach employed by MEB-A were: to frame activities and operations in the context of influence, consistency of coalition force activities with IO themes and messages: “it is not only what you say or what products you hand out, it is what you do,” and “the principal voice [for IO themes and messages] is really the Afghan voice.”
Colonel Michael Killion, G-3, MEB-A

(U//FOUO) Emphasis on integration of IO and other operations continued as the I MEF (Fwd) staff prepared for their deployment as RC(SW). “Information operations is a strategic weapon you can use to get your message across … it cannot be an afterthought.”
MajGen Richard Mills, Commanding General, RC(SW)

(U//FOUO) IO themes and messages developed at the RC(SW) level were nested within strategic communications messages from higher headquarters, International Security Assistance Force (ISAF). Messages were also broad-based to allow tailoring for local conditions. Examples included successful actions of the government or Afghan security forces that build credibility or the perception of security.

(U//FOUO) A general theme expressed by interviewees was, “IO is tactical.” Much of the contact with the population is at the small unit level, and the Marines need to understand (1) the importance of their interaction with locals, and (2) that their actions must match the words they use. This theme relates to three areas: (1) allocating sufficient capabilities and resources to the battalion level, e.g., attaching sufficient, appropriately sized tactical psychological operations (PSYOP) elements, combat camera, and Radio in a Box (RIAB) transmitters; (2) assigning capable individuals to IO billets, and (3) training in employment of IO for small unit leaders.

(U//FOUO) MEB-A worked to develop a network of strong personal relationships with key individuals such as GIRoA officials, tribal leaders, and other key influencers at the local, district and provincial levels.

(U//FOUO) From an IO perspective, the primary threat from insurgents was a persistent, localized propaganda campaign. Local insurgent leaders, being familiar with social dynamics in their areas, were effective in employing tribalism, social fears and religious propriety to influence the population. As MEB-A elements partnered with special operations forces (SOF) and began having success in targeting high value targets, claims emerged of coalition forces desecrating or burning the Qur’an (Islamic holy text), which negatively impacted relations between local nationals and coalition forces, at least short term. The MEB’s network of Afghan relationships was employed as a means of countering insurgent propaganda. “We learned pretty quickly [that] our best counter action was really to provide information, declassify information, provide evidence to the contrary of what the [insurgents] claim was, and then use that leadership to organize a shura,” or “truth commission” of local elders or leaders to determine the facts of what had actually transpired. This network of Afghan leaders then disseminated their findings to the population, thus “the principal voice was the „Afghan voice.‟ …We found when we didn‟t disseminate a message through Afghans, that that‟s when it got twisted or misconstrued.”

(U//FOUO) The MEB-A commander and staff interfaced with provincial leaders. A similar approach to interface with the local population was applied at battalion and regimental levels, focused on identifying and developing relationships with key individuals within the district. Development of such relationships, and providing them information to disseminate to the population was key in countering enemy propaganda and “being first with the truth.” When a SIGACT occurred, the battalion would immediately arrange a KLE for the on-scene commander to meet with ANSF, GIRoA officials and local leaders to determine and disseminate the facts regarding an incident.  Similarly, the PAO would assemble a quick reaction team of correspondents, preferably independent external media that were in the area to conduct independent reporting of an incident or event. Combat camera also maintained photographers on standby, with their camera equipment packed and ready.

(U//FOUO) One battalion positioned its RIAB transmitter in the district center, where it was easily accessible by the district governor, the district administrator, or chief of police. When an incident occurred, they recorded comments by the district governor, and transmitted his comments via RIAB broadcast.

DIE FÄLSCHUNGEN DER WEGEN BETRUGES AM EIGENEN ANLEGER VORBESTRAFTEN STASI-“GoMoPa”

Nachfolgend die Stellujngnahme der Meridian Capital zu “GoMoPa”:

 

 

Sehr geehrte Damen und Herren,

die Betrüger und durch uns inhaftierten Erpresser der GoMoPa versuchen mit einer gefälschten Presse-Mitteilung von sich abzulenken und einen investigativen Journalisten, Bernd Pulch, zu belasten.

Die Presse-Mitteilung auf pressreleaser.org ist eine Fälschung und die gesamte Webseite ist der GoMoPa zu zuordnen.

Hier noch einmal die tatäschlichen Geschehnisse:

Hier der Artikel von “GoMoPa” über Meridian Capital.


1103021 6 Meridian Capital about GoMoPa STASI FÄLSCHUNGEN DER “GoMoPa”„GoMopa“ schreibt:08.09.2008
Weltweite Finanzierungen mit WidersprüchenDie Meridian Capital Enterprises Ltd. gibt an, weltweite Finanzierungen anbieten zu können und präsentiert sich hierbei auf aufwendig kreierten Webseiten. GOMOPA hat die dort gemachten Angaben analysiert und Widersprüche entdeckt.Der FirmensitzDer Firmensitz befindet sich laut eigener Aussage in Dubai, Vereinigte Arabische Emirate. In einem GOMOPA vorliegenden Schreiben der Meridian Capital Enterprises Ltd. heißt es jedoch, der Firmensitz sei in London. Auf der Homepage des Unternehmens taucht die Geschäftsadresse in der Londoner Old Broad Street nur als „Kundenabteilung für deutschsprachige Kunden“ auf. Eine weitere Adresse in der englischen Hauptstadt, diesmal in der Windsor Avenue, sei die „Abteilung der Zusammenarbeit mit Investoren“.Die Meridian Capital Enterprises ist tatsächlich als „Limited“ (Ltd.) mit Sitz in England und Wales eingetragen. Aber laut Firmenhomepage hat das Unternehmen seinen „rechtlichen Geschäftssitz“ in Dubai. Eine Abfrage beim Gewerbeamt Dubais (DED) zu dieser Firmierung bleibt ergebnislos.Bemerkenswert ist auch der vermeintliche Sitz in Israel. Auf der Webseite von Meridian Capital Enterprises heißt es: „Die Firma Meridian Capital Enterprises Ltd. ist im Register des israelischen Justizministeriums unter der Nummer 514108471, gemäß dem Gesellschaftsrecht von 1999, angemeldet.“ Hierzu Martin Kraeter, Gomopa-Partner und Prinzipal der KLP Group Emirates in Dubai: „Es würde keinem einzigen Emirati – geschweige denn einem Scheich auch nur im Traum einfallen, direkte Geschäfte mit Personen oder Firmen aus Israel zu tätigen. Und schon gar nicht würde er zustimmen, dass sein Konterfei auch noch mit vollem Namen auf der Webseite eines Israelischen Unternehmens prangt.“Auf der Internetseite sind diverse Fotos mit Scheichs an Konferenztischen zu sehen. Doch diese großen Tagungen und großen Kongresse der Meridian Capital Enterprises werden in den Pressearchiven der lokalen Presse Dubais mit keinem Wort erwähnt.
Martin Kraeter: „ Ein ‚britisch-arabisch-israelisches bankfremdes Finanzinstitut sein zu wollen, wie die Meridian Capital Enterprises Ltd. es darstellt, ist mehr als zweifelhaft. So etwas gibt es schlicht und ergreifend nicht! Der Nahostkonflikt schwelt schon seit mehr als 50 Jahren. Hier in den Vereinigten Arabischen Emiraten (VAE) werden Israelis erst gar nicht ins Land gelassen. Israelische Produkte sind gebannt. Es gibt nicht einmal direkte Telefonverbindungen. Die VAE haben fast 70% der Wiederaufbaukosten des Libanon geschultert, nachdem Israel dort einmarschiert ist.“Zwei angebliche Großinvestitionen der Meridian Capital Enterprises in Dubai sind Investmentruinen bzw. erst gar nicht realisierte Projekte. Das Unternehmen wirbt mit ihrer finanziellen Beteiligung an dem Dubai Hydropolis Hotel und dem Dubai Snowdome.

Der Aktivitätsstatus der Meridian Capital Enterprises Ltd. ist laut englischen Handelsregister (UK Companies House) „dormant“ gemeldet. Auf der Grundlage des englischen Gesellschaftsrechts können sich eingetragene Unternehmen selbst „dormant“ (schlafend) melden, wenn sie keine oder nur unwesentliche buchhalterisch zu erfassende Transaktionen vorgenommen haben. Dies ist angesichts der angeblichen globalen Investitionstätigkeit der Meridian Capital Ltd. sehr erstaunlich.

Der Webauftritt

Die Internetseite der MCE ist sehr aufwendig gestaltet, die Investitionen angeblich in Millionen- und Milliardenhöhe. Bei näherer Betrachtung der Präsentationselemente fällt jedoch auf, dass es sich bei zahlreichen veröffentlichen Fotos, die Veranstaltungen der Meridian Capital Enterprises dokumentieren sollen, meist um Fotos von Online-Zeitungen oder frei zugänglichen Medienfotos einzelner Institutionen handelt wie z.B. der Börse Dubai.

Auf der Internetpräsenz befinden sich Videofilmchen, die eine frappierende Ähnlichkeit mit dem Werbematerial von NAKHEEL aufweisen, dem größten Bauträger der Vereinigten Arabischen Emirate. Doch den schillernden Videos über die berühmten drei Dubai Palmen „Jumeirah, Jebel Ali und Deira“ oder das Archipel „The World“ wurden offensichtlich selbstproduzierte Trailersequenzen der Meridian Capital Enterprises vorangestellt. Doch könnte es sich bei den Werbevideos um Fremdmaterial handeln.

Auch die auf der Webseite wahllos platzierten Fotos von bekannten Sehenswürdigkeiten Dubais fungieren als Augenfang für den interessierten Surfer mit eigenem Finanzierungswunsch. Bei einem Volumen von 10 Millionen Euro oder höher präsentiert sich die Meridian Capital Enterprises Ltd. als der passende Investitionspartner. Das Unternehmen verfügt weltweit über zahlreiche Standorte: Berlin, London, Barcelona, Warschau, Moskau, Dubai, Riad, Tel Aviv, Hong Kong und New York. Aber nahezu alle Standorte sind lediglich Virtual Offices eines global arbeitenden Büroservice-Anbieters. „Virtual Office“ heißt im Deutschen schlicht „Briefkastenfirma“. Unter solchen Büroadressen sollen laut Meridian Capital Enterprises ganze Kommissionen ansässig sein, alles zum Wohle des Kunden.“

Zitatende

Hier die Hintergründe der Erpressung:

http://www.immobilien-vertraulich.com/law/7154-opfer-nach-immovation-und-estavis-versucht-gomopa-nun-dkb-zu-erpressen-gomopa-hintermann-ra-resch.html

Hier unsere Original-Stellungnahme:

