Unveiled – Russia Article 31 Protest Photos Moscow and St Petersburg

   Moscow

[Image]

Interior Ministry officers detain an opposition activist during a protest rally to defend Article 31 of the Russian constitution, which guarantees the right of assembly, in Moscow March 31, 2012. Reuters

[Image]

A detained participant displays a sign from the window of a police van during a protest to defend Article 31 of the Russian constitution in Moscow July 31, 2012. Activists gather on the 31st day of the month to support Article 31 of the Russian constitution — the right to free assembly. Reuters

[Image]

Police officers detain a protester during an unsanctioned opposition rally in downtown Moscow, Russia, Tuesday, July 31, 2012. Reuters

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

Police officers detain opposition leader Eduard Limonov, third from left, during an unsanctioned opposition rally in downtown Moscow, Russia, Tuesday, July 31, 2012.  AP

[Image]

Eduard Limonov, long time radical activist, former leader of banned National Bolshevik Party speaks to The Associated Press in Moscow on Tuesday, July 31, 2012.  AP

[Image]

An opposition protester shout slogans from the police van during an unsanctioned opposition rally in downtown Moscow, Russia, Tuesday, July 31, 2012. AP

[Image]

[Image]

A participant shouts slogans in front of a police cordon during a protest to defend Article 31 of the Russian constitution in Moscow July 31, 2012. Reuters

St Petersburg

[Image]

A participant shouts as he is detained by police during a protest to defend Article 31 of the Russian constitution in St. Petersburg July 31, 2012. Activists gather on the 31st day of the month to support Article 31 of the Russian constitution — the right to free assembly. Reuters

[Image]

Participants sit during a protest to defend Article 31 of the Russian constitution in St. Petersburg July 31, 2012. Activists gather on the 31st day of the month to support Article 31 of the Russian constitution — the right to free assembly. The placard reads “I don’t care about your fines.” Reuters

[Image]

Russian riot policemen detain an opposition supporter in central St.Petersburg on May 31, 2012 during unauthorized rally to defend Article 31 of the Russian constitution which guarantees freedom of assembly. Getty

[Image]

A participant is detained by the police during a protest to defend Article 31 of the Russian constitution in St. Petersburg July 31, 2012. Reuters

[Image]

Police officers detain Olga Kurnosova, the leader of the St. Petersburg branch of Garry Kasparov’s United Civil Front movement, during a protest to defend Article 31 of the Russian constitution in St.Petersburg, August 31, 2011. Reuters

[Image]

Police officers detain activists during a protest to defend Article 31 of the Russian constitution in St.Petersburg August 31, 2011. Article 31 guarantees the right of assembly.

TOP-SECRET from the FBI – Two Men Arrested for Fraud and Aggravated Identity Theft

SAN FRANCISCO—A federal grand jury in San Francisco indicted Ngoc Duong, a/k/a Danny Duong, of Fountain Valley, California, and Hong Lee Wong, a/k/a William Wong, of Torrance, California, on July 19, 2012, with conspiracy to commit wire fraud, wire fraud, and aggravated identity theft, United States Attorney Melinda Haag announced.

According to the indictment, which was unsealed Friday, Duong, 60, a partner in Incom Trading Corporation Inc.; and Wong, 44, a principal in Powell Trading Inc. and Powell Commodity Inc., allegedly defrauded three companies: Cheery Way Inc. (Cheery Way), of Brisbane, California; as well as two Chinese companies, Zheijang Metals and Materials and Zheijang Concentrating (Zheijang), by falsely claiming to have an agreement with the city of New Orleans to recycle scrap metal from a Six Flags amusement park damaged by Hurricane Katrina. To carry out the fraud, Duong and Wong created and sent false documents to Cheery Way and Zheijang in which the defendants fraudulently used names and e-mail addresses of New Orleans city officials.

Duong was arrested on July 26, 2012, at the Houston International Airport. He made his initial appearance in federal court in Houston on July 27, 2012. Today, following a bail hearing held in federal court in Houston, Duong was released on a $100,000 bond. Wong was arrested on July 27, 2012, at his residence in Torrance. He made his initial appearance in federal court in Los Angeles on July 27, 2012, and was released on $25,000 bond and electronic monitoring. Both defendants are scheduled to appear before the Magistrate Judge in federal court in San Francisco, on August 6, 2012.

The maximum statutory penalty for each count of conspiracy to commit wire fraud and wire fraud in violation of 18 U.S.C. § 1349 and 1343, respectively, is 20 years in prison and a fine of $250,000 or twice the amount of the fraud. The statutory penalty for each count of aggravated identity theft in violation of 18 U.S.C. § 1028A is a mandatory two-year term in prison, to be imposed consecutive to any sentence imposed for other charges, and a $250,000 fine. However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal statute governing the imposition of a sentence, 18 U.S.C. § 3553. The case has been assigned to United States District Court Judge Susan Illston.

Denise Marie Barton is the Assistant U.S. Attorney who is prosecuting the case with the assistance of Elizabeth Garcia. The prosecution is the result of an approximately eight-month investigation by the Federal Bureau of Investigation.

Please note, an indictment contains only allegations against an individual and, as with all defendants, Duong and Wong must be presumed innocent unless and until proven guilty.

Serial Killers ~ The Bourgoin Tapes – Full Movie

In thirty-year career, the criminology expert Stephane Bourgoin has studied thousands of cases of serial killers. In this documentary series, it delivers the results of its investigation and reveals the deadly path of each assassin presented: childhood, the first passage to the act, arrest and criminal career. Sexual predators to couples through evil women killer and backpackers crime, Stephane Bourgoin gives us his personal archives and analyzes in detail the psychology, rituals and procedures of these serial killers.

TOP-SECRET – Australian Department of the Prime Minister and Cabinet WikiLeaks Talking Points

The following documents were publicly released on July 11, 2012 in response to a Freedom of Information request to the Australian Department of the Prime Minister and Cabinet for:

“All documents (including electronic documents) that have been sent by the Department of the Prime Minister and Cabinet to the Prime Minister between 1 January 2011 and 4 June 2012 that relate to WikiLeaks, Mr Julian Paul Assange and/or United States Army private Bradley Manning.”

Australian Department of the Prime Minister and Cabinet WikiLeaks Talking Points

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

 

AU-DPMC-WikiLeaks

Networth of Julian Assange

Julian Assange is an Australian publisher, journalist, computer programmer and Internet activist, with a net worth of $300 thousand. Julian Assange has earned his net worth as the editor in chief of WikiLeaks, which is a whistleblower website to create open governments, by exposing private, secret, and classified media from anonymous news sources, news leaks, and whistleblowers. Assange was born in Townsville, Queensland, Australia, on July 3, 1971. He is well-known for his public appearances in many parts of the world, to speak out about freedom of the press, censorship and investigative journalism.

Some topics that have been published on his WikiLeaks site include; extrajudicial killings in Kenya, toxic waste dumping in Cote d’Ivoire, and procedures at Guantanamo Bay. WikiLeaks has five international print media partners, which include; Der Spiegel, e Monde, The Guardian, El Pais and The New York Times. In November, of 2010 WikiLeaks and its five media partners began publishing detailed correspondence between the U.S State Department and its diplomatic missions around the world, (also known as Cablegate).

How much is Julian Assange worth?

Julian Assange Net Worth

Assange has won many awards and nominations, including the 2009 Amnesty International Media Award and Readers’ Choice for TIME magazine’s 2010 Person of the Year. In his youth he was referred to as “Australia’s most famous, ethical, computer hacker” by the Personal Democracy Forum. As a youth, he was charged with 31 counts of hacking and related crimes. It took three years for the case to make it to court where Julian pled guilty to 25 charges of hacking. The other six charges were dropped. He was released on bond for good conduct, after being fined AUD $2,100. Assange has never been married, however, he does have one son with an ex-girlfriend. After a custody battle that lasted for years, the couple formed an activist group, referred to as, “Parent Inquiry Into Child Protection,” which created a “central databank” for otherwise inaccessible legal records, related to child custody issues in Australia.

Cryptome – CIA’s Historical Review Panel Public Statement

Public Statement from the CIA’s Historical Review Panel

 


Date: Thu, 19 Jul 2012 10:49:16 -0400
To: intelforum[at]lists101.his.com
From: IntelForum Mailing List <intelforum[at]lists101.his.com>
Subject: [Intelforum] Public Statement from the CIA’s Historical Review Panel

Date: Wed, July 18, 2012 8:52 am

Public Statement from the CIA’s Historical Review Panel

Professor Robert Jervis (Chair)
Department of Political Science
Columbia University

Professor Melvyn Leffler
Department of History
University of Virginia

Professor Thomas Newcomb
Department of Political Science and Criminal Justice
Heidelberg College

Professor Jeffrey Taliaferro
Department of Political Science
Tufts University

Professor Ruth Wedgwood
Nitze School of Advanced International Studies
Johns Hopkins University

The Director, Central Intelligence Agency’s Historical Review Panel (HRP) was formed in 1995, replacing a panel that was less formally organized and that had met only episodically. Since then, the HRP has met twice a year, with the mandate to:

Advise the Central Intelligence Agency on systematic and automatic declassification review under the provisions of Executive Order 12958 as amended.Assist in developing subjects of historical and scholarly interest for the Intelligence Community declassification review program.

Advise CIA and the Intelligence Community on declassification issues in which the protection of intelligence sources and methods potentially conflicts with mandated declassification priorities.

Provide guidance for the historical research and writing programs of the CIA History Staff, and when appropriate, review draft products.

Advise Information Management Services on its mandatory and voluntary declassification review initiatives and the Center for the Study of Intelligence on its academic outreach programs.

At the request of the Director of Central Intelligence Agency, advise on other matters of relevance to the intelligence and academic communities.

Advise Information Management Services on archival and records management issues.

The HRP, like the other DCIA panels, is convened by the Director to provide him with confidential advice and assessments. Because the HRP’s advice to the DCIA must be completely frank and candid, we are not reporting Panel recommendations. But because this panel’s primary concern is the program of declassification and the release of information to the public, the DCIA and the Panel concluded that it should inform the interested public of the subjects and problems that the Panel is discussing.

The HRP met on June 4-5, 2012, with Robert Jervis, Melvyn Leffler, Thomas Newcomb, and Jeffrey Taliaferro being in attendance.

As has often been the case, we spent much of our time discussing the Foreign Relations of the United States (FRUS) series, including specific volumes at various stages of compilation and declassification and the general processes involved. We had a long session with the State Department’s Historical Advisory Committee and the Historical Office staff. A great deal of progress has been made in reducing delays and coming to grips with difficult issues. We agreed on the value of continuing communication between the two advisory panels and of course in developing even further the working-level relations between CIA and the State Department, which will have to be expanded to include representatives of the National Security Council staff.

We also discussed the projects of the Historical Collections Division (HCD) and how these can be developed to meet the needs of multiple audiences and to produce material of most interest to scholars, journalists, and members of the interested public.

We continued our discussion of the 25-Year Program, the wider dissemination of material on the CREST system (the CIA Records Search Tool), and the need to get all agencies to devote attention to material from Presidential libraries.

We also discussed options for reviewing Presidential Daily Briefs (PDBs).

We will meet again in December 2012 or January 2013.

Robert Jervis
Columbia University

_______________________________________________

IntelForum mailing list
IntelForum[at]lists101.his.com
http://lists101.his.com/mailman/listinfo/intelforum

 


 


 

 

 


 

Serial Killer Charles Sobhraj ~ The Serpent – Full Movie

Hotchand Bhaonani Gurumukh Charles Sobhraj (born April 6, 1944), better known as Charles Sobhraj, is a serial killer of Indian and Vietnamese origin, who preyed on Western tourists throughout Southeast Asia during the 1970s. Nicknamed “the Serpent” and “the Bikini killer” for his skill at deception and evasion, he allegedly committed at least 12 murders. He was convicted and jailed in India from 1976 to 1997, but managed to live a life of leisure even in prison. After his release, he retired as a celebrity in Paris; he unexpectedly returned to Nepal, where he was arrested, tried and sentenced to life imprisonment on August 12, 2004. The Supreme Court of Nepal has finally convicted him and ordered the life imprisonment, this decision was made on 30 July 2010.[1]
While Sobhraj is widely believed to be a psychopath, his motives for killing differed from those of most serial killers. Sobhraj was not driven to murder by deep-seated, violent impulses, but as a means to sustain his lifestyle of adventure. That, as well as his cunning and cultured personality, made him a celebrity long before his release from prison. Sobhraj enjoyed the attention, charging large amounts of money for interviews and film rights; he has been the subject of four books and three documentaries. His search for attention and his overconfidence in his own intelligence are believed responsible for his return to a country where authorities were still eager to arrest him.

TOP-SECRET from the FBI – Last of Seven Defendants Sentenced in AmeriFirst Securities Fraud Case

DALLAS—The final sentencing was held today in the massive AmeriFirst securities fraud case, prosecuted in the Northern District of Texas, that has resulted in a total of seven felony convictions and prison sentences up to 25 years, announced U.S. Attorney Sarah R. Saldaña of the Northern District of Texas. Today, John Porter Priest was sentenced by U.S. District Judge Barbara M. G. Lynn to one year in federal prison.

Priest, 43, of Ocala, Florida, was sentenced by Judge Lynn to one year in federal prison and ordered to pay $4,742,946 in restitution. He pleaded guilty in September 2010 to one count of securities fraud based on his role in the Secured Capital Trust scheme.

“The AmeriFirst investment fraud came to light just over five years ago. Since that time, a coalition of public agencies, including the FBI, the Federal Deposit Insurance Corporation Office of Inspector General, the U.S. Securities and Exchange Commission, the Texas State Securities Board, and the Florida Office of Financial Regulation, have worked tirelessly, alongside court-appointed receivers in Florida and Texas, to bring the perpetrators of the fraud to justice,” said U.S. Attorney Saldaña. “The sentencings this week close a five-year chapter in the authorities’ work on this matter. All seven of the most culpable participants in the AmeriFirst scheme have been convicted of felonies and sentenced. We have pursued this matter for the last five years because investment fraud, particularly when it victimizes seniors as the AmeriFirst fraud did, is intolerable and must be redressed.”

Dennis Woods Bowden, 59, of Farmers Branch, Texas, was sentenced last Friday by Judge Lynn to serve 192 months in federal prison and ordered to pay more than $23 million in restitution. Bowden was the owner and chief operating officer of the now-defunct Dallas-based AmeriFirst Funding Corp. and AmeriFirst Acceptance Corp. Bowden was also a manager and owner of American Eagle Acceptance Corp., a Dallas-based company that bought and sold used automobiles, financed purchases of used automobiles, and bought and serviced used car notes. In December 2011, a jury convicted Bowden on four counts of securities fraud and five counts of mail fraud related to his role in a scheme to defraud investors in connection with the sale of securities. AmeriFirst has been under control of a court-appointed receiver since the Securities and Exchange Commission (SEC) brought an emergency action to halt the fraud in July 2007.

In connection with the same scheme, in 2010 a jury convicted Jeffrey Charles Bruteyn, 42, of Dallas, on nine counts of securities fraud. Bruteyn is currently serving a 25-year federal prison sentence. Bruteyn is the former managing director of AmeriFirst. On June 29, 2012, the U.S. Court of Appeals for the Fifth Circuit affirmed Bruteyn’s conviction and sentence.

According to evidence presented at the trials, Bowden and Bruteyn orchestrated offerings of promissory notes called secured debt obligations (SDOs) that raised more than $50 million from more than 500 investors living in Texas and Florida, many of whom were retired and all of whom were looking for safe and secure investments.

Bowden paid Bruteyn and brokers working under Bruteyn’s direction to sell the securities, but Bowden also signed documents that went directly to investors. Through the brokers and through documents that he signed, Bowden misled, deceived, and defrauded investors by misrepresenting, and by failing to disclose, material facts concerning the safety of the securities. Among other things, Bowden falsely represented to investors that their investments were guaranteed by a commercial bank, that the investors’ principal was secured by an interest in certain types of collateral, that insurance purchased by AmeriFirst companies insured the investors against loss of their money, and that the issuers of the SDOs were acting as the investors’ fiduciaries. In fact, none of these representations was true. Bowden, supposedly acting as the investors’ fiduciary, spent investors’ money on things investors did not approve or even know about, including an airplane, sports cars, a condominium, real estate for used car lots, and his own personal living expenses.

Another defendant convicted in the scheme, Vincent John Bazemore Jr., 37, of Denton, Texas, a broker who sold SDOs, pleaded guilty in October 2007 and is currently serving a 60-month federal prison sentence. Bazemore was also ordered to pay nearly $16 million in restitution.

Gerald Kingston, 47, of Dallas, pleaded guilty in December 2007 to one count of conspiracy to commit securities fraud, stemming from his role in helping Bruteyn manipulate the stock price of Interfinancial Holdings Corporation (IFCH). Acting at the direction of Bruteyn, Kingston bought and sold hundreds of thousands of shares of IFCH and affected matched trades to create the false impression of widespread interest in the stock. Kingston admitted that he derived more than $1.6 million in proceeds from his fraudulent sales of IFCH in the course of the conspiracy. Judge Lynn sentenced him in January 2012 to a two-year term of probation and fined him $50,000.

Eric Hall, 40, of Fort Myers, Florida, pleaded guilty in June 2008 to one count of securities fraud, based on his role in a scheme to defraud investors in an entity called Secured Capital Trust. He was sentenced by Judge Lynn in April 2012 to a two-year term of probation and ordered to pay approximately $4,742,946 in restitution.

Fred Howard, 64, of Tarpon Springs, Florida, was sentenced by Judge Lynn two weeks ago to five years in federal prison and ordered to pay approximately $4,742,946 in restitution. He pleaded guilty in February 2012 to one count of securities fraud for his role in the Secured Capital Trust scheme.

Today’s announcement is part of efforts underway by President Obama’s Financial Fraud Enforcement Task Force (FFETF) which was created in November 2009 to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. With more than 20 federal agencies, 94 U.S. attorneys’ offices, and state and local partners, it is the broadest coalition of law enforcement, investigatory, and regulatory agencies ever assembled to combat fraud. Since its formation, the task force has made great strides in facilitating increased investigation and prosecution of financial crimes; enhancing coordination and cooperation among federal, state, and local authorities; addressing discrimination in the lending and financial markets; and conducting outreach to the public, victims, financial institutions and other organizations. Over the past three fiscal years, the Justice Department has filed more than 10,000 financial fraud cases against nearly 15,000 defendants, including more than 2,700 mortgage fraud defendants. For more information on the task force, visit http://www.stopfraud.gov.

Assistant U.S. Attorneys Alan Buie and Christopher Stokes and Special Assistant U.S. Attorney Stephanie Tourk were in charge of the prosecutions.

TOP-SECRET – FBI – Serious Health Risks to Law Enforcement

https://publicintelligence.net/wp-content/uploads/2012/07/FBI-LithiumBatteries.png

U//FOUO) The FBI assesses with high confidence, based on multiple incident reports from a collaborative source with direct access to the information, that counterfeit and substandard lithium batteries pose a serious health and safety risk to consumers, specifically law enforcement officers, emergency medical services providers, and military personnel who use these batteries extensively. The FBI has received numerous reports of such batteries, which are not manufactured with the safety mechanisms of legitimate US branded-batteries, spontaneously combusting while being used, transported, or stored, resulting in serious injuries to consumers and damage to tactical equipment and property.

(U) Law Enforcement, Military, and Emergency Responders at Risk From Counterfeit or Substandard Lithium Batteries in Tactical Equipment

(U//FOUO) Lithium batteries, primarily CR123A cell batteries, are used by the public in electronic devices; however, they are more frequently used by law enforcement officers, emergency medical services providers, and military personnel in tactical equipment such as flashlights, weapon lights, headlamps, and helmet lights and cameras. Counterfeit and substandard lithium batteries have caused numerous incidents involving serious injury to law enforcement personnel, as well as damage to equipment and property.

(U) How to Avoid Purchasing or Using Counterfeit and Substandard Lithium Batteries

(U//FOUO) Several indicators are associated with counterfeit or substandard lithium batteries; awareness of these indicators can decrease the chances of purchasing inferior batteries that can put users at risk.

• (U) Common exterior indicators of counterfeit batteries include label misspellings, missing label information, blurred fonts, altered logos or seals, different label dimensions, altered or substandard packaging, crimp seal differences, material differences, and differences in the vent perforation of the anode.

• (U) Counterfeit and substandard lithium batteries are often sold at a reduced price on the Internet and at swap meets, store fronts, gun shows, and electronics and technical shows. Although not all batteries sold at these locations are counterfeit or substandard, such sellers are often sources of counterfeit or substandard batteries produced in China and the chance of purchasing a counterfeit or substandard battery is higher at these locations.

(U) Outlook and Implications

(U//FOUO) The FBI assesses that counterfeit and substandard lithium batteries will continue to pose a health and safety risk to law enforcement officers, military personnel, and emergency medical services personnel, as well as unwitting consumers in the general public, as long as they are available for purchase. Taking the following precautions, however, can reduce the likelihood of user injury or property damage from either the purchase of counterfeit and substandard batteries or the improper use of legitimate lithium batteries.

• (U) Law enforcement, military and emergency personnel should use caution when purchasing batteries from online auction sites, online vendors, store fronts, gun shows, electronic and technical shows and swap meets. Individuals purchasing batteries on the secondary market should seek quality assurance and scrutinize labels, packaging and contents; seek authorized retailers; watch for missing sales tax charges; and insist on secure transactions, according to the International Trade Commission.

• (U) To prevent a catastrophic event when using legitimate lithium batteries, individuals should refrain from improperly mixing different types and brands of batteries; using a combination of batteries with different depletion levels (that is, mixing old and new batteries); and removing lithium batteries from one product and placing them into another product in which they are not intended to be used (such as removing a lithium battery from a flashlight and placing it in a camera).

(U//FOUO) The FBI assesses that in addition to the safety risks, the sale of counterfeit and substandard lithium batteries has a negative economic impact on both users and US manufacturers of legitimate lithium batteries. The widespread use of tactical equipment and electronic devices requiring lithium batteries among law enforcement, emergency medical services providers, and military personnel can lead to significant costs for these agencies if they purchase and then must replace defective batteries, tactical gear and property, or pay for emergency care. US manufacturers lose potential revenue when producers in China and other countries profit from the fraudulent use of US brand holders’ trademarks. In addition, when incidents occur involving what appear to be legitimate US batteries, the brand holder often faces costs in terms of both money spent on testing to determine the cause of the incident and potential erosion in brand confidence among consumers.

Unveiled by Wikileaks – BULGARIA – Stasi mayor unacceptable

Date 2011-07-12 13:27:06 From ben.preisler@stratfor.com
To eurasia@stratfor.com
Others Listname: mailto:eurasia@stratfor.com
MessageId: <4E1C2F8A.8000705@stratfor.com>
InReplyTo: 4E1B2BD5.9000703@stratfor.com
Text Glasove – Bulgaria. Bulgaria’s governing party Gerb is putting
up a former State Security officer as its candidate for mayor
of Bulgaria’s fifth largest city Russe in the Bulgarian local
elections scheduled for October. The opposition online
newspaper Glasove is disgusted: “Stoilov was a permanent
employee of the State Security who openly admits that he
recruited soldiers for military counter-espionage and is proud
of it to boot. In an interview last year he said that many
things in Bulgaria would have turned out differently had the
State Security been reformed in the right way. … You must
have a screw loose if you can’t find anyone better than a guy
with a Stasi past after four years on the city council.”
(11/07/2011) +++
http://www.glasove.com/gerb-mozhe-da-specheli-mestnite-izbori-samo-ako-gi-falshifitsira-14877

Benjamin Preisler
+216 22 73 23 19

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

TOP-SECRET – European Central Bank Paper: Shadow Banking in the Euro Area

https://publicintelligence.net/wp-content/uploads/2012/07/ECB-ShadowBanking.png

 

Shadow banking, as one of the main sources of financial stability concerns, is the subject of much international debate. In broad terms, shadow banking refers to activities related to credit intermediation and liquidity and maturity transformation that take place outside the regulated banking system.

