Cryptome – Illegal Court Eavesdropping to be Exposed

James Atkinson to Expose Illegal Court Eavesdropping

 


Court documents related to the James Atkinson e-mail following:

27-June-2012-Niroula-orders.pdf (1.4)

top-secret-page-one-cobines.pdf (1.4MB)

Scan-14082012_00000.pdf (4.3MB)

Microsoft-Word-5-Feb-2012-Babble-Motion-Order-and-Declarations.pdf (103KB)

Microsoft-Word-5-Feb-2012-Jim-Declaration.pdf (57KB)

Courtfiling_for_Kaushal_Niroula_in_Pro_Per_Babble_41.pdf (160KB)

15-June-2012-James-Atkinson-Exhibits-and-Declarations-1.pdf (2.3MB)

11-June-2012-Court-Orders-for-James-Atkinson-TSCM-2.pdf (2.2MB)

Scan-25062012_00000-MInEavedrop1.pdf (1.6MB)

Mey-Tann-transcript.pdf (1.5MB)

 


Subject: My Services to the Court 
Date: Fri, 17 Aug 2012 15:44:44 -0400 
From: James M. Atkinson <jmatk[at]tscm.com> 
Reply-To: jmatk[at]tscm.com 
Organization: Granite Island Group 
To: Kristine.Hinos[at]riverside.courts.ca.gov 

Ms. Kristine Hinos
Superior Court of the State of California
County of Riverside, Indio Branch
Department 1B
Annex Court
82-675 Highway 111
Indio, CA 92201

Please forward a copy of this correspondence to the Honorable David B. 
Downing, as soon as possible, as it involves a case (People v. Niroula, 
INF064492) which is currently before the court.

Please consider this not to be an Ex Parte communication (at your 
discretion), and it is requested that it not be placed under seal (at 
your discretion). I would ask that copies be distributed to all of the 
respective parties.

Your Honor, a matter has come before me which effects the operation of 
your court, and which may affect the integrity of the proceedings in the 
above captioned case. Also, I am relatively certain that the 
information that I am in possession of, or which will be uncovered in my 
work will result in a mistrial, and likely the Indictment before the 
Grand Jury of several court officers, and members of law enforcement, and 
likely the Defendants themselves.

Defendant Kashual Niroula has unsuccessfully attempted to retain my 
services as a technical expert in this case, and I have provided him 
with quotations for legitimate services that I could render in support 
of this case.

However, to this day I have not been able to consummate any agreement 
with Mr. Niroula for these services as he perpetually will not focus the 
proposed services to the case at hand, and instead tries to get me to 
fraudulently charge this court for services utterly unrelated to the 
matter before you, but rather he blatantly tries to manipulate the Court 
to order my consulting services outside of the scope of these proceedings,
and he seems to be trying to get the court to order me to work for free.

Nevertheless, as there have been no agreement between Mr. Niroula and 
myself, and there is no acceptance of my offer (which was based on a 
request by Mr. Niroula), there has been no consideration paid, although 
Mr. Niroula has promised to pay me $7,000 per hour for certain services 
(which I feel are illegal in nature, and which I refuse to be a part 
of), but there has not yet been any form of consideration or payment to 
me in any form. Further, he stated or inferred that he has hidden funds 
from which he could pay me $7,000 per hour for my services, if I would 
assist in him an escape attempt. I of course refused to assist him in 
this illegal activity as well, which I now bring to the attention of this 
court.

In addition, it must be brought to this courts attention that my normal 
(and documented) base rate for a government entity or work on a criminal 
case is $7500 per day, plus all out-of-pocket expenses. This is billed 
on a door to door basis, and I normally work 14+ documented hours per 
day, 7 days a week and bill bi-weekly against the retainer for the project.

This amount was made clear to Mr. Niroula several times verbally and in 
writing. However, I offered to him that I would reduce my fee to an 
hourly basis of $350 per hour, provided that 3220 hours as approved as 
an initial cap, for the combined projects outlined is various sealed 
document which have been signed by you and provided to me. I made it clear to 
Mr. Niroula that if I was not engaged for the initial 3220 hours of work 
then my rate would remain at $7500 per day.

Mr. Niroula then stated that the court would pay me $150 per hour, and 
that he could engage me at that amount, but I did not accept his offer 
and his proposed project description at that time as it appeared to 
involve the commission of felonies on his behalf, which refused to be a 
part in.

Also, I made if very clear to him that I will provide him no services of 
any sort unless those services are well described and outlined in the 
form of a signed and sealed order of this court, but also that the 
estimated fee must be paid in advance of any work on the case. Also that 
there must be 3 week advance notice of any and all travel in regards to 
this case.

As the court has repeatedly, issued sealed orders for my for services, 
and have not specified any other rate. I then have to assume that my 
previously discussed and quoted rate of $7500 per day (plus all 
expenses) will apply, I thus must assume that the court (through your 
agent Kaushal Niroula) is willing to pay me $7500 per day for my work on 
this case.

Based on the August 10, 2012 order alone this will be 187 days of work 
at a daily rate of $7500 per day, for a initial fee of $1,403,572, plus 
expenses (airfare and excess cargo costs of approximately $8,500), 
lodging costs of roughly $46,750, office supplies of $5,600, office 
machine costs of roughly $7800, and the purchase of 20 ea 6 TB 
Thunderbolt Drives at a combined cost of $12,500 to perform the copying 
function ordered by this court.

On top of this will be the actual hardware required to set up the “hive” 
or “cloud” which will involve roughly $47,500 of materials costs, plus 
the two demo machines at a cost of $12,800 each. Due to the nature of 
the materials on these hard drive, it ill be necessary to mechanically 
destroy them and to reduce them to molten metal as the completion of the 
demonstration. This destruction will be performed by me using an 
incendiary device which I will make form scratch called a “burning bar” 
which will liquefy the hard drives in questions. The hard drives in or 
associated with the computers will be removed and liquefied in the same 
fashion. This molten metal will then be poured into a sand form in the 
sign of a Roman cross.

Additionally, it is my understanding that the testimony in this case is 
almost completed, and they by the time I actually get to California their 
may be mere hours left in the trial, and thus I feel that Mr. Niroula is 
running a scam on the court, and that he fully intends to cheat me out 
of any expenses, or that he intends to force a last minute mistrial, and 
then use the time before the new trial for me to render services.

As the court and Mr. Niroula has acquiesced to my $7,500 per day rate, 
and has issued orders for me to perform services, but with an order which 
neglects to specify the rate at which I will be paid, then the $7500 per 
day previously discussed with Mr. Niroula is thus applied.

The fee for the services to be rendered based on the August 10, 2012 
will thus be $1,403,572, plus $8,500 for transportation, plus $46,750 
for lodging, and $86,200 for office supplies, office machines, storage 
devices, and “HYDRA” computers.

Thusly, by way of a wire transfer or check from Riverside Country or 
from one of Mr. Niroula (or Mr. Garcia’s) numerous hidden bank accounts, 
or from the court in the amount of $1,544,022 payment in full must be 
made in advance for services being rendered. This must be paid in full 
before I will perform any work, supply any materials, or initiate travel 
arrangements, or take any action in this case of any sort. I am amenable 
for these funds to be provided to a court officer in Indio, and then 
paid out against bi-weekly billing, or dispersion made to cover travel 
and lodging. The court does have the authority to order the county to 
place $1,544,022 with a local law firm or other officer of this court, 
and then to release the funds to me as the work progresses.

I am amenable to working at a lower hourly or daily rate (if there is a 
higher volume of work), but the court has so far been mute in defining 
how much the court or the county is willing to pay. Mr. Niroula has 
claimed that the court can pay only $150 per hour, and I am willing to 
except that payment amount, provided the work is not unlawful, that the 
work is detailed in a signed and sealed order from this court, and my 
services are confined to those matters actually before this court.

Mr. Niroula has attempted to contract my services, and while me may be 
representing himself in a criminal matter, I doubt that he has the 
authority to contract with me on behalf of the county to develop a 
software program which he intended to sell commercially. Please 
understand that he wishes the country to pay me to develop a program 
which he and Mr. Garcia will then sell for profit (which the county paid 
for).

Further, as I am not an attorney, or clergy, or physician to Mr. Niroula 
there can be no automatic privilege between he and I until the court 
orders that that privilege takes place, or he provides me with a signed 
contract for my service which invoke formal confidentiality, after which 
the court would issue an order of formal privilege.

As your honor is well aware, I may have long hair, and I look like a 
hippy, but I am nobody’s fool (which I believe were the exact words out 
of your honors mouth).

Also, please be aware that it is not only your jail that has been 
illicitly bugged, but also your own courtroom; including times then you 
personally thought that you were having private discussions. Thus, this 
matter should be further technically examined by an outside expert in 
the field (such as myself), as you may have a near-term mistrial on your 
hands, and you may have a grave situation of obstruction of justice by 
the eavesdroppers, along other violations of your own rights.

I am in receipt of an order of the court dated August 10, 2012, but I 
was not provided a copy of this order until 6:15 PM on August 14, 2012, 
which also orders me to appear before this honorable court the day 
before the order was provided to me. I also understand that your honor 
was concerned when I was not before the court as ordered on August 13, 
2012 as so ordered. But as the Defendant did not provide me with the 
copy of the order until the 14th, is suggests that Mr. Niroula is 
playing games and getting you to sign frivolous orders, merely to get 
into the record that experts were ordered to come, but did not, as is 
quite clear in this case. Indeed is could appear that Mr. Niroula is 
playing this honorable court for the fool, and observation that I am 
morally and ethically bound to bring to your attention.

Mr. Niroula never bothering to notify me of the ordered appearance in a 
way that would allow me to comply unless I possess a time machine and 
could go backwards a few days. The orders he has repeatedly gotten 
signed as in fact frivolous and serve no legitimate purpose, and it 
would appear they he is merely setting up the record for an appeal.

Mr. Niroula has not yet paid my for the services he requests, and as 
you honor is aware the Thirteenth Amendment to the United States 
Constitution officially forbids involuntary servitude, so that if 
Mr. Niroula or the Court wishes me to provide goods and services, 
I must be paid, and paid in advance.

I do need to be completely frank with the court, and to disclose that 
Mr. Niroula and I have been utterly unsuccessful in consummating a 
contract for services, and while there was a request for services was 
made to me by Mr. Niroula, then an offer of services was made by me to Mr. 
Niroula, the offer was then rejected by Mr Niroula who proposed and 
requested a different service be rendered, which I refused to provide 
out of my own ethical, moral and legal limitations. He then engaged in 
repeatedly asking for different services, and we never reached the point 
where a contract could even remotely be considered to be formed and there 
as no actual acceptance of the offer, or any consideration given.

In short, request was made for an offer, an offer was then made in which 
certain conditions applied, the offer as refused, and then another 
counter-offer was made, which was declined, and this whole process repeated.

For example, Mr. Niroula has proposed that I assist him in an escape 
plan by which he would escape from custody and flee the country, which I 
refused to take part in, and which I here and now disclose to on a 
matter of a forthcoming escape attempt/plan. Mr. Niroula proposes to 
trick the court into placing him under house arrest by way of a GPS 
tracking bracelet, then removing the GPS bracelet in such a way that the 
removal would not be detected, and then to flee the country by way of a 
jet aircraft. He proposed to me the chartering of a private aircraft (a 
Citation X), with a range of roughly 3700 miles, but he has not yet 
disclosed the intended destination country.

I have explained to Mr. Niroula that I will take no part in his escape 
plans, or with providing him with any information whatsoever about 
tamping with his or other peoples tracking bracelets. In the past (at 
time periods before Mr. Niroula was arrested, or even in this country), 
I have written and publicly published white papers and articles in 
regards to flaws in “House Arrest” type of GPS tracking bracelets which 
render then prone to false data, render them vulnerable to removal 
without detection, and how wireless garage door openers and wireless 
thermometers can interfere with the tracking bracelets and how an 
offender can “slip the control of the tracking system” and then return 
to it undetected at a later time with no indication that the device has 
been subverted. Mr. Niroula has mentioned these writings to me 
face-to-face, but I felt it would be irresponsible to discuss the 
writings with him at this time, given his current incarceration 
situation, and his stated express scheme to be place under the 
constraint of such a system, which he had an interest in subverting.

Also, outside of a privileged relationship Mr. Niroula or his legal 
runner (in early 2011) has repeatedly ask me to provide him with 
information in regards to subverting the tracking of cellular 
telephones, which I refused to share with him. He now attempts to gain 
access to this same information under the guise of getting me to testify 
in regards to “Cell Phone Tower Pinging Faking” as listed on line 14, on 
page 2, of the order of this court dated August 10, 2011. While I am 
happy to testify in court as to the methods used to track cell phone 
movements, the intelligence analysis of this data, the use of this data 
in criminal investigation, of the proper procurement of this technical 
data from the cellular phone service providers, and how investigators 
have tampered with or tainted evidence in the past, and how this 
tampering or faking can be detected, and who there may be such tampering 
in this case. But, I have not yet agreed to provide him this 
information, or to study the records of the case, or to provide reports or 
testimony on the matter.

Proposed Invoice For Technical Services
Based on the Order of this Court Dated August 10, 2012
(and received in to my hands on August 14, 2012)

To obtain a better idea of what the charges would be, for the services 
described in the Order of this Court dated August 10, 2012, I have 
broken down the tasks list in the order, and we will assume for the time 
that an hourly rate of $150 per hour applies.

$37,500 - 250 hrs [at] $150 per hour – Review of all court transcripts, and 
then coaching KN on TSCM and Electronic Surveillance Related Matters 
face-to-face at the Indio Jail, and sit next to him at the Defendant 
table in Superior Court for the duration of this trial. In court 
testimony as to findings.

$24,000 - 160 hrs [at] $150 per hour – Review of Cell Phone Records, Tower 
Dumps, and Cell Phone “Pings” and to review, testimony, reports and 
transcripts. In court testimony as to findings.

$277,500 -1850 hrs [at] $150 per hour – Design, Program, and Compile a 
program in C++ or Objective C on a Apple Computer called “HYDRA” to 
simulate a computer based internet “hive” or “cloud”, and then to place 
this program on a dedicated computer, and to populate this computer with 
COURT SUPPLIED child pornography in the form of photographs and videos 
of child having sex with other children, adults having sex with 
children, which may include photographs and videos of the Defendants 
themselves (or images created by the defendants for the purposes of 
blackmail and extortion) in this and related cases having sex with 
minors within the jurisdiction of this court, or of the Federal courts, 
and also outside of the jurisdiction of the United States of America, 
but with the files in question currently residing within the 
jurisdiction of this court. Also to provide extensive court testimony 
and demonstration as to findings.

As I already possess knowledge of the “HYDRA” product obtained outside 
of a protected, privileged, or proprietary relationship. I have reason 
to believe that I possess a working knowledge of the proposed operation 
and function, and that based on my education, training, and experience I 
have good reason that the secret to HYDRA is a vast library possessed by 
Mr. Garcia and Mr. Niroula, and others, of a huge collection of child 
pornography that has been amassed on hard drives by Daniel Garcia and 
his Associates.

Thus, it would be improper for the court to order me to be compelled 
into a business contract with Mr. Garcia as is ordered by the court in 
it order dated August 10, 2012. Indeed, as an ethic matter I must 
respectfully refuse to comply with the order of the court in regards to 
signing any such contract confected by either Daniel Garcia or Kaushal 
Niroula, and will recognize only a protective authored by the court and 
order issue to me by this Honorable Court to perform this project, and 
not to divulge the secrets of the program beyond that which is already 
known to me.

Instead, a Protective Order from this court would be more proper in this 
matter, which would protect only those secrets or details that I do not 
already have knowledge of. This order would need to state that I already 
hold a working knowledge of the Hydra program, in that I understand the 
means and mechanism and algorithms which they intend to use, and how 
they intend to use it, but also that at present the program itself does 
not exist, merely the massive library of child pornography that will feed it.