Anfang Oktober 2008 erhielt einer der Arbeiter der Meridian Capital Enterprises Ltd. eine Meldung von einem anonymen Sender, dass in naher Zukunft – zuerst im Internet, dann im Fernsehen, im Radio und in der deutschen Presse – Informationen erscheinen, die die Funktionsweise und Tätigkeiten der Meridian Capital Enterprises Ltd. in einem äußerst negativen Licht darstellen. Der Mitarbeiter der Meridian Capital Enterprises Ltd. wurde also informiert, dass diese Meldungen/Nachrichten zweifelsohne deutlich das Aussehen und den guten Ruf der Firma Meridian Capital Enterprises Ltd. beeinträchtigen.
Der an dieser Stelle erwähnte „Gesprächspartner” hat den Arbeiter der Meridian Capital Enterprises Ltd. informiert, dass die Möglichkeit besteht die peinliche Situation zu vermeiden, indem die Meridian Capital Enterprises Ltd. auf das von der Person gezeigte Konto die Summe von 100.000,00 EUR überweist. Wie sich aber später zeigte, war der Herr Klaus Maurischat – dieser anonyme Gesprächspartner – „Gehirn“ und „Lider des GOMOPA“. Die Ermittlungen wurden angestellt durch die Bundeskriminalpolizei (Verfolgungs- und Ermittlungsorgan auf der Bundesebene) während des Ermittlungsverfahrens wegen einer finanziellen Erpressung, Betrügereien auch wegen der Bedrohungen, welche von Herrn Maurischat und seine Mitarbeiter praktiziert wurden sowie wegen Teilnahme anderer (Leiter der Internetservices und Moderatoren der Blogs) an diesem Prozedere. Diese Straftaten wurden begangen zu Schaden vieler Berufs- und Justizpersonen, darunter auch der Meridian Capital Enterprises Ltd. Die Opfer dieses Verbrechens sind in Deutschland, Österreich, der Schweiz, Spanien, Portugal, Großbritannien, den USA und Kanada sichtbar.
In diesem Moment taucht folgende Frage auf: Wie war die Reaktion der Meridian Capital Enterprises Ltd. auf die Forderungen seitens GOMOPA? Entsprach die Reaktion den Erwartungen von GOMOPA? Hat die Meridian Capital Enterprises Ltd. die geforderte Summe 100.000,00 EUR überwiesen?
Seites der Meridian Capital Enterprises Ltd. gab es überhaupt keine Reaktion auf den Erpressungsversuch von GOMOPA. Ende August 2008 auf dem Service http://www.gompa.net sind zahlreiche Artikel/Meldungen erscheinen, welche die Tätigkeit der Meridian Capital Enterprises Ltd. in einem sehr negativen Licht dargestellt haben. Nachdem die auf http://www.gomopa.net enthaltenen Informationen ausführlich und vollständig analysiert worden waren, ergab es sich, dass sie der Wahrheit nicht einmal in einem Punkt entsprechen und potenzielle und bereits bestehende Kunden der Meridian Capital Enterprises Ltd. in Bezug auf die von diesem Finanzinstitut geführten Geschäftstätigkeit irreführen. Infolge der kriminellen Handlugen von GOMOPA und der mit ihm kooperierenden Services und Blogs im Netz hat die Meridian Capital Enterprises Ltd. beachtliche und messbare geschäftliche Verluste erlitten. Die Meridian Capital Enterprises Ltd. hat nämlich in erster Linie eine wichtige Gruppe von potenziellen Kund verloren. Was sich aber als wichtiger ergab, haben sich die bisherigen Kunden von der Meridian Capital Enterprises Ltd. kaum abgewandt. Diejenigen Kunden haben unsere Dienstleitungen weiterhin genutzt und nutzen die immer noch. In Hinblick auf die bisherige Zusammenarbeit mit der Meridian Capital Enterprises Ltd., werden ihrerseits dem entsprechend keine Einwände erhoben .
GOMOPA hat so einen Verlauf der Ereignisse genau prognostiziert, dessen Ziel beachtliche und messbare geschäftliche durch die Meridian Capital Enterprises Ltd. erlittene Verluste waren. Der Verlauf der Ereignisse hat das Service GOMOPA mit Sicherheit gefreut. GOMOPA hat nämlich darauf gerechnet, dass die Stellung der Meridian Capital Enterprises Ltd. nachlässt und das Finanzinstitut die geforderte Summe (100.000,00 EUR) bereitstellt. Im Laufe der Zeit, als das ganze Prozedere im Netz immer populärer war, versuchte GOMOPA noch vier mal zu der Meridian Capital Enterprises Ltd. Kontakte aufzunehmen, indem es jedes mal das Einstellen dieser kriminellen „Kompanie” versprochen hat, wobei es jedes mal seine finanziellen Forderungen heraufsetzte. Die letzte für das Einstellen der „Kompanie“ gegen die Meridian Capital Enterprises Ltd. vorgesehene Quote betrug sogar 5.000.000,00 EUR (in Worten: fünfmilionen EURO). Die Meridian Capital Enterprises Ltd. konnte sich aber vor den ständig erhöhenden Forderungen seitens des Services GOMOPA behaupten.
Im Oktober 2008 traf die Leitung der Meridian Capital Enterprises Ltd. Entscheidung über die Benachrichtigung der Internationalen Polizei INTERPOL sowie entsprechender Strafverfolgungsorgane der BRD (die Polizei und die Staatsanwaltschaft) über den bestehenden Sachverhalt. In der Zwischenzeit meldeten sich bei der Meridian Capital Enterprises Ltd. zahlreiche Firmen und Korporationen, sogar Berufsperson wie Ärzte, Richter, Priester, Schauspieler und anderen Personen aus unterschiedlichen Ländern der Welt, die der Erpressung von GOMOPA nachgegeben und die geforderten Geldsummen überwiesen haben. Diese Personen gaben bereits Erklärungen ab, dass sie dies getan haben, damit man sie bloß endlich „in Ruhe lässt” und um unnötige Probleme, Schwierigkeiten und einen kaum begründbaren Ausklang vermeiden zu können. Die Opfer dieses kriminellen Vorgehens haben die Meridian Capital Enterprises Ltd. über unterschiedliche Geldsummen, welche verlangt wurden, informiert.
In einem Fall gab es verhältnismäßig kleine (um ein paar tausend EURO), in einem anderen Fall handelte es schon um beachtliche Summen (rund um paar Millionen EURO).
Zusätzlich wendeten sich an die Meridian Capital Enterprises Ltd. Firmen, welche dem GOMOPA noch keine „Gebühr” überweisen haben und bereits überlegen, ob sie dies tun sollen, oder nicht. Diese Firmen erwarteten von der Meridian Capital Enterprises Ltd. eine klare Stellungnahme sowie eine professionelle praktische Beratung, wie man sich in solch einer Lage verhalten soll und wie man diese Geldforderungen umgehen kann. Die Meridian Capital Enterprises Ltd. hat ausnahmslos allen Verbrechensopfern, welche sich bei unserer Firma gemeldet haben, eine Zusammenarbeit vorgeschlagen. Als oberste Aufgabe stellt sich diese Kooperation, gemeinsam entschlossene und wirksame Maßnahmen gegen GOMOPA, gegen andere Services im Netz sowie gegen alle Bloggers zu treffen, die an dem hier beschriebenen internationalen kriminellen Vorgehen mit GOMOPA-Führung teilnehmen.Auf unsere Bitte benachrichtigten alle mitbeteiligten Firmen die Internationale Polizei INTERPOL sowie ihre heimischen Verfolgungsorgane, u. a. die zuständige Staatsanwaltschaft und die Polizeibehörden über den bestehenden Sachverhalt.
In Hinblick auf die Tatsache, dass das verbrecherische Handeln von GOMOPA sich über viele Staaten erstreckte und dass die Anzahl der in der Bundesrepublik Deutschland erstatteten Anzeigen wegen der durch GOMOPA, Internetservices und Bloggers begangenen Straftaten, rasant wuchs – was zweifelsohne von einer weit gehenden kriminellen Wirkungskraft des GOMOPA zeugt – schlug die Internationale Wirtschaftspolizei INTERPOL der Meridian Capital Enterprises Ltd. vor, dass sich ihr Vertreter in Berlin mit dem Vertreter von GOMOPA trifft, um die „Zahlungsmodalitäten“ und Überweisung der Summe von 5.000.000,00 EUR zu besprechen. Dieser Schritt meinte, eine gut durchdachte und durch die Bundeskriminalpolizei organisierte Falle durchzuführen, deren Ziel die Festnahme der unter GOMOPA wirkenden internationalen Straftäter war.
Die koordinierten Schritte und Maßnahmen der Meridian Capital Enterprises Ltd. und anderer Beschädigter, geleitet von der Internationalen Wirtschaftspolizei INTERPOL, dem Bundeskriminalamt und der Staatsanwaltschaft der Bundesrepublik Deutschland haben zur Aus-, Einarbeitung und Durchführung der oben beschriebenen Falle beigetragen. Im November 2008 führte die in Berlin vorbereitete Falle zur Festnahme und Verhaftung des Vertreters des GOMOPA, der nach der Festnahme auf Herrn Klaus Maurichat – als den Hauptverantwortlichen und Anführer der internationalen kriminellen Gruppe GOMOPA verwies. Der Festgenommene benannte und zeigte der Bundeskriminalpolizei zugleich den aktuellen Aufenthaltsort des Herrn Klaus Maurischat. „Gehirn“ und Gründer dieser internationalen kriminellen Gruppe GOMOPA, Herr Klaus Maurischat wurde am selben Tag auch festgenommen und auf Frist verhaftet, wird bald in Anklagezustand gestellt, wird die Verantwortung für eigene Straftaten und die des Forums GOMOPA vor einem zuständigen Bundesgericht tragen. Die Meridian Capital Enterprises Ltd. unternahm bereits alle möglichen Schritte, damit Herr Klaus Maurischat auch auf der Anklagebank des zuständigen Gerichts des Vereinigten Königsreiches Großbritannien erscheint. Unter den beschädigten Berufs- und Justizpersonen aus Großbritannien, neben der Meridian Capital Enterprises Ltd. gibt es noch viele Opfer von GOMOPA…

Die dreisten Verbrecher wagen es unter http://www.pressreleaser.org, einer eigenen “GoMoPa”-Seite unsere Pressemitteilung oben zu verfälschen und unschuldige Personen zu belasten.

Dear Readers,

after a thorough research we are sure that the real “GoMoPa” boss is Jochen Resch, lawyer in Berlin, Germany. He is the brain behind “GoMoPa” and responsable for blackmailing, extortion, racketeering, cybermurder and murder – in the tradition of the East German “Inteeligence” STASI that is why he called “GoMoPa” – Financial “Intelligence” Service .

Webmaster

Meridian Capital about GoMoPa

Meridian Capital Enterprises Ltd.. unveils new criminal phenomena in network. In recently appeared on the net more often at the same time a new a very worrying phenomenon of criminal nature. Professional criminals groups in the network are taking part, to extortion, fraud, Erschwindeln relating to certain specifically selected companies and businesses are capable of. These criminals developed new methods and means, simply and in a short time to bereichern.Strategien and manifestations, which underlie this process are fairly simple. A criminal is looking to “carefully” on the Internet specific companies and corporations (victims of crime) and informed them in the next step, that of the business activities of such companies and corporations in the near future – first on the Internet then in other available mass media – numerous and very unfavorable information appears. At the same time, the criminals beat their future victims an effective means of reducing unnecessary difficulties and problems to escape the loss of good name and image of the company and corporate sector. These offenders are aware of that reputation, name and appearance of each company is a value in itself. It was therefore a value of what each company is prepared to pay any price. But the reason for difficulties and problems arising from the loss of good name and reputation result. The criminals and their victims are already aware that this loss is devastating consequences might have been the closing down of a particular business can enforce. It takes both to No as well as at large companies regard. The company is concerned that in virtually every industry in each country and cross-border activities sind.Das criminal procedure in the form of a blackmail on money, a fraud is becoming rapidly and globally, ie led cross-border and internationally. Among the victims of extortion, fraud is now looking both at home (domestic) and international corporations, the major emphasis on conservation, keeping and maintaining their reputation in the business according to their credibility lay. The criminals in the network have understood that maintaining an unassailable reputation and name of a company the unique ability to provide fast and easy enrichment forms. The above-mentioned criminal procedure is difficult to track because it is international in nature, and by overlapping or even nonexistent (fictional) professional and judicial persons in various countries and operated company wird.Diese offenders in the network publish it and disseminate false information about your victims on remote servers, which are not uncommon in many exotic countries. There are those countries in which serious gaps in the legal system, investigative and prosecution procedures are visible. As an example, at this point mention India werden. Mit criminals working in the network grid portals known leader of blogs with your seat-consciously or unconsciously, even in highly developed countries. For example, at this point, countries such as Germany, Austria, Switzerland, the United States, Britain, Spain or Portugal are mentioned. The below listed criminals were able to act unpunished today. As a symptom of such action appears here the activity and “effectiveness” of the company GOMOPA, which is on countries such as Germany, Switzerland, Austria, the United States, Britain, Spain and India. A good example of such an action is Mr. Klaus Mauri Chat – the leader and “brain” of the company GOMOPA with many already in force and criminal judgments “on his account”, which in this way for years and funded its maintenance in the industry almost unlimited activity. This status will change dramatically, however, including far and wide thanks to discontinued operations of the firm Meridian Capital Enterprises Ltd.. who would oppose such offenses addressed in the network. Other companies and corporations, in which the crime network and outside of this medium have fallen victim to contribute to combating such crimes bei.Die situation is changing, thanks to effective steps and the successful cooperation of the firm Meridian Capital Enterprises Ltd.. with the international police Interpol, with the federal agency (FBI) in the U.S., the Federal Criminal Police in Germany, with Scotland Yard in Britain, as well as with the Russian secret service FSB.Die Meridian Capital Enterprises Ltd.. – Together with other companies and cooperations, the victim of criminal activities of the network of crime have fallen – has undeniably already started to yield results. The fact that in recent weeks (November 2008) on the territory of the Federal Republic of Germany of the above-mentioned leaders and “brain” of the company GOMOPA, Mr Klaus Maurishat was arrested should not be ignored. The Meridian Capital Enterprises Ltd.. information available results clearly show that the next arrests of persons participating in this process in such countries as: Austria, Switzerland, Russia, Ukraine, Poland, Spain, Mexico, Portugal, Brazil, the USA, Canada, UK, Ireland , Australia, New Zealand and made in a.. The ultimate goal of Meridian Capital Enterprises Ltd.. and the other victims of crime in the network is to provide all participants in this criminal procedure before the competent court to lead. All professional and judicial persons, regardless of the seat and out of the business, which the above-described criminal action (fraud, extortion) to have fallen victim can of Meridian Capital Enterprises Ltd.. led company to join the goal set at all at this point the procedure described those associated in the public and the economic life out. II blacklist blackmail and with international fraudsters and their methods (opus operandi) in the following countries: 1 The Federal Republic Deutschland2. Dubai 3rd Russia 1st The Federal Republic of Germany GmbH GOMOPA, Goldman Morgenstern & Partners LLC., Goldman Morgenstern & Partners Consulting LLC, Wottle collection. In these firms are quite active following persons: – Klaus Mauri Chat ( “Father” and “brain” of the criminal organization responsible for countless final judgments have been achieved (arrested in Germany in November 2008) – Josef Rudolf Heckel ( “right hand “when Mr Klaus Mauri chat, denounced former banker who is excessive in many Bankschmuggeleien was involved.
The study of 900 pages named Toxdat by Ehrenfried Stelzer is the “Stasi Killer Bible”. It lists all kind of murder methods and concentrates on the most effective and untraceable.
“The toxdat study was ordered by Stasi Vice-President Gerhard Neiber, the second man in rank after boss Erich Mielke. The toxdat study was also the theoretical “story book” for the murder of the famous German watchdog and journalist Heinz Gerlach by former Stasi member under the guidance of “GoMoPa”,” an informer stated. “Ehrenfried stelzer” was nicknamed “Professor Murder” by his victims. Even close co-worker now compare him with the German SS”doctor” Mengele, “Dr. Death” from Auschwitz.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.