This paper presents a first investigation of the size and the structure of shadow banking within the euro area, using the statistical data sources available to the ECB/Eurosystem.

Although overall shadow banking activity in the euro area is smaller than in the United States, it is significant, at least in some euro area countries. This is also broadly true for some of the components of shadow banking, particularly securitisation activity, money market funds and the repo markets.

This paper also addresses the interconnection between the regulated and the non-bank-regulated segments of the financial sector. Over the recent past, this interconnection has increased, likely resulting in a higher risk of contagion across sectors and countries. Euro area banks now rely more on funding from the financial sector than in the past, in particular from other financial intermediaries (OFIs), which cover shadow banking entities, including securitisation vehicles. This source of funding is mainly shortterm and therefore more susceptible to runs and to the drying-up of liquidity. This finding confirms that macro-prudential authorities and supervisors should carefully monitor the growing interlinkages between the regulated banking sector and the shadow banking system. However, an in-depth assessment of the activities of shadow banking and of the interconnection with the regulated banking system would require further improvements in the availability of data and other sources of information.

This paper presents a preliminary investigation of the size and the structure of shadow banking in the euro area, as a contribution to the international and European debate on this issue. In broad terms, shadow banking refers to activities related to credit intermediation, liquidity and maturity transformation that take place outside the regulated banking system. There is widespread international agreement on the need to better understand the activities of shadow banking and the related financial stability risks. Moreover, the forthcoming implementation of Basel III, with the introduction of more stringent capital and liquidity requirements for credit institutions, and the provisions to be applied to insurers may provide further incentives for banks to shift part of their activities outside of the regulated environment and therefore increase shadow banking activities.

Evaluating the size of the shadow banking system in the euro area is not straightforward. A quantitative assessment of the activities of the shadow banking sector can only be based on data sources that unfortunately were not designed specifically for this purpose (i.e. flow-of-funds data and monetary and financial statistics). Moreover, for some activities and markets there are no official data available.

The analysis shows that shadow banking activity in the euro area is smaller than in the United States. In the United States the size of the shadow banking system, measured as the total amount of its assets, was comparable to the size of the banking system in the second quarter of 2011, while in the euro area it represented less than half of the total assets of banking sector. However, the size of assets held by financial
intermediaries that are not regulated as banks is still important in the euro area, especially in some countries.

A proxy for the activities of shadow banking in the euro area can be derived from the analysis of the balance sheets of OFIs, a sector which excludes insurance corporations and pension funds but covers most of the agents engaging in shadow banking. Regarding the dynamics of shadow-banking activities, assets of OFIs grew rapidly in the run-up to the crisis, in the period 2005-07. Starting at the end of 2007, OFI intermediation declined sharply in the context of the general deleveraging triggered by the financial crisis.

The paper investigates some key components of shadow banking. In particular, it looks at financial entities other than banks involved in credit intermediation, such as securitisation vehicles, and at the financial intermediaries and markets providing funding to the banks, such as money market funds (MMFs) and the repo market. The data suggests the following.

(i) Securitisation issuance was smaller in volume in the euro area than in the United States before the crisis (around 5% and 12% of GDP respectively) and remains less developed.

(ii) Assets under management by MMFs amounted to €1.83 trillion and €1.1 trillion in the United States and in the euro area respectively by the second quarter of 2011. However, it should be pointed out that in the euro area MMFs are a somewhat heterogeneous group (even if the CESR, i.e. the predecessor of the European Securities and Markets Authority, published in 2010 guidelines on a Common Definition of European Money Market Funds).

(iii) The repo market is a key source of funding in both the United States and the euro area.

The paper also addresses the interconnection between regulated and non-regulated segments of the financial sector undertaking banking activities. Over the recent past this interconnection has been increasing, likely resulting in higher risk of contagion across sectors and countries. Euro area banks rely more than in the past on funding from the financial sector and in particular from the OFI sector, which covers shadow banking entities including securitisation vehicles. This source of funding is mainly short-term and therefore more susceptible to runs and to the drying-up of liquidity. The relative size and relevance of shadow banking intermediation differs significantly across euro area countries.

A more in-depth assessment of the activities of shadow banking and of the interconnection with the regulated banking system would require an improvement in the availability of data and other related information. More than 60% of the assets that are considered part of shadow banking activities in the euro area are linked to financial institutions for which high frequency statistical information is not available. Similarly, very scarce and non-standardised information is available on repo markets. Moreover, the aggregate data collected for the euro area are not detailed enough to allow a full understanding of key elements such as the presence of maturity transformation and leverage and the possible channels for contagion, which are of particular importance when evaluating possible regulatory measures. The paper concludes with some preliminary considerations regarding possible measures to address data gaps and regulatory options.

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

ECB-ShadowBanking

Video – Former FBI Serial Killer Expert John Douglas

 

Former FBI Serial Crime Expert, John Douglas’ book is called “Mindhunter”. In it, Douglas recounts some of his cases involving several of the most notable serial killers of our time. He talks about the science behind criminal profiling and the patterns of behaviour adopted by perpetrators. Douglas was the model for Jack Crawford in “The Silence of the Lambs,” and later acted as consultant of the movie “Mindhunter”. (Originally aired February 1996).

TOP-SECRET – European Commission Green Paper on Shadow Banking

https://publicintelligence.net/wp-content/uploads/2012/07/EU-ShadowBanking.png

The 2008 crisis was global and financial services were at its heart, revealing inadequacies including regulatory gaps, ineffective supervision, opaque markets and overly-complex products. The response has been international and coordinated through the G20 and the Financial Stability Board (FSB).

The European Union has shown global leadership in implementing its G20 commitments. In line with EU’s Roadmap for Financial Reform, the Union is very advanced in implementing the reforms linked to the G20 commitments. Most of the reforms are now going through the legislative process. In particular, a major achievement has been the recent adoption by the Council and the Parliament of landmark legislation on over-the-counter derivatives. Negotiations are also well developed on measures to revamp capital requirements for the banking sector. Overall, the reforms will equip the EU with the tools designed to ensure that the financial system, its institutions and markets are properly supervised. More stable and responsible financial markets are a pre-condition for growth and for the creation of a business environment that allows companies to thrive, innovate and expand their activities. This in turn enhances the confidence and trust of citizens.

However, there is an increasing area of non-bank credit activity, or shadow banking, which has not been the prime focus of prudential regulation and supervision. Shadow banking performs important functions in the financial system. For example, it creates additional sources of funding and offers investors alternatives to bank deposits. But it can also pose potential threats to long-term financial stability.

In response to the invitations by G20 in Seoul in 2010 and in Cannes in 2011, the FSB is therefore in the process of developing recommendations on the oversight and regulation of this activity.

The FSB’s work has highlighted that the disorderly failure of shadow bank entities can carry systemic risk, both directly and through their interconnectedness with the regular banking system. The FSB has also suggested that as long as such activities and entities remain subject to a lower level of regulation and supervision than the rest of the financial sector, reinforced banking regulation could drive a substantial part of banking activities beyond the boundaries of traditional banking and towards shadow banking.

Against this background, the Commission considers it a priority to examine in detail the issues posed by shadow banking activities and entities. The objective is actively to respond and further contribute to the global debate; continue to increase the resilience of the Union’s financial system; and, ensure all financial activities are contributing to the economic growth. The purpose of this Green Paper is therefore to take stock of current development, and to present on-going reflections on the subject to allow for a wide-ranging consultation of stakeholders.

3. WHAT IS SHADOW BANKING?

The October 2011 FSB report represents the first comprehensive international effort to deal with shadow banking. It focuses on (i) the definition of principles for the monitoring and regulation of the shadow banking system; (ii) the initiation of a mapping process to identify and assess systemic risks involved in shadow banking; and, (iii) the identification of the scope of possible regulatory measures.

In this report, the FSB defined the shadow banking system as “the system of credit intermediation that involves entities and activities outside the regular banking system”. This definition implies the shadow banking system is based on two intertwined pillars.

First, entities operating outside the regular banking system engaged in one of the following activities:

• accepting funding with deposit-like characteristics;
• performing maturity and/or liquidity transformation;
• undergoing credit risk transfer; and,
• using direct or indirect financial leverage.

Second, activities that could act as important sources of funding of non-bank entities. These activities include securitisation, securities lending and repurchase transactions (“repo”).

Against this background, the Commission is at this stage focussing its analysis on the following possible shadow banking entities and activities. This should not be viewed as exhaustive, as shadow banking entities and activities can evolve very rapidly.

Possible shadow banking entities and activities on which the Commission is currently focussing its analysis

Entities:

– Special purpose entities which perform liquidity and/or maturity transformation; for example, securitization vehicles such as ABCP conduits, Special Investment Vehicles (SIV) and other Special Purpose Vehicles (SPV);
– Money Market Funds (MMFs) and other types of investment funds or products with deposit-like characteristics, which make them vulnerable to massive redemptions (“runs”);
– Investment funds, including Exchange Traded Funds (ETFs), that provide credit or are leveraged;
– Finance companies and securities entities providing credit or credit guarantees, or performing liquidity and/or maturity transformation without being regulated like a bank;
and
– Insurance and reinsurance undertakings which issue or guarantee credit products.

Activities:
– Securitisation; and
– Securities lending and repo.

The FSB has roughly estimated the size of the global shadow banking system at around € 46 trillion in 2010, having grown from € 21 trillion in 2002. This represents 25-30% of the total financial system and half the size of bank assets. In the United States, this proportion is even more significant, with an estimated figure of between 35% and 40%. However, according to the FSB estimates, the share of the assets of financial intermediaries other than banks located in Europe as a percentage of the global size of shadow banking system has strongly increased from 2005 to 2010, while the share of US located assets has decreased. On a global scale, the share of those assets held by European jurisdictions has increased from 10 to 13% for UK intermediaries, from 6 to 8% for NL intermediaries, from 4% to 5% for DE intermediaries and from 2% to 3% for ES intermediaries. FR and IT intermediaries maintained their previous shares in the global shadow banks assets of 6% and 2% respectively.

 

DOWNLO)AD THE ORIGINAL DOCUMENT HERE

ECB-ShadowBanking-1

TOP-SECRET – NSA Cybercom Running Anonymous Operations

NSA Cybercom Running Anonymous Operations

 


http://www.nytimes.com/2012/07/27/us/cyberattacks-are-up-national-security-chief-says.html

General Alexander, who rarely speaks publicly, did not say how many attacks had occurred in that period. But he said that he thought the increase was unrelated to the release two years ago of a computer worm known as Stuxet, which was aimed at taking down Iran’s uranium enrichment plant at Natanz.

When the worm inadvertently became public, many United States officials and outside experts expressed concern that it could be reverse-engineered and used against American targets. General Alexander said he saw no evidence of that.

General Alexander, as head of the N.S.A., was a crucial player in a covert American program called Olympic Games that targeted the Iranian program. But under questioning from Pete Williams of NBC News at a security conference here, he declined to say whether Stuxnet was American in origin; the Obama administration has never acknowledged using cyberweapons. …

General Alexander spoke in a 75-minute interview at the Aspen Security Forum at the Aspen Institute here. The New York Times is a media sponsor of the four-day conference.

http://aspensecurityforum.org/

—–

Cryptome: Alexander, contrary to previous DIRNSAs, is speaking quite often to gin cyber-aggression as dual-use head of NSA and Cybercom, first for defense second for offense, both now ordered to expound open cyber-threat propaganda to parallel long-standing covert information operations.

Among a slew of commercial initiatives drumming cyber conflict, the Aspen Security Forum aims to be the premier war-bloviation platform, heavily empaneled by former USG officials now shilling for the national security industry. NY Times sponsorship is indicative of the perdurable wartime financial benefits for the media in conjunction with financial markets. Bloviation blows ill winds, the storm front gaining force during presidential campaigns.

Cyber attacks on the US, do not forget them, they are legion, expect them, thanks to NSA/Cyber Command Anonymous operations.

 


 


 

 

 


	

TOP-SECRET – Fundamentals of Tactical Information Collection

https://publicintelligence.net/wp-content/uploads/2012/07/USArmy-SoldierSurveillance.png

 

This publication establishes the Army’s doctrine in support of the Every Soldier is a Sensor (ES2) initiative. The need for Soldiers to be aware that basic observations are an important part of operations has led to the development of this manual.

This manual expands on the information contained in ST 2-91.6 and provides a foundation for developing tactical questioning and reporting and supersedes all other tactical questioning handbooks produced by the United States Army Intelligence Center (USAIC), specifically the Tactical Questioning Soldier’s Handbook and ST 2-91.6. This manual––

• Provides the doctrinal framework for Soldiers and leaders at all echelons and forms the foundation for ES2 curricula within the Army Education System. Its audience is broad, from military Soldiers and leaders to civilians. It is essential that all Soldiers and civilians understand how their daily observations feed into the bigger intelligence process and help create a more favorable environment for US success in a region.
• Is a compilation of tools to help all Soldiers collect information through tactical questioning, detainee handling, and document and equipment handling in offensive, defensive, stability operations, and civil support operations.
• Is not intended to make the Soldier an expert on intelligence collection. It is not intended to train Soldiers as intelligence collectors nor authorize Soldiers to conduct interrogation and source operations.
• Introduces the basics of questioning and reporting and provides some tools for patrols and S-2s.
• Applies to the Full Spectrum Operations. Principles outlined are valid under conditions involving use of chemical, biological, radiological, nuclear, and high yield explosives (CBRNE).

This manual is a compilation of tools to help all Soldiers collect information through surveillance, reconnaissance, patrolling, interacting with the local populace, tactical site exploitation, tactical questioning and detainee handling, briefing, debriefing, and reporting in offensive, defensive, stability operations, and civil support operations. Most of the text was developed specifically for patrols and to conduct traffic control points (TCPs) or roadblocks, and other missions where Soldiers will interact with the local populace including site exploitation and tactical questioning after a planned or hasty raid. The term “patrol” could reflect a platoon, section, fire team, or other special-purpose group given a mission as listed above.

This manual applies to Active Army, the Army National Guard/Army National Guard of the United States, and the United States Army Reserve unless otherwise stated. Although this is Army doctrine, other services will make necessary adaptations based on each of their organizations and service-specific doctrine.

3-35. When conducting tactical questioning, it is imperative that the provisions of the Geneva Conventions (FM 27-10) be followed at all times. When possible, obtain as much information as needed through tactical questioning in order to exploit perishable information (for example, another insurgent operation occurring at the same time, the current location of a known HVT). Personnel talked to are not to be mistreated in any way:

DO NOT––

  • Pay money or compensate for information.
  • Attempt to force or scare information from noncombatants.
  • Attempt to recruit or task someone to go seek out information.
  • Issue government equipment or identification in exchange for information.
  • Refer to personnel questioned as “sources.”
  • Establish a “source network.”
  • Ask questions of noncombatants in an area where the questioning puts the noncombatant in danger. Be discreet, but not so discreet that you attract attention.
  • Ask questions that make your unit’s mission or information requirements obvious.
  • Take notes in front of the person after asking the question.
  • Ask leading questions. Leading questions are phrased in a way to invoke a particular answer, not simply a yes or no answer. Leading questions allow the individual to answer with a response he or she thinks you want to hear, not necessarily the facts. For example, “Is Group XYZ responsible?”
  • Ask negative questions. Negative questions are questions that contain a negative word in the question itself such as “Didn’t you go to the warehouse?”
  • Ask compound questions. Compound questions consist of two questions asked at the same time; for example, “Where were you going after work and who were you to meet there?”
  • Ask vague questions. Vague questions do not have enough information for the person to understand exactly what you are asking. They may be incomplete, general, or otherwise nonspecific and create doubt in the person’s mind.
  • Mention that they may be interrogated later or try any other “scare tactic.”
  • Give comfort items to EPWs/detainees. . . they are not your guests.
  • Inform them of their rights; someone else will handle that task.

DO—

  • Ask only basic questions as described in this section.
  • Move detainees to a detention facility as quickly as possible.

INTERVIEW PREPARATION

B-25. Soldiers should cover the following in preparing for interviews:

  • Select an appropriate site for interviews. Position and arrange the physical setup of the area. When conducting interviews with important people or individuals from different cultures, this arrangement can be significant.
  • Instruct interpreters to mirror the Soldier’s tone and personality of speech. Instruct interpreters not to interject their own questions or personality. Also instruct interpreters to inform them if they notice any inconsistencies or peculiarities from those being interviewed.
  • When possible, identify cultural restrictions before interviewing, instructing, or conferring with particular foreign nationals. For instance, Soldiers should know when is it proper to stand, sit, or cross one’s legs. Gestures, being learned behavior, vary from culture to culture. Interpreters should be able to relate a number of these cultural restrictions, which, whenever possible, should be observed in working with particular groups or individuals.
  • Rehearse with the interpreter using maps, key words or phrases, diagrams, or models that may facilitate a discussion. The interpreter may be able to explain to the Soldier the significance of symbols or gestures commonly used in a conversation to emphasize a point that may not be verbalized.

CONDUCTING AN INTERVIEW
B-26. Soldiers should cover the following when conducting an interview or presenting a lesson:

  • Avoid simultaneous translations; that is, both the Soldier and the interpreter talking at the same time. This can be disrupting unless the Soldier and interpreter work very well together.
  • Speak for a minute or less in a neutral, relaxed manner, directly to the individual or audience. The interpreter should watch the Soldier carefully and, during the translation, mimic the Soldier’s body language as well as interpret his or her verbal meaning. Observe interpreters closely to detect any inconsistencies between an interpreter’s and a Soldier’s manners. Be careful not to force an interpreter into a literal translation by being too brief. Present one major thought in its entirety and allow the interpreter to reconstruct it in his language and culture.
  • Although interpreters perform some editing as a function of the interpreting process, it is imperative that they transmit the exact meaning without additions or deletions. Insist that interpreters always ask for clarification, prior to interpreting, whenever they are not absolutely certain of the Soldier’s meaning. However, be aware that a good interpreter, especially one who is local, can be invaluable in translating subtleties and hidden meanings.
  • During an interview or lesson, if questions are asked, interpreters should immediately relay them for an answer. Interpreters should never attempt to answer questions even though they may know the correct answer. Additionally, neither Soldiers nor interpreters should correct each other in front of an interviewee or class; all differences should be settled away from the subject or audience.
  • Just as establishing rapport with the interpreter is vitally important, establishing rapport with interview subjects or the target audience is equally important. Soldiers and interpreters should concentrate on rapport. To establish rapport, subjects or audiences should be treated as mature, important human beings who are capable and worthy.

TOP-SECRET from the FBI – $ 97 Million Medicare Fraud Scheme

WASHINGTON—A superseding indictment was unsealed today charging two owners of a Houston mental health care company, Spectrum Care P.A., some of its employees, and the owners of Houston group care homes for their alleged participation in a $97 million Medicare fraud scheme, announced the Department of Justice, the Department of Health and Human Services (HHS), and the FBI.

Mansour Sanjar, 79; Cyrus Sajadi, 64; and Chandra Nunn, 34, were originally charged in December 2011 and are expected to make their initial appearances on the superseding indictment in the coming days. The indictment was originally retuned on July 24, 2012, and was unsealed today.

Adam Main, 31; Shokoufeh Hakimi, 65; Sharonda Holmes, 38; and Shawn Manney, 50, all from the Houston area, were arrested today and are expected to make their initial appearances in U.S. District Court for the Southern District of Texas in Houston either today or tomorrow.

The superseding indictment charges Sanjar, Sajadi, Main, Terry Wade Moore, 51, Hakimi, and Nunn each with one count of conspiracy to commit health care fraud; Sanjar, Sajadi, Main, and Moore are charged with various counts of health care fraud; Sanjar, Sajadi, Hakimi, Nunn, Holmes, and Manney each are charged with one count of conspiracy to defraud the United States and to pay health care kickbacks; and Sanjar, Sajadi, Hakimi, Nunn, Holmes, and Manney are charged with various counts of payment and receipt of healthcare kickbacks. The superseding indictment also seeks forfeiture.

According to the indictment, Sanjar and Sajadi orchestrated and executed a scheme to defraud Medicare beginning in 2006 and continuing until their arrest in December 2011. Sanjar and Sajadi owned Spectrum, which purportedly provided partial hospitalization program (PHP) services. A PHP is a form of intensive outpatient treatment for severe mental illness. The Medicare beneficiaries for whom Spectrum billed Medicare for PHP services did not qualify for or need PHP services. Sanjar, Sajadi, Main, and Moore signed admission documents and progress notes certifying that patients qualified for PHP services, when, in fact, the patients did not qualify for or need PHP services. Sanjar and Sajadi also billed Medicare for PHP services when the beneficiaries were actually watching movies, coloring, and playing games—activities that are not covered by Medicare.

Sanjar, Sajadi, and Hakimi paid kickbacks to Nunn, Holmes, Manney, and other group care home operators and patient recruiters in exchange for delivering ineligible Medicare beneficiaries to Spectrum, according to the indictment. In some cases, the patients received a portion of those kickbacks. The indictment alleges that Spectrum billed Medicare for approximately $97 million in services that were not medically necessary and, in some cases, not provided.

Today’s charges were announced by Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division; U.S. Attorney Kenneth Magidson of the Southern District of Texas; Special Agent in Charge Stephen L. Morris of the FBI’s Houston Field Office; Special Agent in Charge Mike Fields of the Dallas Regional Office of HHS’s Office of the Inspector General (HHS-OIG); the Texas Attorney General’s Medicaid Fraud Control Unit (MFCU); Joseph J. Del Favero, Special Agent in Charge of the Chicago Field Office of the Railroad Retirement Board, Office of Inspector General (RRB-OIG); and Scott Rezendes, Special Agent in Charge of Field Operations of the Office of Personnel Management, Office of Inspector General (OPM-OIG).

An indictment is merely a formal accusation. Defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

The case is being prosecuted by Trial Attorneys Laura M.K. Cordova and Allan J. Medina and Deputy Chief Sam S. Sheldon of the Criminal Division’s Fraud Section with assistance from Trial Attorneys Jennifer Ambuehl and Aixa Maldonado-Quinones of the Criminal Division’s Asset Forfeiture and Money Laundering Section. The case was investigated by the FBI, HHS-OIG, MFCU, RRB-OIG, and OPM-OIG and was brought as part of the Medicare Fraud Strike Force, supervised by the Criminal Division’s Fraud Section and the U.S. Attorney’s Office for the Southern District of Texas.

Since its inception in March 2007, the Medicare Fraud Strike Force, now operating in nine cities across the country, has charged more than 1,330 defendants who have collectively billed the Medicare program for more than $4 billion. In addition, HHS’s Centers for Medicare and Medicaid Services, working in conjunction with HHS-OIG, is taking steps to increase accountability and decrease the presence of fraudulent providers.

To learn more about the Health Care Fraud Prevention and Enforcement Action Team (HEAT), go to http://www.stopmedicarefraud.gov.

The FBI – Former Carmel Real Estate Developer Pleads Guilty to $16 Million Golf Course Investment Fraud Scheme

SAN JOSE, CA—A former Carmel, California real estate developer pleaded guilty today to wire fraud and money laundering arising out of his golf course investment fraud scheme in which he defrauded more than 50 victims, U.S. Attorney Melinda Haag announced.

Thomas Joseph O’Meara, III, 65, formerly a Carmel resident now living in Palm Desert, California, admitted in his plea agreement that he carried out an investment fraud scheme from 2004 to 2007. O’Meara recruited individuals to invest more than $16 million in a 18-hole golf course and gated housing development in Fresno, California, that he named the Running Horse Golf and Country Club.