Further, as I have good reason to believe that the “HYDRA” computer 
program is in fact a massive library of child pornography which has been 
compiled by the defendants, I thus request of this court issue a very specific 
work order that permits me to possess this court provided child pornography 
(from the computers and drives in police custody) for the sole purposes of 
integrating it as raw data files into a program called HYDRA which I will 
write or modify in order to comply with your order dated August 10, 2012.

Based on my prior education, and training, I have good reason to suspect 
that the “HYDRA” project is in fact a mechanism to suspect fraud, 
extortion, and a massive library of child pornography, with which the 
defendants appear to intend to use extortion, fraud, and blackmail 
against those adults who have taken part in the production and trafficking 
in child pornography, to suggest that this includes videos and 
photographs of child pornography actually produced by the defendants as 
a tool of extortion and blackmail.

I would urge the court to tightly constrain what is done by the 
Defendants with the data on the hard drives which the defendants intend 
and propose to provide to me. For example, as the court will be paying 
for the development of this program, and the Defendants merely supply raw 
data (possession of which is a serious federal felony), and I would need 
to perform this work directly for the court, and not for the defendants, 
and as the county would be paying for the development, the county could  
then claim ownership of the program, and once operational provide both 
the data and the program to the State, County, of Federal Task Forces 
which deal with child pornography issues.

Also, unless I have a specific order from this court that recognizes 
that contraband child pornography is present on these hard drives and 
data files, and the court authorized me to be in possession of this 
materials I will formally refuse to have any part in the “HYDRA” project.

$54,000 - 360 hrs [at] $150 per hour - Technical investigation of the 
computer and external hard drive and thumb drives of Daniel Garcia, to 
detect and isolated eavesdropping software, or files that resulted from 
eavesdropping. {120 hours to examine the computer itself, 240 hours to 
examine the external hard drive). In court testimony and demonstration 
as to findings.

$90,000 - 600 hrs [at] $150 per hour - Technical investigation of the 
computer and wireless networks present in the courtroom, and the 
evaluation of all computers active on the network segment which provides 
connectivity to and from the courtroom, and to all computers thereon to 
detect eavesdropping software or eavesdropping files. Then detect 
illicit network eavesdropping and then to seize and mirror the computers 
so identified, and to deliver these computer to the court. In court 
testimony and demonstration as to findings.

Thusly, the proposed projects, at the $150 per hour rate will be $483,500, 
plus expenses of $141,450 or a total of $624,950

This does not include the inspection of the Attorney-Client booths that 
Mr. Niroula has also requested, nor the seized and examinations of GTL 
computers and servers, which this court orders, but there was no mention 
of payment in the orders these orders. Nor does there appear to have been 
any proper requests from this court to the Federal Courts to request the 
assistance of the U.S. Marshals nor of the Federal Courts as of yet.

I must also respectfully remind the court that I am physically located 
in Massachusetts, and that the authority of this honorable court does 
not extend beyond the borders of California. I am happy to provide 
services to this court, but I also have to be paid for my service.

I do not work for free, nor can I be considered a fool.

Thank You for understanding,

Respectfully

James M. Atkinson

--
James M. Atkinson. President and Sr. Engineer
"Leonardo da Vinci of Bug Sweeps and Spy Hunting"
http://www.linkedin.com/profile/view?id=15178662

Granite Island Group          http://www.tscm.com/
(978) 546-3803                jmatk[at]tscm.com
(978) 381-9111

 


 

 

 


 

 

 


	

SECRET – Afghan National Army and Coalition Forces Partnership in Khost and Paktiya

https://publicintelligence.net/wp-content/uploads/2012/08/USArmy-HTS-ANAPartnership.png

(U) Members of Human Terrain Team AF01 embedded with a U.S. cavalry squadron from November to December 2011. Our goal was to understand the dynamics that influence partnering between the Afghan National Army (ANA) and Coalition Forces (CF) and how those dynamics impacted ANA effectiveness in gaining the Afghan population’s support. We conducted 22 interviews with U.S. Army personnel, including U.S. enlisted Soldiers and officers, U.S. troop commanders, police trainers, and ANA mentors. In addition, we conducted 21 interviews with high- and low-ranking ANA enlisted Soldiers and officers and Afghan police officers. We accompanied U.S. forces on non-kinetic missions to villages throughout Khost and Paktiya to gather perceptions from the Afghan civilian population. We also distributed a survey to three U.S. Cavalry companies (N=57). These data, along with research from secondary sources, informed the findings presented in this paper.

(U) A recent study by Bordin (2011)2 has drawn attention to “green on blue” hostility. While we acknowledge that his findings are probably an accurate reflection of Soldier views, we disagree with his conclusion that CF and ANA may be “culturally incompatible.” Instead, we are very optimistic that with the right training and leadership, cultural barriers can be overcome. Partnership, if correctly executed, can combine the strengths of Afghan and CF units such that each partner benefits from, and is bolstered by, the other. Afghan National Security Force (ANSF) development can become a force multiplier, not a trade-off, in efforts to defeat the insurgency. While our study, like Bordin’s, does highlight some uncomfortable truths about partnership, we hope that as much as we have criticized current efforts, we have equally acknowledged the challenges facing Soldiers at all levels, and provided helpful solutions that begin to address how these can be overcome.

(U) Key Findings:

Three factors: Motivation, Training, and Dependence begin to explain variation in ANA performance. Closer partnership can increase CF understanding of these factors, and more. Increased understanding is needed in order to improve ANA performance and readiness for transition. The squadron with whom HTT embedded prioritized ANA development but faced at least two key obstacles that could not have been overcome without external intervention or support:

1. Due to geographic separation of headquarters, they could not benefit from regular Afghan contributions to their planning processes. This created an asymmetric relationship, with U.S. unilateral planning driving the vast majority of operations.

2. A focus on ANA deficiencies in meeting U.S. expectations, due to metric reporting that ignores Afghan knowledge of and interactions with the human terrain, led them to overlook uniquely Afghan strengths that could have improved their planning process. Existing CF measurement instruments, such as the Commander’s Unit Assessment Tool (CUAT) and the Tactical Conflict Assessment and Planning Framework (TCAPF), provide indicators of ANSF performance and effectiveness, but both lack reporting on population perceptions of the ANSF and are therefore incomplete measures of ANSF’s effectiveness in counterinsurgency. This deficiency in data collection should be addressed. Initial findings indicate that CF and Afghan perceptions do not match up when it comes to views of the ANA and the Afghan police. CF rate the police as more professional, but Afghans favor the ANA. This is a reflection of CF preferences for police tactics and frustration with ANA unwillingness to use CF warfighting tactics, such as searching homes or religious buildings for weapons caches. HTT’s assessment of COP Wilderness found that success lay in a combination of clear guidance, metrics to provide accountability, and regular assessments, along with a shared mission. At COP Wilderness, the U.S. Troop Commander recognized the benefits of partnered training, operations, and social activities.

(U) Recommendations: Collocating partnered units is the single most critical adjustment to current operations that would vastly improve opportunities for partnering. Give CF a better idea of “what right looks like” in their pre-deployment training. Create metrics to measure the quality and closeness of partnership and include them in Soldiers’ regular reporting to incentivize them to improve current efforts. Because ANSF is on the frontline of building public confidence in the Afghan government, we recommend the rapid development of better metrics to measure both partnership and ANSF effectiveness. CF should track population perceptions in order to ensure that their measures of performance and effectiveness resonate with Afghans. Better incorporate Afghan input into CF planning. By this we mean not just obtaining Afghan buy-in to a CF plan, but inserting their ideas, especially those regarding the human terrain, into the planning process. In this way, CF can leverage the ANA’s strengths—knowledge of, and legitimacy with, the Afghan population—rather than focusing on improving their weaknesses. Leverage the ANA’s knowledge of the human terrain, knowledge of the local culture, and lessons about how to shift operations to being more population-centric. CF training and joint operations with the ANSF should be tailored to address the issue of ANSF legitimacy and the population’s perception of the ANSF’s ability to improve security and stability.

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

USArmy-HTS-ANAPartnership

Irina Shayk Body Painting-Sports Illustrated Swimsuit – Video

Irina Shayk Body Painting Shoot, SI Swimsuit 2009

The Structure of the STASI – Die Struktur der STASI – PDF – Free Download

DOWNLOAD ORIGINAL DOCUMENT HERE:

struktur-mfs

TMZ – US Olympian Runs 5 Minute Mile… while POUNDING BEERS!

US Olympian Nick Symmonds ran a mile in a little over 5 minutes… while chugging a beer at every lap! Yes, our Olympians certainly make America proud.

SECRET – Cryptome unveils Military Police Civil Disturbance Operations

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

mp-civil-disturbance-ops-1

Serial Killer – San Francisco Slaughter – The Zodia Killer solved – Full Movie

Richard Gaikowski, the infamous Zodiac Serial Killer solved.

SECRET – Restricted U.S. Army Air Defense Artillery Reference Handbook

https://publicintelligence.net/wp-content/uploads/2012/08/USArmy-ADA-Handbook.png

 

The purpose of this field manual (FM) is to familiarize personnel with air defense artillery (ADA) operations and weapon systems and their roles in air and missile defense (AMD). This publication is intended for personnel serving in the following positions:

  • Staff positions requiring general knowledge of ADA systems and operations.
  • Instructor positions in service schools and the Reserve Officer Training Corps.
  • Members of advisory elements and groups assigned to missions in foreign countries.
  • Advisory positions in reserve component forces.
  • Command and leadership positions in special operations force units.
  • Executive positions and advisory positions that require knowledge of air defense subjects.

Readers are reminded that weapon systems and operations are continually changing. Publications such as interactive electronic technical manuals, table(s) of organization and equipment (TOE), and mission training plans provide more detailed information on specific subjects. Many of these sources are referred to in appropriate sections of this FM.

AIR DEFENSE ARTILLERY MISSION

The mission of U.S. Army ADA is to protect the force and selected geopolitical assets from aerial attack, missile attack, and surveillance using AMD mission sets. The four mission sets are—

  • Provide AMD.
  • Contribute to situational awareness/situational understanding (SA/SU).
  • Contribute to Airspace Command and Control (AC2).
  • Contribute to operational protection.

AIR AND MISSILE DEFENSE MISSION

Army ADA forces, fighting interdependently with other elements of the joint, interagency, and multinational (JIM) team at strategic, operational, and tactical levels, provide critical air and missile defense. They also contribute to SA and SU, airspace management, and operational force protection to deter or defeat enemy aerial threats, protect the force and high-value assets, enable freedom to maneuver, and contribute to victory. The four elements of the AMD mission statement—Dominate, Enable, Exploit, and Protect—have specific meanings within the context of Army ADA. These elements are imperative to focus on ADA transformation for the future. The Dominate-Enable-Exploit-Protect cycle contributes synergistically to support JIM operations. Army ADA transformation will address capability gaps as part of a larger joint AMD transformation effort. ADA commanders allocate active and reserve air defense (AD) component assets based on the supported commander’s priorities. The mission is designed to include protection of critical assets, installations, and facilities along with the joint and multinational forces when required.

GEOPOLITICAL ASSETS

Geopolitical assets are nonmilitary assets that U.S., allied, or host nation civil authorities nominate for AMD protection. These assets can be political, religious, ethnic, historical, or territorial in nature. Since protection of geopolitical assets may not directly support military operations, the integration of geopolitical assets into the AMD priorities list must be accomplished at the highest levels.

THREAT

The evolving AMD threat will take on new characteristics. The major threat to deployed U.S. forces will continue to be that of regional powers as they seek to dominate their respective regions. Adversaries will continue to closely observe emerging U.S. capabilities in an effort to identify and exploit weaknesses using asymmetric approaches. Chemical, biological, radiological, and nuclear (CBRN) weapons proliferation and their delivery means (particularly ballistic and cruise missiles [BMs and CMs]), stealth capabilities, and the employment of unmanned aircraft systems (UASs) will improve their military forces and the asymmetric options available to them when facing the U.S. and its allies and coalition partners.

Fundamental capabilities that adversaries may pursue to counter U.S. strengths include, but are not limited to, weapons of mass destruction, unmanned intelligence, surveillance, and reconnaissance (ISR) target acquisition platforms, UASs, large numbers of inexpensive rockets, low-observable cruise missiles, and information warfare. Some states may rely on asymmetric capabilities as a substitute for, or complement to, large conventional forces. Regional competition reinforces the perceived need to acquire unmanned systems that provide high operational effectiveness for nominal cost.

AIR AND MISSILE DEFENSE OPERATIONS

AMD operations are inherently joint operations, multicomponent, and embody Army doctrine. ADA forces are versatile, agile, and fight throughout the depth of the theater of operations. Through aggressive planning and carefully coordinated execution of the plan, the ADA assets allow the commander at any level to seize and maintain the initiative. Commanders integrate AMD operations into campaigns fought at the operational and tactical engagement levels.

Successful AMD operations are the key to generating and sustaining combat power in force projection operations. The ADA contribution to friendly efforts to counter threat reconnaissance, surveillance, and target acquisition (RSTA) and identification efforts establishes a greater emphasis on current Army ADA capabilities. Both active and reserve components must synergistically combine with AD assets of other services to defeat the multifaceted threat. The Army AD forces participate in operations at all levels of war.

This FM describes ADA weapon systems currently in the force. Short-range air defense (SHORAD) weapons are employed in support of maneuver forces. They defend personnel and assets against attack by enemy aerial platforms. They are also employed to defend air bases, forces, key installation, and other vital assets. SHORAD weapon systems include Avenger and Stinger. The Patriot system is deployed to defend theater and corps commanders’ assets. Patriot provides protection against airborne threats from very low to very high altitudes. The terminal high-altitude area defense (THAAD) system is also deployed to defend theater and corps commander’s assets. THAAD serves as a high-altitude defense against BMs. It is capable of detecting and intercepting BM threats in and above the atmosphere.

Also described in this FM are the Sentinel radar sensor system, the air defense and airspace management (ADAM) cell, and the training devices and aerial targets used to train Soldiers to promote skills, knowledge, and expertise required to maintain their proficiency with the above-mentioned ADA systems.

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

USArmy-ADA-Handbook

MORD-DROHUNG WG PUBLIKATION DER STASI-LISTEN MIT KLARNAMEN

http://www.victims-opfer.com/?p=22649

SI Swimsuit Video Calendar – Sexy, Steamy and Hot !

TMZ – Lindsay Lohan — Staying Away from Trouble

Since Lindsay Lohan is involved in yet ANOTHER potentially dangerous legal situation involving stolen jewelry — she decided to pack up her bags and get the HELL out of town!