For more Information the victims have launched a new site: http://www.victims-opfer.com

The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.

German authorities are under growing pressure to reopen investigations into at least a dozen suspicious deaths after the arrest of an alleged East German assassin cast new light on the communist regime. Stasi victims quoted a source saying “isolated units” had conducted operations that were “extremely well organised” and had “100 per cent logistical support” from the East German state.
A statement from prosecutors read: “The accused [Jurgen G] is suspected, as a member of a commando of the former DDR, of killing a number of people between 1976 and 1987 who from the point of view of the DDR regime had committed treason or were threatening to do so.”
Details of his Jurgen G’s arrest have been described in suitably florid terms, with the mass circulation tabloid Bild saying he was working at the Wolfsbruch marina near Rheinsberg in north-eastern Germany when a woman approached him. “Excuse me, is that your yellow Trabant in the car park? I just ran into it with my car,” she is said to have asked.
When he followed her to the car park, masked officers jumped out of vans and bushes and overpowered him in an operation worthy of the Stasi itself.
An eyewitness told Bild: “They blindfolded him and raced off in an unmarked car.”
Police across Germany are reported to be sifting through files to see who the victims may have been, and some intelligence officers are greeting the arrest of Jurgen G as a breakthrough.
Thomas Auerbach, who works for the Stasi file authority in Berlin and has written a book based on the death squad files, said: “These people were trained to make such murders look like accidents or suicides, even as ‘ordinary’ crimes such as robberies. They were real terror experts.”
The cases said to be linked to Jurgen G or his unit include many people involved with the commercial arm of the East German ruling socialist party, the SED (Socialist Unity Party).
Uwe Harms, the head of a Hamburg-based haulage firm which was part of a network of companies secretly owned by the SED, disappeared in March 1987 after conversations with various DDR functionaries. Six weeks later, his body was found in a plastic bag.
Weeks before his death he told friends that he felt he was being followed. After reunification, one of the other SED company heads said Mr Harms had been liquidated for refusing to allow his firm to be used to transport arms into East Germany.
Dieter Vogel, a businessman who had been jailed for life for spying for the CIA, was found suffocated in his cell in the East German prison Bautzen on March 9, 1982. The fact that he was due to be taken to the West in a spy swap arrangement just a few weeks later cast doubt on the suicide theory.
He had passed the names of several Stasi moles to the BND, West Germany’s heavily penetrated counter-intelligence service.
The Christian Democrat Union politician Uwe Barschel, 43, was found dead by magazine reporters in his bathtub in a hotel room in Geneva in October, 1987. He died of poisoning, but rumours that he was involved somehow in arms deals and the Stasi have clung to the case.
One of the more high-profile and enduring mysteries is that of Lutz Eigendorf, an East German footballer from the Stasi-backed Dynamo Berlin.
He fled to the West in 1979 amid great publicity. Four years later, he died after crashing his car into a tree on a straight stretch of road with blood alcohol levels way over the limit. Witnesses who had seen him earlier in the evening said he had not been drinking.
Most controversial though is the suggestion that the assassination squad was linked to the murder of a Swedish television reporter and her friend in 1984.
Cats Falk and her friend Lena Graens went missing on Nov 19, 1984. Their bodies were fished out of a Stockholm canal six months later.
Reports suggested a three-man assassination squad killed them, spiking their drinks with drugs, putting them into their car and pushing it into the Hammarby canal.
Shortly before her death, Cats Falk had reportedly uncovered a deal between an arms dealer and an East German firm.
Germany has recently undergone a wave of nostalgia for all things East German, dubbed Ostalgie, with colourful television shows featuring former DDR stars such as the ice skater Katerina Witt talking wistfully about socialist pop music.
A reassessment may be coming in the wake of the revelations.

Victims: The DDR-STASI MURDER GANG “GoMOPa” in murderoplot against Joerg Berger

The Stasi Murder Gang of „GoMoPa“ was involved in many trials to kill the popular East German soccer trainer Joerg Berger, Stasi victims tell in postings on their hompage http://www.sjb-fonds-opfer.com. Berger stated before his early death in his biography that they tried to pollute him with arsenic.
Arsenic and many of its compounds are especially potent poisons. Many water supplies close to mines are contaminated by these poisons. Arsenic disrupts ATP production through several mechanisms. At the level of the citric acid cycle, arsenic inhibits lipoic acid which is a cofactor for pyruvate dehydrogenase; and by competing with phosphate it uncouples oxidative phosphorylation, thus inhibiting energy-linked reduction of NAD+, mitochondrial respiration and ATP synthesis. Hydrogen peroxide production is also increased, which might form reactive oxygen species and oxidative stress. These metabolic interferences lead to death from multi-system organ failure, probably from necrotic cell death, not apoptosis. A post mortem reveals brick red coloured mucosa, owing to severe haemorrhage. Although arsenic causes toxicity, it can also play a protective role.[
Elemental arsenic and arsenic compounds are classified as “toxic” and “dangerous for the environment” in the European Union under directive 67/548/EEC. The International Agency for Research on Cancer (IARC) recognizes arsenic and arsenic compounds as group 1 carcinogens, and the EU lists arsenic trioxide, arsenic pentoxide and arsenate salts as category 1 carcinogens.
Arsenic is known to cause arsenicosis owing to its manifestation in drinking water, “the most common species being arsenate [HAsO42- ; As(V)] and arsenite [H3AsO3 ; As(III)]”. The ability of arsenic to undergo redox conversion between As(III) and As(V) makes its availability in the environment more abundant. According to Croal, Gralnick, Malasarn and Newman, “[the] understanding [of] what stimulates As(III) oxidation and/or limits As(V) reduction is relevant for bioremediation of contaminated sites (Croal). The study of chemolithoautotrophic As(III) oxidizers and the heterotrophic As(V) reducers can help the understanding of the oxidation and/or reduction of arsenic.
Treatment of chronic arsenic poisoning is easily accomplished. British anti-lewisite (dimercaprol) is prescribed in dosages of 5 mg/kg up to 300 mg each 4 hours for the first day. Then administer the same dosage each 6 hours for the second day. Then prescribe this dosage each 8 hours for eight additional days. However the Agency for Toxic Substances and Disease Registry (ATSDR) states that the long term effects of arsenic exposure cannot be predicted. Blood, urine, hair and nails may be tested for arsenic, however these tests cannot foresee possible health outcomes due to the exposure. Excretion occurs in the urine and long term exposure to arsenic has been linked to bladder and kidney cancer in addition to cancer of the liver, prostate, skin, lungs and nasal cavity.[
Occupational exposure and arsenic poisoning may occur in persons working in industries involving the use of inorganic arsenic and its compounds, such as wood preservation, glass production, nonferrous metal alloys and electronic semiconductor manufacturing. Inorganic arsenic is also found in coke oven emissions associated with the smelter industry.

THE DDR GESTAPO-STASI MURDER GANG responsable for the murder of Lutz Eigendorf

The talented Eigendorf played for East German side Dynamo Berlin.
He made his debut for the GDR in an August 1978 match against Bulgaria, immediately scoring his first two goals in a 2–2 draw. He went on to collect six caps, scoring three goals.[1] His final international was a February 1979 friendly match against Iraq.
On 20 March 1979, after a friendship match between Dynamo and West German club 1. FC Kaiserslautern in Gießen he fled to the west hoping to play for that team. But because of his defection he was banned from play for one year by UEFA and instead spent that time as a youth coach with the club.
This was not the first time an East German athlete had fled to the west, but it was a particularly embarrassing defection. Eigendorf’s club Dynamo was under the patronage of the Stasi, East Germany’s secretive state police, and subject to the personal attentions of the organisation’s head, Erich Mielke. He ensured that the club’s roster was made up of the country’s best players, as well as arranging for the manipulation of matches in Dynamo’s favour. After his defection Eigendorf openly criticised the DDR in the western media.
His wife Gabriele remained behind in Berlin with their daughter and was placed under constant police surveillance. Lawyers working for the Stasi quickly arranged a divorce and the former Frau Eigendorf re-married. Her new husband was eventually revealed as a Lothario – an agent of the state police whose role it was to spy on a suspect while romancing them.
In 1983 Eigendorf moved from Kaiserslautern to join Eintracht Braunschweig, all the while under the scrutiny of the Stasi who employed a number of West Germans as informants. On 5 March that year he was badly injured in a suspicious traffic accident and died within two days. An autopsy indicated a high blood alcohol level despite the testimony of people he had met with that evening indicating that Eigendorf had only a small amount of beer to drink.
After German re-unification and the subsequent opening of the files of the former East Germany’s state security service it was revealed that the traffic accident had been an assassination attempt orchestrated by the Stasi, confirming the longtime suspicions held by many. A summary report of the events surrounding Eigendorf’s death was made on German television on 22 March 2000 which detailed an investigation by Heribert Schwan in the documentary “Tod dem Verräter” (“Death to the Traitor”).
On 10 February 2010, a former East German spy revealed the Stasi ordered him to kill Eigendorf, which he claimed not to have done

MfS has been accused of a number of assassinations against political dissidents and other people both inside and outside the country. Examples include the East German football player Lutz Eigendorf and the Swedish journalist Cats Falck.
The terrorists who killed Alfred Herrhausen were professionals. They dressed as construction workers to lay a wire under the pavement of the road along Mr. Herrhausen’s usual route to work. They planted a sack of armor-piercing explosives on a parked bicycle by the roadside. An infrared beam shining across the road triggered the explosion just when the limousine, one of three cars in a convoy, sped by.
The operation, from the terrorists’ point of view, was flawless: Mr. Herrhausen, the chairman of one of Europe’s most powerful companies, Deutsche Bank, was killed in the explosion along that suburban Frankfurt road on Nov. 30, 1989.
But was everything what it seemed?
Within days, the Red Army Faction — a leftist terrorist group that had traumatized West Germany since 1970 with a series of high-profile crimes and brazen killings of bankers and industrialists — claimed responsibility for the assassination. An intense manhunt followed. In June 1990, police arrested 10 Red Army Faction members who had fled to East Germany to avoid arrest for other crimes. To the police’s surprise, they were willing to talk. Equally confounding to authorities: All had solid alibis. None was charged in the Herrhausen attack.
Now, almost two decades later, German police, prosecutors and other security officials have focused on a new suspect: the East German secret police, known as the Stasi. Long fodder for spy novelists like John le Carré, the shadowy Stasi controlled every aspect of East German life through imprisonment, intimidation and the use of informants — even placing a spy at one point in the office of West German Chancellor Willy Brandt.
According to documents reviewed by The Wall Street Journal, the murders of Mr. Herrhausen and others attributed to the Red Army Faction bear striking resemblance to methods and tactics pioneered by a special unit of the Stasi. The unit reported to Stasi boss Erich Mielke and actively sought in the waning years of the communist regime to imitate the Red Army Faction to mask their own attacks against prominent people in Western Germany and destabilize the country.
“The investigation has intensified in recent months,” said Frank Wallenta, a spokesman for the Federal Prosecutor. “And we are investigating everything, including leads to the Stasi.”
If those leads turn out to be true, it would mean not only rewriting some of the most dramatic episodes of the Cold War, but would likely accelerate a broader soul-searching now under way in Germany about the communist past.
In building a reunified country, many Germans have ignored discussion of the brutal realities of its former communist half. When the former East Germany is discussed, it’s often with nostalgia or empathy for brothers hostage to Soviet influence.