According to the indictment, O’Meara retained professional golfer Jack Nicklaus’ firm Nicklaus Design to design the Running Horse golf course and convinced the PGA Tour to publically schedule a PGA Tour event at the golf course. O’Meara admitted in the plea agreement that in an effort to recruit investors and secure money for the planned golf course, he lied about Nicklaus Design’s and the PGA Tour’s confidence in the development. O’Meara also admitted that he lied to investors about the progress and financial condition of the development. The Running Horse Development ultimately failed, investors lost their money, no PGA Tour golf event took place, and the 450 Fresno-area acres on which the golf course and gated community was to have been located remain largely undeveloped.

O’Meara has been on home detention and electronic monitoring, secured by a bond, since his August 3, 2010, arrest in Palm Desert.

O’Meara’s sentencing is scheduled for November 14, 2012, before United States District Judge Lucy H. Koh in San Jose.

In pleading guilty, O’Meara admitted to wire fraud, in violation of 18 U.S.C. § 1343 (count 15) and money laundering, in violation of 18 U.S.C. § 1957 (count 30). The maximum statutory penalty for wire fraud in violation of 18 U.S.C. § 1343 is 20 years in prison and a fine of $250,000, plus restitution. The maximum statutory penalty for money laundering in violation of 18 U.S.C. § 1957 is 10 years in prison and a fine of $250,000, plus restitution. O’Meara agreed in his plea agreement to pay at least $7 million in restitution to victims. However, any sentence following conviction would be imposed by the court after consideration of the U.S. Sentencing Guidelines and the federal status governing the imposition of a sentence, 18 U.S.C. § 3553.

Joseph Fazioli is the Assistant U.S. Attorney who is prosecuting the case with the assistance of Legal Assistant Kamille Singh. The prosecution is the result of a multi-year investigation by the Federal Bureau of Investigation and the Internal Revenue Service. The United States Attorney’s Office recognizes the substantial and valuable assistance of the Monterey County District Attorney’s Office in this matter.

Cryptome reports Getty Recycles bin Laden Operation Photos

Getty Recycles bin Laden Operation Photos

[Image]

Getty Images 23 minutes ago (downloaded 25 July 2012, 17:05)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, Secretary of Defense Robert Gates (L), President Barack Obama (2nd-R) and National Security Advisor Tom Donilon (R) attenda a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden.

[Image]

Getty Images 23 minutes ago (downloaded 25 July 2012, 17:05)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, (L-R) Deputy National Security Advisor Denis McDonough, John Brennan, Assistant to the President for Homeland Security and Counterterrorism, Secretary of Defense Robert Gates, Tony Blinken, National Security Advisor to the Vice President and President Barack Obama attend a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden.

[Image]

Getty Images 38 minutes ago (downloaded 25 July 2012, 17:09)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, (L-R) National Security Advisor Tom Donilon, Secretary of State Hillary Clinton and Director of National Intelligence James Clapper listen as Leon Panetta, Director of the CIA speaks during a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden.

[Image]

Getty Images 38 minutes ago (downloaded 25 July 2012, 17:10)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff and Secretary of Defense Robert Gates attend a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden.

[Image]

Getty Images 38 minutes ago (downloaded 25 July 2012, 17:11) [Earlier White House release]

WASHINGTON, DC – MAY 1: In this photo provided by The White House, (L-R) President Barack Obama,National Security Advisor Tom Donilon, Secretary of State Hillary Clinton, Director of National Intelligence James Clapper, Leon Panetta, Director of the CIA, National Security Advisor Tom Donilon and Vice President Joe Biden attend a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden. [Man between James Clapper and Leon Panetta is unidentified CIA officer who tracked bin Laden.]

[Image]

Getty Images 38 minutes ago (downloaded 25 July 2012, 17:12)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, (L-R) Director of National Intelligence James Clapper, Leon Panetta, Director of the CIA and National Security Advisor Tom Donilon attend a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden. [Man at upper left behind James Clapper is unidentified CIA officer who tracked bin Laden.]

[Image]

Getty Images 43 minutes ago (downloaded 25 July 2012, 17:14)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff speaks during a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden.

[Image]

Getty Images 9 minutes ago (downloaded 25 July 2012, 17:15)

WASHINGTON, DC – MAY 1: In this photo provided by The White House, Deputy National Security Advisor Denis McDonough chats during a meeting in the Situation Room on May 1, 2012 in Washington, DC. President Barack Obama’s national security team held a series of meeting to discusss Osama bin Laden.

The Internet’s First Serial Killer – Full Movie

John Edward Robinson (born December 27, 1943) is a convicted serial killer, con man, embezzler, kidnapper, and forger. Because he made contact with most of his post-1993 victims via on-line chat rooms, he is sometimes referred to as “the Internet’s first serial killer”.

TOP-SECRET – Sworn Declaration of Whistleblower William Binney on NSA Domestic Surveillance Capabilities

https://publicintelligence.net/wp-content/uploads/2012/07/NSA-WilliamBinneyDeclaration.png

The following sworn declaration of William Binney, a former employee of the NSA and specialist in traffic analysis, was filed July 2, 2012 in support of the Electronic Frontier Foundation’s case against the National Security Agency (Jewel v. NSA) regarding their illegal domestic surveillance programs which, according to Binney “are consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications” inside the U.S.  Thanks to Jacob Appelbaum for originally drawing attention to the declaration.

I, William Binney, declare:

1. I am a former employee of the National Security Agency (“NSA”), the signals intelligence agency within the Department of Defense. Unless otherwise indicated, I have personal knowledge of each and every fact set forth below and can competently testify thereto.

2. A true and correct copy of my resume is attached hereto as Exhibit A.

3. In the late 1990′s, the increasing use of the Internet for communications presented the NSA with a special kind of problem: The NSA could not collect and smartly select from the large volume of data traversing the Internet the nuggets of needed information about “Entities of Interest” or “Communities of Interest,” while protecting the privacy of U.S. persons. Human analysts had to manually identify the groups and entities associated with activities that the NSA sought to monitor. That process was so laborious that it significantly hampered the NSA’s ability to do large scale data analysis.

4. One of my roles at the NSA was to find a means of automating the work of human analysts. I supervised and participated in the development of a program called “Thin Thread” within the NSA. Thin Thread was designed to identify networks of connections between individuals from their electronic communications over the Internet in an automated fashion in real time. The concept was for devices running Thin Thread to monitor international communications traffic passing over the Internet. Where one side of an international communication was domestic, the NSA had to comply with the requirements of the Foreign Intelligence Surveillance Act (“FISA”). With Thin Thread, the data would be encrypted (and the privacy of U.S. citizens protected) until such time as a warrant could be obtained from the Foreign Intelligence Surveillance Comi.

5. The advent of the September 11 attacks brought a complete change in the approach 18 of the NSA toward doing its job. FISA ceased to be an operative concern, and the individual liberties preserved in the U.S. Constitution were no longer a consideration. It was at that time that the NSA began to implement the group of intelligence activities now known as the President’s Surveillance Program (“PSP”). While I was not personally read into the PSP, various members of my Thin Thread team were given the task of implementing various aspects of the PSP. They confided in me and told me that the PSP involved the collection of domestic electronic communications traffic without any of the privacy protections built into Thin Thread.

6. I resigned from the NSA in late 2001. I could not stay after the NSA began purposefully violating the Constitution.

7. The NSA chose not to implement Thin Thread. To the best of my knowledge, the NSA does not have a means of analyzing Internet data for the purpose of identifying Entities or Communities of Interest in real time. The NSA has the capability to do individualized searches, similar to Google, for particular electronic communications in real time through such criteria as target addresses, locations, countries and phone numbers, as well as watch-listed names, keywords, and phrases in email. The NSA also has the capability to seize and store most electronic communications passing through its U.S. intercept centers. The wholesale collection of data allows the NSA to identify and analyze Entities or Communities of interest later in a static database. Based on my proximity to the PSP and my years of experience at the NSA, I can draw informed conclusions from the available facts. Those facts indicate that the NSA is doing both.

8. The NSA could have installed its intercept equipment at the nation’s fiber-optic cable landing stations. See Greg’s Cable Map, cablemap.info. There are more than two dozen such sites on the U.S. coasts where fiber-optic cables come ashore. If the NSA had taken that route, it would have been able to limit its interception of electronic communications to international/international and international/domestic communications and exclude domestic/domestic communications. Instead the NSA chose to put its intercept equipment at key junction points (for example Folsom Street) and probably throughout the nation, thereby giving itself access to purely domestic communications. The conclusion of J. Scott Marcus in his declaration that the “collection of infrastructure … has all the capability necessary to conduct large scale covert gathering of IP-based communications information, not only for communications to overseas locations, but .for purely domestic communications as well,” is correct.

9. I estimate that the NSA installed no fewer than ten and possibly in excess of twenty intercept centers within the United States. I am familiar with the contents of Mark Klein’s declaration. The AT&T center on Folsom Street in San Francisco is one of the NSA intercept centers. Mr. Klein indicated that the NSA’s equipment intercepted Internet traffic on AT&T’s peering network. It makes sense for the NSA to intercept traffic on AT &T’s peering network. The idea would be to avoid having to install interception equipment on each of the thousands of parallel data lines that eventually lead into and out of peering networks. By focusing on peering networks, the NSA intercepts data at the choke point in the system through which all data must pass in order to move from one party’s network to another’s. This is particularly important because a block data is often broken up into many smaller packets for transmission. These packets may traverse different routes before reaching the destination computer which gathers them and reassembles the original block.

10. One of the most notable pieces of equipment identified in Mr. Klein’s declaration is the NARUS Semantic Traffic Analyzer. According to the NARUS website, each NARUS device collects telecommunications data at the rate of ten gigabits per second and organizes the data into coherent streams based on the protocol associated with a specific type of collected data. A protocol is an agreed-upon way for data to be broken down into packets for transmission over the Internet, for the packets to be routed over the Internet to a designated destination and for the packets to be re-assembled at its destination. Protocols exist at each layer of the OSI (Open Systems Interconnection) 7-layer telecommunications model and are used for a wide variety of data, not just electronic communications. That means that NARUS can reconstruct all information transmitted through the peering network and forward all of the electronic communications to a database for analysis. The NARUS device can also select predetermined data from that path and forward the data to organizations having interest in the data. As I indicated above, the predetermined data would involve target addresses, locations, countries, and phone numbers, as well as watch-listed names, keywords, and phrases.

11. A further notable development has been the NSA’s public announcement in October 2009 that it was building a massive, $1.2 billion digital storage facility in Ft. Williams, Utah. According to some reports, the Utah facility will eventually have a data storage capacity measured in yottabytes (1024 bytes). Even if the Utah facility were to have no more than the amount of data storage that is presently commercially available, then one would expect the data storage to be in the range of multiples often exebytes (1018 bytes). See http://www.cleversafe.com. (According to Cleversafe, its ten exebyte storage solution fills no more than two hundred square feet). In April 2011, the NSA also announced that it would build a new supercomputing center at its Ft. Meade, Maryland headquarters.

12. The amount of data that each NARUS device can process per second is large (10 gigabits is 10 billion bits). To illustrate the sheer size of the data storage capacity ofthe Utah facility, one could assume the installation of twenty-five NARUS devices in the U.S. and that all of 2 the NARUS-processed data is sent via fiber-optic cable to Utah. That means that the NARUS processing rate of 10 billion bits per second means that one machine can produce approximately 4 x 1016 bytes per year. That in turn means that it would take twenty-five devices one year to fill an exebyte or ten years to fill ten exebytes.

13. The sheer size of that capacity indicates that the NSA is not filtering personal electronic communications such as email before storage but is, in fact, storing all that they are collecting. The capacity of NSA’s planned infrastructure far exceeds the capacity necessary for the storage of discreet, targeted communications or even for the storage of the routing information from all electronic communications. The capacity of NSA’s planned infrastructure is consistent, as a mathematical matter, with seizing both the routing information and the contents of all electronic communications.

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

NSA-WilliamBinneyDeclaration

TOP-SECRET from the FBI – Two TSA Screeners Agree to Plead Guilty to Conspiracy Charges

LOS ANGELES—Two people who were employed as transportation security officers at Los Angeles International Airport—and a third person who allegedly smuggled marijuana to Boston—were charged today with conspiring to pay bribes to the employees of the Transportation Security Administration.

The three defendants have agreed to plead guilty to conspiracy charges in plea agreements that were also filed this morning in United States District Court. Two other drug couriers previously agreed to plead guilty in this case, meaning that five defendants have now been charged and agreed to plead guilty in this investigation.

The three defendants charged today are:

  • Dianna Perez, 28, of Inglewood, who was terminated as a TSA employee last October;
  • Randy Littlefield, 29, of Paramount, who resigned from TSA last October; and
  • Millage Peaks, 24, of Los Angeles, who initiated the bribery scheme when he offered Perez money to allow narcotics-laden luggage to be passed through security checkpoints.

The other two defendants who agreed to plead guilty to conspiracy charges in plea agreements filed July 2 are:

  • Charles Hicks, also known as “Smoke,” 24, of Culver City; and
  • Andrew Russel Welter, also known as “Drew,” 25, of Fontana.

All five defendants are scheduled to make their initial appearances in federal court on August 14.

According to court documents, the conspiracy between the drug couriers and the TSA employees began November 2010. “Peaks offered to pay coconspirator Perez a bribe fee of approximately $500 for each bag containing marijuana that coconspirator Perez cleared through airport security for the drug couriers,” according to the statement of facts contained in the five plea agreements.

“Over the course of the next year, conspirator Perez used her position with TSA to help the drug couriers circumvent airport security on approximately nine occasions,” the statement of facts continues. “She did this a number of ways. First, she would instruct the drug couriers how to pack the marijuana so it would not trigger alarms on TSA’s explosive detection system. Coconspirator Perez would also personally screen the bags using TSA’s explosive detection system. Finally, if a bag did alarm, co-conspirator Perez would manually screen the bag and then clear it.”

Littlefield “cleared” bags on at least two occasions in exchange for $200 that was to be paid by Perez, according to the plea agreements.

The charge of conspiracy carries a statutory maximum penalty of five years in federal prison.

The case against Perez, Littlefield, and the drug couriers is the result of an investigation by the Federal Bureau of Investigation, which received assistance from the Los Angeles Airport Police and the Department of Homeland Security, Office of Inspector General.

In an unrelated case filed by the United States Attorney’s Office in April, two then-TSA screeners who worked at LAX, two former TSA screeners and three alleged drug couriers were indicted on narcotics trafficking and bribery charges for allegedly taking cash payments to allow large shipments of cocaine, methamphetamine, and marijuana to pass through the X-ray machines at security checkpoints (see: http://www.justice.gov/usao/cac/Pressroom/2012/051.html). The seven defendants in this case are currently scheduled to go on trial on February 12, 2013.

The Baton Rouge Serial Killer – Full Movie

Derrick Todd Lee (born November 5, 1968 in St. Francisville, Louisiana, USA) is a convicted serial killer, nicknamed the Baton Rouge Serial Killer.[1]
He was linked by DNA to the deaths of seven women in the Baton Rouge and Lafayette areas in Louisiana, and in 2004 was convicted of the murders of Geralyn DeSoto and Charlotte Murray Pace. Newspapers have suggested Lee can be linked to other unsolved murders in the area, but the police lack DNA evidence to prove these connections. After Lee’s arrest, it was discovered that another serial killer, Sean Vincent Gillis, was also operating in the Baton Rouge area during the same time as Lee.
Lee’s methods varied with nearly each murder. Similarities between the crimes included the removal of cell phones from the victim’s belongings, and a lack of any visible signs of forced entry into the location where the victim was attacked. Most of the murders were committed in the area around Louisiana State University (LSU). Two of the victims’ bodies were discovered at the Whiskey Bay boat launch, approximately 30 miles west of Baton Rouge, just off of Interstate 10.

“GoMoPa” – Cyberattacken – Graumarktinfo – Gerlach

Liebe Leser,

gibt es eigentlich noch etwas absurders als die “GoMoPa”-Cyber-Rufmorde ?

“Nein”, werden Sie sagen.

Ich sage: “Ja !”

Die “GoMoPa”-Lebensläufe” und die Behauptung,  “Opfer” von Cyberattacken geworden zu sein wegen “kritischen Journalismus.”

Und das “GoMoPa”-Kinderportal mit Sexualerziehung für Kinder… Wobei NUR absurd hier nicht zutrifft…

Typisch “GoMoPa”: Die Tatsachen umdrehen und mit Fälschungen arbeiten:

Fakt ist, dass Info-Portal der Journalistin Renate Daum von Gruner & Jahr wurde mit Cyber-Attacken angegriffen, ebenso wie seinerseits die Gerlach-Webseite kurz vor Gerlachs äusserst mysteriösen Tod, einem mutmasslichen Mord durch Dioxin, um dies zu verschleiern ist jetzt “GoMoPa”  “Opfer”.

Ein durchsichtiges Spiel mit immer denselben Tricks (siehe auch die Meridan Capital-Fälschungen).

Ich weiß, wovon ich rede, denn auch unsere Webseiten werden ständig angegriffen. Mutmasslich von “GoMoPa”-Hackern, mutmasslich koordiniert von Sven Schmidt und Thomas Promny.

Wie gesagt: “Die Schweine erkennt der Bauer am Gang!”

Herzlichst Ihr

Bernd Pulch, MA

PS: Offensichtlich kundschaftet “GoMoPa” auch das Privatleben von Frau Daum aus und infiltriert ihre Umgebung (“GoMoPa”-Bemerkung über ihren Lebensgefährten) – auch diese STASI-Methoden kenne ich seit Jahren. Auch bei Heinz Gerlach wurde so verfahren. Hier die Belege:

TOP-SECRET – Activation Order – ADM Cyberstalker Client

Activation Order –ADM Cyberstalker

Client – ADM Corporate Security Division

Overview – The client has requested a new cyberstalker report regarding their CEO, Patricia A. Woertz and her immediate family.

Deliverable – Stratfor will provide a written report detailing the available public information regarding the Woertz family. The report will include only information obtained from publicly available sources.

ACTIVATION ORDER – Cyberstalker Report

Date 2007-10-01 18:32:44
From alfano@stratfor.com
To howerton@stratfor.com
mfriedman@stratfor.com
gfriedman@stratfor.com
stewart@stratfor.com
McCullar@stratfor.com
greg.sikes@stratfor.com
briefers@stratfor.com
Others MessageId: <00df01c80448$b27a6020$8ead1cac@stratfor.com>
InReplyTo: 000c01c7fabf$b265ebf0$ae01a8c0@stratfor.com

The report will contain two primary sections.  The first section will be prose detailing our findings—this section will be approximately four to five pages long.  The second section will be appendices that will provide a copy and paste view of the actual information that we were able to obtain.

The final report should be delivered in PDF format.

Timeline – Anya will write this report.  Following comments from Stick, I’ll send the report to Mike McCullar for edit before COB on Thursday, October 4.  Mike will return the finished product to me by COB on Wednesday, October 10.

Comments –   Client is making decision about whether to conduct full re-investigations on other members of the family.

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Unternehmen wehren sich – “Life Forestry warnt Unternehmen vor Cyber Mobbing und Erpressung”

Life Forestry Switzerland AG: Wie seriös ist Gomopa? Life Forestry warnt Unternehmen vor Cyber Mobbing und Erpressung

EquityStory AG-News: Life Forestry Switzerland AG / Schlagwort(e): Marktbericht/Stellungnahme Life Forestry Switzerland AG: Wie seriös ist Gomopa? Life Forestry warnt Unternehmen vor Cyber Mobbing und Erpressung

23.07.2012 / 11:42

———————————————————————

Life Forestry warnt Unternehmen vor Cyber Mobbing und Erpressung

Stans, CH, 23. Juli 2012: In Deutschland werden jährlich Tausende von Unternehmen Opfer von Online-Verleumdung und Erpressung. Viele Unternehmen zahlen im Stillen das geforderte ‘Schutzgeld’, um größere Image-Schäden abzuwehren. Das Unternehmen Life Forestry wehrt sich – und macht anderen Unternehmen Mut, seinem Beispiel zu folgen.

Die Life Forestry Switzerland AG aus dem eidgenössischen Stans zählt zu den führenden Anbietern von Direktinvestments in Teakholz und betreut seit 2006 in Zentralamerika Aufforstungsprojekte der höchsten Qualitätsstufe. Seit einigen Wochen ist das Mittelstandsunternehmen Opfer einer gezielten Verleumdungskampagne des vermeintlichen Online-Nachrichtendienstes ‘Gomopa’.

Wie Berichte in der FAZ, dem Handelsblatt, Börse-Online, der Süddeutsche Zeitung und der Financial Times aufzeigen, steckt hinter Gomopa ein Netzwerk von Anwälten, Wirtschaftsdetektiven und Investmentprofis, die seit einigen Jahren in Deutschland immer wieder wegen fragwürdiger Geschäftspraktiken aufgefallen sind. Der Gomopa-Gründer und Unternehmenskopf Klaus Maurischat wurde bereits 2006 wegen Betrugs verurteilt, 2009 wurden Mitarbeiter von Gomopa wegen Insiderhandels und Aktienkursmanipulation im Zusammenhang mit dem Unternehmen WireCard angeklagt. Heute benutzt Gomopa sein gleichnamiges Nachrichtenportal dazu, um Unternehmen mit falschen Fakten und Anschuldigungen anzugreifen und zu erpressen. Zu ihren ‘Opfern’ zählen neben der Life Forestry AG die Immovation AG aus Kassel, die CPA Capital Partners AG und andere Mittelstandsunternehmen.

Die Life Forestry hat bereits vor Wochen Maßnahmen ergriffen, die zur Abwehr von Cyber Mobbing-Attacken beitragen: Zum Beispiel wurde beim Landgericht Frankfurt a.M. eine Unterlassungsverfügung erwirkt, die es Gomopa untersagt, seine ungerechtfertigten Anschuldigungen weiter im Internet zu verbreiten. Auch der Internet-Konzern Google wurde kontaktiert und gebeten, die betreffenden Aussagen aus den Suchmaschinen zu entfernen. Lambert Liesenberg, Geschäftsführer bei der Life Forestry AG, kommentiert die Abwehrmaßnahmen seines Unternehmens: ‘Wir tun, was wir können, um den Schaden zu minimieren. Aber die Cyber Mobber von Gomopa brauchen lediglich neue Anschuldigungen zu erfinden oder auf einen anderen Blog auszuweichen, und schon fängt der Kreislauf von vorne an.’

Aus diesem Grund hält es die Life Forestry AG für immens wichtig, die Öffentlichkeit und vor allem andere Unternehmen über Gomopas rufschädigende Methoden zu informieren. ‘Mafiöse Organisationen wie Gomopa leben davon, dass Unternehmen aus Angst vor Imageschäden ihren Forderungen nachgeben. Wenn bekannter wäre, wie Gomopa arbeitet, dann würde der Einfluss dieser Organisation sehr schnell schrumpfen,’ glaubt Lambert Liesenberg.

Auch im Hinblick auf ihre Kunden hält Life Forestry es für unverzichtbar, über die geschäftsschädigenden Praktiken der Cyber Mobber und ihre Anschuldigungen aufzuklären. Seit der Gründung gehört es zur Unternehmensphilosophie der Life Forestry Switzerland AG, das Vertrauen ihrer Kunden mit maximaler Qualität und – Transparenz – zu verdienen. Geschäftsführer Lambert Liesenberg: ‘Vom Geschäftsmodell über die präzise GPS-Erfassung aller Teakbaumbestände bis zur Herleitung unserer Ertragsprognosen verfolgen wir ein Ziel: für unsere Kunden ein Höchstmaß an Sicherheit und Nachvollziehbarkeit herauszuholen. Wenn Sie Fragen haben, dann zögern Sie nicht uns jederzeit zu kontaktieren.’