Unveiled by Cryptome and the Media – Free Syria Army Photos

Free Syria Army Photos

[Image]

Members of the Free Syrian Army clash with Syrian army soldiers in Aleppo’s Saif al-Dawla district, August 22, 2012. In Syria, Assad’s forces have lost swathes of territory in recent months, but have fought back hard in Damascus and in Aleppo, the country’s biggest city and commercial hub until it. became a theatre for urban warfare. Reuters

[Image]

A member of the Free Syrian Army aims his rifle as he uses doors as shield during clashes with Syrian army soldiers in Aleppo’s Saif al-Dawla district, August 22, 2012. Reuters

[Image]

Members of the Free Syrian Army take up positions as they observe the area during clashes with Syrian army soldiers in Aleppo’s Saif al-Dawla district, August 22, 2012. Reuters

[Image]

A member of the Free Syrian Army walks through a hole in a wall during clashes with Syrian army soldiers in Aleppo’s Saif al-Dawla district, August 22, 2012. Reuters

[Image]

Members of the Free Syrian Army exchange places as they take cover during clashes with Syrian army soldiers in Aleppo’s Saif al-Dawla district, August 22, 2012. Reuters

[Image]

[Image]

Members of the Free Syrian Army transport the body of their comrade outside a hospital in Aleppo’s district of Bustan Al Qasr, August 21, 2012. According to the them, their comrade was killed by shelling from forces loyal to Syria’s President Bashar al-Assad. Reuters

[Image]

Members of the Free Syrian Army watch as a man mourns the death of his relative, whom according to activists, was killed by shelling from forces loyal to Syria’s President Bashar al-Assad, in Aleppo’s district of Bustan Al Qasr, August 21, 2012. Reuters

[Image]

A member of the Free Syrian Army prepares his anti-aircraft machine gun in Aleppo’s Saif al-Dawla district August 20, 2012. United Nations military observers left Damascus on Monday after a four-month mission in which they became helpless spectators of Syria’s spiralling conflict, instead of monitoring a ceasefire between President Bashar al-Assad’s forces and rebels. Reuters

[Image]

Members of the Free Syrian Army prepare their weapons in Aleppo’s Saif al-Dawla district August 20, 2012.  Reuters

[Image]

A member of the Free Syrian Army reloads a weapon during clashes with Syrian Army soldiers in Aleppo’s Saif al-Dawla district, August 20, 2012. U.S. forces could move against Syrian leader Bashar al-Assad, President Barack Obama warned, notably if he deploys his chemical weapons against rebels trying to overthrow him.  Reuters

[Image]

Members of the Free Syrian Army reload weapons during clashes with Syrian Army soldiers in Aleppo’s Saif al-Dawla district, August 20, 2012.  Reuters

[Image]

A Member of the Free Syrian Army fires during clashes with Syrian Army soldiers as others take positions in Aleppo’s Saif al-Dawla district, August 20, 2012. U.S. forces could move against Syrian leader Bashar al-Assad, President Barack Obama warned, notably if he deploys his chemical weapons against rebels trying to overthrow him. Reuters

[Image]

A Member of the Free Syrian Army runs to take cover during clashes with Syrian Army soldiers in Aleppo’s Saif al-Dawla district, August 20, 2012.  Reuters

[Image]

Members of the Free Syrian Army discuss strategies in Aleppo’s Saif al-Dawla district, August 20, 2012.  Reuters

[Image]

Members of the Free Syrian Army prepare anti-aircraft machine guns to shoot at a Syrian military aircraft in the Salaheddine neighbourhood of central Aleppo, August 19, 2012. Reuters

[Image]

A rebel sits in a van as they check the area in the northern Syrian city of Aleppo on August 19, 2012, on the first day of the Eid al-Fitr, marking the end of the holy month of Ramadan.  Getty

[Image]

A rebel takes position from one of their forward positions against snipers of the Syrian government forces in Castal Harami area of the city of Aleppo, on August 18, 2012. Getty

[Image]

Rebels take position from one of their forward positions against snipers of the Syrian government forces in Castal Harami area of the city of Aleppo, on August 18, 2012. Getty

[Image]

A rebel runs across the street at the check point in the city in Aleppo on August 18, 2012. Syrian helicopters dropped leaflets over the city urging residents not to shelter rebels and warning the Free Syrian Army it had one last chance to surrender.

[Image]

Members of the Free Syrian Army hold their rifles as they secure a street in the Damascus suburb of Saqba August 17, 2012. Syria’s government and rebels have “chosen the path of war”, a U.N. peacekeeping chief said as the world body ended its doomed monitoring mission to Damascus and deadlock persists among world powers over how to contain the spreading conflict. Reuters

[Image]

A member of the Free Syrian Army holds a rocket-propelled grenade as he secures a street in the Damascus suburb of Saqba August 17, 2012. Syria’s government and rebels have “chosen the path of war”, a U.N. peacekeeping chief said as the world body ended its doomed monitoring mission to Damascus and deadlock persists among world powers over how to contain the spreading conflict. Reuters

[Image]

This image made from amateur video released by the Syrian Observatory for Human Rights and accessed Monday, Aug. 13, 2012, purports to show a Free Syrian Army soldier firing a recoilless rifle during clashes with Syrian government forces at the village of Mukhtariya in the suburbs of Homs, Syria. AP

[Image]

In this video image three Free Syria Army members take up fighting positions, with a civilian running past, in Aleppo, Syria Tuesday 14, 2012. The U.N. says an estimated 2.5 million Syrians have been injured, displaced or face problems securing food or other necessities, a sharp rise from about 1 million three months ago. “There is an ongoing humanitarian crisis,” said the U.N. humanitarian chief Valerie Amos after meetings in Damascus to try to open routes for more international aid into Syria.”It is important that the fighting stops.” AP

[Image]

A Syrian man chants slogans during the funeral of 29 year-old Free Syrian Army fighter, Husain Al-Ali, who was killed during clashes in Aleppo, in the town of Marea on the outskirts of Aleppo city, Syria, Thursday, Aug. 9, 2012. AP

[Image]

In this Sunday Aug. 5, 2012 photo, a Free Syrian Army fighter holds his gun as he runs for cover during a mortar attack in the town of Atareb on the outskirts of Aleppo, Syria. AP

[Image]

This image made from amateur video released by Tabshoor1 and accessed Tuesday, July 31, 2012, purports to show Free Syrian Army soldiers executing Assad loyalists in Aleppo, Syria. A gruesome video apparently showing rebels gunning down Assad loyalists in Aleppo this week has fueled concerns that opposition fighters in Syria are capable of brutality that matches that of the regime they are fighting to topple. AP

[Image]

In this Tuesday, July 31, 2012 photo, Free Syrian Army soldiers carry the body of a comrade killed in Aleppo, Syria. Syrian troops launched a ground assault Wednesday on the besieged northern city of Aleppo, but activists said rebels forces were fighting back in a battle for the country’s largest city that has raged for more than two weeks. AP

[Image]

Members of the Free Syrian Army fighters pose near destroyed tank after clashes with forces loyal to Syria’s President Bashar al-Assad at al-Rasten, near Homs, July 25, 2012. Reuters

Jack The Ripper 2012 – Full Documentary

Has The Ripper case finally been solved 100%?

 

TOP-SECRET – Restricted U.S. Army Reconnaissance and Scout Platoon Manual

https://publicintelligence.net/wp-content/uploads/2012/08/USArmy-ReconScoutPatrol.png

 

FM 3-20.98 provides basic tactics, techniques, and procedures (TTP) for the tactical employment of the reconnaissance and scout platoons of the reconnaissance squadrons in the heavy, infantry, and Stryker brigade combat teams (HBCT, IBCT, and SBCT) as well as the battlefield surveillance brigade’s (BFSB) reconnaissance and surveillance squadron and the cavalry squadron of the armored cavalry regiment (ACR).

This publication—

• Provides doctrinal guidance for commanders and leaders of the currently transitioning organizations who are responsible for planning, preparing, executing, and assessing operations in the reconnaissance and scout platoons.
• Serves as an authoritative reference for personnel developing doctrine (fundamental principles and TTP), materiel and force structure, institutional and unit training, and standing operating procedures (SOP) for reconnaissance and scout platoon operations. It does not, however, cover deployment; reception, staging, onward movement, and integration; or redeployment operations.
• Describes doctrine that is based on suggestions, insights, and observations from previously developed doctrine and from units and leaders taking part both in operational situations, such as Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF), and in training at the Army’s combat training centers. These doctrinal principles and procedures are intended to be used as a guide and are not to be considered inflexible. Each situation in combat must be resolved by an intelligent interpretation and application of the doctrine outlined in this manual.
• Is directed toward the reconnaissance and scout platoon leader and platoon sergeant (PSG). The manual reflects and supports Army operations doctrine as covered in FM 3-0, Operations; FM 3-90, Tactics; FM 3-90.6, The Brigade Combat Team; and FM 3-20.96, Reconnaissance Squadron. It is not a stand-alone reference for reconnaissance and scout platoon operations; rather, it is intended to be used in conjunction with those and other existing doctrinal resources.
• Outlines the framework in which the five types of reconnaissance and scout platoons (HBCT, IBCT, SBCT, BFSB, and ACR) will operate, either by themselves or together as part of the troop or larger organization. The manual also includes discussions of doctrine that is applicable to each specific type of platoon.

THE OE IN RECONNAISSANCE OPERATIONS

3-33. Reconnaissance and scout platoons must be prepared to operate beyond the traditional roles of reconnaissance, surveillance, and target acquisition of enemy forces. Today, scouts must adjust their traditional roles to fulfill the broader mission of providing SU in its fullest sense. This involves an understanding of the OE in all its aspects, covering political, economic, social, information, infrastructure, physical environment, and time variables in addition to the military aspects of the OE. This multidimensional requirement means that the platoon must develop an understanding of what is happening and why. In the asymmetric environment, identifying enemy centers of gravity, decisive points, and the means to influence the enemy’s will and behavior—while observing proper ROE—is one of the most important contributions that the platoon can make to ensure successful mission accomplishment. For more information on the OE, refer to FM 3-0.

NONTRADITIONAL ASPECTS OF THE OE

3-34. The Army has traditionally focused its efforts on traditional combat operations, based on open terrain, force-on-force battles, and symmetrical enemy formations, focusing on gaining information on the enemy and terrain. Platoon planning, however, must expand to include nontraditional aspects of OE variables that could influence its operations.

Asymmetric Warfare

3-35. Conditions in the new millennium, coupled with the technological developments of the information age, raise the specter of asymmetric warfare, a concept in which a weak opponent successfully engages a stronger opponent using a variety of non-conventional TTPs. The goal is to gain an advantage in hopes of achieving the weaker force’s objectives and goals. Asymmetric threats include—

  • Regional military forces.
  • Paramilitary forces.
  • Guerrillas and insurgents.
  • Terrorists.
  • Criminal groups.
  • Certain civilian groups and individuals.
  • Political parties.
  • Religious groups.

3-36. Threat elements will use a number of nontraditional approaches in conducting asymmetric warfare, including the following:

  • Information operations (IO).
  • Weapons of mass destruction (WMD).
  • Operations in complex terrain.
  • Civilian involvement (include hiding within the population and staging evasive attacks).

Urban Considerations

3-37. The urban environment confronts commanders with a combination of difficulties rarely found in other settings in which the Army conducts operations. The distinct characteristics of the urban environment are primarily a function of the following factors:

  • The increasing size and global prevalence of urban areas.
  • The combinations of man-made features and supporting infrastructure superimposed on the existing natural terrain.
  • The density of civilians in close proximity to combat forces.

3-38. The human dimension represents potentially the most important and the most perplexing factor for commanders to understand and evaluate. Although urban terrain is complex, understanding it is a relatively straightforward process in comparison to comprehending the multifaceted nature of urban society. The urban environment is, first, a human environment. That makes it different from all other types. An urban environment is not solely defined by its structures or systems but by the people who compose it. It reacts and interacts with an army in ways that no natural environment can.

3-39. Military operations often require Army forces to operate in close proximity to a high density of civilians, whose presence, attitudes, actions, and needs in turn affect the conduct of operations. Civilian populations continually influence, to varying degrees, military operations within an AO. As urban areas increase in size, they become less and less homogenous; therefore, commanders must understand and account for the characteristics of a diverse population whose beliefs and actions may vary based on many factors. Improving communications with the local population (especially using interpreters) can improve intelligence gathering and win acceptance of the platoon within that AO. Security requirements might change when these personnel are on vehicles and around digital communication systems.

3-40. The decisive terrain during a military operation, particularly in stability operations, may be the civilian inhabitants themselves. To gain and/or retain the support of the civilian population, commanders must first understand (through reconnaissance) the complex nature and character of the urban society and its infrastructure. Scouts must then understand and accept that every military action (or inaction) may influence, positively or negatively, the relationship between the urban population and Army forces and, by extension, have a significant impact on mission success. With this awareness, commanders visualize decisions they must make, plan operations, and implement programs. They can take immediate action to maintain support of a friendly populace, gain the support of neutral factions, or neutralize hostile elements. Unit continuity books maintaining feedback on past operations within the area will provide insight on past successful and unsuccessful missions and their results.

HUMINT OPERATIONAL CONSIDERATIONS

3-152. HUMINT is a category of intelligence derived from information collected and provided by human sources. It uses human sources as a tool and a variety of collection methods, both passive and active, to gather information to satisfy the commander’s intelligence requirements and cue other intelligence disciplines. HUMINT tasks include, but are not limited to, the following:

  • Source operations using tactical and other developed sources.
  • Liaison with HN officials and allied counterparts.
  • Elicitation of information from the civilian populace, including transients.
  • Identification of individuals as potential force protection sources.
  • Debriefing of U.S. and allied forces and civilian personnel.
  • Interrogation of EPWs and detainees.
  • Information operations.
  • Translation and exploitation of threat documents, media, and other materials.

3-153. All reconnaissance and scout platoon leaders can expect to conduct some form of HCT collection activities to gather the information needed to make decisions in support of the overall mission. HUMINT activities help the platoon leader shape the AO by providing information that enables him to respond to previously unforeseen threats. He focuses the HUMINT effort by carefully assigning missions and clearly defining the desired results. In orienting the unit’s HUMINT efforts and capabilities, the platoon leader must decide who or what will be advantageous targets for collection activities. As noted, only the SBCT reconnaissance platoon has organic HUMINT personnel.

Role of HUMINT Collectors

3-154. The SBCT platoon’s HUMINT Soldiers, who can be augmented by interrogators (from the MICO) when available, conduct collection operations in support of the overall mission. These operations rely on the use of both casual and recruited sources of information. The collection effort includes liaison activities; the debriefing of refugees, detainees, and EPWs; review of open source literature; and DOMEX. HUMINT collectors directly support SE and subsequent intelligence gathering operations against the enemy. These operations use the techniques identified in FM 34-5 and FM 2-22.3. Other resources include AR 381-172, which covers policy concerning counterintelligence force protection source operations (CFSO), and AR 381-10, which outlines policies and procedures governing the conduct of intelligence activities by the Army.

HUMINT Sources

3-156. Platoon leaders should be familiar with the types of sources HUMINT personnel will use to satisfy command PIR:

  • Casual source. A casual source is one who, by social or professional position, has access to information of CI interest, usually on a continuing basis. Casual sources usually can be relied on to provide information that is routinely available to them. Casual sources include private citizens, such as retired officials or other prominent residents of an area.
  • Official sources. These are liaison contacts. CI personnel conduct liaison with foreign and domestic CI, intelligence, security, and law enforcement agencies to exchange information and obtain assistance. CI personnel focus on investigative, operational, and threat information.
  • Recruited sources. These include sources who support CFSO, as identified in FM 34-5. By design, CFSOs entail the use of human source networks, dispersed throughout the area that can provide timely and pertinent force protection information.
  • Refugees, detainees, and EPWs. Interrogators normally conduct collection operations with these sources, often with technical assistance from a CI agent.
  • Open source publications. These printed materials, as well as radio and television broadcasts, are valuable sources of information of CI interest and operational information. Depending on the resources, this support can be provided by interrogation personnel, allied personnel, indigenous employees, or reserve component translators.
  • Documents not openly available. Such sources as adversary plans and reports are exploited in much the same way as open source publications.

Reconnaissance Support Activities

3-157. In military urban operations, people (EPWs and civilians) are the preeminent source of information. HUMINT collection provides information otherwise not available through SIGINT and image intelligence (IMINT). As an example, when a lodgment is made in a building, the HUMINT collectors:

  • Move in and interrogate EPWs.
  • Persuade holdouts to surrender.
  • Help with the questioning and evacuation of noncombatants.
  • Collect information on floor plans and defensive plans.
  • Determine locations of combatants and noncombatants in the area.