Stasi boss Erich Mielke, middle, with unnamed associates
That taboo is slowly being broken. Last year’s Oscar-winning movie, “The Lives of Others,” chronicled in dark detail a Stasi agent’s efforts to subvert the lives of ordinary people. Material in the Stasi archives shows that senior leaders had a shoot-to-kill order against those fleeing from East to West — a controversial order that contradicts East German leaders’ claims that they never ordered any shootings.
This story is based on more than a dozen interviews with police, prosecutors and other security officials. Several policemen and prosecutors confirmed that the allegation of extensive Stasi involvement with the Red Army Faction is a key part of the current investigation.
Court cases in West Germany in the 1990s established that members of the Red Army Faction were granted free passage to other countries in the 1970s and refuge in East Germany in the 1980s. But the current investigation and documents from Stasi archives suggest far deeper involvement — that members of the Red Army Faction were not only harbored by the Stasi but methodically trained in sophisticated techniques of bombing and murder.
Traudl Herrhausen, Mr. Herrhausen’s widow, is one of those pushing for further investigation. She says she long suspected involvement by the Stasi or other intelligence service such as the KGB, but never spoke publicly because she didn’t have evidence and didn’t want to interfere in the investigation. She says she is now breaking an 18-year silence in her desire to see justice done. “Now I want to look my husband’s killers in the eye,” she said in an interview.
The Red Army Faction was founded about 1970 by a band of leftists who justified their terrorism based on opposition to West Germany’s ruling elite. Killing members of this elite would provoke the West German state to take repressive measures that would show its true fascist face, Red Army Faction leaders believed.
In its early years, the group, also known as the Baader-Meinhof band, made headlines with prison breaks, bank robberies, bomb attacks and deadly shootouts. Four gang members led by Ulrike Meinhof freed Red Army Faction leader Andreas Baader from a Berlin jail a month after his arrest.
Red Army Faction violence in West Germany intensified in 1977 when Jürgen Ponto, then head of Dresdner Bank, was shot and killed at his home. Five weeks later, the group killed four people and abducted the chairman of the German employer association, Hans-Martin Schleyer, one of West Germany’s most prominent businessmen. It was the start of a six-week ordeal in which neither government nor terrorists would compromise. To support the Red Army Faction cause, Palestinian terrorists hijacked a Lufthansa jet in Spain, forcing it to land in Mogadishu, Somalia. After the plane was rushed by West German commandos, top Red Army Faction leaders in West Germany committed suicide and Mr. Schleyer was executed by his captors.
Red Army Faction violence began to abate in the late 1970s after the Lufthansa incident. Many in Germany thought the group — whose attacks were often crude — lost its will to kill after the arrest of its senior leaders in 1982. So when the group appeared to renew its terror campaign with a series of high-profile attacks in 1985, police were stunned by the level of their sophistication and determination.
This time, the group dazzled police with its ability to hit targets and leave little substantial evidence behind. They used high-tech devices no one thought they possessed. Their marksmen killed with military precision.

Weapons used by terrorists during the 1977 kidnapping of German industrialist Hanns-Martin Schleyer.
Surprisingly, members of the Red Army Faction so-called third generation had a policeman’s understanding of forensic science. From 1985 onward, the Red Army Faction rarely left a fingerprint or other useful piece of evidence at a crime scene, according to court records. The murder cases from this era are still open. Some suspected Stasi involvement, but no one could ever prove it, according to a senior police official.
The 1989 car-bomb murder of Mr. Herrhausen particularly stunned police with its audacity and sophistication. Mr. Herrhausen was the head of Deutsche Bank, Germany’s largest bank. He was part of the political-business elite that helped turn West Germany from a war-ravaged rump state into an economic powerhouse — all while East Germany languished in frustration. Mr. Herrhausen was a vocal proponent of a united Germany.
In November 1989, Mr. Herrhausen was following the fall of the Berlin wall and events in the Soviet Union closely, conferring frequently with Mikhail Gorbachev, according to his wife and friends. Then on Nov. 27, Mr. Herrhausen announced a plan to acquire the investment banking firm Morgan Grenfell — at the time a record-breaking bank acquisition.
Also during November, a spot along Mr. Herrhausen’s usual route to work was closed because of construction. Terrorists, dressed as construction workers, laid an electric wire under the road’s pavement. On Nov. 29, the stretch reopened.
On the morning of Nov. 30, like every workday morning, Mr. Herrhausen stepped into his limousine at about 8:30. Mr. Herrhausen’s driver waited about one minute to allow the first of the three-car entourage to drive ahead and survey the road.
“It was the route they hadn’t used in weeks,” Mrs. Herrhausen said.
As Mr. Herrhausen sped down the road, a team of terrorists waited. Beside the road, a parked bicycle held a sack of armor-piercing explosives. The detonator was connected by the electric wire under the road to a trigger activated by an interruption in an infrared beam shining across the road.
A terrorist activated the detonator after the first car of bodyguards drove past the bomb. Mr. Herrhausen died at the scene.
As they had during previous attacks, police set up dragnets to round up Red Army Faction cadre. But the June 1990 arrests of 10 members of the group who had earlier been granted political asylum in East Germany produced no leads. All the seized Red Army Faction members had solid alibis.
In July 1991, prosecutors believed they had a breakthrough when an informant claimed he had allowed two members of the Red Army Faction to stay at his home near the Herrhausen residence. Prosecutors followed that trail 13 years before dropping charges in 2004.
Frustrated with the inability of prosecutors to solve the Herrhausen case and believing that prosecutors were ignoring other leads including possible Stasi involvement, German officials replaced the prosecutor overseeing the case.
Police acknowledge that part of the reason for their focus on possible Stasi involvement was that all other leads had dried up. But they say they also knew that over the years the Stasi had worked with and given explosives to other terrorists, including “Carlos the Jackal” and the Basque group ETA in Spain. And in 2001 to 2003, an undercover police officer met with a man who claimed he had been a killer for the Stasi operating in Western Germany, although police were never able to tie him to specific murders.
German investigators turned their attention to Wartin, a small eastern German village nestled in yellow-brown fields of grain near the Polish border. Today, sheep graze in a field spotted with wooden posts.
In the 1980s, however, Wartin was home to the Stasi’s AGM/S — “Minister Working Group/Special Operations.” It got its name because it reported to Mr. Mielke, the minister who headed the Stasi for almost all of East Germany’s 40-year history.
The Wartin unit’s peacetime duties included the kidnapping and murder of influential people in the West, according to Stasi records reviewed by The Wall Street Journal in the Stasi archives in Berlin.
The documents say the unit’s activities included “intimidating anti-communist opinion leaders” by “liquidation,” and “kidnapping or hostage taking, connected with the demand that political messages be read,” according to a description of the unit’s activities written by a senior Wartin official in 1982.
Based on these documents, German investigators increasingly believe that the Stasi played a more active role than previously believed in Red Army Faction terrorism. After years of not being able to draw parallels between the Stasi unit in Wartin and the Red Army Faction killings, police are now focusing closely on such a link. Joachim Lampe, who assisted the successful prosecution of the first wave of Red Army Faction terrorists up until 1982 and was then assigned to prosecute Stasi-related crimes in West Germany, says it’s time to compare the activities of Wartin with the activities of the Red Army Faction to see where they overlap. “It is an important line of investigation,” he said.
A year after the Red Army Faction’s first generation collapsed in 1972, an internal Wartin report said cooperation with terrorists is possible if the individuals could be trusted to maintain secrecy and obey orders. Initial contacts, however, may not have taken place until later in the decade. Disillusionment gripped many of the terrorists living on the lam, according to court records citing witness statements by accused terrorists. Beginning about 1980, the Stasi granted refuge to 10 members of the Red Army Faction in East Germany and gave them assumed identities.
The Stasi sympathized with the anti-capitalist ideals of the Red Army Faction, but Stasi leaders were concerned about placing their trust in a group of uncontrollable leftist militants, a review of Stasi records shows. Stasi officials did not want to tarnish East Germany’s international reputation, so they toyed with different concepts for cooperation with terrorist groups, according to a prosecutor who has investigated Stasi involvement with terrorism.
One suggestion, contained in a document prepared for new officers assigned to the unit, was to emulate Romanian intelligence, which successfully worked with the terrorist “Carlos” to bomb the Radio Free Europe office in Munich, Germany, in 1981. To assist in such operations, the Wartin unit developed highly specialized explosives, poisons and miniature firearms.
About 1980 the Stasi also proposed a second strategy: instead of using a terrorist group directly — such cooperation always contained risk of discovery — they could simply execute attacks so similar to those of known terrorists that police would never look for a second set of suspects, according to Wartin records. The Wartin leadership called this strategy the “perpetrator principle,” according to Stasi records. The unit’s progress in implementing the steps to imitate terrorist attacks is described in a series of progress reports by Wartin officials between 1980 and 1987.
In September 1981, Red Army Faction terrorists attempted to kill U.S. Gen. James Kroesen in Heidelberg, Germany, shooting a bazooka at his car. About the same time, members of the same Red Army Faction team visited East Germany, where they were asked by the Stasi to shoot a bazooka at a car containing a dog. The dog died, according to court records.
In Wartin, officials wrote up a detailed description of the Red Army Faction members’ re-enactment of the Kroesen attack. “It is important to collect all accessible information about the terrorist scene in imperialist countries, to study and analyze their equipment, methods and tactics, so we can do it ourselves,” a senior Wartin official wrote in February 1982, according to the report.
In 1982, West German police discovered two troves of Red Army Faction weapons and documents buried in German forests. Three terrorists, including Red Army Faction leader Christian Klar, were arrested when they approached the sites. The troves were buried in locations easy to find at night, a tactic used by Wartin’s own agents to store operational equipment in West Germany, according to an investigator who viewed the troves and Stasi records.
That same year, a Wartin official described the staged bombing of a moving vehicle. According to the report, several Stasi officers shed “tears of joy” when electronic sensors detected the approaching car and ignited the detonator.
A spokesman at Germany’s federal police investigative agency, the equivalent of the U.S. Federal Bureau of Investigation, declined to comment on the close similarity between the detonator used in the demonstration and the device that killed Mr. Herrhausen, saying this is part of their investigation.
Wartin officers continued their preparations for imitating terrorist attacks in West Germany, according to a 1985 internal Wartin report. They created a special archive profiling the characteristics of known terrorists and terrorist groups, and taught staff members to execute nearly identical attacks, according to Stasi records. Each year, the unit’s officers detailed the unit’s success in teaching these techniques in their annual reports, according to the reports.
Then, in 1987, the AGM/S stopped offensive operations. The unit was disbanded.
Werner Grossmann, a former three-star Stasi General and former head of foreign intelligence operations, says the AGM/S was responsible for planning attacks in West Germany, but was dissolved “because it didn’t produce results.” Mr. Grossmann assumed control of part of the AGM/S after most of the unit was dissolved.
Mr. Grossmann says he took control of part of the AGM/S because he wanted to run intelligence operations against West Germany’s civil defense infrastructure.
“I refused to have anything to do with terrorism and terrorists,” Mr. Grossmann said in an interview. He said he didn’t have any influence over the AGM/S activities before 1987 and wasn’t informed about the unit’s activities before it came under his control.
Olaf Barnickel, a career Stasi officer who served at Wartin, says his unit planned murders in West Germany, but never committed one. “It was all theory and no practice,” Mr. Barnickel said in an interview.
But some German police are unpersuaded. They believe the seeds may have been planted for future violent attacks.
In November 1989, as East Germany disintegrated, groups of citizens forced their way into Stasi installations, seizing control. In Wartin, a local church minister led a group of demonstrators to the main entrance of the Stasi base. The base closed.
Within the Stasi as a whole, the chain of command began to disintegrate. Links to organizations in West Germany, including the Red Army Faction, were broken.
Sixteen months after Mr. Herrhausen’s murder, the Red Army Faction claimed its last victim, killing Detlev Karsten Rohwedder, the head of the Treuhandanstalt, the powerful trust that controlled most state-owned assets in the former East Germany and was overseeing their privatization. Mr. Rohwedder was killed while he was standing by the window of his house in Düsseldorf.
The murder was performed by a trained sharpshooter, according to a police official familiar with the investigation. The Stasi trained members of the Red Army Faction in sharpshooting skills and had its own teams of sharpshooters, according to witness statements by Stasi officials to a Berlin prosecutor and Stasi records.
In 1998, the Red Army Faction issued the last of its communiques, announcing it was disbanding. German police attribute the group’s disappearance to changing times, which made the group seem a relic of the past. Indeed, the Red Army Faction today is largely seen by the German public as part of the social upheaval that plagued West Germany in the 1970s and 1980s. More than one in four Germans consider former Red Army Faction members to have been misguided idealists. More than half now think the investigations should be closed for good in the coming decade when the current group of Red Army Faction prisoners finish serving their prison sentences.
German prosecutors say their investigation of the Stasi’s role is continuing.
Since last month, Mrs. Herrhausen has been in contact with the next of kin of victims in the other unsolved Red Army Faction murder cases, looking for support to push the investigation. The bomb that killed her husband nearly 18 years ago exploded soon after he left for work, within earshot of their home in suburban Frankfurt.
“I still hear that bomb every day,” she says.

Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution.
The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.
Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.
The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.
This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.
Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.
Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment.

The name of Benno Ohnesorg became a rallying cry for the West German left after he was shot dead by police in 1967. Newly discovered documents indicate that the cop who shot him may have been a spy for the East German secret police.
It was one of the most important events leading up to the wave of radical left-wing violence which washed over West Germany in the 1970s. On the evening of June 2, 1967, the literature student Benno Ohnesorg took part in a demonstration at West Berlin’s opera house. Mohammad Reza Pahlavi, the shah of Iran, was to attend and the gathered students wanted to call attention to his brutal regime.
The protests, though, got out of hand. Pro-shah demonstrators, some of them flown in from Iran for the occasion, battled with the student protestors. West Berlin police also did their part, brutally beating back the crowd. At 8:30 p.m., a shot was fired, and a short time later the 26-year-old Ohnesorg, having been hit in the back of the head, became the left wing’s first martyr.
Now, though, the history of the event may have to be re-written. New documents discovered in the Stasi archive — the vast collection of files left behind by the East German secret police — reveal that the policeman who shot Ohnesorg, Karl-Heinz Kurras, could in fact have been a spy for East Germany’s communist regime.
In an article that will appear in late May in Deutschlandarchiv, a periodical dedicated to the ongoing project of German reunification, Helmut Müller-Enbergs and Cornelia Jabs reveal that documents they found in the Stasi papers show that Kurras began working together with the Stasi in 1955. He had wanted to move to East Berlin to work for the East German police. Instead, he signed an agreement with the Stasi to remain with the West Berlin police force and spy for the communist state.
As a result of the new information, criminal charges have once again been filed against Kurras, who was acquitted twice, once in 1967 and again in 1970, of negligent homicide charges related to Ohnesorg’s death. Kurras told the Berlin paper Tagesspiegel on Friday that he had never worked together with the Stasi.
But in addition to finding the agreement between Kurras and the Stasi, the two researchers also discovered numerous documents indicating that the East Germans were pleased with the information Kurras passed along — particularly given that he was posted to a division responsible for rooting out moles within the West German police force.
Immediately after Ohnesorg’s death, Kurras received a Stasi communication ordering him to destroy his records and to “cease activities for the moment.” Kurras responded with his acquiescence and wrote “I need money for an attorney.”
The exact circumstances surrounding the death of Ohnesorg have never been completely clarified. Kurras himself, now 81, gave conflicting versions of the story during the investigation but the official version has long been that Kurras fired in self defense. Many others point to witness accounts whereby the police were beating Ohnesorg when the shot was fired.
It is still unclear how the new evidence might play into history’s understanding of the tragic event. The day was one full of violence, with demonstrators and police battling each other with pipes, wooden clubs and stones. Police were further incited by rumors that an officer had been stabbed earlier in the evening. Ohnesorg himself, however, was not directly involved in the violence.
West Berlin in the 1960s and 70s became a focal point of German left wing radicalism. The city had long been left-leaning, and the fact that Berliners were exempt from military service meant that it became a magnate for pacifists and anti-state activists.
Ohnesorg’s death gave them an immediate rallying cry. As the left-wing movement became more radical, many justified their violent activities by pointing to the police brutality that led to the student’s death. A letter written by Ulrike Meinhof announcing the founding of the Red Army Faction, which appeared in SPIEGEL in the fall of 1967, explicitly mentioned the Ohnesorg incident. The RAF went on to terrorize Germany for decades, ultimately killing over 30 people across the country. The radical “June 2 Movement” used the date of the incident in its name.
Kurras, for his part, seems to have been a highly valued Stasi agent. In his files, it is noted that “he is prepared to complete any task assigned to him.” It also mentions that he is notable for having the “courage and temerity necessary to accomplish difficult missions.”

Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.

The serial betrayer and cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica

The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention ofGoogle Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011

In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.

The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.

This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)

Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelznr, Berlin.

Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror

The Stasi murder:
„GoMoPa“ & Backers: Blackmailing, Extortion, Racketeering, Internet Murder and Murder. These are the weapons of the East-German “NACHRICHTENDIENST” “GoMoPa”, a renegate confesses.
Deep Throat, Berlin; confesses: „Since months the „GoMoPa“ keyfigures like Klaus-Dieter Maurischat< are in hide-aways because the German police is hunting them for the wirecard fraud and a lot of other criminal actions. I left the group when I noticed that. The found and former Stasi-Colonel Ehrenfried Stelzer died under strange circumstances in Berlin. This has been told to us. But it is also possible that his death was staged. In any case the criminal organization of “GoMoPa” is responsible for the murder of Heinz Gerlach by dioxin. Now my life is also in danger that is why I hide myself.”
According to Deep Throat, Hans J. the murder was done with the help of the old Stasi-connections of the “NACHRICHTENDIENST” “GoMoPa”.
The renegate says that computer hacker Thomas Promny and Sven Schmidt are responsible for the computer crimes and he states that the crime organization of “GoMoPa” has also helpers inside internet companies like Go-Daddy, Media-on and even in Google, Hamburg..

THE “NACHRICHTENDIENST”:New criminal police action against “GoMoPa”:

German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground.

On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders say they have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the
Encyclopedia – Britannica

The case is also directed against Google, Germany, whilst supporting criminal action of “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.

Besides that many legal institutions, individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.

The case number is

ST/0148943/2011

Stasi-Dioxin: The “NACHRICHTENDIENST”  searching for the perfect murder:

Viktor Yushchenko was running against Prime Minister Viktor Yanukovych. Yanukovych was a political ally of outgoing president Leonid Kuchma. Kuchma’s administration depended upon corruption and dishonesty for its power. Government officials ruled with a sense of terror rather than justice. For the powerful and wealthy few, having Yanukovych elected president was important. Should Yushchenko win, Ukraine’s government was sure to topple. Yushchenko’s campaign promises included a better quality of life for Ukrainians through democracy. His wife, Katherine, told CBS in a 2005 interview, “He was a great threat to the old system, where there was a great deal of corruption, where people were making millions, if not billions.”
On September 6, 2004, Yushchenko became ill after dining with leaders of the Ukrainian secret police. Unlike other social or political engagements, this dinner did not include anyone else on Yushchenko’s team. No precautions were taken regarding the food. Within hours after the dinner, Yushchenko began vomiting violently. His face became paralyzed; he could not speak or read. He developed a severe stomachache and backache as well as gastrointestinal pain. Outwardly, Yushchenko developed what is known as chloracne, a serious skin condition that leaves the face scarred and disfigured.
By December 2004, doctors had determined that Yushchenko had been the victim of dioxin poisoning. Dioxin is a name given to a group of related toxins that can cause cancer and even death. Dioxin was used in the biochemical weapon called Agent Orange during the Vietnam War controversial war in which the United States aidedSouth Vietnam in its fight against a takeover by Communist North Vietnam). Yushchenko had a dioxin level six thousand times greater than that normally found in the bloodstream. His is the second-highest level ever recorded.
Yushchenko immediately suspected he had been poisoned, though Kuchma’s camp passionately denied such allegations. Instead, when Yushchenko showed up at a parliamentary meeting shortly after the poisoning incident, Kuchma’s men teased him, saying he must have had too much to drink or was out too late the night before.
Dioxin can stay in the body for up to thirty-five years. Experts predict that his swelling and scars will fade but never completely disappear. John Henry, a toxicologist at London’s Imperial Hospital, told RedNova.com, “It’ll be a couple of years, and he will always be a bit pockmarked. After damage as heavy as that, I think he will not return to his film star looks.” And Yushchenko will live with the constant threat of cancer.
At first it was believed the poison must have come from a Russian laboratory. Russia was a strong supporter of Kuchma and lobbied against Yushchenko in the 2004 election. But by July 2005, Yushchenko’s security forces were able to trace the poison to a lab in Ukraine. Though not entirely ruling out Russia’s involvement, Yushchenko is quoted on his Web site as saying “I’m sure that even though some people are running from the investigation, we will get them. I am not afraid of anything or anybody.”

Evidence shows that such a perfect murder plotted by former Stasi agents is the cause of the death of German watchdog and journalist Heinz Gerlach.

The Ministry for State Security (German: Ministerium für Staatssicherheit (MfS), commonly known as the Stasi (IPA: [‘?tazi?]) (abbreviation German: Staatssicherheit, literally State Security), was the official state security service of East Germany. The MfS was headquartered in East Berlin, with an extensive complex in Berlin-Lichtenberg and several smaller facilities throughout the city. It was widely regarded as one of the most effective and repressive intelligence and secret police agencies in the world. The MfS motto was “Schild und Schwert der Partei” (Shield and Sword of the Party), that is the ruling Socialist Unity Party of Germany (SED).

According to the confessions of an informer, Berlin lawyer Jochen Resch writes most of the “articles” of the communist “STASI” agency “GoMoPa” himself or it is done by lawyers of his firm. The whistleblower states that lawyer Resch is the mastermind behind the “CYBER-STASI” called “NACHRICHTENDIENST” “GoMoPa”. Bizarre enough they use Jewish names of non-existing Jewish lawyers by the name of “Goldman, Morgenstern and Partner” to stage their bogus “firm”.  Further involved in their complots are a “detective” Medard Fuchsgruber and “STASI”-Colonel Ehrenfried Stelzer, “the first crime expert” in the former communist East-Germany.
According to London based Meridian Capital hundreds and thousands of wealthy people and companies have paid to the “NACHRICHTENDIENST” to avoid their cyberstalking (see article below).
Finally the German criminal police started their investigations (case number ST/0148943/2011).
The “NACHRICHTENDIENST” is also involved in the death of the well-known German watchdog and journalist Heinz Gerlach who died under strange circumstances in July 2010.
Only hours after his death the “NACHRICHTENDIENST” was spreading the news that Mr Gerlach died of blood pollution and set the stage for a fairy tale. Months before his death the “NACHRICHTENDIENST” started a campaign to ruin his reputation and presumably was also responsable for cyberattacks to bring his website down. In fact they presumably used the same tactics also against our servers. Therefore we investigated all internet details of them and handed the facts to the FBI and international authorities.