Die Life Forestry Switzerland AG bewirtschaftet Teakholz-Pflanzungen der höchsten Qualitätsstufe in Costa Rica und Ecuador. Die Kunden erwerben Eigentum an den Baumbeständen , die nach 20-jähriger Pflege geerntet und verkauft werden. Durch strengste professionelle Standards bei der Auswahl der Anbaugebiete und dem forstwirtschaftlichen Anbau wird eine Holzqualität erreicht, die sich im internationalen Holzmarkt mit Teakholz aus Naturwäldern messen kann. Jeder Teak-Forst wird vom FSC (Forest Stewardship Council) zertifiziert und die Bäume individuell gekennzeichnet. Über eine GPS-Vermessung aller Plantagen und der einzelnen Parzellen kann der Standort der Bäume jederzeit bestimmt und nachgeprüft werden. Teakholzinvestments von Life Forestry stehen für eine hohe finanzielle Performance in Verbindung mit einem messbaren ökologischen und sozialen Mehrwert.

Life Forestry Switzerland AG Mühlebachstrasse 3 CH – 6370 Stans NW

Carl-Lambert Liesenberg Geschäftsführer/CEO

Tel: +41 (0) 41 632 63 00 Fax: +41 (0) 41 632 63 01

info@lifeforestry.com http://www.lifeforestry.com

Ende der Medienmitteilung

———————————————————————

23.07.2012 Veröffentlichung einer Pressemitteilung, übermittelt durch EQS CORPORATE COMMUNICATIONS. http://www.eqs.com – Medienarchiv unter http://www.eqs.com/ch/pressemappen

Für den Inhalt der Mitteilung ist der Herausgeber verantwortlich.

TOP-SECRET – Fukushima Nuclear Accident Independent Investigation Commission Official Report

https://publicintelligence.net/wp-content/uploads/2012/07/FukushimaAccidentReport.png

A “manmade” disaster

The TEPCO Fukushima Nuclear Power Plant accident was the result of collusion between the government, the regulators and TEPCO, and the lack of governance by said parties. They effectively betrayed the nation’s right to be safe from nuclear accidents. Therefore, we conclude that the accident was clearly “manmade.” We believe that the root causes were the organizational and regulatory systems that supported faulty rationales for decisions and actions, rather than issues relating to the competency of any specific individual. (see Recommendation 1)

The direct causes of the accident were all foreseeable prior to March 11, 2011. But the Fukushima Daiichi Nuclear Power Plant was incapable of withstanding the earthquake and tsunami that hit on that day. The operator (TEPCO), the regulatory bodies (NISA and NSC) and the government body promoting the nuclear power industry (METI), all failed to correctly develop the most basic safety requirements—such as assessing the probability of damage, preparing for containing collateral damage from such a disaster, and developing evacuation plans for the public in the case of a serious radiation release.

TEPCO and the Nuclear and Industrial Safety Agency (NISA) were aware of the need for structural reinforcement in order to conform to new guidelines, but rather than demanding their implementation, NISA stated that action should be taken autonomously by the operator. The Commission has discovered that no part of the required reinforcements had been implemented on Units 1 through 3 by the time of the accident. This was the result of tacit consent by NISA for a significant delay by the operators in completing the reinforcement. In addition, although NISA and the operators were aware of the risk of core damage from tsunami, no regulations were created, nor did TEPCO take any protective steps against such an occurrence.

Since 2006, the regulators and TEPCO were aware of the risk that a total outage of electricity at the Fukushima Daiichi plant might occur if a tsunami were to reach the level of the site. They were also aware of the risk of reactor core damage from the loss of seawater pumps in the case of a tsunami larger than assumed in the Japan Society of Civil Engineers estimation. NISA knew that TEPCO had not prepared any measures to lessen or eliminate the risk, but failed to provide specific instructions to remedy the situation.

We found evidence that the regulatory agencies would explicitly ask about the operators’ intentions whenever a new regulation was to be implemented. For example, NSC informed the operators that they did not need to consider a possible station blackout (SBO) because the probability was small and other measures were in place. It then asked the operators to write a report that would give the appropriate rationale for why this consideration was unnecessary. It then asked the operators to write a report that would give the appropriate rationale for why this consideration was unnecessary.

The regulators also had a negative attitude toward the importation of new advances in knowledge and technology from overseas. If NISA had passed on to TEPCO measures that were included in the B.5.b subsection of the U.S. security order that followed the 9/11 terrorist action, and if TEPCO had put the measures in place, the accident may have been preventable.

There were many opportunities for taking preventive measures prior to March 11. The accident occurred because TEPCO did not take these measures, and NISA and the Nuclear Safety Commission (NSC) went along. They either intentionally postponed putting safety measures in place, or made decisions based on their organization’s self interest, and not in the interest of public safety.

From TEPCO’s perspective, new regulations would have interfered with plant operations and weakened their stance in potential lawsuits. That was enough motivation for TEPCO to aggressively oppose new safety regulations and draw out negotiations with regulators via the Federation of Electric Power Companies (FEPC). The regulators should have taken a strong position on behalf of the public, but failed to do so. As they had firmly committed themselves to the idea that nuclear power plants were safe, they were reluctant to actively create new regulations. Further exacerbating the problem was the fact that NISA was created as part of the Ministry of Economy, Trade & Industry (METI), an organization that has been actively promoting nuclear power.

DOWNLOAD THE ORIGINAL DOCUMENT HERE

FukushimaAccidentReport

Confidential – Cryptome publishes Masquerade Protests

Masquerade Protests

[Image]A man wearing a mask of Spanish Prime Minister Mariano Rajoy protest during a demonstration organized by Unions on July 19, 2012 in Barcelona, against the government’s welfare cuts. In the latest measures to lower Spain’s deficit, conservative Prime Minister Mariano Rajoy announced 65 billion euros’ ($80 billion) worth of savings measures. Getty
[Image]A street performer dressed as an character from the science fiction film Avatar walks among the crowds near Mexico City’s main plaza, the Zocalo, Friday, July 13, 2012. Street performers, many dressed in costumes, gathered to protest in the historic downtown area where once they were allowed to perform but are now run off by police. AP
[Image]An anti-government demonstrator holds a molotov cocktail during clashes in the village of Sitra, south of Manama, Bahrain July 13, 2012. Dozens of demonstrators marched in an attempt to protest under the slogan ”Challenge Friday”, challenging the authorities after the government banned the protest. On Thursday, the Ministry of Interior issued a statement saying that the ministry is looking into venues where protests can be held. Reuters
[Image]An animal rights activist wearing an elephant-shaped headpiece arrives holding a placard for a protest in front of the Staples Center in Los Angeles, on July 11, 2012 in California, on the opening day of the Ringling Bros. and Barnum & Bailey Circus. Representatives of PETA, Animal Defenders International, In Defense of Animals, Last Chance for Animals, and the Animal Protection and Rescue League participated with a message for prospective circusgoers: Don’t go. Getty
[Image]A member of the Sikh community takes part in a protest against the Pakistani government in New Delhi on July 15, 2012. Sikh protesters demanded the immediate release of Indian national Sarabjit Singh who is currently held in a Pakistani prison. Sarabjit Singh is a high-profile prisoner who has spent two decades in solitary confinement on death row in Lahore after being convicted for his role in a string of bombings. Getty
[Image]An Israeli protester wearing a Guy Fawkes mask and Pharaoh headpiece chains his hand as he holds a slogan which reads in Hebrew ‘The justice is like Pharaoh’ during a demonstration in the Mediterranean coastal city of Tel Aviv on July 14, 2012 to mark the first anniversary of last summer’s social justice demonstrations that swept the country to protest the spiralling cost of living. Getty
[Image]Demonstrators march against student tuition hikes and Bill 78 in downtown Montreal, Quebec July 22, 2012. The mass demonstration, which is quickly becoming a monthly protest in Montreal since it started around six months ago, has drawn tens of thousands of people to protest in the city. Reuters
[Image]A woman wears an old police helmet during a protest by firefighters and police officers against government austerity measures in Valencia July 23, 2012. Reuters
[Image]A member of the movement ‘YoSoy#132’ takes part in a protest against the election results at Reforma avenue, in Mexico City, on July 22, 2012. The movement is protesting against Enrique Pena Nieto, candidate of the Institutional Revolutionary Party (PRI), who declared victory in the presidential election, after the first official results showed him with 38 percent of the vote. The candidate for the leftist coalition Progressive Movement of Mexico, Andres Manuel Lopez Obrador, the winner’s nearest rival, refused to concede the race to Pena Nieto until the official final results be released, claiming to have data showing different results. Getty

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]Juan Antonio Torres, 42, a social worker and member of the Comisiones Obreras (CCOO), lies in a coffin while wearing a mask of Spain’s Prime Minister Mariano Rajoy during a protest march against austerity measures in Malaga, southern Spain, July 19, 2012. Hundreds of thousands of Spaniards marched against the centre-right government’s latest austerity measures on Thursday evening, following more than a week of demonstrations across the country. Reuters
[Image]Firemen shouts slogans as they march during a protest against government austerity measures in Madrid July 19, 2012. A protest movement against the centre-right Spanish government’s latest austerity measures swelled on Thursday as public sector workers stepped up demonstrations in Madrid and around the country after more than a week of spontaneous action. The placard reads, “Our cut will be with a guillotine”. Reuters

[Image]

[Image]A demonstrator dresses as an skeleton during a protest against government austerity measures in Madrid July 19, 2012. A protest movement against the centre-right Spanish government’s latest austerity measures swelled on Thursday as public sector workers stepped up demonstrations in Madrid and around the country after more than a week of spontaneous action. The placard reads, “Market, money management thieves”. Reuters
[Image]A woman performs during a protest against the health care system in Bogota, Colombia, on July 19, 2012, requiring the dismantling of the Health Promotion Companies (EPS). Colombian President Juan Manuel Santos announced Thursday a package of drastic measures to save the health sector, threatened with bankruptcy because of debts incurred by the EPS. Getty

[Image]

[Image]

[Image]

[Image]

[Image]A woman carries a gallows rope with the pictures Yahya Mohammed Abdullah Saleh (R), nephew of former Yemeni President Ali Abdullah Saleh, and Saleh’s son Ahmed Ali Abdullah Saleh, during a protest outside the home of Yemeni President Abd-Rabbu Mansour Hadi, to demand the dismissal of the rest of the Saleh’s family members, in Sanaa July 19, 2012. Reuters
[Image]Hungarian rescue workers remove Greenpeace activists from the roof of a local petrol station in Budapest on July 19, 2012, during an action of Greenpeace’s Hungarian and foreign activists to protest against the Shell Oil Company’s plans to drill in the Arctic. Getty

[Image]

[Image]A Filipino woman protester gives vegetables to an activist wearing a mask of Uncle Sam while another with a mask of Philippine President Benigno Aquino III joins a symbolic protest outside the gates of the Malacanang Presidential Palace in Manila, Philippines on Tuesday, July 17, 2012. The protest aims to symbolize President Aquino and the U.S. of depriving and cheating Filipinos. AP
[Image]Firefighters and other government employees take part in a demonstration against the Spanish government’s latest austerity measures, in front of the Spanish Parliament (Las Cortes) in Madrid, on July 16, 2012. Several hundreds government workers, including police officers, firefighters, and healthcare workers, joined the spontaneous protest after conservative Prime Minister Mariano Rajoy announced, on July 13, the latest measures to lower Spain’s deficit, a 65-billion-euro (80 billion USD) austerity package involving among other things an increase in the VAT (TVA) tax and cuts in unemployment benefits. Getty
[Image]A demonstrator holds up a sign during a protest in Tel Aviv July 15, 2012, against the economic policies of Israel’s conservative government and to show solidarity with Moshe Silman, who sustained serious burns after he poured flammable liquid on himself and lit it at another protest on Saturday. The sign reads in Hebrew “Bibi you burned me too”, referring to Israel’s Prime Minister Benjamin Netanyahu by his nickname. Reuters
[Image]Israelis block a highway as they march through the streets to protest rising housing costs on July 15, 2012 in Tel Aviv, Israel. Growing discontent among Israelis over housing prices and other social inequalities have spurred marches, boycotts and labor strikes in the Jewish state. An Israeli man set himself on fire during the march for social justice protest yesterday. Getty
[Image]In this Sunday, July 15, 2012 photo, Lebanese women sit at a protest camp set up by Sheik Ahmad Assir, a harline Sunni cleric, in the southern port city of Sidon, Lebanon. Assir has set up the camp in the middle of a key road in Sidon, declaring it an uprising against Hezbollah’s weapons. Assir is taking aim at Hezbollah at a vulnerable time for the group when it faces the possible downfall of its crucial ally, President Bashar Assad in Syria. Assir may not be a direct threat to Hezbollah, but the willingness to publicly confront it underlines the dangers the group faces as it tries to retain the power and influence it has built up over the past 30 years in the face of the Syria crisis. AP
[Image]A protester stands in front of Malaysia Islamic Party flag (PAS) during a protest march to the National Palace to to hand out a memorandum in protest of the listing of Malaysia’s Felda Global in Kuala Lumpur, Malaysia, Saturday, July 14, 2012. The Malaysian palm oil firm Felda Global surged 20 percent in its trading debut on June 28, as investors cheered on the world’s second largest Initial Public Offering (IPO) after Facebook. Felda’s listing plans were initially met with resistance from the farmers who partly owned the firm and feared the loss of control of an asset they had invested in for generations. AP
[Image]A street performer dressed as a Minotaur walks among the crowds near Mexico City’s main plaza, the Zocalo, Friday, July 13, 2012. Street performers, many dressed in costumes, gathered to protest in the historic downtown area where once they were allowed to perform but are now run off by police. AP
[Image]A worker in a mask marches holding a sign which reads, “No to Conga, no to mine,” in solidarity with the anti-mining protest in Cajamarca, Lima July 12, 2012. More than 1,000 members of the General Confederation of Workers of Peru (CGTP), who marched in solidarity with the anti-mining protest, also protested against Peru’s President Ollanta Humala’s government and demanded better pay conditions. The Cajamarca region is still under state of emergency a week after five people died and 21 were injured in clashes between police and protesters against Newmont’s $5 billion gold mine project, known as Conga. Reuters

 

TOP-SECRET – St. Michael Man Arrested on First-Degree Murder Charges

FARGO—U.S. Attorney Timothy Q. Purdon announced that a St. Michael, North Dakota man has been arrested and charged with the May 2011 killings of Destiny Jane Shaw and Travis Lee DuBois, Jr. on the Spirit Lake Reservation. Valentino James Bagola, 19, faces four counts of first-degree murder in connection with the deaths of the two children.

In Bismarck, United States Attorney Purdon said, “The indictment unsealed today is the result of months of careful police work by the FBI and the BIA. This investigation included the thorough examination of a great deal of forensic evidence and law enforcement interviews of many, many individuals. The resources and effort brought to bear on this investigation by the federal law enforcement agents and the Assistant United States Attorneys who are involved should leave no doubt as to the Department of Justice’s commitment to ensuring justice for child victims in Indian country.”

The indictment charges Bagola with:

  • Count one: the unlawful killing of Destiny Jane Shaw;
  • Count two: the unlawful killing of Destiny Jane Shaw while perpetrating or attempting to perpetrate the crimes of aggravated sexual abuse, sexual abuse, and child abuse against Destiny Jane Shaw;
  • Count three: the unlawful killing of Travis Lee DuBois, Jr.; and
  • Count four: the unlawful killing of Travis Lee DuBois, Jr. while perpetrating or attempting to perpetrate the crime of child abuse against Travis Lee DuBois, Jr.

The indictment alleges that Bagola killed the two children by “striking and stabbing” them “numerous times.”

The maximum penalty for all charges is life imprisonment.

The charges contained in the indictment are only allegations. A person is presumed innocent unless and until he or she is proven guilty beyond a reasonable doubt in a court of law.

This case is being prosecuted by Assistant United States Attorneys Scott Schneider, Janice Morley, and Chris Myers. The case is being investigated by the Federal Bureau of Investigation and the Bureau of Indian Affairs Office of Justice Services.

City of Missing Girls – Full Movie

Following a series of mysterious disappearances of young girls, dancer Thalia Arnold is found murdered. Police-detective Captain McVeigh believes that King Peterson, a nightclub operator and owner of the Crescent School of Fine Arts, knows something about the case. Meanwhile, reporter Nora is waging a newspaper crusade against the district attorney’s office for failing to trace the girls. Pauline Randolph disappears next, but not before Nora sees her leaving her grandmother’s home in a car driven by a blonde woman. An interview with the girl’s grandmother provides the first real clues…

Unveiled – B4/G4 – GERMANY/RUSSIA – STASI Allegations Haunt German Gazprom Executive

 

B4/G4 – GERMANY/RUSSIA – Stasi Allegations Haunt German Gazprom Executive

Date 2008-05-07 17:05:55
From goodrich@stratfor.com
To os@stratfor.com
gvalerts@stratfor.com
Others InReplyTo: 4EE0BAE9.9020601@stratfor.com
Text
Stasi Allegations Haunt German Gazprom Executive

07.05.2008

An investigation has been launched into the alleged Stasi involvement of a
senior executive at the Russian gas monopoly Gazprom.

Felix Strehober, chief financial officer of Gazprom Germania, was under
investigation for his work as an undercover officer of the Stasi,
according to a Wednesday report in the German newspaper Die Welt.

Die Welt said Strehober, who was born in East Berlin, could be charged in
Cologne with perjury. Stehober had made a statutory declaration last year
declaring that he had never “been a salaried employee of the Ministry of
State Security (Stasi) or the equivalent.”

The prosecutor’s office in Cologne confirmed that Strehober is under
investigation.

More than 100 pages in official German archives showed that Strehober had
been an undercover officer for the Stasi, the hated East German police
notorious for its surveillance and imprisonment of ordinary Germans.

Gazprom not taking action

The German subsidiary of Gazprom, the world’s biggest gas company, said
the case was “an employee’s private matter.” A company spokesman said
Gazprom did not see any reason to take action, and added that Strehober
had placed the matter in the hands of a lawyer.

A statutory declaration is a legal affirmation equivalent to a statement
under a religious oath.

http://www.dw-world.de/dw/article/0,,3317092,00.html?maca=en-rss-en-all-1573-rdf

Lauren Goodrich
Director of Analysis
Senior Eurasia Analyst
Stratfor
Strategic Forecasting, Inc.
T: 512.744.4311
F: 512.744.4334
lauren.goodrich@stratfor.com
http://www.stratfor.com

 

 

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Confidential – Fukushima Daiichi NPS February-May 2012

Fukushima Daiichi NPS February-May 2012

[Image]

The combination of two photos shows the Fukushima Dai-ichi nuclear power station in Fukushima Prefecture before, top, and nearly one year after a devastating earthquake and tsunami hit Japan’s northeast on March 11, 2011 and sent three of its reactors into meltdown. The top photo was taken in October, 2008 while the bottom photo was taken on Feb. 26, 2012. (Kyodo News)

[Image]

Tsunami-crippled four reactors, from left, Unit 1 to Unit 4, are seen at Fukushima Dadi-ichi nuclear power plant in Okuma, Fukushima Prefecture, Japan Sunday, March 11, 2012. Japan on Sunday was remembering the massive earthquake and tsunami that struck the nation a year ago, killing just over 19,000 people and unleashing the world’s worst nuclear crisis in a quarter century. The photo was taken about three kilometers (1.9 miles) away from the plant. (Kyodo News)

[Image]

Cranes stand around tsunami-crippled four reactors, from left, Unit 1 to Unit 4, at Fukushima Dadi-ichi nuclear power plant in Okuma, Fukushima Prefecture, Japan Sunday, March 11, 2012. Japan on Sunday was remembering the massive earthquake and tsunami that struck the nation a year ago, killing just over 19,000 people and unleashing the world’s worst nuclear crisis in a quarter century. The photo was taken about three kilometers (1.9 miles) away from the plant. (Kyodo News)

[Image]

Severely damaged reactor Unit 3 is seen at the tsunami-crippled Fukushima Dai-ichi nuclear power plant in Okuma, Fukushima Prefecture, Japan, Sunday, March 11, 2012. Japan on Sunday was remembering the massive earthquake and tsunami that struck the nation a year ago, killing just over 19,000 people and unleashing the world’s worst nuclear crisis in a quarter century. (Kyodo News)

[Image]

Reactor Unit 2 stands at the tsunami-crippled Fukushima Dai-ichi nuclear power plant in Okuma, Fukushima Prefecture, Japan, Sunday, March 11, 2012. Japan on Sunday was remembering the massive earthquake and tsunami that struck the nation a year ago, killing just over 19,000 people and unleashing the world’s worst nuclear crisis in a quarter century. (Kyodo News)

[Image]

Severely damaged ducts, fences and buildings are seen in the seaside compound of the tsunami-crippled Fukushima Dai-ichi nuclear power plant in Okuma, Fukushima Prefecture, Japan, Sunday, March 11, 2012. Japan on Sunday was remembering the massive earthquake and tsunami that struck the nation a year ago, killing just over 19,000 people and unleashing the world’s worst nuclear crisis in a quarter century. (Kyodo News)

[Image]

In this aerial photo taken from the Asahi Shimbun helicopter, cranes surround the tsunami-damaged Fukushima Dai-ichi nuclear power plant reactors, from right, Unit 2, covered by light blue walls, Unit 3, center, and Unit 4, in Okuma, Fukushima Prefecture, northeastern Japan, Monday, May 28, 2012. The prime minister during Japan’s nuclear crisis last year said Monday he had to use an emergency law that never anticipated major radiation leaks and lacked experts capable of giving him guidance. (Tom Curley)

[Image]

In this aerial photo taken from the Asahi Shimbun helicopter, reactors of the tsunami-damaged Fukushima Dai-ichi nuclear power plant stand in Okuma, Fukushima Prefecture, northeastern Japan, Monday, May 28, 2012. Reactors are, from right, Unit 1, covered with a beige cover, Unit 2, covered with a square white cover, Unit 3 and Unit 4, showing their damaged frames at the bottom of cranes. (Tom Curley)

[Image]

In this aerial photo taken from the Asahi Shimbun helicopter, the tsunami-damaged Fukushima Dai-ichi nuclear power plant is seen in Okuma, Fukushima Prefecture, northeastern Japan, Monday, May 28, 2012. The prime minister during Japan’s nuclear crisis last year said Monday he had to use an emergency law that never anticipated major radiation leaks and lacked experts capable of giving him guidance. (Tom Curley)

Shocking – Top 10 Infamous Serial Killers in America: Part 1

Whatever their motive, serial killers terrify entire communities with their brutal crimes. http://www.WatchMojo.com counts down the top 10 most chilling, real-life serial killers in American history. In this video, numbers 10 through 6. WARNING: Mature themes.

CONFIDENTIAL – California Fusion Center Tests an Inspire Magazine Ember Bomb

https://publicintelligence.net/wp-content/uploads/2012/07/STAC-EmberBombTest.png

 

(U//FOUO) On May 9, 2012 the California Department of Forestry and Fire Protection (CAL FIRE) conducted a practical evaluation of the Ember Bomb incendiary device as described in the ninth issue of lnspre, a magazine published by al-Qa’ida in the Arabian Peninsula (AQAP).

(U) Background

(U//FOUO) The eighth and ninth issues of Inspire, published on May 2, 2012, are the first issues of the magazine published since the deaths of Anwar al-Awlaki and Samir Khan in September 2o11. Al-Awlaki will likely be best remembered for his role In actively promoting the targeting of western assets via AQAP propaganda, to include Inspire magazine and video interviews. Similarly, Samir Khan will have a legacy as the Inspire editor who implemented production values on par with many commercial publications.