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

USArmy-ReconScoutPlatoon-2

ETHIKBANK distanziert sich von der STASI-“GoMoPa” und ihren dubiosen “Partnern” und IM”

https://berndpulch.org/wp-content/uploads/2011/08/image001.png

Video – SI Swimsuit: Jessica Gomes Body Painting

Jessica Gomes tells you about experience being a human canvas for the SI Swimsuit 2008 body painting shoot.
For more photos and videos visit http://www.si.com/swimsuit

TMZ – Booker T Wins the Internet

TMZ chatted with wrestler Booker T… the man responsible for the GREATEST VIDEO IN THE HISTORY OF THE INTERNET!

TMZ – Mel B — In a Thong, Covered in Oil !

Honestly, the title to this video pretty much says it all. Yes, it’s Mel B — in a thong, covered in oil! Enjoy!

TOP-SECRET – Mother and Son Admit $14 Million Credit Union Fraud

Richard S. Hartunian, United States Attorney for the Northern District of New York, and Clifford C. Holly, Special Agent in Charge of the Albany Division of the Federal Bureau of Investigation, make the following announcement:

Scott A. Lonzinski, 32, of Clifford Township, Susquehanna County, Pennsylvania, and his mother, Laura Conarton, 46, of Great Bend, Susquehanna County, Pennsylvania, pled guilty today in United States District Court to the felony crime of bank fraud.

In entering their guilty pleas before Senior United States District Court Judge Thomas J. McAvoy, both Lonzinski and Conarton admitted that, between July of 2009 and February of 2011, they perpetrated an elaborate fraudulent scheme to obtain a total of 10 loans from the Broome County Teacher’s Federal Credit Union (BCT) in the aggregate amount of over $14 million.

As part of the scheme, Lonzinski and Conarton created numerous phony documents, including false bank statements; forged signatures of people; made numerous false and fraudulent statements; and created a fictitious persona. The purpose of the scheme was to convince BCT that Certificates of Deposit allegedly held by Lonzinski at People’s National Bank, which were pledged as security for the loans from BCT, had a value at least equal to the amount of loans obtained from BCT. In fact, the Certificates of Deposit were fraudulently made and had no value.

During the period of the fraud, Lonzinski owned and operated a construction business where Conarton worked as manager and bookkeeper. The loan proceeds were used by Lonzinski and Conarton to finance Lonzinski’s construction business, to purchase vehicles for his business, to purchase and remodel Lonzinski’s primary residence, to acquire personal automobiles for Lonzinski, Conarton, and other family members, and to pay other business and personal expenses.

When the fraudulent scheme was uncovered during an examination by the National Credit Union Administration (NCUA), the federal agency that regulates and insures federally chartered credit unions, NCUA assumed responsibility for the day to day operations of the credit union. The assets of BCT were eventually sold to Visions Federal Credit Union. No members/clients of BCT lost money as a result of the liquidation of BCT.

During the investigation, bank accounts, real property, and automobiles were seized from the defendants. As a result of the seizures, more than $5 million in cash and property has been recovered, and will be used to make partial restitution in the case.

Lonzinski and Conarton both face a maximum sentence of 30 years’ imprisonment, and a maximum fine of $1 million. Sentencing is scheduled for Lonzinski December 19, 2012 and Conarton December 20, 2012.

The case was investigated by the Federal Bureau of Investigation, Albany Field Division, and is being prosecuted by Assistant United States Attorney Thomas P. Walsh.

The successful prosecution of Lonzinski and Conarton is part of an ongoing effort by the United States Attorney’s Office, the Federal Bureau of Investigation, and other federal law enforcement agencies to combat financial fraud. In just the last two years, the United States Attorney’s Office has resolved four other cases involving fraud losses over a million dollars, and brought two additional cases that each allege over $7 million frauds1:

  • Matthew John Ryan was sentenced to 121 months’ imprisonment based upon his plea to one count of securities fraud. As the owner of American Integrity Financial Co., Ryan sold investors contracts promising a guaranteed fixed rate of interest for a fixed term. Ryan obtained a mail drop to create the false impression that American Integrity had an office in Manhattan, used the names of fictitious employees in correspondence with investors, and falsely represented that their investments were insured up to specific dollar amounts. Ryan used more than $4.8 million that investors invested in American Integrity for multiple purposes he concealed from investors, including to repay real estate loans, to pay other investors’ purported returns or interest using the principal investments of other investors, and to pay his own personal expenses.
  • Arthur Strasnick was sentenced to imprisonment for 60 months and ordered to pay restitution of about $2 million upon his conviction of two counts of mail fraud and one count of aggravated identity theft. As president and CEO of Backstreet Associates, Inc., Strasnick obtained money from investors based on false representations relating to guaranteed rates of return, sent investors fabricated monthly account statements, and made periodic payments to investors that he falsely represented to be interest earned on their investments. Strasnick also defrauded homeowners by obtaining money representing equity in their homes through mortgages obtained by false pretenses and used the personal identification information of another to open and use an American Express credit account.
  • Christopher Bass was sentenced to imprisonment for 151 months and ordered to pay restitution of over $5.3 million upon his conviction of wire fraud and attempted tax evasion. Bass ran a fraudulent investment program involving the purchase and sale of securities to investors under the names Revisco Finance and Swiss Capital Harbor. More than 300 investors suffered pecuniary loss. Bass promised investors that their money would be sent to Europe for investment, but most of the deposits were disbursed to Bass or used to pay for his personal expenses, used to repay investors who demanded a return of their initial investment or distribution of the income allegedly earned, and/or used to pay for expenses incurred in operating the fraudulent investment program. Bass caused false periodic account statements to be issued that reported monthly returns and account balances and falsely represented that investments were insured, risk free, or protected by a cash reserve account.
  • Thomas E. Kelly was sentenced to imprisonment for 51 months upon his conviction of mail fraud. Kelly was a financial consultant who recommended that clients sell off legitimate securities investments in order to invest in a fictitious entity Kelly called Seneca Group. Kelly promised investors a stable, secure investment, but used the money invested in Seneca Group to make risky investments in the stock market and pay personal expenses. Investors lost about $1 million.
  • Timothy M. McGinn and David L. Smith are scheduled for trial in November on a 30 count indictment charging them with mail and wire fraud, securities fraud, and filing false income tax returns. The indictment alleges that McGinn and Smith misled investors regarding the safekeeping and use of investor money, the risks of the offerings, the performance of the underlying income streams, the source of investor payments, and the improper diversion of investor money in order to obtain money from investors and enrich themselves, with a loss to investors of about $8 million.
  • William A. Stehl and Richard M. Rossignol are charged with conspiracy to commit mail and wire fraud and other offenses in an indictment that alleges that they used false representations and promises to persuade others to invest money in companies that were purportedly developing or utilizing various applications of an alternative energy source, and thereby obtained more than $7 million from more than 300 investors, with most of the money used for personal expenditures by Stehl and Rossignol.

United States Attorney Hartunian said, “The road to financial ruin is paved by schemers who think they are just sly enough to take the money, line their pockets, and make enough to satisfy obligations before they are caught. But people suffer, often losing their savings, their retirement, or the money they need to meet expenses. We are dedicated to combating financial fraud, both to protect and assist those who are or would be victimized and to stop the far-reaching effects that undermine our financial system.”

Further inquiries may be directed to the United States Attorney’s Office, Binghamton branch office, at (607) 773-2887.

1 The pending indictments contain mere accusations, and the defendants are presumed innocent unless and until proven guilty beyond a reasonable doubt in a court of law.

Jeffrey Dahmer – The Secret Life 1993 – Full Movie

Jeffrey Dahmer: The Secret Life is an American true crime film, released in 1993. It starred Carl Crew as Jeffrey Dahmer, an American serial killer, necrophile and cannibal.
Other cast members include Christopher “CJ” Smith as young Jeffrey Dahmer, Donna Stewart Bowen as his mother and Jeanne Bascom as his grandmother. The film mainly focuses on the actual murders, as well as Dahmer’s violent pathology.

Revealed by Cryptome – @a_greenberg Leaks – This Machine Kills Secrets

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

greenberg-leaks-secrets

CONFIDENTIAL – U.S. Postal Service Operation Medicine Delivery Exercise Outcomes Summary

https://publicintelligence.net/wp-content/uploads/2012/08/USPS-OMD-Summary.png

 

The following document summarizes outcomes and lessons learned from an exercise conducted in May 2012 by the U.S. Postal Service and the Department of Health and Human Services in conjunction with the Minnesota Department of Health called Operation Medicine Delivery.  The exercise was the first test of the National Postal Model for the Delivery of Medical Countermeasures in the event of a biological attack.  For more information on the exercise, see Carlton Purvis’ article for Security Management magazine.

 

On May 5-6, 2012, the Minneapolis-St. Paul area conducted a major test of the National Postal Model for distribution of medicine to the public in an emergency, using U.S. Postal Service assets to supplement mass dispensing sites and other strategies. The May exercise, known as Operation Medicine Delivery, was the culmination of planning efforts that began in February 2004, with a memorandum of agreement signed by the U.S. Secretary of Health and Human Services, the U.S. Secretary of Homeland Security and the Postmaster General. Parties to the 2004 MOA agreed to make USPS resources available for distributing emergency medicine in response to a bioterrorist attack. A subsequent presidential executive order (December 2009) called for the development of a federal capability to distribute medical countermeasures (MCM) in response to a bioterrorist attack.

In February 2010, work was completed on the Minneapolis/St. Paul (MSP) Comprehensive Postal Plan, a blueprint for implementing the Postal Model in the Twin Cities area of Minnesota. A tabletop exercise (TTX) of the MSP Comprehensive Postal Plan was conducted in January 2011. Operation Medicine Delivery was conducted as a full-scale exercise (FSE) of the plan. The MSP Comprehensive Postal Plan was the first such plan in the nation, and OMD was the first full-scale exercise of the Postal Model. The concept had previously been tested, on a limited basis, in Boston, Philadelphia and Seattle.

 

Exercise Objectives

Activities undertaken in connection with Operation Medicine Delivery were evaluated based on the success of exercise participants in (1) implementing key elements of the MSP Comprehensive Postal Plan, and (2) meeting six key objectives chosen to reflect critical emergency response capabilities. The six exercise objectives were developed by the exercise planning team, specifically for Operation Medicine Delivery. These objectives included:

• Demonstrating the ability to establish and maintain an effective system for communicating with the public during an incident requiring activation of the MSP Comprehensive Postal Plan.
• Demonstrating the ability to alert, activate and assemble the necessary personnel, facilities and equipment to distribute simulated preventive antibiotics to residential mailing addresses in four Twin Cities ZIP codes.
• Testing the process for assembling law enforcement personnel involved in implementation of the MSP Comprehensive Postal Plan, and coordinating their activities with those of USPS personnel.
• Assessing the ability of exercise participants to activate and secure facilities used to receive, break down, distribute and dispense simulated supplies of preventive antibiotics.
• Testing the process for recovering and handling any undelivered supplies of simulated preventive antibiotics, and demobilizing postal operations that were activated in connection with the exercise.
• Testing the ability of exercise participants to maintain appropriate command and control over exercise activities, and maintain effective internal channels of communication, as described in the MSP Comprehensive Postal Plan.

Areas for Improvement

Exercise evaluators identified the following outcomes of Operation Medicine Delivery as primary areas for improvement:

• Clearer description of command and control structure in the plan. The overall command and control structure for the MSP Comprehensive Postal Plan, including the integration of local command elements, needs to be defined more clearly.
• Authority to reallocate and demobilize delivery teams in the field. Four different command entities had responsibility for the delivery teams – the Postal Emergency Operations Center, delivery unit managers, law enforcement command centers and law enforcement sergeants in the field. Greater clarity is needed regarding who has authority to reallocate (reassign) or demobilize the delivery teams.
• Clarification of terminology used to report completion of delivery routes. Issues related to reporting terminology created uncertainty regarding the completion of routes and affected the ability to quickly redeploy delivery teams to other routes.
• Lack of a process for reallocating delivery teams following route completion. Lack of a defined process for reallocating teams after they had completed their assigned routes delayed reallocation of teams to new routes by as much as 40 minutes.

The Stranger – Full Movie by and with Orson Welles and Edward G. Robinson – Loretta Young

The War Crimes Commission sends Wilson to find Franz Kindler, mastermind of the Holocaust, who has effectively erased his identity. Wilson releases Kindler’s former comrade Meinike and follows him to Harper, Connecticut, to track down Kindler. Unfortunately Meinike is murdered before he can identify Kindler. Wilson is only left with the knowledge of Kindler’s fascination with antique clocks as a lead

The Stranger is often considered Orson Welles‘ most “traditional” Hollywood-style directorial effort. Welles plays a college professor named Charles Rankin, who lives in a pastoral Connecticut town with his lovely wife Mary (Loretta Young). One afternoon, an extremely nervous German gentleman named Meineke (Konstantin Shayne) arrives in town. Professor Rankin seems disturbed–but not unduly so–by Meineke’s presence. He invites the stranger for a walk in the woods, and as they journey farther and farther away from the center of town, we learn that kindly professor Rankin is actually notorious Nazi war criminal Franz Kindler. Conscience-stricken by his own genocidal wartime activities, Meineke has come to town to beg his ex-superior Kindler to give himself up. The professor responds by brutally murdering his old associate. If Kindler believes himself safe–and he has every reason to do so, since no one in town, especially Mary, has any inkling of his previous life–he will change his mind in a hurry when mild-mannered war crimes commissioner Wilson (Edward G. Robinson) pays a visit, posing as an antiques dealer.

TMZ – Mariah Carey — FURIOUS Over Nicki Minaj Joining ‘American Idol’

Mariah Carey is PISSED OFF that Nicki Minaj may be the newest addition the judging panel on “American Idol”… but wait until she hears the OTHER person that may be joining the show!

TOP-SECRET from the FBI – California Hedge Fund Manager Doug Whitman Found Guilty

Preet Bharara, the United States Attorney for the Southern District of New York, announced that DOUG WHITMAN, a portfolio manager at Whitman Capital, LLC, was found guilty today by a jury in Manhattan federal court of conspiracy and securities fraud crimes stemming from his involvement in two insider trading schemes that earned his firm more than $900,000 in illegal profits. WHITMAN was convicted on all four counts with which he was charged. As part of the schemes, WHITMAN executed trades based on material, non-public information (“Inside Information”), related to three publicly traded companies: Marvell Technology Group, Ltd. (“Marvell”); Polycom, Inc. (“Polycom”); and Google, Inc. (“Google”). He was convicted after a three-week trial before U.S. District Judge Jed S. Rakoff.

Manhattan U.S. Attorney Preet Bharara said: “Douglas Whitman now joins the grim procession of convicted Wall Street professionals who decided that the rules don’t apply to them. The rules do apply. Over and over again, juries of good, common-sense citizens have said the rules do apply, and they have held defendants like Mr. Whitman accountable for breaking them. Mr. Whitman had a hedge fund with his name on the door, with rules against insider trading. He flouted those rules, tarnished his name, and now is a convicted felon facing imprisonment. I want to thank both the jury for their service and the fine career prosecutors from my office who so ably tried this case for their hard work and dedication.”

According to the indictment, evidence presented at Whitman’s trial, as well as testimony from other trials and court proceedings:

From 2007 through 2009, while running Whitman Capital, WHITMAN bought and sold Marvell stock and options based on Inside Information, including earnings, revenue, and/or other material financial and business information. The Inside Information was provided to WHITMAN by Karl Motey, an independent research consultant, who had obtained it from certain Marvell employees. In exchange for the Inside Information, WHITMAN paid Motey through a soft dollar payment arrangement between Whitman Capital and Motey’s consulting firm. WHITMAN also provided the Marvell Inside Information to Wesley Wang, in exchange for other Inside Information.