Story background:
Now it seems the STASI is back again in business after transforming it in to the CYBER-STASI of the 21st Century.

The serial betrayer and  cyberstalker Klaus Maurischat is on the run again. The latest action against him (see below) cause him to react in a series of fake statements and “press releases” – one more absurd than the other. Insider analyze that his criminal organisation “GoMoPa” is about to fade away.
On our request the German criminal police (Kriminalpolizei) has opened new cases against the notorious “GoMoPa” organisation which already fled in the underground. Insiders  say they  have killed German journalist and watchdog Heinz Gerlach and their criminal record is bigger than the Encyclopedia – Britannica
The case is also directed against Google, Germany, whilst supporting criminal action of  “GoMoPa” for years and therefore give them the chance to blackmail successfull businessman. This case is therefore an example and will be followed by many others as far as we can project. Furthermore we will bring the case to the attention of the German lawyers community which will not tolerate such misconduct by Googles German legal representative Dr. Arndt Haller and we will bring the case to the attention of Google Inc in Mountain View, USA, and the American ministry of Justice to stop the Cyberstalkers once and for all.
Besides that many legal institutions,  individuals and firms have already contacted us to help to clarify the death of Mr. Heinz Gerlach and to prosecute his murderers and their backers.
The case number is ST/0148943/2011
In a series of interviews beginning 11 months before the sudden death of German watchdog Heinz Gerlach Berlin lawyer Joschen Resch unveilved secrets of Gerlach, insiders say. Secret documents from Mr Gerlachs computer were published on two dubious hostile German websites. Both have a lot of similarities in their internet registration. One the notorious “GoMoPa” website belongs to a n Eastern German organization which calls itself “
Numerous attempts have been made to stop our research and the publication of the stories by “GoMoPa” members in camouflage thus confirming the truth and the substance of it in a superior way.
Only two articles let the German audience believe that the famous journalist and watchdog Heinz Gerlach died on natural courses by blood pollution. The first one, published only hours after the death of Mr Heinz Gerlach by the notorious “GoMoPa” (see article below) and a second 3 days later by a small German local newspaper, Weserbergland Nachrichten.

Many people including the hostile Gerlach website “Akte Heinz Gerlach” doubted that this man who had so many enemies and friends would die of natural causes without any previous warning. Rumours occured that Mr. Gerlach’s doctor doubted natural courses at all. After many critical voices discussed the issue a small website of a small German local newspaper – which never before had reported about Mr. Heinz Gerlach and which is not even in the region of Mr Gerlachs home – published that Mr Gerlach died of blood pollution. Weserbergland-Nachrichten published a long article about the deadly consequences of blood pollution and did not even name the source of such an important statement. It claimed only that somebody of Gerlachs inner circle had said this. It is a proven fact that after the collpase of the Eastern German Communist Regime many former Communist propaganda agents went to regional newspapers – often in Western Germany like Günther Schabowski did the man who opened the “Mauer”.

The theatre stage was set: One day later the hostile Gerlach website “Akte Heinz Gerlach” took the agenda publishing that Mr Gerlach had died for natural causes without any further research at all.

This was done by a website which for months and months and months reported everything about Mr. Gerlach.
Furthermore a research proves that the technical details regarding the website hosting of this hostile website “Akte Heinz Gerlach” proves that there are common details with the hosting of “GoMoPa” and their affiliates as proven by the SJB-GoMoPa-victims (see http://www.sjb-fonds-opfer.com)
Insiders believe that the murderers of Mr. Heinz Gerlach are former members of the Eastern German Terror Organisation “Stasi” with dioxins. They also believe that “GoMoPa” was part of the plot. At “GoMoPa”’ a person named Siegfried Siewers was officialy responsible for the press but never appeared in public. “GoMoPa”-victims say that this name was a cameo for “GoMoPa” frontrunner Klaus Maurischat who is controlled by the Stasi Top Agent Ehrenfried Stelzner, Berlin.

Siegfried Sievers, a former Stasi member is responsible for the pollution of millions Germanys for many years with dioxins. This was unveiled at 5th of January 2011 by German prosecutors.
The victims say that Maurischat (probably also a Stasi cameo) and Sievers were in contact as Sievers acted as Stasi Agent and was in fact already a specialist in dioxins under the Communist Terror Regime in Eastern Germany.
Furthermore the Stasi Top Agent Ehrenfried Stelzer disguised as Professor for Criminal studies during the Communist Regime at the Eastern Berlin Humboldt University.

Background:
The man behind the Berlin lawyer Jochen Resch and his activities is Ehrenfried Stelzer, former Stasi Top officer in Berlin and “Professor for Criminal Studies” at the Eastern Berlin Humboldt University during the Communist regime, the SJB-GoMoPa-victims say (www.sjb-fonds-opfer.com) is responsable for the killing of German watchdog and journalist Heinz Gerlach.
These informations stem from various sources who were close to the criminal organization of GoMoPa in the last years. The SJB-GoMoPa say that the well-known German watchdog and journalist Heinz Gerlach was killed by former Stasi members with dioxins. Polychlorinated dibenzodioxins (PCDDs), or simply dioxins, are a group of organic polyhalogenated compounds that are significant because they act as environmental pollutants. They are commonly referred to as dioxins for simplicity in scientific publications because every PCDD molecule contains a dioxin skeletal structure. Typically, the p-dioxin skeleton is at the core of a PCDD molecule, giving the molecule a dibenzo-p-dioxin ring system. Members of the PCDD family have been shown to bioaccumulate in humans and wildlife due to their lipophilic properties, and are known teratogens, mutagens, and confirmed (avered) human carcinogens. They are organic compounds.
Dioxins build up primarily in fatty tissues over time (bioaccumulate), so even small exposures may eventually reach dangerous levels. In 1994, the US EPA reported that dioxins are a probable carcinogen, but noted that non-cancer effects (reproduction and sexual development, immune system) may pose an even greater threat to human health. TCDD, the most toxic of the dibenzodioxins, is classified as a Group 1 carcinogen by the International Agency for Research on Cancer (IARC).
In 2004, a notable individual case of dioxin poisoning, Ukrainian politician Viktor Yushchenko was exposed to the second-largest measured dose of dioxins, according to the reports of the physicians responsible for diagnosing him. This is the first known case of a single high dose of TCDD dioxin poisoning, and was diagnosed only after a toxicologist recognized the symptoms of chloracne while viewing television news coverage of his condition.
German dioxin scandal: In January 2011 about 4700 German farms were banned from making deliveries after tests at the Harles und Jentzsch plant in the state of Schleswig-Holstein showed high levels of dioxin. Again this incident appears to involve PCBs and not PCDDs at all. Dioxin were found in animal feed and eggs in many farms. The person who is responsible for this, Siegfried Sievert is also a former Stasi Agent. At “GoMoPa” the notorious Eastern-Berlin press agency (see article below) one of the henchmen acted under the name of “Siegfried Siewert”.
Further evidence for the killing of Mr.Heinz Gerlach is provided by the SJB-GoMoPa-victims by analyzing the dubious role of former Stasi-Top-agent Ehrenfried Stelzer, also a former “Professor for Crime Studies” under the Communist regime in Eastern Germany and the dubious role of “detective” Medard Fuchsgruber. Both are closely tied to the dubious “GoMoPa” and Berlin lawyer Jochen Resch.
According to the SJB-GoMoPa-victims is Berlin lawyer Jochen Resch the mastermind of the criminal organization “GoMoPa2. The victims state that they have a source inside “GoMoPa” who helped them discover  the shocking truth. The so-called “Deep Throat from Berlin” has information that Resch had the idea to found the criminal organization “GoMoPa” and use non-existing Jewish lawyers  named Goldman, Morgenstern & Partner as camouflage. Their “office” in Madison Avenue, New York, is a mailbox. This is witnessed by a German Ex-Patriot, a lawyer, whose father, Heinz Gerlach, died under strange circumstances.
Resch seems to use “GoMoPa” as an instrument to blackmail parts of the German Property and Investment section.

-”Worse than the Gestapo.” —Simon Wiesenthal, Nazi hunter said about the notorious “Stasi”.

Less than a month after German demonstrators began to tear down the Berlin Wall on November 9, 1989, irate East German citizens stormed the Leipzig district office of the Ministry for State Security (MfS)—the Stasi, as it was more commonly called. Not a shot was fired, and there was no evidence of “street justice” as Stasi officers surrendered meekly and were peacefully led away. The following month, on January 15, hundreds of citizens sacked Stasi headquarters in Berlin. Again there was no bloodshed. The last bit of unfinished business was accomplished on May 31 when the Stasi radioed its agents in West Germany to fold their tents and come home.
The intelligence department of the Nationale Volksarmee (NVA), the People’s Army, had done the same almost a week earlier, but with what its members thought was better style. Instead of sending the five-digit code groups that it had used for decades to message its spies in West Germany, the army group broadcast a male choir singing a children’s ditty about a duck swimming on a lake. There was no doubt that the singing spymasters had been drowning their sorrow over losing the Cold War in schnapps. The giggling, word-slurring songsters repeated the refrain three times: “Dunk your little head in the water and lift your little tail.” This was the signal to agents under deep cover that it was time to come home.
With extraordinary speed and political resolve, the divided nation was reunified a year later. The collapse of the despotic regime was total. It was a euphoric time for Germans, but reunification also produced a new national dilemma. Nazi war crimes were still being tried in West Germany, forty-six years after World War II. Suddenly the German government was faced with demands that the communist officials who had ordered, executed, and abetted crimes against their own people—crimes that were as brutal as those perpetrated by their Nazi predecessors—also be prosecuted.
The people of the former Deutsche Demokratische Republik (DDR), the German Democratic Republic, as the state had called itself for forty years, were clamoring for instant revenge. Their wrath was directed primarily against the country’s communist rulers—the upper echelon of the Sozialistische Einheitspartei (SED), the Socialist Unity Party. The tens of thousands of second-echelon party functionaries who had enriched themselves at the expense of their cocitizens were also prime targets for retribution.
Particularly singled out were the former members of the Stasi, the East German secret police, who previously had considered themselves the “shield and sword” of the party. When the regime collapsed, the Stasi had 102,000 full-time officers and noncommissioned personnel on its rolls, including 11,000 members of the ministry’s own special guards regiment. Between 1950 and 1989, a total of 274,000 persons served in the Stasi.
The people’s ire was running equally strong against the regular Stasi informers, the inoffizielle Mitarbeiter (IMs). By 1995, 174,000 had been identified as IMs, or 2.5 percent of the total population between the ages of 18 and 60. Researchers were aghast when they found that about 10,000 IMs, or roughly 6 percent of the total, had not yet reached the age of 18. Since many records were destroyed, the exact number of IMs probably will never be determined; but 500,000 was cited as a realistic figure. Former Colonel Rainer Wiegand, who served in the Stasi counterintelligence directorate, estimated that the figure could go as high as 2 million, if occasional stool pigeons were included.
“The Stasi was much, much worse than the Gestapo, if you consider only the oppression of its own people,” according to Simon Wiesenthal of Vienna, Austria, who has been hunting Nazi criminals for half a century. “The Gestapo had 40,000 officials watching a country of 80 million, while the Stasi employed 102,000 to control only 17 million.” One might add that the Nazi terror lasted only twelve years, whereas the Stasi had four decades in which to perfect its machinery of oppression, espionage, and international terrorism and subversion.
To ensure that the people would become and remain submissive, East German communist leaders saturated their realm with more spies than had any other totalitarian government in recent history. The Soviet Union’s KGB employed about 480,000 full-time agents to oversee a nation of 280 million, which means there was one agent per 5,830 citizens. Using Wiesenthal’s figures for the Nazi Gestapo, there was one officer for 2,000 people. The ratio for the Stasi was one secret policeman per 166 East Germans. When the regular informers are added, these ratios become much higher: In the Stasi’s case, there would have been at least one spy watching every 66 citizens! When one adds in the estimated numbers of part-time snoops, the result is nothing short of monstrous: one informer per 6.5 citizens. It would not have been unreasonable to assume that at least one Stasi informer was present in any party of ten or twelve dinner guests.