(U//FOUO) Each issue of inspire features the ongoing series “Open Source Jihad.” The series, which be8an with the first issue in 2010, includes articles describing the practical application of terrorist tactics, techniques, and procedures. One of the first articles, entitled “Make a bomb in the kitchen of your Mom,’ provided step-by-step instructions for constructing a pipe bomb. Other topics have included the proper methods or employing an AK-47 type weapon, operational planning consideration, and how to establish secure electronic communications.

(U//FOUO) The latest article in the series is entitled “It is of your freedom to ignite a firebomb,’ which provides a selected history of wildland fires, planning considerations for setting wildland fires, detailed instructions for building a device to initiate a wildland fire, and some of the anticipated societal consequences to a wildland fire.

 

https://publicintelligence.net/wp-content/uploads/2012/07/ember-bomb-1.png

 

https://publicintelligence.net/wp-content/uploads/2012/07/ember-bomb-2.png

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE

STAC-EmberBombTest

Editorial – Our Investigative Partnership with Wikileaks

Dear Readers,

it is a pleasure for me to inform you that we have been invited by Wikileaks to join their investigative partnership.

Here is what it means – defined by Wikileaks:

LONDON—WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example :

“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees : “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”

Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS : “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical instruments, particularly government bonds, currencies and the like”. The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff : “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.

The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability. Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures :

“[Is it] possible for us to get some of that ’leak-focused’ gravy train ? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information… In fact, I’m not so sure this is an IT problem that requires an IT solution.”

Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ’alpha’, ’tactical’ and ’secure’. The correspondence also contains code names for people of particular interest such as ’Hizzies’ (members of Hezbollah), or ’Adogg’ (Mahmoud Ahmedinejad).

Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media organisations, because Stratfor is a private intelligence organisation that services governments and private clients these relationships are corrupt or corrupting.

WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant “Geronimo” , handled by Stratfor’s Former State Department agent Fred Burton.

WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.

End of Wikileaks Press Release

We are convinced that this cooperation will generate many benefits for all persons and the media involved and of course for our readers and users.

Sincerely yours

Bernd Pulch, MA

TOP-SECRET – Stratfor – Re: [OS] GERMANY – computer to reassemble 45 million shredded STASI files

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Re: [OS] GERMANY – computer to reassemble 45 million shredded Stasi files

Date 2007-05-11 21:46:04
From goodrich@stratfor.com
To analysts@stratfor.com
davison@stratfor.com
aaric.eisenstein@stratfor.com
Others MessageId: <4644C7FC.5000007@stratfor.com>
InReplyTo: 0e6f01c79404$f1f258c0$8a01a8c0@stratfor.com
Text
OMG… you can tell you have a kid!Aaric Eisenstein wrote:Get this to The King right away. There may yet be time to save Humpty
Dumpty!

Aaric S. Eisenstein

Stratfor

VP Publishing

700 Lavaca St., Suite 900

Austin, TX 78701

512-744-4308

512-744-4334 fax

———————————————————————-

From: os@stratfor.com [mailto:os@stratfor.com]
Sent: Friday, May 11, 2007 2:38 PM
To: analysts@stratfor.com
Subject: [OS] GERMANY – computer to reassemble 45 million shredded Stasi
files
New Computer Program to Reassemble Shredded Stasi Files
Millions of files consigned to paper shredders in the late days of the
East German regime will be pieced together by computer. The massive job
of reassembling this puzzle from the late Cold War was performed, until
now, by hand.

It’s been years in the making, but finally software designed to
electronically piece together some 45 million shredded documents from
the East German secret police went into service in Berlin on Wednesday.
Now, a puzzle that would take 30 diligent Germans 600 to 800 years to
finish by hand, according to one estimate, might be solved by computer
in seven.

Photo Gallery: Reconstructing the Cold War
Click on a picture to launch the image gallery (4 Photos)

“It’s very exciting to decode Stasi papers,” said Jan Schneider, head
engineer on the project at the Fraunhofer Institute for Production
Systems and Design Technology located in the German capital. “You have
the feeling you are making history.”

Or at least putting it back together again. In 1989, with the looming
collapse of the Communist regime becoming increasingly evident, agents
of the East German Staatssicherheitsdienst or Stasi feverishly plowed
millions of active files through paper shredders, or just tore them up
by hand.

Rights activists interrupted the project and rescued a total of 16,250
garbage bags full of scraps. But rescuing the history on those sheets of
paper amounted to an absurdly difficult jigsaw puzzle. By 2000, no more
than 323 sacks were legible again — reconstructed by a team of 15
people working in Nuremburg — leaving 15,927 to go. So the German
government promised money to any group that could plausibly deal with
the remaining tons of paper.

The Fraunhofer Institute won the contract in 2003, and began a pilot
phase of the project on Wednesday. Four hundred sacks of scraps will be
scanned, front and back, and newly-refined software will try to arrange
the digitized fragments according to shape, texture, ink color,
handwriting style and recognizable official stamps.

NEWSLETTER
Sign up for Spiegel Online’s daily newsletter and get the best of Der
Spiegel’s and Spiegel Online’s international coverage in your In- Box
everyday.

Gu:nter Bormann, from the agency that oversees old Stasi documents (the
Federal Commission for the Records of the national Security Service of
the Former German Democratic Republic), says most of the paper probably
dates from the years 1988 and 1989. “This is what Stasi officers had on
their desks at the end,” he says. “It’s not material from dusty
archives.”

Still-unknown Stasi informants — ordinary East Germans who spied on
other East Germans — stand to be uncovered. International espionage
files are reportedly not among the thousands of sacks; most of those
having been more conclusively destroyed.

The Fraunhofer Institute’s computers will start with documents torn by
hand, because large irregular fragments lend themselves to shape
recognition more readily than uniform strips from shredding machines.
The institute received a promise of EUR6.3 million ($8.53 million) in
April from the German parliament for this phase, which is expected to
take about two years.

If it’s deemed successful, the rest of the job would take four to five
years, according to project chief Bertram Nickolay. The final cost will
be up to EUR30 million.

msm/ap

Re: [OS] GERMANY – computer to reassemble 45 million shredded Stasi files

Date 2007-05-11 21:46:04
From goodrich@stratfor.com
To analysts@stratfor.com
davison@stratfor.com
aaric.eisenstein@stratfor.com
Others MessageId: <4644C7FC.5000007@stratfor.com>
InReplyTo: 0e6f01c79404$f1f258c0$8a01a8c0@stratfor.com
Text
OMG… you can tell you have a kid!Aaric Eisenstein wrote:

Get this to The King right away. There may yet be time to save Humpty
Dumpty!

Aaric S. Eisenstein

Stratfor

VP Publishing

700 Lavaca St., Suite 900

Austin, TX 78701

512-744-4308

512-744-4334 fax

———————————————————————-

From: os@stratfor.com [mailto:os@stratfor.com]
Sent: Friday, May 11, 2007 2:38 PM
To: analysts@stratfor.com
Subject: [OS] GERMANY – computer to reassemble 45 million shredded Stasi
files
New Computer Program to Reassemble Shredded Stasi Files
Millions of files consigned to paper shredders in the late days of the
East German regime will be pieced together by computer. The massive job
of reassembling this puzzle from the late Cold War was performed, until
now, by hand.

It’s been years in the making, but finally software designed to
electronically piece together some 45 million shredded documents from
the East German secret police went into service in Berlin on Wednesday.
Now, a puzzle that would take 30 diligent Germans 600 to 800 years to
finish by hand, according to one estimate, might be solved by computer
in seven.

Photo Gallery: Reconstructing the Cold War
Click on a picture to launch the image gallery (4 Photos)

“It’s very exciting to decode Stasi papers,” said Jan Schneider, head
engineer on the project at the Fraunhofer Institute for Production
Systems and Design Technology located in the German capital. “You have
the feeling you are making history.”

Or at least putting it back together again. In 1989, with the looming
collapse of the Communist regime becoming increasingly evident, agents
of the East German Staatssicherheitsdienst or Stasi feverishly plowed
millions of active files through paper shredders, or just tore them up
by hand.

Rights activists interrupted the project and rescued a total of 16,250
garbage bags full of scraps. But rescuing the history on those sheets of
paper amounted to an absurdly difficult jigsaw puzzle. By 2000, no more
than 323 sacks were legible again — reconstructed by a team of 15
people working in Nuremburg — leaving 15,927 to go. So the German
government promised money to any group that could plausibly deal with
the remaining tons of paper.

The Fraunhofer Institute won the contract in 2003, and began a pilot
phase of the project on Wednesday. Four hundred sacks of scraps will be
scanned, front and back, and newly-refined software will try to arrange
the digitized fragments according to shape, texture, ink color,
handwriting style and recognizable official stamps.

NEWSLETTER
Sign up for Spiegel Online’s daily newsletter and get the best of Der
Spiegel’s and Spiegel Online’s international coverage in your In- Box
everyday.

Gu:nter Bormann, from the agency that oversees old Stasi documents (the
Federal Commission for the Records of the national Security Service of
the Former German Democratic Republic), says most of the paper probably
dates from the years 1988 and 1989. “This is what Stasi officers had on
their desks at the end,” he says. “It’s not material from dusty
archives.”

Still-unknown Stasi informants — ordinary East Germans who spied on
other East Germans — stand to be uncovered. International espionage
files are reportedly not among the thousands of sacks; most of those
having been more conclusively destroyed.

The Fraunhofer Institute’s computers will start with documents torn by
hand, because large irregular fragments lend themselves to shape
recognition more readily than uniform strips from shredding machines.
The institute received a promise of EUR6.3 million ($8.53 million) in
April from the German parliament for this phase, which is expected to
take about two years.

If it’s deemed successful, the rest of the job would take four to five
years, according to project chief Bertram Nickolay. The final cost will
be up to EUR30 million.

msm/ap

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Stratfor about Gemany and the STASI

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

Re: east german stasi

Date 2010-10-05 00:41:28
From marko.papic@stratfor.com
To sean.noonan@stratfor.com
Others InReplyTo: 4CAA55EA.2070401@stratfor.com
Text
Interesting thing is that George talked about how in Southern Europe
people trust the “clan” over the society/government. So in Serbia shit
like this never went to this extreme. A husband spying on his wife?
Unheard off…But Germans are so freaking orderly and loyal. They are a society where
family links are not more important than those between a citizen and a
state.Would hate to have married a German.Sean Noonan wrote:man this is fucked up. still can’t imagine what it would’ve been like.The Spy in My Bed

by Bob Jamieson Info
Bob Jamieson
http://www.thedailybeast.com/blogs-and-stories/2010-10-02/the-spy-in-my-bed/full/

Vera Lengsfeld was arrested and tortured by the East German government.
Only years later, did she discover it was her husband who informed on
her. Bob Jamieson reports.

Hohenschoenhausen Prison in Berlin is the sinister reminder that even
now, on the 20th anniversary this Sunday, the work to reunify Germany is
still unfinished.

The complex of drab buildings was the secret detention jail for East
Germany’s Ministry of State Security-Stasi-the vast and brutal internal
army used to control the population. And Hohenschoenhausen, left
untouched since Stasi agents fled when the wall came down, was the
center of interrogation and torture.

“This was my cell,” said Vera Lengsfeld, who spent a month there
awaiting trial as Stasi agents tried to force a confession to opposing
the state. She did not know then that the man who betrayed her was her
husband.

In the 1980s Vera Lengsfeld was a modest civil-rights activist in the
Communist state, with three children and, friends say, very much in love
with her husband, a poet. Today she is a trim 58-year-old with a blond
bob who has become an influential member of the German Parliament, often
at odds with Chancellor Angela Merkel (also a former East German) over
individual liberty. She is no longer married.

Walking in what is now a museum, under harsh fluorescent light on
long-faded brown linoleum, Lengsfeld stops outside another door. “This
was where they did the water torture that made you think you were
drowning,” she says without emotion. “And the one next to it was for the
Chinese water torture.”

“Doesn’t being a guide here revive bitter memories?” I ask. “No, it
doesn’t,” she says. “I give the tours to teach the truth about East
Germany, especially to the young.”

In East Germany, there was nowhere Stasi agents or their informers
weren’t watching or listening and reporting back to headquarters. Homes
were bugged, telephones tapped, mail opened, neighbors spied on
neighbors. According to German federal records, there were almost
100,000 Stasi agents and an estimated 500,000 informers under contract
to the ministry in a country of 16 million people. Some informed to
curry favor with the regime and others were induced with threats.

Article – Jamieson Stasi Vera Lengsfeld was arrested and tortured by the
East German government. Only years later, did she discover it was her
husband who informed on her. (Jockel Finck / AP Photo)

In Hitler’s Germany, there was one Gestapo agent for every 2,000
citizens. In East Germany, there was one Stasi agent or informer for
every 63 citizens, records show.

Lengsfeld was under constant surveillance and harassment. She was
expelled from the science academy where she worked and then made her
living as a beekeeper and translator.

Finally, in 1988, she was arrested for carrying a sign in a government
parade. It quoted the first line of the East German constitution: “Every
citizen has the right to express his opinion freely and openly.” The
charge was riotous behavior. She remembers that on her arrival at
Hohenschoenhausen. “I was fingerprinted and then had to sit on a piece
of fabric. That was then placed in a jar to collect my smell.”
(Thousands of such jars were found after the wall came down but there
has never been an explanation of forensic value, bizarre or
otherwise.)

Convicted by a Communist court she was later thrown out of the country,
leaving her husband, and her three children behind.

But the worst for Vera Lengsfeld was yet to come.

Tens of thousands of Stasi victims, whose lives were destroyed; who were
beaten, tortured, kidnapped or killed, have never seen anyone who was
responsible punished.

Thomas Habicht, a leading German journalist who was a target of Stasi
agents in West Berlin, says that still casts a shadow over
reunification. “The generation of Stasi criminals is still alive,
behaves aggressively, and in some cases even has gained influential
positions again.” Many of the former agents and officials, Habicht says,
still live in the privileged housing built for them by the East German
government “which adds insult to serious injury.”

On this subject, Lengfeld’s eyes flash for the first time this day. “I’m
angry,” she snaps. While the first and only freely elected East German
parliament moved to punish the Stasi agents, she and others believe that
to speed reunification, the West German government of Helmut Kohl swept
the issue under the rug and subsequent governments have kept it there.
“Just look at pensions,” she says. “Because (the Stasi agents’) wages
were two or three times higher than the average East German, their
pensions now are two or three times higher” than most of the retirees.
“East Germany,” she says, “had both victims and perpetrators and we
cannot forget that.”

In November, 1989, as chaotic protests against the repressive regime
grew, Lengsfeld wanted to return from her exile in Britain to be with
her family. On November 9 she arrived in West Berlin and through
confusion at the Friedrichstrasse checkpoint, she was able to slip back
into East Berlin. Her timing was exquisite: that night the Berlin Wall
fell.

The Stasi learned from her husband not only about her opposition to the
government but intimate details of dinner table conversations, pillow
talk, even their sex life.

In the aftermath, six million files on East German citizens were
discovered in Stasi archives. Laid end to end they would be 125 miles
long. In 1991, the files were opened for the Stasi victims. It was then
that Vera Lengsfeld learned that that the Stasi informer code named
“Donald” was her husband, Knud Wollenberger.

In 1984, Wollenberger signed a Stasi contract agreeing to inform on
Lengsfeld and her son from a previous marriage. The Stasi learned from
her husband not only about her opposition to the government but intimate
details of dinner table conversations, pillow talk, even their sex life.
She divorced “Donald” in 1992.

Today, she says, “I will never again talk about this.” But those who saw
her then described a shattered woman, someone who felt violated in a way
she could not at first fully comprehend like, say adultery.

Wollenberger, who suffers from advanced Parkinson’s disease, does not
give interviews. But a decade ago when a television interviewer asked
why he agreed to spy on his wife he said, “I didn’t think you could say
no.” Was he forced to do it? “No.” Well, asked the interviewer, was it
voluntary? Wollenberger answered with a question. “What is
voluntary?”

There are certain echoes to this story in The Lives of Others, the Oscar
winning movie about the Stasi and its victims. In the film-the only
serious one on the subject-a playwright’s lover is induced to spy on him
with tragic consequences. The playwright has long made his accommodation
with the regime, but then turns against it.

Sebastian Koch, who portrayed the playwright, believes many in Germany,
like his character, find the Stasi excesses too easy to ignore. “He
refused to see it because things were too perfect and he was too
productive,” Koch says, “but it will always be there, underneath the
surface.”

At the end of the film Koch’s character meets the former minister of
state security, still smug and arrogant. “And to think,” the playwright
says, “that people like you once ruled a country.”

Habicht, the journalist, says, so far, that question has not been fully
answered. “We still have thousands of Stasi victims who, 20 years after
reunification, want to learn the truth from their files.”

According to Germany’s Federal Commission, which manages the Stasi
archives, two and a half million people have read their personal files.
Another six thousand are applying each month to gain access to theirs.
Many former East Germans still do not know who spied on them, what was
reported and the consequences.

At the same time, Sebastian Koch says Germans should never forget people
like Vera Lengsfeld. “There is a larger truth here. You have to commit
yourself and face the consequences. You have this moment when you have
to react or surrender.”

Bob Jamieson has worked as a correspondent for NBC News and ABC News,
reporting from all seven continents during his 40-year career. He has
received five national Emmys as well as DuPont and Peabody awards.

Sean Noonan

Tactical Analyst

Office: +1 512-279-9479

Mobile: +1 512-758-5967

Strategic Forecasting, Inc.

http://www.stratfor.com

– – – – – – – – – – – – – – – – –

Marko Papic

Geopol Analyst – Eurasia

STRATFOR

700 Lavaca Street – 900

Austin, Texas

78701 USA

P: + 1-512-744-4094

marko.papic@stratfor.com

Re: east german stasi

Date 2010-10-05 00:47:04
From marko.papic@stratfor.com
To sean.noonan@stratfor.com
Others InReplyTo: 4CAA5876.1040705@stratfor.com
Text
I was both joking and serious…In Yugoslavia there were a lot of people who you knew were informing on
you. Lots of school teachers would do that, inform on what the kids said
about the parents. But again, the end result would be nuissance, not
imprisonment and torture.You might get fired… but in truth everyone knew somoeone so you could
always work the networks to get off.Serbia/Yugoslavia is an inherently corrupt, family oriented system.The danger with these authoritarian regimes is when they rule an ordered,
technocratic and bureaucratized society like the Germans… When you can’t
work your connections to alleviate the harm. That is what is so dangerous
about the Germans.

Sean Noonan wrote:

is that serious or a joke? I have no idea why they’d do that. Reminds
me of the nazi science experiments you always hear about.

Obviously my experience in China is nothing compared to actually living
it—but I think general surveillance is a bit different than this
complete infiltration of informants. In China, at least, you can get a
bit of an idea of who’s watching. Not sure how Yugoslavia/Serbia
compares, but constantly wondering who around you, including your
family, is informing on you! Fuck!

Marko Papic wrote:

“I was fingerprinted and then had to sit on a piece of fabric. That
was then placed in a jar to collect my smell.” (Thousands of such jars
were found after the wall came down but there has never been an
explanation of forensic value, bizarre or otherwise

K-9 death squads?

Sean Noonan wrote:

man this is fucked up. still can’t imagine what it would’ve been
like.

The Spy in My Bed

by Bob Jamieson Info
Bob Jamieson
http://www.thedailybeast.com/blogs-and-stories/2010-10-02/the-spy-in-my-bed/full/

Vera Lengsfeld was arrested and tortured by the East German
government. Only years later, did she discover it was her husband
who informed on her. Bob Jamieson reports.

Hohenschoenhausen Prison in Berlin is the sinister reminder that
even now, on the 20th anniversary this Sunday, the work to reunify
Germany is still unfinished.

The complex of drab buildings was the secret detention jail for East
Germany’s Ministry of State Security-Stasi-the vast and brutal
internal army used to control the population. And
Hohenschoenhausen, left untouched since Stasi agents fled when the
wall came down, was the center of interrogation and torture.

“This was my cell,” said Vera Lengsfeld, who spent a month there
awaiting trial as Stasi agents tried to force a confession to
opposing the state. She did not know then that the man who betrayed
her was her husband.

In the 1980s Vera Lengsfeld was a modest civil-rights activist in
the Communist state, with three children and, friends say, very much
in love with her husband, a poet. Today she is a trim 58-year-old
with a blond bob who has become an influential member of the German
Parliament, often at odds with Chancellor Angela Merkel (also a
former East German) over individual liberty. She is no longer
married.

Walking in what is now a museum, under harsh fluorescent light on
long-faded brown linoleum, Lengsfeld stops outside another door.
“This was where they did the water torture that made you think you
were drowning,” she says without emotion. “And the one next to it
was for the Chinese water torture.”

“Doesn’t being a guide here revive bitter memories?” I ask. “No, it
doesn’t,” she says. “I give the tours to teach the truth about East
Germany, especially to the young.”

In East Germany, there was nowhere Stasi agents or their informers
weren’t watching or listening and reporting back to headquarters.
Homes were bugged, telephones tapped, mail opened, neighbors spied
on neighbors. According to German federal records, there were almost
100,000 Stasi agents and an estimated 500,000 informers under
contract to the ministry in a country of 16 million people. Some
informed to curry favor with the regime and others were induced with
threats.

Article – Jamieson Stasi Vera Lengsfeld was arrested and tortured by
the East German government. Only years later, did she discover it
was her husband who informed on her. (Jockel Finck / AP Photo)

In Hitler’s Germany, there was one Gestapo agent for every 2,000
citizens. In East Germany, there was one Stasi agent or informer for
every 63 citizens, records show.

Lengsfeld was under constant surveillance and harassment. She was
expelled from the science academy where she worked and then made her
living as a beekeeper and translator.

Finally, in 1988, she was arrested for carrying a sign in a
government parade. It quoted the first line of the East German
constitution: “Every citizen has the right to express his opinion
freely and openly.” The charge was riotous behavior. She remembers
that on her arrival at Hohenschoenhausen. “I was fingerprinted and
then had to sit on a piece of fabric. That was then placed in a jar
to collect my smell.” (Thousands of such jars were found after the
wall came down but there has never been an explanation of forensic
value, bizarre or otherwise.)

Convicted by a Communist court she was later thrown out of the
country, leaving her husband, and her three children behind.

But the worst for Vera Lengsfeld was yet to come.

Tens of thousands of Stasi victims, whose lives were destroyed; who
were beaten, tortured, kidnapped or killed, have never seen anyone
who was responsible punished.

Thomas Habicht, a leading German journalist who was a target of
Stasi agents in West Berlin, says that still casts a shadow over
reunification. “The generation of Stasi criminals is still alive,
behaves aggressively, and in some cases even has gained influential
positions again.” Many of the former agents and officials, Habicht
says, still live in the privileged housing built for them by the
East German government “which adds insult to serious injury.”

On this subject, Lengfeld’s eyes flash for the first time this day.
“I’m angry,” she snaps. While the first and only freely elected
East German parliament moved to punish the Stasi agents, she and
others believe that to speed reunification, the West German
government of Helmut Kohl swept the issue under the rug and
subsequent governments have kept it there. “Just look at pensions,”
she says. “Because (the Stasi agents’) wages were two or three times
higher than the average East German, their pensions now are two or
three times higher” than most of the retirees. “East Germany,” she
says, “had both victims and perpetrators and we cannot forget that.”

In November, 1989, as chaotic protests against the repressive regime
grew, Lengsfeld wanted to return from her exile in Britain to be
with her family. On November 9 she arrived in West Berlin and
through confusion at the Friedrichstrasse checkpoint, she was able
to slip back into East Berlin. Her timing was exquisite: that night
the Berlin Wall fell.

The Stasi learned from her husband not only about her opposition to
the government but intimate details of dinner table conversations,
pillow talk, even their sex life.