In another scheme, from 2006 to 2007, WHITMAN obtained Inside Information, including earnings information and other material financial information, pertaining to Polycom and Google from Roomy Khan, who worked in the hedge fund industry. Khan obtained the Polycom Inside Information from an employee at the company, and she obtained the Google Inside Information from an employee of a firm that provided investor relations services to Google. WHITMAN used the Polycom and Google Inside Information to execute securities transactions that earned his firm more than $900,000 in illegal profits. In exchange for the Inside Information, WHITMAN provided Khan with information about other publicly traded technology companies.

WHITMAN, 54, of Atherton, California, was convicted of two counts of conspiracy to commit securities fraud and two counts of securities fraud. Each of the conspiracy counts carries a maximum penalty of five years in prison and a fine of $250,000, or twice the gross gain or loss from the offense. Each of the securities fraud counts carries a maximum penalty of 20 years in prison and a maximum fine of $5 million. WHITMAN is scheduled to be sentenced by Judge Rakoff on December 20, 2012, at 4:00 p.m.

WHITMAN’s co-conspirators, Karl Motey, Roomy Khan, and Wesley Wang, previously pled guilty to insider trading charges and are awaiting sentencing.

Mr. Bharara praised the investigative work of the Federal Bureau of Investigation and thanked the U.S. Securities and Exchange Commission. He noted that the investigation is continuing.

This case was brought in coordination with President Barack Obama’s Financial Fraud Enforcement Task Force, on which Mr. Bharara serves as a co-chair of the Securities and Commodities Fraud Working Group. President Obama established the interagency Financial Fraud Enforcement Task Force to wage an aggressive, coordinated, and proactive effort to investigate and prosecute financial crimes. The task force includes representatives from a broad range of federal agencies, regulatory authorities, inspectors general, and state and local law enforcement who, working together, bring to bear a powerful array of criminal and civil enforcement resources. The task force is working to improve efforts across the federal executive branch, and with state and local partners, to investigate and prosecute significant financial crimes, ensure just and effective punishment for those who perpetrate financial crimes, combat discrimination in the lending and financial markets, and recover proceeds for victims of financial crimes.

This case is being handled by the Office’s Securities and Commodities Fraud Task Force. Assistant U.S. Attorneys Jillian Berman, Christopher LaVigne, and Micah Smith are in charge of the prosecution.

Statement of FBI Assistant Director Fedarcyk on conviction of Doug Whitman

TMZ – Hope Solo — The Doggy Dilemma

U.S. Women’s soccer goalie Hope Solo chatted with a TMZ camera guy about what the proper protocol is for telling someone that their pet dog ABSOLUTELY SUCKS!

Unveiled by Cryptome – CIA National Photo Interpretation Center 30 Yrs

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

cia-npic

The Communist STASI Law – Original Document – Das Stasi-Unterlagen-Gesetz − StUG im Original

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

stug_pdf

Video – FEMEN Activists Saw Down Cross in Kiev in Support of Pussy Riot

http://www.dailymotion.com/video/xswn22_femen-activists-saw-down-cross-in-kiev-in-support-of-pussy-riot_news?search_algo=2

Börse Online berichtet über “GoMoPa”

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

boerseonline_nr38_16-09-2010_wo_gehobelt_wird

Opfer berichetn über den “GoMoPa”_Gesellschaftsmüll und deren STASI-Background

http://www.victims-opfer.com/?p=31390

http://www.victims-opfer.com/?p=31305

Video – Sports Illustrated Swimsuit: Athletes Wives

Watch this exclusive video with Jeff Garcia’s, Carmelo Anthony’s and Johnny Damon’s wives, posing for the SI Swimsuit 2008 photo shoot.
For more photos and videos visit http://www.si.com/swimsuit

TMZ – Thomas Haden Church — A Choking Victim’s HERO!

Thomas Haden Church is not only a talented actor… he’s also a friggin’ HERO after saving a dude’s life when he was choking!

Unveiled – Why Assange Remained Within an Embassy Window

Why Assange Remained Within an Embassy Window to Deliver a Speech

Assange speech photos: http://cryptome.org/2012-info/assange-juliets/assange-juliets-romedia.htm

 


[Image]

Based on photos of Assange’s appearance at the Ecuadorian Embassy he carefully did not cross the legal boundary of the embassy, that is, the national boundary of Ecuador, by stepping onto the balcony where two videographers were positioned. (A protruding balcony is considered to be outside a building in most laws governing buildings.) This could indicate recognition that if he had crossed the boundary police could have entered the embassy to arrest him on the grounds that he had breached the national boundary and thereby lost asylum protection.

An inadvertent transgression, violating a precise definition of a boundary like a national border, has been used in many other cases to pursue a person across the boundary — borders of the Soviet satellites and US borders, for example.

Assange was awkwardly positioned in the embassy window frame to face the entire widespread crowd as he would have been able to do if he had stood on the balcony.

Toward the end of his speech Assange looked skyward, perhaps toward a helicopter which may have been video-taping his exact position. A toe, a foot, an arm might be forgiven, but a fully body likely not. Evidence will tell if he went too far, or will be accused of doing so.

His own two videographers will have evidence of compliance, although it is not clear if his lower body was taped. Photographs taken by the crowd could show more if they were zoomed to the border of Ecuador at Assange’s lower body.

Not to be overlooked, however, is that his position within the window frame could have been for quick escape against violence or kidnap, official or otherwise.

[Image]

Assange is an inch or so taller than the interior frame of the window (photos show he stooped to pass through the frame). Thus it would have been more convenient to move to the balcony for the speech if not advised against it.

[Image]

Assange’s shoe remains on the window sill, the Ecuador national boundary. Shoe and sill enlarged below.

[Image]

Shoe toe over the sill edge but within the Ecuador boundary.

 

 


 

 

 


 

 

 


 

Unveiled – Assange Juliets the Romedia Photos

Assange Juliets the Romedia Photos

Based on photos of Assange’s appearance at the Ecuadorian Embassy he carefully did not cross the legal boundary of the embassy, that is, the national boundary of Ecuador, by stepping onto the balcony where two videographers were positioned. (A protruding balcony is considered to be outside a building in most laws governing buildings.) This could indicate recognition that if he had crossed the boundary police could have entered the embassy to arrest him on the grounds that he had breached the national boundary and thereby lost asylum protection.

An inadvertent transgression, violating a precise definition of a boundary like a national border, has been used in many other cases to pursue a person across the boundary — borders of the Soviet satellites and US borders, for example.

Assange was awkwardly positioned in the embassy window frame to face the entire widespread crowd as he would have been able to do if he had stood on the balcony.

Toward the end of his speech Assange looked skyward, perhaps toward a helicopter which may have been video-taping his exact position. A toe, a foot, an arm might be forgiven, but a fully body likely not. Evidence will tell if he went too far, or will be accused of doing so.

His own two videographers will have evidence of compliance, although it is not clear if his lower body was taped. Photographs taken by the crowd could show more if they were zoomed to the border of Ecuador at Assange’s lower body.

Not to be overlooked, however, is that his position within the window frame could have been for quick escape against violence or kidnap, official or otherwise.

 


Julian Assange, founder of WikiLeaks re-enters the embassy after making a statement from a balcony of the Equador Embassy in London, Sunday, Aug. 19, 2012. Assange called on United States President Barack Obama to end a “witch hunt” against the secret-spilling WikiLeaks organization. AP

[Image]

WikiLeaks founder Julian Assange looks up as he retreats from the window of Ecuadorian Embassy in central London after making a statement to the media and supporters outside, Sunday, Aug. 19, 2012. Assange called on United States President Barack Obama to end a “witch hunt” against the secret-spilling WikiLeaks organization. AP

[Image]

WikiLeaks founder Julian Assange makes a statement to the media and supporters at a window of Ecuadorian Embassy in central London, Sunday, Aug. 19, 2012. Julian Assange entered the embassy in June in an attempt to gain political asylum to prevent him from being extradited to Sweden, where he faces allegations of sex crimes, which he denies. AP

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

[Image]

 


WikiLeaks founder Julian Assange, left, with his legal adviser Balthasar Garcon, right, talk inside the Ecuadorian embassy in London, Sunday Aug. 19, 2012. WikiLeaks founder Julian Assange took refuge inside Ecuador’s Embassy in London two months ago, seeking to avoid extradition to Sweden for questioning over sexual misconduct allegations. Woman at centre unidentified. AP

[Image]

Police officers stand outside the Ecuadorian Embassy [balcony perhaps to be Assange pulpit] in London on August 19, 2012. WikiLeaks founder Julian Assange was to face the world’s media today from Ecuador’s embassy in London where he has been holed up for two months, but the Australian risks arrest if he steps outside.

[Image]

 


 

 

 

 


 

 

 


 

TOP-SECRET – DHS-FBI Suspicious Activity Reporting Bulletin: Aviation Flyovers

https://publicintelligence.net/wp-content/uploads/2012/08/DHS-FBI-AviationFlyovers.png

 

(U) Suspicious Activity Reporting (SAR): Aviation Flyovers

(U//FOUO) Terrorists may use small aircraft flyovers to conduct preoperational activities such as reconnaissance or rehearsals for planned attacks. When suspicious flyovers occur, law enforcement and first responders should report the key attributes of the flight and the aircraft for timely identification (time of day, location and direction of flight, facility overflown, aircraft size, markings, color scheme, tail number, number of windows, placement of wings or rotor, number of engines, and weather) to the Federal Aviation Administration (FAA) through a local Air Traffic Control facility or office, a local Flight Standards District Office, or directly to the FAA’s Domestic Events Network at 202 493 5107, and the Transportation Security Administration. The FAA is often best able to distinguish between legitimate air traffic and suspicious flight operations that warrant further investigation.

(U//FOUO) The following SAR incidents illustrate types of aviation activity that may indicate preoperational stages or actual attacks. They are cited as examples for awareness and training purposes.

— (U//FOUO) Employees of a coast shipping container retrofit company observed a helicopter that made eight passes over the property. A man wearing a harness stood on the skids and took photographs of the area.
— (U//FOUO) A helicopter, flying at low altitude hovered over a dam, in violation of FAA regulations. Investigators determined that the registration number provided by the reporting party was not valid or on file with the FAA.
— (U//FOUO) An employee of a chemical company reported that a helicopter hovered within 50 feet of a storage tank. Observers also spotted another helicopter nearby. Neither aircraft had tail numbers carried in the FAA Registry

(U//FOUO) Possible Indicators of Suspicious Aviation Activity

(U//FOUO) The following activities can indicate suspicious aviation activity, but context should be carefully considered when evaluating the activity in order to rule out legitimate flyovers and inadvertent pilot error.  Suspicious activities involving aviation should be reported to appropriate authorities.

— (U//FOUO) Aircraft operating n violation or FAA regulations, such as in restricted/special use air space, or without a valid registration number in the FAA Registry (see https://www.faa.gov/regulations_policies/faa_ regulations/ for additional information).
— (U//FOUO) Aircraft flying at unusually low altitude or unusually slow speed.
— (U//FOUO) Aircraft making repeated flyovers, or hovering, without authorization over critical infrastructure, sensitive locations, events, or other activities
— (U//FOUO) Aircraft failing to respond to radio communications while in controlled airspace.

Full Movie – Serial Killer – Kenneth McDuff

Kenneth Allen McDuff (March 21, 1946 — November 17, 1998) was an American serial killer suspected of at least 14 murders. He had previously been on death row from 1968 to 1972

TOP-SECRET from the FBI – New York Man Sentenced to 20 Years in Federal Prison

David B. Fein, United States Attorney for the District of Connecticut, announced that Emanuel Nicolescu, 32, formerly of Ridgewood, New York, was sentenced today by United States District Judge Mark R. Kravitz in New Haven to 240 months of imprisonment, followed by three years of supervised release, for his participation in a 2007 Connecticut home invasion.

“This lengthy sentence is appropriate for a defendant who participated in a violent home invasion,” stated U.S. Attorney Fein. “I commend the excellent work of the law enforcement agencies involved in this investigation, including the Connecticut State Police; the FBI in Connecticut, New York City, and Chicago; the New York City Police Department; and ICE Homeland Security Investigations. Our work is not done as we seek to bring others involved in this serious crime to justice.”

On March 22, 2012, a jury found Nicolescu guilty of attempted extortion, conspiracy to commit extortion, and possession of a stolen vehicle. According to the evidence presented during the trial, Nicolescu and two other individuals, wearing masks and brandishing knives and firearms, entered a home in South Kent, Connecticut, shortly before midnight on April 15, 2007. The intruders bound and blindfolded two adult victims and injected each with a substance the intruders claimed was a deadly virus. The intruders ordered the victims to pay $8.5 million or else they would be left to die from the lethal injection. When it became clear that the victims were not in position to meet the intruders’ demands, Nicolescu and his co-conspirators drugged the two residents with a sleeping aid and fled in the homeowner’s Jeep Cherokee.

The stolen Jeep Cherokee was abandoned the next morning in New Rochelle, New York. Nicolescu’s DNA was found on the steering wheel of the vehicle. At trial, prosecutors showed that although Nicolescu had been employed as a butler at the residence in South Kent for two months in 2006, the homeowner purchased the Jeep Cherokee after Nicolescu had been fired and was no longer on the premises.

In addition to DNA evidence, expert testimony, and the testimony from the two victims, at trial the government introduced into evidence the contents of an accordion case that washed ashore in Jamaica Bay six days after the home invasion. This evidence included a stun gun, a 12-inch knife, a black plastic Airsoft gun, a crowbar, syringes, sleeping pills, latex gloves, and a laminated telephone card with the South Kent address of the victims. Trial testimony from Nicolescu’s former wife and former father-in-law showed that Nicolescu’s father-in-law made the knife and gave it to Nicolescu as a gift.

On the night of the home invasion, one of the victims was caring for her 3-year-old grandchild. During the victim’s testimony at trial, the victim stated that, during the ordeal, “I spent a lot of time while I was just sitting there thinking about—well, my children and how horrible this was going to be for them, because I was sure I was going to die. And I kept thinking that my daughter who was about to deliver a baby was going to wake up in the morning and find her mother dead and her child either dead or kidnapped….I just didn’t see how anyone could survive something like that….I just felt like I had failed as a mother, that at that point she could be in that position….That was my primary concern all night.”

Nicolescu has been detained in federal custody since his arrest by the FBI in Illinois on January 23, 2011.

This ongoing investigation is being conducted by the Connecticut State Police; the Federal Bureau of Investigation in Connecticut, New York City, and Chicago; the New York City Police Department and ICE Homeland Security Investigations.

U.S. Attorney Fein also acknowledged the critical assistance provided by the U.S. Attorney’s Office for the Northern District of Illinois and the U.S. Attorney’s Office for the Eastern District of New York.

This matter is being prosecuted by Assistant United States Attorneys David E. Novick and Paul H. McConnell.

World Record – Betreff “GoMoPa” – Namensgeber nicht existent – CEO wg. Betruges am eigenen Anleger verurteilt

Dear Readers,

do you know any company except “GoMoPa” which attacks every day thousands of other companies and persons for being fraudsters and it’s own CEO was convcted for fraud ?

Do you know any company except “GoMoPa”  which attacks every day thousands of people and  firms and it’s ‘own so-called  founders do not even exist ?

Do you know any company except “GoMoPa”  which attacks every day thousands of people and  firms and it is itself subject of investigation of the FBI and the Bavarian Anti Crime Institution (Bayerisches Landeskriminalamt) ?

No. This is a true world record !

Sincerely yours

Bernd Pulch

Magister Artium

Liebe Leser,

kennen Sie eine Firma (ausser “GoMoPa”), die jeden Tag Tausende von Personen und Firmen wegen angeblichen Betruges angreift und deren eigener “CEO” wegen Betruges am eigenen “GoMoPa”-Anleger verurteilt wurde ?