THE STASI OCTOPUS

Like a giant octopus, the Stasi’s tentacles probed every aspect of life. Full-time officers were posted to all major industrial plants. Without exception, one tenant in every apartment building was designated as a watchdog reporting to an area representative of the Volkspolizei (Vopo), the People’s Police. In turn, the police officer was the Stasi’s man. If a relative or friend came to stay overnight, it was reported. Schools, universities, and hospitals were infiltrated from top to bottom. German academe was shocked to learn that Heinrich Fink, professor of theology and vice chancellor at East Berlin’s Humboldt University, had been a Stasi informer since 1968. After Fink’s Stasi connections came to light, he was summarily fired. Doctors, lawyers, journalists, writers, actors, and sports figures were co-opted by Stasi officers, as were waiters and hotel personnel. Tapping about 100,000 telephone lines in West Germany and West Berlin around the clock was the job of 2,000 officers.
Stasi officers knew no limits and had no shame when it came to “protecting the party and the state.” Churchmen, including high officials of both Protestant and Catholic denominations, were recruited en masse as secret informers. Their offices and confessionals were infested with eavesdropping devices. Even the director of Leipzig’s famous Thomas Church choir, Hans-Joachim Rotch, was forced to resign when he was unmasked as a Spitzel, the people’s pejorative for a Stasi informant.
Absolutely nothing was sacred to the secret police. Tiny holes were bored in apartment and hotel room walls through which Stasi agents filmed their “suspects” with special video cameras. Even bathrooms were penetrated by the communist voyeurs.8 Like the Nazi Gestapo, the Stasi was the sinister side of deutsche Gründlichkeit (German thoroughness).
After the Berlin wall came down, the victims of the DDR regime demanded immediate retribution. Ironically, their demands were countered by their fellow Germans in the West who, living in freedom, had diligently built einen demokratischen Rechtsstaat, a democratic state governed by the rule of law. The challenge of protecting the rights of both the victims and the accused was immense, given the emotions surrounding the issue. Government leaders and democratic politicians recognized that there could be no “quick fix” of communist injustices without jeopardizing the entire system of democratic jurisprudence. Moving too rapidly merely to satisfy the popular thirst for revenge might well have resulted in acquittals or mistrials. Intricate jurisdictional questions needed to be resolved with both alacrity and meticulousness. No German government could afford to allow a perpetrator to go free because of a judicial error. The political fallout from any such occurrence, especially in the East, could prove fatal to whatever political party occupied the chancellor’s office in Bonn at the time.
Politicians and legal scholars of the “old federal states,” or West Germany, counseled patience, pointing out that even the prosecution of Nazi criminals had not yet been completed. Before unification, Germans would speak of Vergangenheitsbewältigung (“coming to grips with the past”) when they discussed dealing with Nazi crimes. In the reunited Germany, this word came to imply the communist past as well. The two were considered comparable especially in the area of human rights violations. Dealing with major Nazi crimes, however, was far less complicated for the Germans: Adolf Hitler and his Gestapo and Schutzstaffel (SS) chief, Heinrich Himmler, killed themselves, as did Luftwaffe chief and Vice Chancellor Hermann Göring, who also had been the first chief of the Gestapo. The victorious Allies prosecuted the rest of the top leadership at the International War Crimes Tribunal in Nürnberg. Twelve were hanged, three received life terms, four were sentenced to lesser terms of imprisonment (up to twenty years), and three were acquitted.
The cases of communist judges and prosecutors accused of Rechtsbeugung (perversion of justice) are more problematic. According to Franco Werkenthin, a Berlin legal expert charged with analyzing communist crimes for the German parliament, those sitting in judgment of many of the accused face a difficult task because of the general failure of German justice after World War II. Not a single judge or prosecutor who served the Nazi regime was brought to account for having perverted justice—even those who had handed down death sentences for infringements that in a democracy would have been considered relatively minor offenses. Werkenthin called this phenomenon die Jauche der Justiz, the cesspool of justice.
Of course, the crimes committed by the communists were not nearly as heinous as the Nazis’ extermination of the Jews, or the mass murders in Nazi-occupied territories. However, the communists’ brutal oppression of the nation by means including murder alongside legal execution put the SED leadership on a par with Hitler’s gang. In that sense, Walter Ulbricht or Erich Honecker (Ulbricht’s successor as the party’s secretary-general and head of state) and secret police chief Erich Mielke can justifiably be compared to Hitler and Himmler, respectively.
Arrest warrants were issued for Honecker and Mielke. The Soviet government engineered Honecker’s escape to Moscow, where he became the ward of Soviet President Mikhail S. Gorbachev. When the Soviet Union crumbled, the new Russian President Boris Yeltsin expelled Honecker. He was arrested on his return to Germany, but a court decided against a trial when he was diagnosed with liver cancer. Honecker flew to Chile with his wife Margot to live with their daughter, a Chilean citizen by marriage. His exile was short, and he died in 1994. Mielke was not so fortunate: His KGB friends turned their backs on him. He was tried in Germany for the 1931 murder of two police officers, found guilty, and sentenced to six years in prison. Other charges, including manslaughter, were dismissed because of his advanced age and poor health.
Three other members of the twenty-one-member ruling Politburo also have been tried. Former Defense Minister Heinz Kessler was convicted of manslaughter in connection with the order to kill people who were trying to escape to the West. He received a seven-and-a-half-year term. Two others, members of the Central Committee and the National Defense Council, were tried with Kessler and sentenced to seven and a half years and five years, respectively. Politburo member Harry Tisch, who was also head of the communist trade union, was found guilty of embezzlement and served eighteen months. Six others, including Egon Krenz (Honecker’s successor as party chief), were charged with manslaughter. Krenz was found guilty, and on August 25, 1997, was sentenced to six and a half years in prison.
However, eight years after reunification, many of the 165 members of the Central Committee have not yet been put under investigation. In 1945, Nazis holding comparable or lesser positions were subject to automatic arrest by the Allies. They spent months or even years in camps while their cases were adjudicated. Moreover, the Nürnberg Tribunal branded the Reich and its Corps of Political Leaders, SS, Security Service (SD), Secret State Police (Gestapo), SA (Storm Troopers), and Armed Forces High Command criminal organizations. Similarly sweeping actions against communist leaders and functionaries such as Stasi officers were never contemplated, even though tens of thousands of political trials and human rights abuses have been documented. After the East German regime fell, German judicial authorities scrupulously avoided the appearance of waging witch-hunts or using the law as a weapon of vengeance. Prosecutors and judges made great efforts to be fair, often suspending legal action while requesting rulings from the supreme court on possible constitutional conflicts.
The victims of oppression clamored for revenge and demanded speedy prosecution of the erstwhile tyrants. They had little patience for a judicial system that was handicapped by a lack of unblemished and experienced criminal investigators, prosecutors, and judges. Despite these handicaps, the Berlin Central Police Investigations Group for Government Criminality, mindful that the statute of limitations for most communist crimes would expire at the end of 1999, made significant progress under its director Manfred Kittlaus, the able former director of the West Berlin state police. Kittlaus’s major task in 1998 was to investigate wrongful deaths, including 73 murders, 30 attempted murders, 583 cases of manslaughter, 2,938 instances of attempted manslaughter, and 425 other suspicious deaths. Of the 73 murders, 22 were classified as contract murders.
One of those tried and convicted for attempted contract murder was former Stasi collaborator Peter Haak, who was sentenced to six and a half years in prison. The fifty-two-year-old Haak took part in the Stasi’s 1981 Operation Scorpion, which was designed to pursue people who helped East Germans escape to the West. Proceedings against former General Gerhard Neiber, whose Stasi directorate was responsible for preventing escapes and for wreaking vengeance, were still pending in 1998.
Peter Haak’s murder plot was hatched after he befriended Wolfgang Welsch and his family. Welsch was a thorn in the side of the Stasi because of his success in smuggling people out of the DDR. Haak joined Welsch and the latter’s wife and seven-year-old daughter on a vacation in Israel, where he mixed a gram of thallium, a highly poisonous metallic chemical element used in rat poison, into the hamburgers he was preparing for a meal. Welsch’s wife and daughter vomited immediately after ingesting the poison and recovered quickly. Welsch suffered severe aftereffects, but eventually recovered: He had consumed a large amount of beer with the meal, and an expert testified that the alcohol had probably flushed the poison from his system.
Berlin Prosecutor General Christoph Schäfgen revealed that after the DDR’s demise 15,200 investigations had been launched, of which more than 9,000 were still active at the beginning of 1995. Indictments were handed down in 153 cases, and 73 perpetrators were convicted. Among those convicted were the aforementioned Politburo members as well as a number of border guards who had killed people who were trying to escape to the West.
Despite widespread misgivings about the judicial failures in connection with some Nazi crimes, a number of judges and prosecutors were convicted and jailed for up to three years for perversion of justice. In collusion with the Stasi, they had requested or handed down more severe sentences in political cases so that the state could collect greater amounts when the “convicts” were ransomed by the West German government. {The amount of ransom paid was governed by the time a prisoner had been sentenced to serve.)
The enormity of the task facing judicial authorities in reunified Germany becomes starkly evident when one examines the actions they have taken in all five former East German provinces and in East Berlin. From the end of 1990 to July 1996, 52,050 probes were launched into charges of murder, attempted murder, manslaughter, kidnapping, election fraud, and perversion of justice. A total of 29,557 investigations were halted for various reasons including death, severe illness, old age, or insufficient evidence. In those five and a half years, there were only 139 convictions.
The problem is even more staggering when cases of espionage are included. Between 1990 and 1996, the office of the federal prosecutor general launched 6,641 probes, of which 2,431 were terminated before trial—most due to the statute of limitations. Of 175 indictments on charges of espionage, 95 resulted in convictions. In addition to the cases handled at the federal level, the prosecutor general referred 3,926 investigations to state authorities, who terminated 3,344 without trial. State courts conducted 356 trials, resulting in 248 convictions. Because the statute of limitations for espionage is five years, the prosecutor general’s office told me in 1997 it was unlikely that more espionage trials would be conducted.
It is important to emphasize the difference between the statute’s application to so-called government crimes committed in East Germany before the collapse and to crimes, such as espionage, committed in West Germany. The Unification Treaty specifically permits the belated prosecution of individuals who committed acts that were punishable under the East German criminal code and who due to official connivance were not prosecuted earlier. There is no statute of limitations for murder. For most other crimes the limit is five years; however, due to the obstacles created by previous government connivance, the German parliament in 1993 doubled this time limit for prosecution of the more serious crimes. At the same time, the parliament decreed that all cases must be adjudicated by the end of 2002. For less serious offenses, the statute would have run out on December 31, 1997, but the parliament extended it to 2000.
A number of politicians, jurists, and liberal journalists pleaded for a general amnesty for crimes committed by former DDR leaders and Communist Party functionaries. A former West German supreme court judge, Ernst Mahrenholz, said the “sharp sword of justice prevents reconciliation.” Schäfgen, the Berlin prosecutor general, had this answer for the former high court judge and other amnesty advocates:

I cannot agree. We are raising no special, sharp sword against East Germans. We must pursue state-sponsored injustice in exactly the same manner as we do when a thief steals or when one human being kills another. If one wants to change that, then we would have to do away with the entire criminal justice system, because punishment always hurts. We are not criminalizing an entire people but only an ever shrinking, small portion.

German Foreign Minister Klaus Kinkel, who was West Germany’s minister of justice when the nation was unified, said this at a session of parliament in September 1991: “We must punish the perpetrators. This is not a matter of a victor’s justice. We owe it to the ideal of justice and to the victims. All of those who ordered injustices and those who executed the orders must be punished; the top men of the SED as well as the ones who shot [people] at the wall.” Aware that the feelings against communists were running high among their victims, Kinkel pointed to past revolutions after which the representatives of the old system were collectively liquidated. In the same speech before parliament, he said:

Such methods are alien to a state ruled by law. Violence and vengeance are incompatible with the law in any case. At the same time, we cannot tolerate that the problems are swept under the rug as a way of dealing with a horrible past, because the results will later be disastrous for society. We Germans know from our own experience where this leads. Jewish philosophy formulates it in this way: “The secret of redemption is called remembering.”