In the aftermath, six million files on East German citizens were
discovered in Stasi archives. Laid end to end they would be 125
miles long. In 1991, the files were opened for the Stasi victims. It
was then that Vera Lengsfeld learned that that the Stasi informer
code named “Donald” was her husband, Knud Wollenberger.

In 1984, Wollenberger signed a Stasi contract agreeing to inform on
Lengsfeld and her son from a previous marriage. The Stasi learned
from her husband not only about her opposition to the government but
intimate details of dinner table conversations, pillow talk, even
their sex life. She divorced “Donald” in 1992.

Today, she says, “I will never again talk about this.” But those who
saw her then described a shattered woman, someone who felt violated
in a way she could not at first fully comprehend like, say adultery.

Wollenberger, who suffers from advanced Parkinson’s disease, does
not give interviews. But a decade ago when a television interviewer
asked why he agreed to spy on his wife he said, “I didn’t think you
could say no.” Was he forced to do it? “No.” Well, asked the
interviewer, was it voluntary? Wollenberger answered with a
question. “What is voluntary?”

There are certain echoes to this story in The Lives of Others, the
Oscar winning movie about the Stasi and its victims. In the
film-the only serious one on the subject-a playwright’s lover is
induced to spy on him with tragic consequences. The playwright has
long made his accommodation with the regime, but then turns against
it.

Sebastian Koch, who portrayed the playwright, believes many in
Germany, like his character, find the Stasi excesses too easy to
ignore. “He refused to see it because things were too perfect and
he was too productive,” Koch says, “but it will always be there,
underneath the surface.”

At the end of the film Koch’s character meets the former minister of
state security, still smug and arrogant. “And to think,” the
playwright says, “that people like you once ruled a country.”

Habicht, the journalist, says, so far, that question has not been
fully answered. “We still have thousands of Stasi victims who, 20
years after reunification, want to learn the truth from their
files.”

According to Germany’s Federal Commission, which manages the Stasi
archives, two and a half million people have read their personal
files. Another six thousand are applying each month to gain access
to theirs. Many former East Germans still do not know who spied on
them, what was reported and the consequences.

At the same time, Sebastian Koch says Germans should never forget
people like Vera Lengsfeld. “There is a larger truth here. You have
to commit yourself and face the consequences. You have this moment
when you have to react or surrender.”

Bob Jamieson has worked as a correspondent for NBC News and ABC
News, reporting from all seven continents during his 40-year career.
He has received five national Emmys as well as DuPont and Peabody
awards.

Sean Noonan

Tactical Analyst

Office: +1 512-279-9479

Mobile: +1 512-758-5967

Strategic Forecasting, Inc.

http://www.stratfor.com

– – – – – – – – – – – – – – – – –

Marko Papic

Geopol Analyst – Eurasia

STRATFOR

700 Lavaca Street – 900

Austin, Texas

78701 USA

P: + 1-512-744-4094

marko.papic@stratfor.com

Sean Noonan

Tactical Analyst

Office: +1 512-279-9479

Mobile: +1 512-758-5967

Strategic Forecasting, Inc.

http://www.stratfor.com

– – – – – – – – – – – – – – – – –

Marko Papic

Geopol Analyst – Eurasia

STRATFOR

700 Lavaca Street – 900

Austin, Texas

78701 USA

P: + 1-512-744-4094

marko.papic@stratfor.com

TOP-SECRET – Former STASI Cryptographers Now Develop Technology for NATO]

Investigative Partnership organised by WikiLeaks – the Data was obtained by WikiLeaks.

[Eurasia] [Fwd: Re: Former Stasi Cryptographers Now Develop Technology for NATO]

Date 2010-09-27 20:24:23
From lena.bell@stratfor.com
To eurasia@stratfor.com
Others Listname: mailto:eurasia@stratfor.com
MessageId: <4CA0E157.50106@stratfor.com>
InReplyTo: 263969146.2106108.1285610199486.JavaMail.root@core.stratfor.com
Text
——– Original Message ——–Subject: Re: Former Stasi Cryptographers Now Develop Technology for
NATO
Date: Mon, 27 Sep 2010 13:21:39 -0500
From: Marko Papic <marko.papic@stratfor.com>
To: Lena Bell <lena.bell@stratfor.com>
References: <4CA0DEFD.2020800@stratfor.com>Feel free to send these to eurasia@stratfor.comVery interesting articles. I’m a big fan of Spiegel.Lena Bell wrote:thpught you’d find this interesting Marko

Former Stasi Cryptographers Now Develop Technology for NATO

http://www.spiegel.de/international/germany/0,1518,719726,00.html

09/27/2010

After the fall of the Berlin Wall, the West Germans were desperate to
prevent the Stasi’s top codebreakers from falling into the wrong hands
and set up a company to hire the East German cryptographers. Now the
former Stasi scientists develop technology used by Angela Merkel and
NATO.

Every morning, while going to his office in Berlin’s Adlershof district,
Ralph W. passes a reminder of his own past, a small museum that occupies
a room on the ground floor of the building. The museum could easily
double as a command center run by the class enemy in an old James Bond
film. A display of coding devices from various decades includes the
T-310, a green metal machine roughly the size of a huge refrigerator,
which East German officials used to encode their telex messages.

The device was the pride of the Stasi, the feared East German secret
police, which was W.’s former employer. Today he works as a cryptologist
with Rohde & Schwarz SIT GmbH (SIT), a subsidiary of Rohde & Schwarz, a
Munich-based company specializing in testing equipment, broadcasting and
secure communications. W. and his colleagues encode sensitive
information to ensure that it can only be read or heard by authorized
individuals. Their most important customers are NATO and the German
government.

Rohde & Schwarz is something of an unofficial supplier of choice to the
German government. Among other things, the company develops bugproof
mobile phones for official use. Since 2004, its Berlin-based subsidiary
SIT, which specializes in encryption solutions, has been classified as a
“security partner” to the German Interior Ministry, which recently
ordered a few thousand encoding devices for mobile phones, at about
EUR1,250 ($1,675) apiece. Even German Chancellor Angela Merkel has used
phones equipped with SIT’s encryption technology. In other words, the
Stasi’s former cryptographers are now Merkel’s cryptographers.

Secret Operation

The transfer of Ralph W. and other cryptologists from the East German
Ministry for State Security, as the Stasi was officially known, to West
Germany was handled both seamlessly and discreetly. West German
officials were determined to make sure that no one would find out about
the integration of East Germany’s top cryptologists into the west. The
operation was so secret, in fact, that it has remained unknown to this
day.

Only a handful of officials were involved in the operation, which was
planned at the West German Interior Ministry in Bonn. In January 1991,
Rohde & Schwarz SIT GmbH was founded. The company was established
primarily to provide employment for particularly talented Stasi
cryptologists that the Bonn government wanted to keep in key positions.

Ralph W. is one of those specialists. W., who holds a doctorate in
mathematics, signed a declaration of commitment to the Stasi on Sept. 1,
1982. By the end of his time with the Stasi, he was making 22,550 East
German marks a year — an excellent salary by East German standards. And
when he was promoted to the rank of captain in June 1987, his superior
characterized W. as one of the “most capable comrades in the
collective.” While with the Stasi, W. worked in Department XI, which
also boasted the name “Central Cryptology Agency” (ZCO).

Looking for the Top Performers

The story begins during the heady days of the East German revolution in
1990. Officially, the East German government, under its last communist
premier, Hans Modrow, had established a government committee to dissolve
the Ministry for State Security which reported to the new East German
interior minister, Peter-Michael Diestel. In reality, the West German
government was already playing a key role in particularly sensitive
matters. Then-West German Interior Minister Wolfgang Scha:uble (who is
the current German finance minister) had instructed two senior Interior
Ministry officials, Hans Neusel and Eckart Werthebach, to take care of
the most politically sensitive remnants of the 40-year intelligence war
between the two Germanys.

The government of then-Chancellor Helmut Kohl was interested in more
than just the politically explosive material contained in some of the
Stasi’s files. It also had its eye on the top performers in the former
East German spy agency. The cryptologists were of particular interest to
the Kohl government, which recognized that experts capable of developing
good codes would also be adept at breaking them. The Stasi cryptologists
were proven experts in both fields.

Documents from the Stasi records department indicate that the one of the
Stasi cryptologists’ achievements was to break Vericrypt and Cryptophon
standards that had been used until the 1980s. This meant that they were
capable of decoding encrypted radio transmissions by the two main West
German intelligence agencies — the Office for the Protection of the
Constitution and the Federal Intelligence Service (BND) — and the West
German border police. The East Germans even managed to decode the BND’s
orders to members of the clandestine “Gladio” group, which was intended
to continue anti-communist operations in the event of a Warsaw Pact
invasion of Western Europe.

The West German government was determined to prevent these highly
trained East German experts from entering the free market. The idea that
specialists who had spent decades working with West German encryption
methods and had successfully cracked West German intelligence’s codes
could defect to Middle Eastern countries like Syria was a nightmare.
Until then, the BND had had no difficulties listening in on intelligence
communications in the Middle East, an ability the potential defection of
Stasi experts would likely have compromised. Bonn also hoped to use
their skills to break into regions where its own agents were making no
headway. All of this meant that the Stasi experts had to be brought on
board in the West — even if it involved unconventional methods.

: Cherrypicking the Stasi’s Top Brains

The government officials in Bonn turned to an expert for advice: Otto
Leiberich, a cryptologist and mathematician who had headed the Central
Office for Cryptology, the equivalent of the Stasi’s ZCO at the West
German BND, until the mid-1970s. Leiberich’s task, after he was brought
in as a member of the secret operation, was to evaluate the professional
abilities of the Stasi experts.

Leiberich still has vivid memories of his first official trip to the
town of Hoppegarten, next to Berlin. One of the East German
cryptologists at the meeting greeted the members of the West German
delegation as “comrades,” Leiberich recalls. He was impressed by the
East Germans’ expertise, says Leiberich. “They were excellent
mathematicians who were not personally guilty of any misconduct.”

Leiberich says he would have liked to hire them, particularly the
Stasi’s then “chief decoder,” the ZCO department head, Horst M. A gaunt
chain-smoker who wore horn-rimmed glasses, M. was born in 1937 and had
earned a degree in mathematics at East Berlin’s Humboldt University. But
the West was also interested in younger people, in the expectation that
they would be of greater value in the nascent computer age.

A Free-Market Solution

Leiberich could have used the extra manpower, especially after 1990,
when the West German Central Office for Cryptology was spun off from the
BND and a law was enacted to form the new Federal Office for Information
Security (BSI). Leiberich, who was named the BSI’s first president,
headed a team consisting mainly of former intelligence colleagues.

But Neusel, the senior official from the West German Interior Ministry,
dismissed the idea as too precarious. Firstly, the government had
decided not to integrate former Stasi officials, because of their past
activities, into the bureaucracy of a unified Germany. Additionally, as
one person involved in the operation recalls, concerns about potential
traitors gave rise to a “sacred principle,” namely that “no one from the
Stasi was to be transferred to the West German intelligence agencies.”

It also didn’t help that the Stasi’s Central Cryptology Agency had been
hastily spun off into the East German Interior Ministry, because the
West German cabinet had decided not to allow any members of the East
German Interior Ministry to work in federal agencies.

But the free market was not restricted by any government resolutions. A
creative solution was needed, and no one was better suited for coming up
with the necessary fix than Hermann Schwarz, one of the two founders of
Rohde & Schwarz.

A Soft Spot for the East

Founded in 1933, the company, a provider of radio, measuring and
security technology, was dependent on government contracts and was a
reliable supplier to the West German intelligence agencies. Besides,
Schwarz had a soft spot for the East. He had earned his doctorate in
1931 in the eastern city of Jena, where he had also met his eventual
business partner, Lothar Rohde.

But to Schwarz, who was already elderly at the time and has since died,
allowing his company’s name to be used as a cover for a Stasi connection
seemed too risky. According to someone familiar with the operation, the
West Germans must have applied a bit of soft pressure on Schwarz, who
was “extremely worried that it would be made public one day.”

But the officials eventually did manage to convince Schwarz to play
along. His change of heart was probably due in part to the prospect of
additional research and federal contracts, which were in fact showered
on his company.

In the end, BSI head Leiberich and a senior Interior Ministry official
decided which former Stasi experts were to be transferred to the front
company. Former Stasi department head Horst M. was seamlessly integrated
into the market economy at SIT, where his wife also began working as a
secretary. Ralph W., who was in his 30s at the time and had been with
the Stasi for eight years, also fitted the desired profile, as did his
colleagues Wolfgang K. and Volker S. In total, about a dozen former
Stasi employees, most of them mathematicians, were given the chance to
embark on a second cryptology career in post-reunification Germany.

The federal government provided whatever assistance it could, but only
with the utmost discretion. SIT was initially headquartered in the town
of Gru:nheide in the eastern state of Brandenburg, in a former Stasi
children’s home.

‘Cosmic Top Secret’

An episode from the 1990s shows how conspiratorially the operation was
handled, even within the West German intelligence community. When the
BND needed a “D-channel filter” — a precursor to today’s firewalls —
to protect communications networks, it contacted the Federal Office for
Information Security (BSI). But BND officials pricked up their ears when
they discovered that the work was being done by SIT. A private company
protecting the computers of Germany’s foreign intelligence agency?
Nevertheless, the BND officials were told that it was “totally OK,” and
that the BSI would take responsibility for SIT.

For the parent company Rohde & Schwarz, the former problem child in
Brandenburg soon became a success story. SIT took over the cryptology
division of German engineering giant Siemens, and the company now
employs about 150 mathematicians, engineers and computer scientists at
its three locations. SIT, which proudly refers to itself as the
“preferred supplier of high-security cryptography” for NATO, even
includes in its product line devices classified as “Cosmic Top Secret,”
NATO’s highest secrecy level. SIT’s Elcrodat solution, standard
equipment on NATO submarines, frigates and military helicopters, has
provided the company with orders worth millions for years.

When approached by SPIEGEL, Rohde & Schwarz declined to comment on this
previously unknown part of its company history.

To show its gratitude for the company’s efforts, the federal government
did more than just provide it with lucrative contracts. Eckart
Werthebach, the Interior Ministry official, awarded the former managing
director of SIT, a senior Rohde & Schwarz executive originally from West
Germany, the Order of Merit of the Federal Republic of Germany for his
services. The executive received the decoration in a formal ceremony at
Villa Hammerschmidt in Bonn, the former official residence of the German
president.

– – – – – – – – – – – – – – – – –

Marko Papic

Geopol Analyst – Eurasia

STRATFOR

700 Lavaca Street – 900

Austin, Texas

78701 USA

P: + 1-512-744-4094

marko.papic@stratfor.com

CONFIDENTIAL – Revised Es)mates of Private Banking Assets Under Management and Total Client Assets – Top 50 Global Private Banks, 2005-­‐2010

Revised Es)mates of Private Banking Assets Under Management and Total Client Assets – Top 50 Global Private Banks, 2005-­‐2010

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE

Private Banking 2012

FBI – Man Sentenced to 18 Months in Prison for Acting as Unregistered Agent for Syrian Government

WASHINGTON—Mohamad Anas Haitham Soueid, 48, a resident of Leesburg, Virginia, was sentenced today to 18 months in prison, followed by three years of supervised release, for collecting video and audio recordings and other information about individuals in the United States and Syria who were protesting the government of Syria and to providing these materials to Syrian intelligence agencies in order to silence, intimidate, and potentially harm the protestors.

Lisa Monaco, Assistant Attorney General for National Security; Neil MacBride, U.S. Attorney for the Eastern District of Virginia; and James McJunkin, Assistant Director in Charge of the FBI Washington Field Office, made the announcement following sentencing by United States District Judge Claude M. Hilton.

Soueid, aka “Alex Soueid” or “Anas Alswaid,” a Syrian-born naturalized U.S. citizen, was charged by a federal grand jury on October 5, 2011, in a six-count indictment in the Eastern District of Virginia. He was convicted of unlawfully acting as an agent of a foreign government on March 26, 2012.

“Mohamad Soueid acted as an unregistered agent of the Syrian government as part of an effort to collect information on people in this country protesting the Syrian government crack-down. I applaud the many agents, analysts, and prosecutors who helped bring about this important case,” said Assistant Attorney General Monaco.

“Mr. Soueid betrayed this country to work on behalf of a state sponsor of terror,” said U.S. Attorney MacBride. “While the autocratic Syrian regime killed, kidnapped, intimidated, and silenced thousands of its own citizens, Mr. Soueid spearheaded efforts to identify and intimidate those protesting against the Syrian government in the United States.”

“By illegally acting as an agent of Syria, Mr. Souied deceived his adopted country of the United States in support of a violent and repressive despotic government,” said Assistant Director in Charge McJunkin. “Through today’s sentencing, he will now be held accountable for his actions.”

According to court records, from March to October 2011, Soueid acted in the United States as an agent of the Syrian Mukhabarat, which refers to the intelligence agencies for the government of Syria, including the Syrian Military Intelligence and General Intelligence Directorate. At no time while acting as an agent of the government of Syria in this country did Soueid provide prior notification to the Attorney General as required by law. The U.S. government has designated the Syrian government a state sponsor of terrorism since 1979.

Under the direction and control of Syrian officials, Soueid recruited individuals living in the United States to make dozens of audio and video recordings of protests against the Syrian regime—including recordings of conversations with individual protestors—in the United States and Syria, which he provided to the Syrian government. He also supplied the Syrian government with contact information for key dissident figures in the United States, details about the financiers of the dissident movement, logistics for protests and meetings, internal conflicts within the movement, and the movement’s future plans.

In a handwritten letter to a Syrian official in April 2011, Soueid outlined his support for the Syrian government’s repressions of its citizens, stating that disposing of dissension must be decisive and prompt and that violence, home invasions, and arrests against dissidents is justified.

The Syrian government provided Soueid with a laptop to further their ability to surreptitiously communicate, which he later destroyed. In late June 2011, the Syrian government paid for Soueid to travel to Syria, where he met with intelligence officials and spoke with President Bashar al-Assad in private.

To thwart detection of his activities by U.S. law enforcement, Soueid lied to a Customs and Border Patrol agent upon his return from meeting with President al-Assad in Syria, and he also lied repeatedly to FBI agents when they questioned him in August 2011. Following the FBI interview, Soueid destroyed documents in his backyard and informed the Mukhbarat about his FBI interview.

This investigation is being conducted by the FBI’s Washington Field Office with assistance from the Loudon County, Virginia Sheriff’s Office. The prosecution is being handled by Assistant U.S. Attorneys Dennis Fitzpatrick and Neil Hammerstrom of the U.S. Attorney’s Office for the Eastern District of Virginia and Trial Attorney Brandon L. Van Grack of the Counterespionage Section of the Justice Department’s National Security Division.

Der Beweis: Der geheime radioaktive STASI-Mordplan gegen Dissidenten – damals wie heute

© JUNGE FREIHEIT Verlag GmbH & Co.  www.jungefreiheit.de    16/00 14. April 2000

Tödliche Strahlung
Die Staatssicherheit der DDR steht im Verdacht, Regimegegner radioaktiv verseucht zu haben
Paul Leonhard
Was die wohl mit dem Zeug wollen? Vielleicht hat sich der Mann diese Frage einmal gestellt, sie aber dann als einen lästigen Gedanken beiseite gewischt. Schließlich war er als Gesellschaftlicher Mitarbeiter (GMS) auf das Ministerium für Staatssicherheit eingeschworen. Regelmäßig empfing Karl J., Leiter der Hauptabteilung Radioaktive Präparate des Zentralinstituts für Kernforschung Rossendorf, die Mielke-Männer und händigte ihnen die gewünschten radioaktiven Stoffe aus. Das war schließlich rechtens, in einem Vertrag geregelt, den die Stasi 1971 mit dem bei Dresden ansässigen Forschungszentrum geschlossen hatte. Es sei für ihn noch heute undenkbar, daß radioaktive Stoffe entgegen den gesetzlichen Bestimmungen an Menschen eingesetzt werden, sagt der inzwischen als Fachbereichsleiter in Rossendorf tätige J.Bereits im Mai 1999 war das Kernforschungsinstitut in die Schlagzeilen geraten. Damals berichtete eine Boulevard-Zeitung über geheime Lieferungen. Wir haben Flüssigkeitspräparate-Kobalt 58, Scandium 46 in Zehn-Milliliter-Ampullen an die Stasi geliefert, bestätigte J. am 21. Mai gegenüber der Bild-Zeitung. Da stand der ungeheuerliche Verdacht bereits im Raum: Waren DDR-Dissidenten durch die Staatssicherheit heimlich verstrahlt worden? Der Spiegel hatte über entsprechende Hinweise berichtet und der Jenaer Maler Frank Rub Strafanzeige bei der Berliner Staatsanwaltschaft gestellt. Auslöser war der Tod seines Freundes, des Regimegegners und Schriftstellers Jürgen Fuchs. Dieser war Anfang Mai 1999 im Alter von 48 Jahren einem Plasmozytom erlegen, einer seltenen Blutkrebsart, die durch Strahlung verursacht werden kann.Bürgerrechtler fordern seit Jahren Aufklärung

Jürgen Fuchs hegte die Vermutung, daß seine tödliche Krankheit nicht gottgewollt war, sondern menschengemacht, erinnerte sein Freund Wolf Biermann. Ein Mord auf Raten? Den Verdacht, Fuchs und andere Dissidenten seien im berüchtigten Stasi-Knast Berlin-Hohenschönhausen mit Röntgenstrahlen traktiert worden, äußerten mehrere ehemalige Bürgerrechtler. Seit einem Jahr fordern sie rückhaltlose Aufklärung.

Zu den bald ermittelten Spuren gehörte ein unorthodox konstruiertes Röntgengerät, das Mitglieder eines Bürgerkomitees Ende Dezember 1989 im Stasi-Untersuchungsgefängnis Gera entdeckt hatten. Die Strahlenkanone stand hinter einem Vorhang versteckt im Fotoraum der Anstalt. Der Strahler habe sich etwa in Kopfhöhe des davor sitzenden Gefangenen befinden, erinnern sich Zeugen. Ähnliche Geräte gab es auch im Magdeburger, Chemnitzer und Bautzner Stasi-Knast. In Hohenschönhausen wurde 1990 im Fotoraum ein verstecktes Lehrbuch für Strahlenkunde entdeckt.

In seinem Schlüsselroman “Magdalena” hatte Jürgen Fuchs aus einer Veröffentlichung der Stasi-nahen Sektion Kriminalistik der Humboldt-Universität Berlin zitiert. Da ging es um radioaktive Gifte und darum, wie man diese spurlos gegen Menschen einsetzen kann. Nach Fuchs’ Tod gewann das Thema auch deswegen Brisanz, weil bereits im Mai 1998 Gerulf Pannach (48), früherer Liedermacher und Texter der DDR-Rockband Renft, an Nierenkrebs, und ein Jahr zuvor der Regimegegner Rudolf Bahro (61), Verfasser des Buches “Die Alternative”, an einem Non-Hodgkin-Lymphom gestorben waren. Alle drei hatten 1976/77 in Hohenschönhausen gesessen.

Wurden mißliebige Häftlinge im Rahmen von MfS-Zersetzungsmaßnahmen mittels Strahlenkanone unbemerkt verseucht, um ihnen langfristig Schaden zuzufügen? Es gibt zwar keine Beweise, dafür aber genug Indizien.

Mielkes Männer experimentierten nachweislich seit den siebziger Jahren mit strahlenden Substanzen. Akten beweisen, daß sie im Umgang mit Radionukliden und nichtmedizinischer Röntgentechnik ausgebildet wurden. Eine ganze Liste besonders gefährlicher Substanzen ist beispielsweise im Jahresplan 1979 des Dienstbereiches 2 unter der Rubrik “Schädigung durch Beibringen radioaktiver Stoffe” aufgelistet. Auch an der Anwendung radioaktiver Isotope arbeiteten die Stasi-Experten.