Kennen Sie eine Firma (ausser “GoMoPa”), die jeden Tage Tausende von Personen wegen angeblichen Betruges angreift und deren angebliche Gründer “Goldman”, “Morgenstern” und “Partner” nicht existieren ?

Kennen Sie eine Firma (ausser “GoMoPa”), die jeden Tage Tausende von Personen wegen angeblichen Betruges angreift und selbst Gegenstand veiler Ermittlungen ist u.v.a FBI und Bayerisches Landeskriminalamt  ?

Nein. Dies ist ein echter Weltrekord !

Beste Grüsse

Bernd Pulch, Magister Artium der Publizistik, Germanistik und Komparatistik

PS:

Hier noch einmal meine Magisterurkunde, denn die gibt es wirklich !

FULL Movie – The Son of Monte Cristo

 

In 1865, the rightful ruler of Lichtenburg, Zona, has had her power usurped by dictator General Gurko Lanen. When the Count of Monte Cristo visits on behalf of the king of France, he falls for Zona and vows to help her.

Though set in 1865, The Son of Monte Cristo is a thinly disguised indictment against 20th century dictatorships. Louis Hayward plays the title character, Edmond Dantes Jr., who while posing as an epicene dandy works tirelessly to topple the regime of fascistic Balkan despot Count Gurko (George Sanders). Under cover of night, Hayward dons mask and cape as “The Torch”, a Zorro-like dogooder rallying the peasantry to rise up against Gurko and his ilk. As a bonus, he rescues the lovely Grand Duchess Zona (Joan Bennett) from an arranged marriage with the usurping Count. Produced by Edward Small as a followup to his 1939 version of Man in the Iron Mask, The Son of Monte Cristo benefits from a carefully chosen supporting cast, including Clayton “Lone Ranger” Moore and Ralph “Dick Tracy” Byrd.

SI Swimsuit – Marisa Miller Video

SI Swimsuit model Marisa Miller tells you about her 6th appearence in one of America’s cultural phenomenon

Daniel Tosh Net – $ Worth 5 Million

How much is Daniel Tosh worth?

Daniel Tosh Net Worth and Salary

Daniel Tosh is an American stand-up comedian and television host with an estimated net worth of $6.5 million dollars. Tosh hosts Comedy Central’s video clip show, Tosh.0. After finishing college with a degree in marketing, Tosh started touring the comedy club circuit as a stand-up comedian. Tosh describes a comic’s routine life on the road as “Groundhog Day”, a reference to the film of the same name.

Tosh’s big career break came with an appearance in 2001 on the Late Show with David Letterman. After the Late Show performance, Tosh appeared on Jimmy Kimmel Live!, The Tonight Show with Jay Leno, and Comedy Central’s Premium Blend. Tosh’s Comedy Central Internet video clip TV show Tosh.0 premiered on June 5, 2009. Besides Tosh.0, Tosh is a regular guest on The Bob & Tom Show.

TMZ – David Beckham… in his UNDERWEAR!

If you enjoy the thought of David Beckham in his underwear — you’re not alone. In fact, someone actually made the brief-clad Becks into a GIGANTIC STATUE!

 

Dear Readers,

nobody ever saw the “GoMopa” founders “Goldman”, “Morgenstern” and “Partner” as they do not exist…

see

http://www.victims-opfer.com/?p=31394

Sincerely yours

Bernd Pulch

Magister Artium

Liebe Leser,

die angeblichen “GoMoPa”-Gründer “Goldman”; “Morgenstern” und “Partner” hat noch nie jemand gesehen.

Das kann auch nicht funktionieren.

Denn es gibt sie überhaupt nicht.

siehe:

http://www.victims-opfer.com/?p=31394

Beste Grüsse

 

Bernd Pulch

Magister Artium der Publizistik, Germanistik und Komparatistik

TOP-SECRET – DoD ATSD Spying Oversight Inspection Guide

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

atsd-io-guide

TMZ – Laura Wasser — Hollywood’s SEXIEST Lawyer

Meet Laura Wasser… Yep, it’s almost unfair that one of the most powerful lawyers in Hollywood is also a total SMOKESHOW, isn’t it?

Public Intelligence – Survey Finds U.S. Soldiers Believe the Afghan Army is Making Little to No Progress

A survey conducted in late 2011 as part of the Human Terrain Team report found that 45% of the soldiers that responded believed the Afghan National Army has improved little, not much or not at all.

Public Intelligence

A research report compiled earlier this year by a group of social scientists working for the U.S. Army’s Human Terrain System found that members of the Afghan National Army (ANA) are largely seen by U.S. soldiers as unmotivated, highly dependent and making little to no progress. The report, titled “ANA and CF Partnership in Khost and Paktiya”, is based on interviews and observations made during the Human Terrain Team’s time embedded with a U.S. cavalry squadron from November to December 2011. A survey distributed to three other companies also informs much of the report’s findings, which are intended to analyze “the dynamics that influence partnering between the ANA and [coalition forces] and how they contributed to the ANA’s effectiveness in gaining the Afghan population’s support.” The soldiers’ candid responses to the survey provide a great deal of insight into perceptions of the ANA among coalition forces.

Nearly half of soldiers surveyed said the ANA has improved little, not much or not at all during their partnership. A major reason for this lack of progress is reported by U.S. soldiers to be a lack of motivation. The report lists several of the  primary reasons why Afghans join the ANA, including earning a salary and consistent employment, as well as the desire to become literate and an opportunity for education. Illiteracy among the ranks of the ANA became such a problem for coalition forces trainers that mandatory literacy programs were instituted in 2009 at the NATO Training Mission – Afghanistan (NTM-A). One trainer told the report’s authors that “I never thought when I entered Afghanistan as a senior trainer I’d be talking more about literacy training than I would about infantry training. But that is truly the case. We recognized very early on in the NTM-A time frame that we had to put a literacy program in place to compensate and mitigate the great illiteracy problem in the ranks as well as in their society.”

Soldiers responding to the survey are quoted as stating that the “ANA doesn’t care, they are lazy” and the “ANA have no motivation to do anything.” One U.S. Staff Sergeant said that the ANA are not interested in taking on more responsibility, adding that “We do the heavy lifting, they put a face on it.” Nearly half of soldiers surveyed said the ANA has little, not much or no motivation at all to fight. This lack of motivation often causes coalition forces to take the lead even on missions that are supposedly led by the ANA.  One soldier told the report’s authors:

“They won’t do a patrol unless U.S. forces are on a patrol. If you ask them ‘hey what did you guys do today,’ you will never hear ‘oh we kicked out a patrol over to Seway, 3 trucks, 15 guys went over there, trying to find out some information about blab blah blah…’ Never gonna happen. They’re just going along with us whenever we need them.”

In fact, 62% of soldiers responding to the survey said that so-called “ANA-led” missions are rarely or never actually planned and executed by Afghan forces. Another soldier reported that a recent “ANA-led” mission that he had been on required him to “spoon-feed” his Afghan counterpart the entire operations order and planning.

A particularly interesting finding in the report is that the views of the Afghan population often differ widely from those of coalition forces on the professionalism and respectability of the ANA. Focusing on data collected during a 2011 survey of residents in Paktiya and Khost provinces, the report finds that the ANA is widely viewed by the Afghan people as more honest, fair and professional than the Afghan National Police. The report recommends that coalition forces do a better job of incorporating the views of the population into their assessments of the ANA, as the perception of stability and legitimacy plays an important role in the overall campaign. If coalition forces cannot do this, then they have only “fought half the battle” and the Afghan National Security Forces “will be able to clear, but not to hold or build.”

Das lässt die “GoMoPa” Stasi durch Google verhindern – Die Herkunft des eigenen Namens

OPFER FRAGEN. “Wissen Sie wofür “”GoMoPa” steht ? “GoMoPa” analog zu “MITROPA” und “NOHA” — keine amerikansiche Firma würde den Namen “Goldman, Morgenstern und Partner” mit den Silben abkürzen wie dies die STASI immer tat: Beispiele: MITROPA, NOHA und eben STASI, sondern GMP wie GM für General Motors. INTELLIGENCE steht für Geheimdienst. NACHRICHTENDIENST ist wie beim BND zu verstehen: Alles auf http://www.victims-opfer.com&#8221;

Geheime Trefforte der STASI enthüllt – Originaldokument

DOWNLAOAD THE ORIGINAL DOCUMENT HERE:

Text-Geheime-Trefforte

Fire Monsters Against The Son of Hercules – Full Movie

The Sun worshipers and the Moon worshipers are two tribes, Maxxus must deal with. After saving the leader of the Sun tribe from a sea monster, he must save the women who have been kidnapped by the Moon tribe.

Secret – CIA Buildings in DC Area 1999

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

cia-buildings-1999

Justin Bieber Net Worth – $105 Million

 

How much is Justin Bieber worth?

Justin Bieber Net Worth

Pop and R&B singer Justin Bieber has a net worth of $105 million. Born to a single mother in Ontario, Canada, Bieber began singing and playing music at an early age, being self-taught in piano, drums, trumpet and guitar. At age thirteen, Beiber started to post covers of artists such as Usher, Stevie Wonder and Justin Timberlake on video sharing website YouTube, mostly for the benefit of family members too distant to attend local performances. Bieber’s gained the attention of noted marketing executive Scooter Braun, who gave Beiber his break with an audition for Usher, who in turn had Bieber audition for Island Records with whom he signed. Bieber released a two part debut album, My World and My World 2.0. In less than two months after its initial release, My World reached the one million sold copies mark (U.S.A.) and was subsequently certified platinum by the RIAA. My World was the first debut album to have four singles (One Time, One Less Lonely Girl, Love Me, and Favorite Girl) on the Top 40 prior to the album’s release.

My World 2.0 debuted at number one on the U.S. Billboard 200 with a total of 698,000 copies sold in the first three weeks of its release. Baby, a single featuring rapper Ludacris from My World 2.0, became Bieber’s top charting single to date. Additionally, Bieber has made many notable appearances, including television talk show The View, Saturday Night Live and the White House for Christmas in Washington.

TOP-SECRET from the FBI – Federal Indictment Charges Two Individuals with RICO

ORTLAND, OR—David Joseph “Joey” Pedersen, 32, and Holly Ann Grigsby, 25, both of Portland, were indicted yesterday for racketeering activity in violation of the Racketeer Influenced and Corrupt Organizations (RICO) Act, RICO conspiracy, using a firearm in a crime of violence that caused death, kidnapping resulting in death, carjacking resulting in death, transportation of stolen vehicles, aggravated identity theft, credit card fraud, and being a felon in possession of a firearm, Amanda Marshall, U.S. Attorney for the District of Oregon, announced today. The charges all stem from an alleged 10-day crime spree that spanned from Everett, Washington, to Eureka, California, and included four murders.

Grigsby is scheduled to appear for arraignment before a U.S. Magistrate Judge in Seattle on August 20, 2012, at 2:30 p.m. Pedersen’s arraignment will be scheduled in Portland in the near future.

“The indictment in this case alleges horrendous crimes were committed as part of defendants’ white supremacist campaign to kidnap and murder targets on the basis of race, color, religion, and perceived ‘degenerate’ conduct,” said U.S. Attorney Marshall. “These crimes victimize not only individuals and their families, but entire communities. This indictment shows that we will work tirelessly with our federal and state partners to pursue allegations of bigotry and prejudice in order to protect all of our citizens from hate and violence. No one should live in fear of being attacked because of their race, religion, ethnicity, nationality, gender, sexual orientation, gender identity, or disability. We hope this indictment brings the victims’ families one step closer to justice.”

The indictment charges that Pedersen and Grigsby were members of a criminal enterprise whose members and associates engaged in acts of violence and other criminal activity to promote a white supremacist movement to “purify” and “preserve” the white race. They are further charged with targeting Jewish leaders, members of prominent Jewish organizations, and other “Zionists” and using the media to publicize their movement in an attempt to spark a revolution. It is alleged that, among other things, Pedersen and Grigsby robbed victims in order to finance the enterprise and obtain cars for transportation and that they murdered victims to eliminate witnesses and avoid apprehension and prosecution. Pedersen and Grigsby are charged with the following crimes and racketeering acts, among others:

  • the murder, kidnapping, and robbery of Pedersen’s father, David Joseph “Red” Pedersen, of Everett, on September 26, 2011, as well as using a firearm during and in relation to a crime of violence that resulted in death, the interstate transportation of Red Pedersen’s stolen vehicle, and credit card fraud and aggravated identify theft based on their use of Red Pedersen’s stolen credit cards;
  • the murder, kidnapping, and robbery of Pedersen’s stepmother, Leslie “Dee Dee” Pedersen, of Everett, on September 26, 2011, as well as credit card fraud and aggravated identify theft based on their use of Leslie Pedersen’s stolen credit cards;
  • the murder, kidnapping, and robbery of Cody Faye Myers, of Lafayette, Oregon, on October 1, 2011, as well as carjacking, using a firearm during and in relation to a crime of violence that resulted in death, and interstate transportation of a stolen vehicle;
  • the murder, kidnapping, and robbery of Reginald Clark, of Eureka, on October 3, 2011, as well as using a firearm during and in relation to a crime of violence that resulted in death; and
  • being a felon in possession of a firearm, which includes allegations that Pedersen is an armed career criminal.

“The FBI, along with our local and state law enforcement partners, put great value on protecting every American’s rights to worship freely and live without fear—regardless of race or religion,” said Greg Fowler, Special Agent in Charge of the FBI in Oregon. “Fairness, equality, and dignity are of fundamental importance under the U.S. Constitution, and we work each day to honor and uphold those civil liberties.”

The federal charges stem from an investigation led by the FBI; the Oregon State Police; the Everett Police Department; and the Eureka Police Department, with assistance from the Oregon Department of Corrections; Lincoln County, Oregon Sheriff’s Office; Lincoln County Major Crimes Team; Linn County, Oregon Sheriff’s Office; Benton County, Oregon Sheriff’s Office; Corvallis, Oregon Police Department; Salem, Oregon Police Department, Keizer, Oregon Police Department; California Highway Patrol; Yuba County, California Sheriff’s Office; Portland Police Bureau; U.S. Marshals Service; Tillamook County, Oregon Sheriff’s Office; Philomath, Oregon Police Department; Lebanon, Oregon Police Department; Stayton, Oregon Police Department; Snohomish County, Washington Sheriff’s Office; and the Oregon Department of Justice. This multi-state investigation is ongoing.

The use of a firearm during and in relation to a crime of violence which causes death, such as the crimes charged in counts three, five, and 12, carries a maximum penalty of death or consecutive sentences of imprisonment from 10 years to life. Kidnapping and carjacking resulting in death, as charged in counts four and 11, also carry a maximum penalty of death or imprisonment for any number of years up to life. The decision about whether to seek the death penalty will be made personally by the Attorney General of the United States at a later date. The other crimes charged in the indictment carry maximum penalties ranging from 10 years to life imprisonment and up to a $250,000 fine.

An indictment is only an accusation of a crime, and defendants should be presumed innocent unless and until proven guilty.

The case is being prosecuted by Assistant U.S. Attorneys Jane Shoemaker and Hannah Horsley.

The NSA & The FBI – New Detail on Confronting the Terrorist Threat – from al-Qaeda to Skinheads

FBI headquarters in Washington, D.C. (Credit: www.fbi.gov)

Washington, D.C., August 18, 2012 – A new Web resource posted today by the National Security Archive offers a wide-ranging compilation of declassified records detailing the operations of a key component of U.S. national security. Among the new documents are internal reports on domestic terrorism that expand on what previously public intelligence assessments have revealed.

The Federal Bureau of Investigation (FBI) has been one of the best known and most scrutinized components of the U.S. government for well over seventy years. As a result it has been the subject of non-fiction books, novels, a multitude of articles, films and television shows, and congressional hearings. In addition to its criminal investigative effort and pursuit of bank-robbers that propelled it into the news, the Bureau has also been heavily involved in counterintelligence, counterterrorism, foreign intelligence, and counter-subversion work. FBI successes, failures, and abuses have helped produce attention and controversy for the Bureau.