Defense attorneys for communist officials have maintained that the difficulty lies in the fact that hundreds of thousands of political opponents were tried under laws of the DDR. Although these laws were designed to smother political dissent and grossly violated basic human rights and democratic norms, they were nonetheless laws promulgated by a sovereign state. How could one justly try individual Stasi officers, prosecutors, and judges who had simply been fulfilling their legal responsibility to pursue and punish violators of the law?
Opinions varied widely on whether and how the Stasi and other perpetrators of state-sponsored crimes should be tried. Did the laws of the DDR, as they existed before reunification, still apply in the east? Or was the criminal code of the western part of the country the proper instrument of justice in reunified Germany? However, these questions were moot: As Rupert Scholz, professor of law at the University of Munich and a Christian Democratic member of parliament, pointed out, the Unification Treaty specifies that the penal code of the DDR and not that of the Federal Republic of Germany (FRG) shall be applied to offenses committed in East Germany. Scholz’s view was upheld by the Bundesverfassungsgericht, the supreme court. Most offenses committed by party functionaries and Stasi officers—murder, kidnapping, torture, illegal wiretapping, mail robbery, and fraud—were subject to prosecution in reunified Germany under the DDR’s penal code. But this would not satisfy the tens of thousands of citizens who had been sent to prison under East German laws covering purely political offenses for which there was no West German equivalent.
Nevertheless, said Scholz, judicial authorities were by no means hamstrung, because West Germany had never recognized the East German state according to international law. “We have always said that we are one nation; that the division of Germany led neither to full recognition under international law nor, concomitantly, to a recognition of the legal system of the DDR,” Scholz said. Accordingly, West German courts have consistently maintained that West German law protects all Germans equally, including those living in the East. Therefore, no matter where the crimes were committed, whether in the East or the West, all Germans have always been subject to West German laws. Applying this logic, East German border guards who had either killed or wounded persons trying to escape to the West could be tried under the jurisdiction of West Germany.
The “one nation” principle was not upheld by the German supreme court. Prior to the court’s decision, however, Colonel General Markus Wolf, chief of the Stasi’s foreign espionage directorate, and some of his officers who personally controlled agents from East Berlin had been tried for treason and convicted. Wolf had been sentenced to six years in prison. The supreme court ruling overturned that verdict and those imposed on Wolf’s cohorts, even though they had obtained the most closely held West German secrets and handed them over to the KGB. The maximum penalty for Landesverrat, or treason, is life imprisonment. In vacating Wolf’s sentence, the court said he could not be convicted because he operated only from East German territory and under East German law.
However, Wolf was reindicted on charges of kidnapping and causing bodily harm, crimes also punishable under East German law. The former Stasi three-star general, on March 24, 1955, had approved in writing a plan to kidnap a woman who worked for the U.S. mission in West Berlin. The woman and her mother were tricked by a Stasi agent whom the woman had been teaching English, and voluntarily got into his car. He drove them into the Soviet sector of the divided city, where they were seized by Stasi officers. The woman was subjected to psychological torture and threatened with imprisonment unless she signed an agreement to spy for the Stasi. She agreed. On her return to the American sector, however, the woman reported the incident to security officials. Wolf had committed a felony punishable by up to fifteen years’ imprisonment in West Germany. He was found guilty in March 1977 and sentenced to two years’ probation.
Those who have challenged the application of the statute of limitations to communist crimes, especially to the executions of citizens fleeing to the West, have drawn parallels to the notorious executive orders of Adolf Hitler. Hitler issued orders mandating the summary execution of Soviet Army political commissars upon their capture and initiating the extermination of Jews. An early postwar judicial decision held that these orders were equivalent to law. When that law was declared illegal and retroactively repealed by the West German Bundestag, the statute of limitations was suspended—that is, it never took effect. Many of those convicted in subsequent trials of carrying out the Führer’s orders were executed by the Allies. The German supreme court has ruled the same way as the Bundestag on the order to shoot people trying to escape to West Germany, making the statute of limitations inapplicable to such cases. The ruling made possible the trial of members of the National Defense Council who took part in formulating or promulgating the order. A number of border guards who had shot would-be escapees also have been tried and convicted.
Chief Prosecutor Heiner Sauer, former head of the West German Central Registration Office for Political Crimes, was particularly concerned with the border shootings. His office, located in Salzgitter, West Germany, was established in 1961 as a direct consequence of the Berlin Wall, which was erected on August 13 of that year. Willy Brandt, at the time the city’s mayor (later federal chancellor) had decided that crimes committed by East German border guards should be recorded. At his behest, a central registry of all shootings and other serious border incidents was instituted. Between August 13, 1961 and the opening of the borders on November 9, 1989, 186 border killings were registered. But when the Stasi archives were opened, investigators found that at least 825 people had paid with their lives for trying to escape to the West. This figure was reported to the court that was trying former members of the National Defense Council. In addition to these border incidents, the registry also had recorded a number of similar political offenses committed in the interior of the DDR: By fall 1991, Sauer’s office had registered 4,444 cases of actual or attempted killings and about 40,000 sentences handed down by DDR courts for “political offenses.”
During the early years of Sauer’s operation, the details of political prosecutions became known only when victims were ransomed by West Germany or were expelled. Between 1963 and 1989, West Germany paid DM5 billion (nearly US$3 billion) to the communist regime for the release of 34,000 political prisoners. The price per head varied according to the importance of the person or the length of the sentence. In some cases the ransom amounted to more than US$56,000. The highest sum ever paid to the East Germans appears to have been DM450,000 (US$264,705 using an exchange rate of US$1.70 to the mark). The ransom “object” in this case was Count Benedikt von Hoensbroech. A student in his early twenties, von Hoensbroech was attending a West Berlin university when the wall went up. He was caught by the Stasi while trying to help people escape and was sentenced to ten years at hard labor. The case attracted international attention because his family was related to Queen Fabiola of Belgium, who interceded with the East Germans. Smelling money, the East German government first demanded the equivalent of more than US$1 million from the young man’s father as ransom. In the end, the parties settled on the figure of DM450,000, of which the West German government paid DM40,000 (about $23,529). Such ransom operations were fully controlled by the Stasi.
Political prisoners released in the DDR could not be registered by the West Germans because their cases remained secret. The victims were admonished to keep quiet or face another prison term. Nonetheless, in the first year after reunification, Sauer’s office added another 20,000 documented cases, for a total of 60,000. Sauer said he believed the final figure of all political prosecutions would be somewhere around 300,000. In every case, the Stasi was involved either in the initial arrest or in pretrial interrogations during which “confessions” were usually extracted by physical or psychological torture, particularly between the mid-1940s and the mid-1960s.
Until 1987, the DDR imposed the death penalty for a number of capital crimes, including murder, espionage, and economic offenses. But after the mid-1950s, nearly all death sentences were kept quiet and executions were carried out in the strictest secrecy, initially by guillotine and in later years by a single pistol shot to the neck. In most instances, the relatives of those killed were not informed either of the sentence or of the execution. The corpses were cremated and the ashes buried secretly, sometimes at construction sites. In reporting about one executioner who shot more than twenty persons to death, the Berlin newspaper Bildzeitung said that a total of 170 civilians had been executed in East Germany. However, Franco Werkenthin, the Berlin official investigating DDR crimes, said he had documented at least three hundred executions. He declined to say how many were for political offenses, because he had not yet submitted his report to parliament. “But it was substantial,” he told me. The true number of executions may never be known because no complete record of death sentences meted out by civil courts could be found. Other death sentences were handed down by military courts, and many records of those are also missing. In addition, German historian Günther Buch believes that about two hundred members of the Stasi itself were executed for various crimes, including attempts to escape to the West.

SAFEGUARDING HUMAN DIGNITY?

The preamble to the East German criminal code stated that the purpose of the code was to “safeguard the dignity of humankind, its freedom and rights under the aegis of the criminal code of the socialist state,” and that “a person can be prosecuted under the criminal code only in strictest concurrence with the law.” However, many of the codified offenses for which East German citizens were prosecuted and imprisoned were unique to totalitarian regimes, both fascist and communist.
Moreover, certain sections of the code, such as those on “Treasonable Relaying of Information” and “Treasonable Agent Activity,” were perversely applied, landing countless East Germans in maximum security penitentiaries. The victims of this perversion of justice usually were persons who had requested legal exit permits from the DDR authorities and had been turned down. In many cases, their “crime” was having contacted a Western consulate to inquire about immigration procedures. Sentences of up to two and a half years’ hard labor were not unusual as punishment for such inquiries.
Engaging in “propaganda hostile to the state” was another punishable offense. In one such case, a young man was arrested and prosecuted for saying that it was not necessary to station tanks at the border and for referring to border fortifications as “nonsense.” During his trial, he “admitted” to owning a television set on which he watched West German programs and later told friends what he saw. One of those “friends” had denounced him to the Stasi. The judge considered the accused’s actions especially egregious and sentenced him to a year and a half at hard labor.
Ironically, another part of this section of the criminal code decreed that “glorifying militarism” also was a punishable offense, although the DDR itself “glorified” its People’s Army beyond any Western norm. That army was clad in uniforms and insignia identical to those of the Nazi Wehrmacht, albeit without eagles and swastikas. The helmets, too, were differently shaped, but the Prussian goose step was regulation during parades.
A nineteen-year-old who had placed a sign in an apartment window reading “When justice is turned into injustice, resistance becomes an obligation!” was rewarded with twenty-two months in the penitentiary. Earlier, the youth had applied for an exit visa and had been turned down. A thirty-four-year-old father of two who also had been denied permission to leave the “workers’ and peasants’ state” with his family similarly advertised that fact with a poster reading “We want to leave, but they won’t let us.” The man went to prison for sixteen months. The “crimes” of both men were covered by a law on “Interference in Activities of the State or Society.”
Two letters—one to a friend in West Germany, seeking assistance to legally emigrate to the West, and another containing a similar appeal to Chief of State Honecker—brought a four-year sentence to their writer, who was convicted under two laws: those on “establishing illegal contacts” (writing to his friend) and on “public denigration” (writing to Honecker). The Stasi had illegally intercepted both letters.
The East German party chiefs were not content to rely only on the Stasi’s millions of informers to ferret out antistate sentiments. Leaving nothing to chance, they created a law that made the failure to denounce fellow citizens a crime punishable by up to five years’ imprisonment. One man was sentenced to twenty-three months for failing to report that a friend of his was preparing to escape to the West. The mandatory denunciation law had its roots in the statutes of the Socialist Unity Party, which were published in the form of a little red booklet. I picked up a copy of this booklet that had been discarded by its previous owner, a Stasi chauffeur, who had written “Ha, Ha” next to the mandate to “report any misdeeds, regardless of the person responsible, to leading party organs, all the way up to the Central Committee.”
Rupert Scholz, member of parliament and professor of law at the University of Munich, said many East Germans feel there is little determination among their Western brethren to bring the Stasi criminals to trial. “In fact, we already have heard many of them say that the peaceful revolution should have been a bloody one instead so they could have done away with their tormentors by hanging them posthaste,” Scholz told me.
The Reverend Joachim Gauck, minister to a Lutheran parish in East Germany, shared the people’s pessimism that justice would be done. Following reunification, Gauck was appointed by the Bonn government as its special representative for safeguarding and maintaining the Stasi archives. “We must at least establish a legal basis for finding the culprits in our files,” Gauck told me. “But it will not be easy. If you stood the millions of files upright in one line, they would stretch for 202 kilometers [about 121 miles]. In those files you can find an unbelievable number of Stasi victims and their tormentors.”
Gauck was given the mandate he needed in November 1991, when the German parliament passed a law authorizing file searches to uncover Stasi perpetrators and their informants. He viewed this legislation as first step in the right direction. With the evidence from Stasi files, the perpetrators could be removed from their public service jobs without any formal legal proceedings. Said Gauck: “We needed this law badly. It is not reasonable that persons who served this apparatus of oppression remain in positions of trust.”

See more at the journalist Bernd Pulch website http://www.berndpulch.org