Eine über 900 Seiten starke Studie der Humboldt-Universität unter dem Titel “Toxdat” führt jede erdenkliche Art auf, wie Menschen mit Gift umgebracht werden können. Die für die Stasi entstandene Ausarbeitung aus dem Jahr 1988 nennt mehr als 200 toxische und strahlende Substanzen und beschreibt detailliert, wie diese eingesetzt werden könnten. Im Kapitel “Schädigung durch Beibringung radioaktiver Stoffe” werden besonders gefährliche Radionuklide genannt: von Strontium-90 bis Plutonium-238, aber auch Mikromengen abgebrannter Brennstäbe aus Kernkraftwerken.

Aus den Papieren erfuhren die Geheimdienstler, welche Wirkung ein Einsatz dieser Stoffe beim Menschen hätte. Von einer kombinierten Schädigung war die Rede. Der biologische Effekt resultiere aus einem chemischen Gift und einer physikalischen Wirkung. Beigebracht in Speisen und Getränken könnten sie zu Siechtum führende Blut-/Knochenmarkschäden und Krebs bewirken. Das sei natürlich abhängig gewesen von der psycho-physischen Reaktion der Einzelperson, sagte Fuchs in einem Interview, in dem er die Möglichkeit einschloß, daß durch Strahlung gesundheitliche Schäden verursacht werden können, nicht bei allen Gefangenen, aber bei denen, von denen man glaubt, es machen zu müssen, zu sollen, zu dürfen, auf Befehl. Die Wissenschaftler der Humboldt-Uni nannten das eine Liquidationsmethode mit hohem Verschleierungspotential durch spät einsetzende unspezifische Initialsymptomatik.

Mielke-Ministerium wollte Strahlenunfälle herbeiführen

Fuchs selbst waren Dokumente in die Hände gefallen, in denen ein handliches Gamma-Gert polnischer Herkunft eine Rolle spielte, das punktförmig Neutronenstrahlen aussendet. Sein Einsatz, bei dem das biologische Gewebe beschädigt wurde, hinterließ keine Spuren, später würde es diffuse, aber bedrohliche Erkrankungen erzeugen. Experten bestätigen inzwischen, daß die Strahlendosis der Röntgengeräte in den Stasi-Gefängnissen bei einstündiger Bestrahlung 1,1 Gray betragen haben könnte. Damit wären die Geräte zwar viel zu schwach, um einen Menschen zu töten, aber die möglichen Strahlendosen hätten ausgereicht, um nach einigen Jahren bei den Opfern Blutkrebs auszulösen.

Die Stasi beschäftigte sich ebenfalls mit Möglichkeiten, kleine Atomminen in Westdeutschland einzusetzen und Kernkraftwerke zu beschädigen, um Strahlenunfälle herbeizuführen. Erst im vergangenen Jahr stieß die Gauck-Behörde auf Unterlagen der Stasi-Abteilung Operativ-Technischer Sektor. Damit war der Beweis erbracht, daß das Mielke-Ministerium mit dem Einsatz radioaktiven Materials experimentierte, um alles mögliche zu überwachen.

Grundlage dafür bot die Kooperation mit den Kernforschern in Rossendorf. Hier fanden die Bestrahlungen im Reaktor statt. Hier wurden Stoffe aktiviert wie Stecknadeln, die später Regimegegnern an die Kleidung geheftet wurden. Einem der Stasi verdächtigen Physiker im Kombinat Carl Zeiss Jena wurden 1978 radioaktiv präparierte Dokumente untergeschoben. Manuskripte von Bürgerrechtlern wurden mit flüssigem nuklearen Material beschichtet. Auch wurden Autos markiert, indem per Luftgewehr radioaktive Munition auf die Reifen geschossen wurde. Man überlegte, wie man Personen bespritzen könnte, um sie später wiederzufinden, beschrieb Joachim Gauck, Leiter der Stasi-Akten-Behörde, in einem Interview die Methoden. Fest steht, daß das Manuskript von Bahros “Alternative” radioaktiv markiert wurde. Die Stasi wollte so den Versandwegen nachspüren und Adressaten ausfindig machen.

Aber nicht nur gegen Dissidenten wurden radioaktive Stoffe eingesetzt. So verschickte die Stasi in einem Fall radioaktiv-markiertes Westgeld, um herauszufinden, wer in einem Postamt aus Briefen Geldscheine stiehlt. Wenn jemand drei dieser Scheine einsteckte, konnte das durchaus gesundheitliche Folgen haben, schätzt Gauck ein.

Insgesamt hat es in den siebziger Jahren hundert Markierungsfälle jährlich gegeben. In den achtziger Jahren sind es 50. Die Stasi benutzte 21 verschiedene Substanzen von Caesium-137 bis zu Kobalt-59 oder Silber-110. Erschreckend sei, daß beteiligte Wissenschaftler bis heute schweigen würden und einen guten Ruf hätten, sagte Gauck im März. Diese Spezialisten hätten aber der Stasi in Kenntnis möglicher Gesundheitsgefahren geholfen. Zwar gibt es bisher nach Aussage Gaucks keinen Beweis, der den schlimmen Verdacht bewußter radioaktiver Bestrahlung in Haftanstalten bestätigt, aber unter dem Decknamen “Wolke” setzten die Mielke-Leute radioaktive Substanzen zur Markierung von Personen und Gegenständen ein. Gesundheitliche Schäden wurden dabei billigend in Kauf genommen. Ein Markierungseinsatz konnte den heute geltenden Grenzwert um das 267fache überschreiten, ermittelte ein im Auftrag der Gauck-Behörde tätiger Gutachter.

Vorwürfe von Fuchs an die bundesdeutsche Justiz

Die Aktionen überschritten selbst die Sicherheitsnormen der DDR. Auch im Fall des Geraer Röntgengerätes, das zumindest zwischen 1976 und 1983 im Stasi-Knast eingesetzt wurde und nach der Wende spurlos verschwand. Es verstieß schon dadurch gegen die DDR-Gesetze, daß es nicht beim Amt für Strahlenschutz gemeldet war.

Man habe die Bedeutung von Zersetzung nicht begriffen, warf Fuchs kurz vor seinem Tod der BRD-Justiz vor. Es werde nicht wahrgenommen, daß ein System wie das der DDR mit einer historischen Mission in Andersdenkenden ideologische Feinde sah, bei deren Ausschaltung jedes Mittel vom Zweck geheiligt ist. Ein Betroffener ist vielleicht in der Lage, die letzten, die allerletzten Beweise zu bringen, wenn er gestorben ist und eine Knochenanalyse vorgenommen wird, sagte er bezüglich der Nachforschungen für den Einsatz radioaktiver Stoffe in den Haftanstalten.

Wie vor den Kopf geschlagen zeigt sich angesichts der jüngsten Enthüllungen auch der Rossendorfer Kernforscher J.: Eine Anwendung an Menschen, die nicht der medizinischen Diagnose oder Therapie dient, verurteile er mit aller Schärfe.

DDR-Regimegegner Rudolf Bahro: Das Manuskript seines Buches “Die Alternative” wurde von der Stasi radioaktiv verstrahlt


Versenden   Ausdrucken Probeabo bestellenQUELLE: JUNGE FREIHEIT

SECRET from the FBI – Judge Webster Delivers Webster Commission Report on Fort Hood

Judge William H. Webster has delivered to the FBI the Final Report of the William H. Webster Commission on The Federal Bureau of Investigation, Counterterrorism Intelligence, and the Events at Fort Hood, Texas, on November 5, 2009. An unclassified version of the report can be found here (pdf). A copy of Judge Webster’s transmission letter can be found here (pdf).

The FBI requested a full investigation of the manner in which the FBI and its Joint Terrorism Task Forces handled and acted on counterterrorism intelligence before and after the Fort Hood shootings, as well as a review and assessment of the FBI’s governing authorities and the FBI’s remedial measures after the Fort Hood shootings. The investigation did not probe the shootings, which are the subject of a U.S. Army-led inquiry and military criminal proceeding against Major Nidal Hasan. The FBI and Department of Justice provided the commission with more than 100 formal and informal interviews, meetings, and briefings, and more than 10,000 pages of documents. The commission also consulted with outside experts on counterterrorism and intelligence operations, information technology, and violent extremism; public interest groups; and staff from congressional committees with responsibility for oversight of the FBI.

The commission found shortcomings in FBI policy guidance, technology, information review protocols, and training, and made 18 important recommendations for corrective and enhancing measures in those areas. The FBI concurs with the principles underlying all the recommendations and has already taken action to implement them based on a combination of the commission’s work, the FBI’s own internal review of the Fort Hood shootings, and the report of the U.S. Senate Committee on Homeland Security and Governmental Affairs.

The commission also found that, working in the context of the FBI’s pre-Fort Hood authorities, policies, operational capabilities, and technology, personnel who handled counterintelligence information made mistakes. The final report concludes, however: “We do not find, and do not suggest, that these mistakes resulted from intentional misconduct or the disregard of duties. Indeed, we find that each special agent, intelligence analyst, and task force officer who handled the [intelligence] information acted with good intent.”

Judge Webster appointed five seasoned investigators and legal specialists from the private sector to serve as commissioners. “Their contributions of time and energy were substantial and an act of selfless patriotism,” Judge Webster said. The final report contains the names and biographies of commission members.

“As a former FBI Director, Director of Central Intelligence, and federal judge, Judge Webster was uniquely qualified to undertake this task and look at the procedures and actions involved in this matter. I want to thank Judge Webster and his team for their thorough investigation of the FBI’s handling of its responsibilities related to the Ft. Hood shootings of November 5, 2009,” said Director Robert S. Mueller, III. “We constantly strive to improve our policies and procedures, and I appreciate the final report’s acknowledgement of the actions that the FBI has taken since the shootings. Some of these actions were taken in response to our internal review, and others were part of the FBI’s ongoing commitment to improving its effectiveness.”

Below is the FBI’s response to each of the Webster Commission’s 18 recommendations.

 

Press inquiries concerning the Webster Commission and its final report should be directed to the National Press Office at (202) 324-3691.

FBI Response to the Final Report of the Judge William H. Webster Commission on The Federal Bureau of Investigation, Counterterrorism Intelligence, and the Events at Fort Hood, Texas, on November 5, 2009

The Webster Commission makes 18 recommendations for corrective and enhancing measures regarding FBI policy and operations, information technology, and training. The FBI concurs with the principles underlying all the recommendations and has already taken action to implement them based on the commission’s work, the FBI’s own internal review of the Fort Hood shootings, and the report of the U.S. Senate Committee on Homeland Security and Governmental Affairs.

Policies: The Webster Commission recommended that the FBI promulgate formal written policies related to the command-and-control of counterterrorism operations between FBI Headquarters and its field offices, the responsibility for investigative leads set from one field office to another, the resolution of inter-office disputes, and assignment and completion of leads. Most of these recommendations focus on the formalization of existing and longstanding FBI practices and procedures. The FBI recognizes the value of written policy and agrees with the recommendations. The FBI also expects its agents, analysts, and other personnel to use sound judgment in conducting thorough investigations, and to take responsibility for bringing issues to resolution. The organizational structure of the FBI also achieves in large part the objectives of the recommended written policies.

Webster Commission Recommendation on Counterterrorism Command-and Control Hierarchy

  • The FBI has undergone many changes since September 11 to prevent terrorist attacks, and key among those changes was centralizing command-and-control of counterterrorism operations in the Counterterrorism Division (CTD) at FBI Headquarters. The CTD assistant director provides direction for all counterterrorism matters, including counterterrorism operations.
  • The FBI has issued guidance to all offices on national management and oversight of counterterrorism matters that identifies CTD entities with responsibility for specific counterterrorism mission areas.

Webster Commission Recommendation on Ownership of Counterterrorism Leads

  • As noted by the commission, FBI practice has long been that offices assigned counterterrorism leads have ultimate responsibility for their timely and diligent completion.
  • The FBI has issued formal written policy that requires offices to complete all leads within specific timeframes. The office assigned the lead is responsible for its resolution.
  • In addition, more than two years ago, the FBI simplified lead categories. The FBI eliminated “discretionary leads,” such that leads may only be “information only” or action leads.

Webster Commission Recommendation on Inter-Office Disagreements in the Counterterrorism Context

  • The FBI has issued guidance on the resolution of inter-office disagreements.
  • Offices must work to resolve disagreements through the chain-of-command. As necessary, the assistant director in charge of the Counterterrorism Division is the official responsible for final decisions.

Webster Commission Recommendation on Completion of Routine Counterterrorism Leads

  • The FBI has issued formal written policy that requires offices to complete all leads within specific timeframes.

Webster Commission Recommendation on Leads for Joint Terrorism Task Force (JTTF) Task Force Officers

  • The FBI agrees that there may be situations in which the assignment of a JTTF task force officer as lead investigator may not be in the best interest of the investigation.
  • The FBI also recognizes and values the unique contributions of its task force officers, including their specialized knowledge and familiarity with their home agency’s systems and procedures, and will assess the proper assignment for each investigation based on the circumstances of each case.

Webster Commission Recommendations on Counterterrorism Assessments of Law Enforcement and Other Government Personnel

  • As the commission notes, the FBI implemented, within weeks of the Fort Hood attacks, an information-sharing agreement with the Department of Defense regarding counterterrorism investigations of military personnel. The Webster Commission described this information-sharing agreement as important, noting that it “assures that, as a matter of written policy, the FBI will provide timely and consistent notice of counterterrorism assessments and investigations” of Defense Department personnel.
  • Consistent with the commission’s recommendation, the FBI is pursuing similar arrangements regarding other federal, state, and local government employees.

Integrating Intelligence and Operations: The Webster Commission reported that it was impressed with the quality and commitment of the FBI’s intelligence analysts and the integration of analysts into the FBI’s work.

Webster Commission Recommendation on Continued Integration of Intelligence Analysts into Operations

  • As the report recognized, the FBI has already taken significant steps to strengthen its integration of intelligence and operations.
  • The Counterterrorism Division has created a strategic analytical and operational branch that includes multiple threat-based fusion cells, responsible for ensuring counterterrorism operations and collection are focused on priority threats. The deputy assistant director who leads this branch is an intelligence analyst.
  • The FBI continues to examine innovative ways to integrate intelligence and operations throughout the organization.

Information Technology: The commission recommended that the FBI employ various enterprise data management and data integration applications designed to aid the FBI in reviewing, analyzing, managing, and acting on information and implement protocols for reviewing such information. In many cases, the FBI has already addressed the commission’s recommendations, including by implementing data management and integration projects and policies designed to help agents, analysts, task force officers, and other personnel more effectively review, evaluate, and exploit information. Due in part to the rapidly evolving nature of information technology, and the FBI’s numerous initiatives to upgrade its technology, much of the technology and tools in place at the time of the attack and reviewed by the Webster Commission have been replaced with more advanced technology over the span of a year or more. As recognized by the Webster Commission, many of these crucial technologies will require additional funding.

Webster Commission Recommendation on Expediting Enterprise Data Management

  • The FBI—like the rest of the U.S. intelligence community—has focused enterprise data management projects on eliminating “stove-piped” database architecture in order to move toward our goal of collecting and storing data as a service.

Webster Commission Recommendation on Expanding and Enhancing the Data Integration and Visualization System

  • Data Integration and Visualization System (DIVS) is one important step in the FBI’s broader Enterprise Data Aggregation Plan. DIVS evolves as technology improves and as new data is received. Today’s DIVS is beginning to use technology that existed only in concept at the time of the Fort Hood shootings.
  • DIVS enables FBI personnel today to use a single logon and user interface to conduct complex searches across the FBI’s most critical data holdings, triage and visualize the results, and integrate the data into analytical tools—all capabilities that did not exist at the time of the Fort Hood shootings. Since the commission’s initial review of DIVS, the number of FBI and non-FBI data sets accessible to DIVS has grown considerably.
  • The FBI is working to implement a majority of DIVS’ planned analytical capabilities by this fall. As the technology industry continues to develop electronic means to extract and understand concepts from data, the FBI must focus on and invest in these technologies.

Webster Commission Recommendation on DWS-EDMS

  • In 2009, the FBI initiated a multi-phased modernization effort to enhance the Data Warehouse System/Electronic-Surveillance Data Management System (DWS-EDMS). The FBI has adopted a new and more effective search engine for DWS-EDMS.
  • The FBI has already invested in hardware necessary for a technical refresh and to enable a disaster recovery capability for DWS-EDMS. As stated in the report, further investment is necessary to implement an automated live recovery capability.

Webster Commission Recommendation on Acquisition of Advanced Information Search, Filtering, Retrieval, and Management Technologies

  • The FBI has begun implementing an enterprise knowledge-management application that will provide advanced search and analytic tools to review and manage a wide variety of data. Among other things, these tools will help FBI personnel organize intelligence and discover non-obvious connections.
  • The FBI is also deploying the next generation of tools to process content within DWS-EDMS; these tools will enable advanced search and other capabilities.
  • As the technology industry continues to develop electronic means to extract and understand concepts from data, the FBI must focus on and invest in these technologies.

Webster Commission Recommendation on Review Protocols for Large Strategic Collections of Data

  • The FBI is in the process of finalizing protocols to manage the review of large strategic collections of data.

Governing Authorities: The Webster Commission conducted a broad review of the FBI’s governing authorities and procedures as they relate to counterterrorism operations. The commission reports these authorities and procedures strike an appropriate balance between detecting and disrupting threats and respecting civil rights and civil liberties. The commission also made recommendations regarding the need for the FBI Office of Integrity and Compliance and Inspection Division to conduct internal compliance reviews and audits to ensure compliance with all policies and procedures that protect civil liberties and individual privacy. The FBI supports these recommendations and has taken action to implement them.

Webster Commission Recommendation on Compliance Reviews and Audits

  • The FBI regularly conducts reviews to ensure FBI compliance with its policies and procedures and will conduct the reviews and audits identified by the commission.

Webster Commission Recommendation on Adherence to Information Security Policies

  • The FBI regularly conducts reviews to ensure FBI compliance with its policies and procedures and will conduct the reviews identified by the commission.

Webster Commission Recommendation for FBI Authorities to Remain in Effect

  • The FBI agrees that FBI’s authorities for national security letters, FISA Section 215 business records, roving wiretaps, and FISA “lone wolf” orders are essential tools for protecting national security and should remain in effect.

Webster Commission Recommendation on Updating Attorney General Guidelines Affecting Extra-Territorial Operations

  • Since 2011, the FBI and Department of Justice have been engaged in a joint-effort to update the Attorney General Guidelines.

Training: Following the shootings, the FBI immediately instituted additional training for all task force officers related to FBI databases and Joint Terrorism Task Force operations. The Webster Commission concluded that the “FBI’s post-Fort Hood enhancements of counterterrorism and JTTF training represent significant improvements.”

Webster Commission Recommendation on Training Task Force Officers

  • The FBI has substantially expanded its task force officer training, including: a mandatory nine-day orientation course, mandatory FBI database training, and mandatory introductory training prior to a task force officer receiving his or her first duty assignment.
  • All mandatory courses must be completed within the first 90 days of assignment to the Joint Terrorism Task Force.

Administrative and Disciplinary Action: At the request of the FBI, the commission considered whether any administrative or disciplinary action should be taken against any FBI personnel. The commission determined that it would not recommend any such action against FBI personnel.

Resources:
Final Report of the Judge William H. Webster Commission on The Federal Bureau of Investigation, Counterterrorism Intelligence, and the Events at Fort Hood, Texas, on November 5, 2009 (unclassified version) (pdf)
Transmission Letter from Judge William H. Webster (pdf)

TOP-SECRET – European Central Bank Paper: Shadow Banking in the Euro Area

https://publicintelligence.net/wp-content/uploads/2012/07/ECB-ShadowBanking.png

 

Shadow banking, as one of the main sources of financial stability concerns, is the subject of much international debate. In broad terms, shadow banking refers to activities related to credit intermediation and liquidity and maturity transformation that take place outside the regulated banking system.

This paper presents a first investigation of the size and the structure of shadow banking within the euro area, using the statistical data sources available to the ECB/Eurosystem.

Although overall shadow banking activity in the euro area is smaller than in the United States, it is significant, at least in some euro area countries. This is also broadly true for some of the components of shadow banking, particularly securitisation activity, money market funds and the repo markets.

This paper also addresses the interconnection between the regulated and the non-bank-regulated segments of the financial sector. Over the recent past, this interconnection has increased, likely resulting in a higher risk of contagion across sectors and countries. Euro area banks now rely more on funding from the financial sector than in the past, in particular from other financial intermediaries (OFIs), which cover shadow banking entities, including securitisation vehicles. This source of funding is mainly shortterm and therefore more susceptible to runs and to the drying-up of liquidity. This finding confirms that macro-prudential authorities and supervisors should carefully monitor the growing interlinkages between the regulated banking sector and the shadow banking system. However, an in-depth assessment of the activities of shadow banking and of the interconnection with the regulated banking system would require further improvements in the availability of data and other sources of information.

This paper presents a preliminary investigation of the size and the structure of shadow banking in the euro area, as a contribution to the international and European debate on this issue. In broad terms, shadow banking refers to activities related to credit intermediation, liquidity and maturity transformation that take place outside the regulated banking system. There is widespread international agreement on the need to better understand the activities of shadow banking and the related financial stability risks. Moreover, the forthcoming implementation of Basel III, with the introduction of more stringent capital and liquidity requirements for credit institutions, and the provisions to be applied to insurers may provide further incentives for banks to shift part of their activities outside of the regulated environment and therefore increase shadow banking activities.

Evaluating the size of the shadow banking system in the euro area is not straightforward. A quantitative assessment of the activities of the shadow banking sector can only be based on data sources that unfortunately were not designed specifically for this purpose (i.e. flow-of-funds data and monetary and financial statistics). Moreover, for some activities and markets there are no official data available.

The analysis shows that shadow banking activity in the euro area is smaller than in the United States. In the United States the size of the shadow banking system, measured as the total amount of its assets, was comparable to the size of the banking system in the second quarter of 2011, while in the euro area it represented less than half of the total assets of banking sector. However, the size of assets held by financial
intermediaries that are not regulated as banks is still important in the euro area, especially in some countries.

A proxy for the activities of shadow banking in the euro area can be derived from the analysis of the balance sheets of OFIs, a sector which excludes insurance corporations and pension funds but covers most of the agents engaging in shadow banking. Regarding the dynamics of shadow-banking activities, assets of OFIs grew rapidly in the run-up to the crisis, in the period 2005-07. Starting at the end of 2007, OFI intermediation declined sharply in the context of the general deleveraging triggered by the financial crisis.

The paper investigates some key components of shadow banking. In particular, it looks at financial entities other than banks involved in credit intermediation, such as securitisation vehicles, and at the financial intermediaries and markets providing funding to the banks, such as money market funds (MMFs) and the repo market. The data suggests the following.

(i) Securitisation issuance was smaller in volume in the euro area than in the United States before the crisis (around 5% and 12% of GDP respectively) and remains less developed.

(ii) Assets under management by MMFs amounted to €1.83 trillion and €1.1 trillion in the United States and in the euro area respectively by the second quarter of 2011. However, it should be pointed out that in the euro area MMFs are a somewhat heterogeneous group (even if the CESR, i.e. the predecessor of the European Securities and Markets Authority, published in 2010 guidelines on a Common Definition of European Money Market Funds).

(iii) The repo market is a key source of funding in both the United States and the euro area.