Today’s National Security Archive posting of 38 documents – drawn from a variety of sources – provides a window into the Bureau’s activities in those areas since, with one exception, 1970. The collection’s aim is to present a foundation for understanding the scope and history of the organization, and in some instances to offer correctives to popular accounts. Freedom of Information Act requests yielded a number of the documents included in the briefing book, which are being posted here for the first time. Included are two intelligence assessments of the domestic terrorist threat – The Terrorist Threat to the U.S. Homeland: An FBI Assessment (2004) and A Threat Assessment for Domestic Terrorism, 2005-2006 (2007) – which examine the threat from al-Qaeda and its supporters as well as from assorted home-grown terrorist groups.

The latter assessments offer a broader and more detailed view of the terrorist issue, including on al-Qaeda, than the key judgments of the 2007 National Intelligence Estimate released by the Director of National Intelligence. The 2004 assessment stated that FBI investigations revealed “extensive support for terrorist causes in the US,” although they also found little evidence of sympathizers being actively engaged in planning or carrying out terrorist attacks.

Additional details on some of the domestic threats mentioned in the 2004 and 2007 estimates can be found in other newly released assessments – such as those on white supremacist groups. Those assessments discuss the threats from ‘stealth’ fascists, white supremacist infiltration of law enforcement, and the possibility of white supremacists employing suicide terrorism to further their cause.

Also, included are detailed inspector general reports concerning the FBI’s performance in the case of Robert Hanssen, the FBI official who spied for the Soviet Union and Russia, its handling of information related to the September 11 terrorist attacks, and its employment of national security letters. Finally, included are a number of Congressional Research Service studies on the Bureau’s history and current activities, including its terrorism investigations.

* * *

Documenting the FBI

By Jeffrey T. Richelson

Federal Bureau of Investigation, The Terrorist Threat to the U.S. Homeland: An FBI Assessment, April 15, 2004. Secret/NOFORN. Source: FBI Freedom of Information Act Release.

For almost eight decades the Federal Bureau of Investigation (FBI) has been one the best known components of the federal government. The organization, or its long-time director, J. Edgar Hoover, have been the subject of a number of non-fiction books – ranging from the adulatory to the intensely critical. 1 There have also been assorted novels, films, and television shows in which the Bureau or Hoover were central elements. 2

Created in 1908, as an untitled Justice Department bureau, it became the Bureau of Investigation in 1909, the Division of Investigation in 1933, and the FBI in 1935. Today, the FBI consists of its headquarters in Washington, D.C., its training academy in Quantico, Virginia, other elements in Virginia, 56 domestic field offices, 380 resident agencies, and more than 60 legal attaché offices outside the United States. As of April 30, 2012, it had 35,850 employees (13, 851 special agents, and 21, 989 support personnel) and a budget of $8.1 billion. 3

It became best known, at least initially, for its operations directed against high-profile gangsters, such as the fatal shooting of John Dillinger on July 22, 1934, in front of Chicago’s Biograph Theater by two of the Bureau’s special agents. 4 Subsequently, the Bureau’s prominence grew as a result of its national security activities. Over the years, those operations have included the gathering of foreign intelligence, counterintelligence, counter-terrorism, and combating, what were in the view of the Bureau (and others), subversive elements. 5

The documents posted today by the National Security Archive range from unclassified records to redacted versions of Secret or “Law Enforcement Sensitive” documents that were obtained under the Freedom of Information Act as well as from a variety of government web pages (including the Department of Justice and General Accountability Office) and private organization sites (including the Federation of American Scientists and Government Attic). The records focus on the Bureau’s foreign intelligence, counterintelligence, and counterterrorism activities since (with one exception) 1970.

Thus, several documents focus on the FBI’s foreign intelligence activities. One examines its operation of the Special Intelligence Service, which was active in Latin America during World War II (Document 9). Another discusses how the Joint Chiefs of Staff requested the FBI employ its “internal information program” to gather intelligence that would be useful in planning and executing a second attempt to rescue the American hostages seized in Iran in November 1979 (Document 2). Today, the FBI’s extensive presence overseas, via its legal attaché program, the subject of a Justice Department inspector general report (Document 17), allows it to produce information relevant both to criminal investigations and U.S. foreign intelligence requirements.

The counterintelligence component of the organization’s mission involves the related activities of investigating foreign intelligence services and their employees, both those employing diplomatic cover and those operating as illegals, and detecting Americans – including members of the FBI and CIA – who are providing classified information to those services. Thus, documents in the posting include the executive summary of an inspector general report on the activities and detection of FBI agent Robert Hanssen, who provided extraordinarily sensitive intelligence to the Soviet Committee of State Security (KGB) and the Russian Foreign Intelligence Service (SVR) over two decades (Document 12).

The posting also includes an examination of the FBI’s successes and failures. One involved the case of the CIA’s Aldrich Ames, arrested in 1994, but not after he disclosed the identities of a number of CIA sources to the Soviet Union. (Document 6). In addition, there is the case of Katrina Leung (Document 25), who had sexual relationships with at least two FBI agents while appearing to provide information on developments within the government of the People’s Republic of China – but actually serving as a PRC agent. Further, the posting includes the reports produced by several security reviews under taken by RAND and an outside commission in the wake of the Hanssen fiasco (Document 7, Document 10).

Also represented in the briefing book are a number of FBI intelligence assessments concerning terrorism. A 1970 analysis focuses on the Fedayeen terrorist group (Document 1) while a 1984 study (Document 3) describes Iranian and Iranian-linked institutions in the United States – including both official institutions and educational foundations – that had (or could have) served as covers for clandestine intelligence collection and support to terrorist activities.

Other more recent assessments have focused on both the international and domestic terrorist threats. Thus, a Secret/Noforn assessment from April 2004 (Document 19) focuses on the threats from al-Qaeda as well as from U.S.-based groups. It reported that the “motivation and commitment to lethality remains as strong as ever” among al-Qaeda’s members, that the group continued to be interested in targeting international flights, and that few entities or individuals in the United States had direct connections to senior al-Qaeda leaders.

But while al-Qaeda was the greatest concern, the FBI also devoted analytical resources to evaluating the threat from a variety of domestic groups. A 2007 assessment (Document 30) noted the threat from animal rights extremists who “committed the overwhelming majority of criminal incidents during 2005 and 2006.” Several reports concerned white supremacist groups – including their possible use of suicide terrorism (Document 28), their infiltration of law enforcement (Document 26), and the phenomenon of “ghost skins,” (Document 27) who “strive to blend into society.” According to the reports, suicide terrorism was seen “primarily as a means of uniting a fractured movement,” while infiltration of law enforcement threatened the success of investigations and could “jeopardize the safety of law enforcement sources and personnel.”

Beyond estimates of the terrorist threat, the documents posted today illuminate various aspects of FBI counter-terrorist operations and organization prior to 9/11 or in its aftermath. Thus, the Department of Justice’s inspector general produced a lengthy report (Document 22) on the Bureau’s performance with respect to the Phoenix memo (warning in 2001 about Osama bin Laden’s possible plan to send operatives to the U.S. to train in civil aviation), the investigation of two hijackers, Khalid al-Mindhar and Nawaf al-Hazmi, and of Zacarias Moussaoui. Another inspector general report (Document 32) focuses on the FBI’s involvement in and observations of interrogations at Guantanamo Bay. In addition, the FBI’s controversial, and at times inappropriate, use of National Security Letters is explored in a 2008 inspector general report (Document 31).

Other documents, produced by the Congressional Research Service as well as the Justice Department’s Inspector General, explore FBI practices subsequent to 9/11 and, particularly, attempts to improve the Bureau’s ability to perform its counterterrorist mission. Among the topics examined are the FBI’s efforts to improve the sharing of intelligence (Document 15); to develop a highly trained, stable corps of intelligence analysts (Document 23); to better integrate headquarters and field office intelligence operations (Document 35); and to assess the impact of revised attorney general guidelines for domestic intelligence operations (Document 38).


Documents

Document 1: Federal Bureau of Investigation, The Fedayeen Terrorist – A Profile, June 1970. Secret.
Source: www.governmentattic.org

This monograph was prepared “to furnish Field Agents a profile of the fedayeen terrorist,” a focus of major concern early in the modern era of international – and especially Middle East-based – terrorism. The study is based on the analysis of ten fedayeen terrorist attacks in Europe and other information available to the FBI. One motivation for its production was “persistent reports” that terrorist attacks in Europe would be followed by attacks in the United States.
Document 2: Joint Chiefs of Staff, Memorandum for the Record, Subject: Briefing of FBI Representatives, September 25, 1980. Top Secret.
Source: Digital National Security Archive

This memo discusses the briefing of FBI representatives by a member of the Joint Staff with regard to intelligence needs in support of operations against Iran – specifically with regard to plans to rescue American hostages.
Document 3: Federal Bureau of Investigation, Threat Assessment of Pro-Khomeini Shiite Activities in the U.S., February 24, 1984. Secret.
Source: www.governmentattic.org

This analysis consists of four key parts – an examination of the Shiite religion, a survey of official Iranian diplomatic establishments in the United States (including the Iranian mission to the United Nations, the Iranian interests section, the Islamic Education Center, and the Mostazafin Foundation), main Iranian Shiite organizations in the United States, and Iranian Shiite threats.
Document 4: General Accounting Office, International Terrorism: FBI Investigates Domestic Activities to Identify Terrorists, September 1990. Unclassified
Source: Government Accountability Office

This GAO study was conducted in response to a request by the chairman of the House Judiciary Committee’s subcommittee on civil and constitutional rights. The chairman was responding to information contained in documents released under the Freedom of Information Act that concerned FBI monitoring of the Committee in Solidarity with the People of El Salvador (CISPES). The study focused on the basis on which the FBI was opening investigations, the scope and results of the investigations, possible FBI monitoring of First Amendment activities, and the reasons for closure of the investigations.

Document 5: Office of the Attorney General, Attorney General Guidelines for FBI Foreign Intelligence Collection and Foreign Counterintelligence Investigations, May 25, 1995. Secret.
Source: Federation of American Scientists

The guidelines in the document govern all foreign intelligence and foreign counterintelligence, foreign intelligence support activities, and intelligence investigations of international terrorism conducted by the FBI as well as FBI investigations of violations of the espionage statutes and certain FBI investigations requested by foreign governments. It also provides guidance to the FBI with respect to coordination with CIA or Defense Department activities within the United States.

Document 6: Office of the Inspector General (OIG), Department of Justice, A Review of the FBI’s Performance in Uncovering the Espionage Activities of Aldrich Hazen Ames, Executive Summary, April 1997. Unclassified.
Source: Department of Justice

This document is the unclassified version of the executive summary of a more extensive, and more highly classified report on the FBI’s role in the Aldrich Ames investigation. While the investigation “found that the lack of knowledge and experience in counterintelligence work” among some FBI managers seriously hampered the FBI’s effort in detecting Ames’ espionage, it also found that once the investigation of Ames was initiated the FBI “allocated enormous resources” and pursued the investigation “efficiently and professionally.”

Document 7: Commission for Review of FBI Security Programs, A Review of FBI Security Programs, March 2002. Unclassified.
Source: Federation of American Scientists

In its report, the commission, which was established in response to the discovery of FBI agent Robert Hanssen’s delivery of “vast quantities of documents and computer diskettes” filled with national security information to the Soviet Union and Russia, identified “significant deficiencies” in FBI security policy practice — noting that “security is often viewed as an impediment to operations.” The report also contains a number of recommendations to improve Bureau security – including establishing an independent Office of Security.

Document 8: David Walker, Comptroller General of the United States, FBI Reorganization: Initial Steps Encouraging but Broad Transformation Needed, June 21, 2002. Unclassified.
Source: Government Accountability Office

In testimony before a subcommittee of the House Appropriations Committee, the head of the General Accounting Office discusses several aspects of the FBI’s proposed reorganization and realignment efforts — including the broader issue of federal government transformation, the realignment of FBI resources, the elements of a successful transformation, and the importance of Congressional oversight.

Document 9: G. Gregg Webb, “New Insights into J. Edgar Hoover’s Role,” Studies in Intelligence, 48, 1 (2003). Unclassified.
Source: www.cia.gov

This article focuses on the FBI’s operation of a foreign intelligence organization during World War II – the Special Intelligence Service – which focused on Latin America.

Document 10: Gregory T. Treverton, Richard Davidek, Mark Gabriele, Martin Libicki, and William (Skip) Williams, RAND Corporation, Reinforcing Security at the FBI, February 2003. Unclassified.
Source: FBI Freedom of Information Act Release

This RAND study was undertaken at the request of the FBI’s Security Division and reports the results of RAND’s assessment of the FBI’s efforts to establish a security program that would dramatically reduce the risk of another security compromise similar to that involving Robert Hanssen.

Document 11: Todd Masse, Congressional Research Service, Domestic Intelligence in the United Kingdom: Applicability of the MI5 Model to the United States, May 2003. Unclassified.
Source: Federation of American Scientists

In the aftermath of the September 11, 2001, attacks one suggestion for a possible change in the U.S. approach to domestic counter-terrorist intelligence was to remove such responsibilities (along with counterintelligence) from the FBI and create a separate organization along the lines of the British Security Service (better known as MI-5). This paper examines both political and organizational considerations relevant to the applicability of the British model as well as summarizing pending legislation.

Document 12: Office of the Inspector General, Department of Justice,A Review of the FBI’s Performance in Deterring, Detecting, and Investigating the Espionage Activities of Robert Philip Hanssen, Executive Summary, August 14, 2003. Unclassified.
Source: Department of Justice

This review is the unclassified version of two classified reports on the same subject – a 674-page Top Secret/Codeword level report and a 383-page report. This version consists of five chapters, which examine Hanssen’s activities before joining the FBI and between 1976 and 1985; his career between 1985 (when he became supervisor of a technical surveillance squad in New York and offered his services to the KGB) and 1992; and deficiencies in the FBI’s internal security revealed during the OIG investigation. It also offers recommendations for changes in the FBI’s counterintelligence and security programs.

Document 13: Todd Masse and William Krouse, Congressional Research Service, The FBI: Past, Present, and Future, October 2, 2003. Unclassified.
Source: Federation of American Scientists

One part of this study is a review of the FBI’s history, its current status, and its future. In addition, it examines four issues facing Congress with regard to the Bureau – whether the FBI can adapt to a terrorist prevention role; some of the FBI’s criminal investigative work should be transferred to state and local law enforcement organizations; a statutory charter should be developed for the Bureau; and whether the planned collocation of the FBI’s Counterterrorism Division and the Terrorist Threat Integration Center risks allowing U.S. foreign intelligence entities to engage in domestic intelligence activities.

Document 14: Office of the Attorney General, The Attorney General’s Guidelines for FBI National Security Investigations and Foreign Intelligence Collection , October 31, 2003. Secret/Noforn.
Source: Federation of American Scientists

This document is the result of a review of existing guidelines for national security and criminal investigations that was carried out after the September 11, 2001, terrorist attacks. The new guidelines authorize FBI investigations of threats to national security; assistance to state, local, and foreign governments in relation to national security matters; foreign intelligence collection by the FBI; the production of strategic analysis by the FBI; and the retention and dissemination of information from those activities.

Document 15: Office of the Inspector General,Department of Justice, FBI’s Efforts to Improve Sharing of Intelligence and Other Information, December 2003. Redacted/Unclassified.
Source: Department of Justice

This audit focused on the FBI’s identification of impediments to its sharing of counter-terrorism related intelligence; improvements in its ability to share intelligence and other information not only within the FBI but with the Intelligence Community as well as state and local law enforcement agencies; and the dissemination of useful threat and intelligence information to other intelligence and law enforcement organizations.