The paper also addresses the interconnection between regulated and non-regulated segments of the financial sector undertaking banking activities. Over the recent past this interconnection has been increasing, likely resulting in higher risk of contagion across sectors and countries. Euro area banks rely more than in the past on funding from the financial sector and in particular from the OFI sector, which covers shadow banking entities including securitisation vehicles. This source of funding is mainly short-term and therefore more susceptible to runs and to the drying-up of liquidity. The relative size and relevance of shadow banking intermediation differs significantly across euro area countries.

A more in-depth assessment of the activities of shadow banking and of the interconnection with the regulated banking system would require an improvement in the availability of data and other related information. More than 60% of the assets that are considered part of shadow banking activities in the euro area are linked to financial institutions for which high frequency statistical information is not available. Similarly, very scarce and non-standardised information is available on repo markets. Moreover, the aggregate data collected for the euro area are not detailed enough to allow a full understanding of key elements such as the presence of maturity transformation and leverage and the possible channels for contagion, which are of particular importance when evaluating possible regulatory measures. The paper concludes with some preliminary considerations regarding possible measures to address data gaps and regulatory options.

 

https://publicintelligence.net/wp-content/uploads/2012/07/us-shadow-banking.png

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE

ECB-ShadowBanking-1

Crytome – Global Politics: Anonymous, Pirate Parties, P2P

Subject: <nettime> Pirate Assemblages: The Global Politics of Anonymous, the Pirate Parties and Radical P2P Communities

CALL FOR CHAPTER PROPOSALS

Pirate Assemblages: The Global Politics of Anonymous, the Pirate Parties and Radical P2P Communities

A book edited by

Marco Deseriis, Northeastern University
Carolin Wiedemann, University of Hamburg

Proposal Submission Deadline: August 31, 2012

In May 2006, the Swedish police raided and seized The Pirate Bay’s servers in Stockholm for copyright infringement. As a result, the newborn Swedish Pirate Party saw a membership surge, received 7% of the vote in the European Parliament election of 2009, and spearheaded the Pirate Parties International, a network of political parties that fight for copyright reform, open source governance, and the civil right to privacy in the information society. Recently, the German Pirate Party has dubbed the success of its Swedish counterpart in four different German state elections.

In October 2010, the hacktivist network Anonymous launched Operation Payback, a series of distributed-denial-of-service (DDoS) attacks against anti-piracy organizations and government agencies that were held responsible for the outage of The Pirate Bay. In an open letter to Anonymous, the US and UK Pirate Parties invited the hacktivist movement to cease the attacks and “choose a more moderate and legal way” to pursue the struggle for copyright reform. Although Anonymous, the Pirate Parties, and other social movements for direct democracy may not always agree on their tactics they all consider the peer-to-peer exchange of information amongst all human beings as fundamental to the communal organization of a free and open society.

The struggles against intellectual property and for a democratic access to information have thus entered a new phase. In particular, the rise of Wikileaks, Anonymous and the Pirate Parties as well as the mobilizations against laws such as SOPA, PIPA and ACTA signal that Internet users are no longer willing to delegate the representation of their interests to third parties. The refusal of representation is also a common feature of the recent movements against autocracy in the Middle East and austerity measures in Europe and North America. For example, Michel Bawuens has compared Occupy to an open API with modules, such as “protest camping”? and “general assemblies,” which can be used as templates and modified by all, without the need of a centralized leadership.

Yet while on a general level the new P2P and pirate movements seem to share common ideals and goals significant differences remain on how to pursue these objectives. Pirate Assemblages takes this debate as a departure point to explore a set of pressing issues on the social composition and global politics of the new P2P movements. In particular we are interested in articles that pose and try to answer questions such as:

* The hacker ethos that informs the open source community and the new pirate movements assumes that traditional institutions are inherently flawed because of their hierarchical and centralized structure. How are decisions made within these movements? Is technical knowledge the primary way to gain status? What other competences are mobilized? Is there a leadership within these movements? If so, how is it selected?

* It is generally assumed that the core organizers of the IPP, Anonymous, and file-sharing networks are predominantly white middle-class men. If this is true, what are the consequences of such limited composition on the politics of these formations? And what are the examples that may challenge this assumption?

* How do these movements differ from each other due to their regional backgrounds? To what extent is the idea of freedom associated with digital rights and P2P still linked to the Enlightenment project and Western rationality? Are there other notions of freedom that can inspire the politics of these movements?

* The IPP, Anonymous, and Occupy often exhibit the coexistence of a liberal or libertarian wing and an anti-capitalist wing. Is the dialectic between these components an impediment or a stimulus to the growth of these movements? How are conflicts mediated internally? How are they represented on the outside?

* In which way is the autonomous organization of cognitive workers that make up the global pirate movement affecting the organizational forms of wider social movements such as the Arab Spring, Occupy and the Spanish Indignados?

* What are the mid-term campaigns and objectives that can lead these movements to articulate a global politics without denying their regional and cultural differences? Are there viable examples that show how this process may already be underway?

We are interested in articles that focus on specific case studies as well as broader comparative analyses. Submissions about non-European and non-U.S. case studies are encouraged. Please send a 300-400 words abstract to Carolin Wiedemann <carolin.wiedemann[at]wiso.uni-hamburg.de> and Marco Deseriis <m.deseriis[at]neu.edu> no later than August 31, 2012. You will receive an answer by September 15, 2012. Complete chapters are due on December 5, 2012. The editors aim at publishing the book in multiple languages including English and German.

Marco Deseriis, Assistant Professor
Screen and Media Studies
Northeastern University
204 Lake Hall
360 Huntington Ave
Boston, MA 02115
Office phone number: +1 617-373-5517
Email:m.deseriis[at]neu.edu

# distributed via <nettime>: no commercial use without permission
# <nettime> is a moderated mailing list for net criticism,
# collaborative text filtering and cultural politics of the nets
# more info: http://mx.kein.org/mailman/listinfo/nettime-l
# archive: http://www.nettime.org contact: nettime[at]kein.org

TOP-SECRET – U.S. Northern Command Homeland Defense/Civil Support Capabilities Assessment Study Plan

https://publicintelligence.net/wp-content/uploads/2012/07/DoD-HDCS-CBA.png

 

During the April 5, 2007, Deputy’s Advisory Working Group (DAWG) meeting. the DepSecDef directed completion of a capability based analysis (CBA) based on the Homeland Defense/Civil Support (HD/CS) Defense Planning Scenarios. The emphasis of this CBA will be on identification of gaps within the HD/CS mission which only DOD can supply. On May 30, 2007, a memo from the Assistant Secretary of Defense for Homeland Defense and Amaicas’ Security Affairs (ASD/HD&ASA) requested the NORAD-USNORTHCOM Commander lead this HD/CS CBA. Finally, the DepSecDef’s August 7, 2007, brief to President of the United States identified the HD/CS CBA as one of DOD’s top 25 Transformational Priorities with an objective of advancing to a major milestone by Dec 08. For the HD/CS CBA, submission of the Joint Capabilities Document (JCD) to the JROC for approval is this major milestone.

This Study Plan outlines the background, scope, strategic assumptions, study objectives, analysis methodology, scenario considerations, timeline, and management responsibilities in conducting the Homeland Defense and Civil Support Capabilities-based Assessment (HD/CS CBA) to include production of the Functional Area Analysis (FAA), Functional Needs Analysis (FNA) and a Joint Capabilities Document (JCD). This CBA, through the execution of the FAA, FNA. And JCD; identifies, describes, documents, and prioritizes DOD’s capability gaps and excesses in the HD/CS mission areas (to include the Mission Assurance (MA) function).

The objective of this HD/CS CBA is to assess DOD’s ability to conduct HD and support CS missions across air, space, maritime, land, and cyber domains while simultaneously achieving MA objectives. While the HD/CS Joint Operating Concept (JOC) is the primary document describing how DOD will operate to achieve national unity of effort, this CBA will assist in identifying, and prioritizing, the capabilities which DOD will provide to defend the homeland and provide support to the lead federal agency for civil support.

The HD/CS CBA focuses on military problems facing DOD in the 2012-2025 timefiame with an emphasis on 2014-2016, i.e., “how” DOD will fulfill its responsibilities required to lead, support and enable HD/CS missions. The HD/CS CBA will leverage previous and ongoing Service. Combatant Command, Agency, and Interagency analytical efforts to the maximum extent possible to prevent duplicative efforts and help define required HD/CS tasks, capabilities, capability gaps, and potential trade space. Significant collaboration with Interagency stakeholders is essential to the success of the CBA.

Finally, this paper puts forward three scenarios for use in the HD/CS CBA analysis. These scenarios provide the conditions against which the HD/CS capabilities will be measured in the CBA and help define the capabilities needed for HD/CS. The scenarios are drawn from the National Planning Scenarios (NPSs), the Defense Planning Scenario (DPS), and the Steady State Security Posture scenarios (SSSPs ). In addition, other key Analytic Agenda efforts to include the CS Analytic Baseline (CSAB) and the HD Multi-Service Force Deployment (MSFD) studies will also be considered in the analysis as much as practical to help ensure consistency.

3. Objectives. The HD/CS CBA will assess DOD2′s ability to conduct HD and CS missions across air, space. maritime, land, and cyber domains while simultaneously achieving MA objectives. Specifically, NORAD-USNORTHCOM will lead a comprehensive HD/CS CBA to:

3.1. Establish assumptions, informed by interagency partners, on DOD and interagency roles and responsibilities for HD/CS missions and mission assurance function.

3.2. Through a cascading mission-to-capability, capability-to-task, task-to-characteristic, characteristic-to-attribute linkage, determine the core capabilities required to execute DOD’s HD/CS missions and mission assurance functions (CJCSI 3170.01F).

3.3. Systematically and comprehensively identify, integrate, and assess existing and planned HD, CS, and MA capabilities for the specified timeframe. As a key facet of this determination, in conjunction with Department of Homeland Security (DHS), identify current interagency HD/CS capabilities.

3.4. Identify and prioritize critical HD, CS, and MA capability gaps, overlaps, and redundancies while considering and characterizing mission risk.

3.S. Conduct a risk assessment and recommend a prioritized plan for future DOD HD, CS, and MA capability development which effectively leverages interagency investment.

3.6. Deliver a Joint Capabilities Document (JCD) with a prioritized list of HD, CS, and MA capability gaps.

4. Background.

4.1. The DOD is charged with fighting and winning the nation’s wars, a responsibility traditionally executed overseas. However, today the DOD operates in a changing, uncertain security environment facing a range of threats, extending into all domains and the homeland. Whereas the enemies of yesterday were relatively predictable, homogenous, hierarchical, and resistant to change, today’s adversaries are unpredictable, diverse, increasingly networked, and dynamic. These adversaries benefit from technologies and materials readily accessible on world markets, to include disruptive systems or the ingredients required 10 fabricate weapons of mass destruction (WMD). This potential availability of WMD to terrorist groups is of vital concern, especially as terrorists thrive in the “seam” of ambiguity where threats are neither clearly military wartime threats nor clearly criminal type threats. Current trends indicate a future security environment which includes:

4.1.1. Certain nation-states pursuing traditional, but constantly improving, capabilities including manned or unmanned systems (air, ground and maritime), kinetic weapons, ballistic and cruise missiles.

4.1.2. Emerging threats presenting greater challenges through an increased use of asymmetric approaches which avoid US strengths and attack US vulnerabilities in lieu of more traditional military means and methods.

4.1.3. Globalization creating opportunities for economic growth and an impetus for expanding political freedoms, but also accelerating corruption, the spread of disease, WMD technology, extremist ideologies, and terrorism.

4.1.4. Terrorism and terror tactics which are increasingly lethal, unpredictable, a-edible, well-organized, and well-financed.

4.1.5. Kinetic and non-kinetic attacks on information, Supervisory Control and Data Acquisition (SCAD A) and space systems.

4.1.6. Increase in the speed and scale of the proliferation of missile technology and the spread of chemical, biological, radiological, nuclear and high-yield explosive (CBRNE) weapons and their means of delivery, posing a fast-growing challenge to land, maritime, air, cyber, and space capabilities in the homeland and abroad.

4.1. 7. Requirements for unified action across DOD, USG Interagency, InterGovernmental organizations (IGO), non-governmental organization (NGO) and multinational partners.

4.1.8. Reassessment of DOD capabilities in domestic situations, specifically for the use of U.S. Coast Guard in Title 14 status and the National Guard in Title 32 Slatus.
within the roles of disaster response and border control support.

4.2. The Homeland is confronted with a wide spectrum of threats ranging from traditional national security threats (ballistic missile attack) to law enforcement threats (drug smuggling). Between the two ends of this spectrum, there is a set of missions where an overlap of roles, responsibilities, authorities and capabilities exist amongst DOD, Department of Homeland Security (DHS), Department Health and Human Services (DHHS), Department of Justice (DOJ), and other Interagency (IA) stakeholders in securing the United States (US). These areas of overlap present an opportunity to take advantage of increased US Government capacity, and should not be viewed as detrimental. In order to take advantage of these areas of overlap, it is vital that appropriate interagency pre-event planning occur and that stakeholders come together in a “unity of effort” through operational coordination and collaboration during the threat response. Noting the importance of this need for “unity of effort,” the President has directed specific coordination requirements in the Maritime Operational Threat Response (MOTR) Plan and the Aviation Operational Threat Response (AOTR) Plan, as well in other planning and operational documents. While the HD/CS Joint Operating Concept is the primary document describing how DOD will operate to achieve National unity of effort, this CBA will assist in identifying, and prioritizing the capabilities which DOD will use to contribute to the Nation’s security activities.

4.3. In parallel with the Homeland Defense mission, DOD must remain prepared to support its Federal, State, and local partners in responding to natural and manmade disasters or accidents when directed. Natural disasters such as major hurricanes, earthquakes, or pandemics can overwhelm local responders and involve significant allocation of defense resources to help mitigate the effects and support relief and recovery efforts. Likewise, a successful terrorist attack, particularly one involving WMD, can cause catastrophic losses requiring substantial Defense Support of Civil Authorities (DSCA). DOD must be trained, equipped. and ready to provide the capabilities needed to assist civil authorities when required.

4.4. Finally, DOD must sustain the nation’s freedom of action during and despite any of the events described above. This effort includes Emergency Preparedness, Defense Critical Infrastructure Protection, Continuity of Government and Continuity of Operations as well as ensuring and assessing the protection of the Defense Industrial Base.

 

The world’s worst serial killer – Full Movie

Some serial killers are very well known although the number of murders are not so many. Here is the other way around. Not so well known, but has murdered an incredible number of people. Here is the story of Garavito who has killed at least 140 children in Columbia in the 90´s.
Those of you who do not speak Swedish have to put up with the Swedish texting.

TOP-SECRET from the FBI – Superseding Indictment Charges 11 People in $19 Million Tax Fraud and Identity Theft Conspiracy

ANCHORAGE—U.S. Attorney Karen L. Loeffler and Assistant Attorney General Kathryn Keneally of the Justice Department’s Tax Division announced that 11 defendants were charged in a 90-count superseding indictment returned today in connection with their alleged roles in a scheme to use stolen Puerto Rican identities to file tax returns and obtain fraudulent income tax refunds. This second superseding indictment adds tax fraud, identity theft, and other financial counts to previous charges, including conspiracy to distribute cocaine, cocaine distribution, and international money laundering.

“Today’s indictment is a clear warning that anyone who steals the identities of innocent taxpayers and uses the information for personal profit will be aggressively pursued, investigated, and prosecuted in Alaska or throughout the United States,” Ms. Loeffler said. “This case is an example of how interagency cooperation and teamwork can successfully bring down an entire organized criminal conspiracy.”

The indictment charges that between January 2010, and March 2012, the defendants engaged in a conspiracy to defraud the United States by filing false tax returns and claiming millions of dollars in tax refunds to which they were not entitled.

To accomplish their tax refund scheme, the indictment alleges that the conspirators obtained the names and Social Security numbers of individuals from the Commonwealth of Puerto Rico. They then fabricated individual income tax returns in those names claiming that they were owed thousands of dollars in refunds to which they were not entitled.

To facilitate the submission of false tax returns, the indictment alleges that three of the defendants obtained laptop computers that were loaded with individual names, Social Security numbers, and other identity information. Altogether, the three laptop computers contained over 2,600 stolen identities and identified approximately $19 million in fraudulent refund claims. The indictment further alleges that, in some cases, one or more of the defendants obtained the physical addresses used on the tax returns by stealing mail from mailboxes in and around the Anchorage area.

In other cases, it is alleged that one or more of the defendants contacted conspirators in locations such as New Jersey and Puerto Rico and requested that fraudulently obtained tax refund checks be sent to Anchorage under false names.

The indictment also alleges that the defendants negotiated the refund checks at banks in Anchorage. The indictment further charges one bank employee with assisting other defendants in opening bank accounts in false names and negotiating forged U.S. Treasury checks.

In order to negotiate the tax refund checks, the defendants allegedly used false identification documents. They allegedly obtained these documents by using the names, dates of birth, and Social Security numbers of other individuals in applications made to the Alaska Department of Motor Vehicles. The defendants are charged with opening numerous bank accounts in the various stolen identities. The defendants involved in the tax scheme, all of whom were citizens of either the Dominican Republic or Mexico, are alleged to have falsely claimed to be United States citizens on their applications for these false documents.

The indictment also charges various defendants with submitting false claims for refund, possessing stolen mail, making false claims of U.S. citizenship, committing passport fraud, making false statements to banks and credit unions, and passing forged U.S. Treasury checks, as well as aggravated identity theft. The fraud charges each carry maximum penalties of between two and 30 years of imprisonment, in addition to the five-year mandatory minimum prison term required upon conviction on the drug charges.

“The charges brought forth today against these 11 individuals serve as another reminder that IRS-Criminal Investigation is aggressively pursuing those who choose to defraud the government and disrupt the lives of innocent taxpayers,” stated Richard Weber, Chief, IRS-Criminal Investigation.

“These criminals illegally posed as U.S. citizens and exploited our financial system for personal gain,” said Brad Bench, Special Agent in Charge of HSI Seattle, who oversees investigations in Alaska. “By pooling our unique resources, legal authorities, and expertise, HSI and the IRS were able to dismantle a significant scheme to defraud the people of the United States.”

“Drug traffickers’ greed clearly has no limits, as evidenced by this investigation,” said Acting Special Agent in Charge Douglas James of the Drug Enforcement Administration. “The DEA is proud of its partnership with the Anchorage Police Department, who brought this case to their federal counterparts, exposing this multi-faceted criminal organization.”

The case is being jointly prosecuted by Assistant U.S. Attorneys Thomas C. Bradley and James Barkeley of the U.S. Attorney’s Office for the District of Alaska and Trial Attorney Stephanie Carowan Courter of the U.S. Department of Justice Tax Division. The initial charges arose out of an investigation begun by the Drug Enforcement Administration (DEA) and Anchorage Police Department (APD). The new charges were further investigated by the Internal Revenue Service Criminal Investigation (IRS-CI), U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI), the U.S. Postal Inspection Service (USPIS), and the U.S. State Department’s Diplomatic Security Service. Additional assistance was provided by the U.S. Attorney’s Offices for the District of New Jersey, the Eastern District of Pennsylvania, and the Southern District of New York.

Anyone who believes that they have been a victim of identity theft, or wants information about preventing identity theft, may obtain helpful information and complaint forms on various government websites, including the Federal Trade Commission, Justice Department, Social Security Administration, and IRS.

This case was investigated and prosecuted under the purview of the Organized Crime and Drug Enforcement Task Force, which is made up of personnel from the U.S. Attorney’s Office; Federal Bureau of Investigation; Drug Enforcement Administration; the Bureau of Alcohol, Tobacco, Firearms, and Explosives; ICE-Homeland Security Investigations; Internal Revenue Service–Criminal Investigations; U.S. Marshals Service; U.S. Postal Inspection Service; U.S. Coast Guard; and the Anchorage Police Department.

An indictment is merely a formal accusation. Defendants are presumed innocent until proven guilty in a court of law.

Unveiled – An Israeli – Iranian War: The Iranian Perspective

What are Tehran’s goals in a confrontation with Israel? Why have the Iranians been prepared to fight for so many years? A special analysis by Colonel (Res.) Ronen Cohen
https://i0.wp.com/www.israeldefense.com/_Uploads/dbsarticles/_cut/SA0000_0244x0240x0072_000xFFFFFF_ahmadinejad@jpg.jpg
Mahmoud Ahmadinejad (Photo: AP)

“The IDF is ready to move against Iran the minute it receives the green light,” declared IDF Chief of Staff, Lieutenant General Benny Gantz in an interview broadcast on Israel’s 64th Independence Day. “The Iranians are determined to build a nuclear weapon while they continue to dupe the international community,” Minister of Defense Ehud Barak added the following day.

Israel’s leaders face a series of existential questions: should Israel attack Iran or pursue the diplomatic track? When, if ever, is the right time to launch an attack? How should it be executed? How will Iran’s leaders react to an attack on their nuclear facilities?

The day after

The most likely day-after scenario, as the international media sees it, is a devastating Iranian response based mainly, though not entirely, on its long-range missile arsenal. This attack would be coupled with terrorist strikes against Jewish and Israeli targets abroad, and backed by Hezbollah – Iran’s proxy in Lebanon.
On the international front, Iran could wreak havoc on the global economy through fluctuations in oil prices, even though this could also ultimately harm Iran (it is unclear whether Iran or the West would suffer more in an oil war).

Iran could respond with a four-way campaign with long-ranged counter-fire against Israel, terror activity on Israel’s borders, attacks on Israelis and Jews overseas, and a limited conflict in the north of Israel.

Israel is fully aware of the implications of the day after, but senior political-security figures have increasingly alleged that Iran’s response capabilities are limited due to international constraints and its distance from Israel. From our perspective, Israel could withstand an Iranian retaliation, just as it has withstood missile attacks in the past.

In his Independence Day speech, the chief of staff threw the proverbial ball into the political decision-makers’ court, taking careful aim at the prime minister and minister of defense. The question is whether Israel is up to the challenge of a day-after scenario that is different from the one the media projects.

If Israel initiates a military strike and Iran responds, Israel will face a security challenge of a magnitude that it has never experienced. It will be the first time in history that Israel faces a non-Arab state with an entirely different culture, mentality, and historical legacy. The same is true for the Iranians – for the first time they will be confronting Israel and the West.

Furthermore, Israel has never carried out a military attack against a state on the brink of nuclear capability. An attack against Iran would be far different than the bombing of the nuclear reactor in Iraq or the air strike against the reactor in Syria (attributed to Israel). For Israel, the element of surprise is already gone, which in effect, has already enabled the enemy to carry out a series of steps. These steps range from instilling a state of awareness into their nation, political-strategic maneuvering, and preparations for both an offensive and defensive military response.

Presenting a regional objective

When we examine the rationale behind an Iranian response, we should assume that the regime in Tehran will make every effort to cause the “Zionist entity” such severe damage that it would restore the Islamic Republic to the lofty position of a regional superpower. Iran’s choice of targets and its method of attack will be a regional and international display of Iranian strategy and military might. Iran cannot allow the campaign to end with it appearing ruined and humiliated. Another Iranian goal will be to safeguard its nuclear project so that it can quickly resume operations if damaged.

An Iranian strike would probably be directed against Israel’s population centers, since the Iranians believe that Israel would be hard-pressed to cope with a protracted campaign of attrition that weakens the home front.

Upon examining these goals against the scenario established by the media, we can see that the scenario the media portrays would not attain Iran’s objectives. What then is the modus operandi that Iran will choose to meet its goals?

A different kind of society

To understand how the Iranian leadership operates, we must go back to the 1980-1988 Iran-Iraq War. Despite the extreme differences between that war and a possible Israeli-Iranian confrontation, it would be worthwhile to look at the way the Ayatollah regime, still in its infancy, waged its first war.

At the time, following a break in relations with the US, the Iranian regime was isolated and bereft of superpower backing