Document 16: National Commission on Terrorist Attack Upon the United States, Memorandum for the Record, “Interview of [Deleted],” December 29, 2003. Secret.
Source: www.cryptome.org

This memo reports on an interview with a FBI reports officer (whose identity has been deleted) by members of the 9/11 Commission staff. It provides background on the interviewee, while the subjects of the remainder of the memo include, but are not limited to, the Terrorism Reports and Requirements Section, terrorism reporting, general impressions of the FBI, as well as the role of the Office of Intelligence and of reports officers and their products.

Document 17: Office of the Inspector General,Department of Justice, FBI Legal Attaché Program, March 2004. Redacted/Unclassified.
Source: Federation of American Scientists

This audit examines the type of activities performed by the FBI’s Legal Attaché offices; the effectiveness of the offices in establishing liaison relationships with other U.S. law enforcement and intelligence organizations overseas; the criteria and process used by the FBI to locate offices; and the oversight and management of existing offices. The auditors reviewed operations at FBI headquarters and four of the Bureau’s 46 attaché offices.

Document 18: Federal Bureau of Investigation, Tactics Used by Eco-Terrorists to Detect and Thwart Law Enforcement Operations, April 15, 2004. Unclassified/Law Enforcement Sensitive.
Source: www.wikileaks.org

This assessment report focuses on sections of Earth First founder David Foreman’s Eco-Defense; A Field Guide to Monkeywrenching – which discuss some of the covers Foreman believes are used by law enforcement to infiltrate radical environmental groups and the means of identifying undercover law enforcement personnel.

Document 19: Federal Bureau of Investigation, The Terrorist Threat to the U.S. Homeland: An FBI Assessment, April 15, 2004. Secret/NOFORN.
Source: FBI Freedom of Information Act Release

This secret assessment concerns the threat from Al-Qaeda as well as domestic terrorists (including terrorists from the white supremacist, animal rights, and hacker communities). It includes an examination of “Islamic Extremist Terrorism Trends.”

Document 20: Alfred Cumming and Todd Masse, Congressional Research Service, FBI Intelligence Reform Since September 11, 2001: Issues and Options for Congress, August 4, 2004. Unclassified.
Source: http://fpc.state.gov/documents/organizations/39334.pdf

In the aftermath of the September 11 attacks there were numerous proposals for reform of FBI intelligence operations. This study examines five options for Congress to consider – including creation of a domestic organization similar to the United Kindgom’s Security Service (MI-5), transferring domestic intelligence responsibilities to the Department of Homeland Security, and creating a national security intelligence service within the FBI.

Document 21: Office of the Inspector General,Department of Justice, Internal Effects of the FBI’s Reprioritization, September 2004. Redacted/Unclassified.
Source: Department of Justice

This Inspector General report lays out the FBI’s new priorities announced by the Bureau’s director in May 2002: protecting the United States from terrorist attack, foreign intelligence operations, and cyber-based attacks. The report examines FBI changes in resource utilization from the 2000 and 2003 fiscal years to determine if the new priorities were reflected in FBI resource allocations.

Document 22: Office of the Inspector General, Department of Justice, A Review of the FBI’s Handling of Intelligence Information Related to the September 11 Attacks, November 2004. Unclassified.
Source: Department of Justice

This 449-page report provides background concerning the FBI’s counterterrorism effort, and examines three key aspects of the FBI’s pre-9/11 work – its handling of the Phoenix communication and the Bureau’s attention to the possible use of airplanes in terrorist attacks, its handling of the Zacarias Moussaoui case, and its performance with respect to two of the 9/11 hijackers (Khalid al-Mihhar and Nawaf Al-Hazmi). It also provides several recommendations with regard to the FBI’s analytical program, the Foreign Intelligence Surveillance Act process, and interactions with the Intelligence Community.

Document 23: Office of the Inspector General,Department of Justice, FBI Efforts to Hire, Train, and Retain Intelligence Analysts, May 2005. Unclassified.
Source: Department of Justice

This Inspector General audit examines the FBI’s progress in meeting analyst hiring goals, analyst hiring requirements, establishing a comprehensive training program and reaching the training goals, analyst staffing and utilization in support of FBI activities, and retaining analysts. The auditors concluded that the FBI “made significant progress in hiring and training quality analysts, although significant issues remain[ed].”

Document 24: Alfred Cumming and Todd Masse, Congressional Research Service, Intelligence Reform Implementation at the Federal Bureau of Investigation: Issues and Options for Congress, August 16, 2005. Unclassified.
Source: Federation of American Scientists

This study attempts to assess the state of intelligence reform in the FBI, subsequent to the announcement that the Bureau would establish a National Security Service (which was ultimately known as the National Security Branch). It also discusses some of Congress’ options and areas for oversight.

Document 25: Office of the Inspector General,Department of Justice, A Review of the FBI’s Handling and Oversight of FBI Asset Katrina Leung, Unclassified Executive Summary, May 2006. Unclassified.
Source: Department of Justice

In May 2000, the FBI received information that Katrina Leung, one of the Bureau’s most highly paid assets who was actively spying for the People’s Republic of China against the United States. The Secret 236-page report that was the product of the resulting investigation is summarized in this executive summary, which reports on the FBI’s Chinese counterintelligence program, the 18-year period in which Leung was operated by James J. Smith (who was also involved in “an intimate romantic relationship” with her), and the FBI’s investigation of Smith and Leung. It also reports the OIG’s conclusions and recommendations.

Document 26: Federal Bureau of Investigation, White Supremacist Infiltration of Law Enforcement, October 17, 2006. Unclassified/Law Enforcement Sensitive.
Source: FBI Freedom of Information Act Release

This assessment, drawn from open sources and FBI investigations, provides an overview of white supremacist infiltration of law enforcement. It reports the threats posed to intelligence collection and exploitation, as well as to elected officials and other protected persons. It also explains why different supremacist groups can benefit from a single penetration.

Document 27: Federal Bureau of Investigation, Ghost Skins: The Fascist Path of Stealth, October 17, 2006. Unclassified/Law Enforcement Sensitive.
Source: FBI Freedom of Information Act Release

This intelligence bulletin focuses on ‘ghost skins’ – white supremacists who avoid giving any indication of their sympathy with Nazi beliefs and “strive to blend into society to be unrecognizable to the Jewish enemy.”

Document 28: Federal Bureau of Investigation, White Supremacy: Contexts and Constraints for Suicide Terrorism, April 20, 2007. Unclassified/For Official Use Only/Law Enforcement Sensitive.
Source: FBI Freedom of Information Act Release

Suicide terrorism is defined in this study as instances in which a terrorist intentionally kills himself or herself while attempting to kill others or operations in which the terrorist expects to be killed by police or other defenders. It examines the prospects for organized suicide campaigns as well as for the white supremacist movement to generate lone offenders.

Document 29: Office of the Inspector General,Department of Justice,FBI’s Progress in Responding to the Recommendations in the OIG Report on Robert Hanssen, Executive Summary, September 2007. Unclassified.
Source: Department of Justice

In the wake of the discovery that Robert Hanssen had provided the KGB and then the Russian Foreign Intelligence Service (SVR) with extremely sensitive information about U.S. intelligence and counterintelligence activities, the Department of Justice’s Office of the Inspector General examined FBI security practices and 21 recommendations to improve the Bureau’s internal security and its ability to deter and detect espionage by its own employees. This report assesses the FBI’s response to some of those recommendations.

Document 30: Federal Bureau of Investigation, A Threat Assessment for Domestic Terrorism, 2005 – 2006, September 18, 2007. Unclassified/For Official Use Only/Law Enforcement Sensitive.
Source: FBI Freedom of Information Act Release

This study examines the activities, capabilities, opportunities, intent, and potential targets of a variety of domestic terrorist groups – including anarchist, animal rights, anti-abortion, Puerto Rican, and white supremacist extremists.

Document 31: Office of the Inspector General,Department of Justice, A Review of the FBI’s Use of National Security Letters: Assessment of Corrective Actions and Examination of NSL Usage in 2006, March 2008. Unclassified.
Source: Department of Justice

This extensive review covers several aspects of the FBI’s controversial use of National Security Letters: corrective actions taken by the FBI and Department of Justice in response to an earlier Inspector General report on the use of NSLs; the FBI review of the earlier NSL report; NSL requests by the FBI in 2006; the effectiveness of national security letters as an investigative tool; Inspector General findings on the FBI’s compliance with non-disclosure and confidentiality requirements; and the improper or illegal use of NSLs reported by FBI personnel in 2006. It concluded that the FBI and Justice Department had made “significant progress” in implementing the recommendations from the earlier report but also offered 17 additional recommendations.

Document 32: Office of Inspector General, Department of Justice, A Review of the FBI’s Involvement in and Observations of Detainee Interrogations in Guantanamo Bay, Afghanistan, and Iraq, May 2008. Unclassified.
Source: Department of Justice

This 438-page study consists of twelve chapters. Between the introductory and concluding chapters, it provides background on the FBI’s post-9/11 role and interrogation policies, early development of FBI policies regarding detainee interviews and interrogations, the concerns of Bureau agents about military interrogation activities at Guantanamo Bay, the Bureau’s response to the disclosures concerning Abu Ghraib, training for FBI agents in military zones, FBI observations regarding specific techniques used in Guantanamo, Afghanistan, and Iraq, and the Office of Inspector General’s review of alleged misconduct by FBI employees in military zones.

Document 33: Federal Bureau of Investigation, White Supremacist Recruitment of Military Personnel since 9/11, July 7, 2008. Unclassified/For Offical Use Only/Law Enforcement Sensitive.
Source: www.cryptome.org

This assessment, based on FBI case files from October 2001 to May 2008, examines why white supremacist extremist groups sought to increase their recruitment of current and former U.S. military personnel, the extent of their success, and the impact of recruitment on the white supremacist movement.

Document 34: Office of the Attorney General, The Attorney General’s Guidelines for Domestic FBI Operations, September 29, 2008. Unclassified.
Source: Department of Justice

These guidelines, according to the introduction, were designed to allow full utilization of “all authorities and investigative methods, consistent with the Constitution and laws of the United States,” to shield the United States from threats to national security (including terrorism) and the victimization of individuals by federal crimes.

Document 35: Strategic Execution Team, FBI, The New Field Intelligence, March 2008-March 2009, 2009. Unclassified.
Source: FBI Freedom of Information Act Release

This study explores domestic intelligence collection, in 2008-2009, by FBI field offices. It focuses on organization, roles and responsibilities, collection management, HUMINT collection, tactical intelligence, production and dissemination, measuring and tracking performance, and implementation.

Document 36: Vivian S. Chu and Henry B. Hogue, Congressional Research Service, FBI Directorship: History and Congressional Action, July 25, 2011. Unclassified.
Source: Federation of American Scientists

This report examines the history of the 1968 and 1976 legislation that is the basis for the current nomination and confirmation process for FBI directors. It also discusses the precedent for lengthening the tenure of an office and the constitutionality of extending Robert Mueller’s tenure as director.

Document 37: Federal Bureau of Investigation, Anonymous’ Participation in “Day of Rage” Protest May Coincide with Cyber Attack, September 14, 2011. Unclassified/Law Enforcement Sensitive.
Source: www.publicintelligence.net

This intelligence bulletin reports the FBI’s assessment that the group of activist hackers known as Anonymous was likely to participate in the ‘Days of Rage’ protest in New York scheduled for September 17, 2011. The bulletin also notes past Anonymous activities that involved cyber attacks.

Document 38: Jerome P. Bjelopera, Congressional Research Service, The Federal Bureau of Investigation and Terrorism Investigations, December 28, 2011. Unclassified.
Source: Federation of American Scientists

This study focuses on key components of FBI terrorism investigations. It reports on enhanced investigative tools and capabilities, the revision of Attorney General guidelines for domestic FBI operations, intelligence reform within the FBI, and the implications for privacy and civil liberties inherent in the use of preventive techniques to combat terrorism.


Notes

[1] Don Whitehead, The FBI Story (New York: Pocket Books, 1959); Fred J. Cook, The FBI Nobody Knows (New York: Pyramid, 1972); Sanford J. Ungar, The FBI: An Uncensored Look Behind the Walls (Boston: Little, Brown, 1976); William C. Sullivan with Bill Brown,The Bureau: My Thirty Years in Hoover’s FBI (New York: W.W. Norton, 1979); David J. Garrow, The FBI and Martin Luther King, Jr: From “Solo” to Memphis (New York: W.W. Norton, 1981); Richard Gid Powers, Secrecy and Power: The Life of J. Edgar Hoover (New York: Free Press, 1988); Ronald Kessler, The Secrets of the FBI (New York: Crown, 2011), and Tim Weiner, Enemies: A History of the FBI (New York: Random House, 2012).

[2] Novels involving the FBI include those in the Ana Grey series, by April Smith, including White Shotgun (New York: Knopf, 2011) and Rex Stout’s The Doorbell Rang (New York: Viking, 1965). Films include The FBI Story (1959), Manhunter (1986), Mississippi Burning (1988), and J. Edgar (2011). Television shows featuring the FBI include I Led Three Lives (1953-56), The F.B.I. (1965-74), The X Files (1993-2002), and Fringe (2008- ).

[3] “Quick Facts,” http://www.fbi.gov/about-us/quick-facts, accessed May 27, 2012.

[4] Kessler, The Secrets of the FBI, pp. 194-195.

[5] The Bureau’s COINTELPRO efforts are covered in Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Final Report, Book II: Intelligence Activities and the Rights of Americans (Washington, D.C.: U.S. Government Printing Office, 1976).

Unveiled – Assange Protest Photos EC Embassy 12-0816

Julian Assange Protest Photos 16 August 2012

[Image]

AP

[Image]

British police officers stand guard outside the Ecuadorian Embassy in central London, Thursday, Aug. 16, 2012 after Ecuadorean Foreign Minister Ricardo Patino announced that he had granted political asylum to WikiLeaks founder Julian Assange. He’s won asylum in Ecuador, but Julian Assange is no closer to getting there. The dramatic decision by the Latin American nation to identify the WikiLeaks founder as a political refugee is a symbolic boost for the embattled ex-hacker, but legal experts say that does little to help him avoid extradition to Sweden and does much to drag Britain and Ecuador into a contentious international faceoff. AP

[Image]

AP

[Image]

Getty

[Image]

AP

[Image]

Getty

[Image]

AP

[Image]

Getty

[Image]

Reuters

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Reuters

[Image]

Reuters

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Getty

[Image]

Reuters

[Image]

Getty

[Image]

AP

[Image]

Getty

[Image]

Ecuador’s Foreign Minister Ricardo Patino speaks during a news conference in Quito August 16, 2012. Ecuador has granted political asylum to WikiLeaks’ founder Julian Assange, Patino said on Thursday, a day after the British government threatened to storm the Ecuadorean embassy in London to arrest Assange. Britain has said it is determined to extradite the former computer hacker, who enraged Washington in 2010 when his WikiLeaks website published secret U.S. diplomatic cables, to Sweden where he has been accused of rape and sexual assault. Reuters

Danica Patrick-SI Swimsuit Video

TMZ – Lindsay Lohan — Dropping $$$ in Target

Lindsay Lohan has had her fair share of financial issues in the past… but now that she’s making BANK again, she had NO PROBLEM dropping a FORTUNE in Target.

Unveiled – Official and Fake Leak Sites

Official and Fake Leak Sites

 


From: To Luke Allnutt <AllnuttL[at]rferl.org>
Date: 10:54 AM 8/7/2012
Re: interview request

Dear John Young and Deborah Natsios,

I’m a journalist at RFE/RL looking at digital whistleblowing. In short, after WikiLeaks came on the scene a number of clones popped up and were heralded as the future. However, many of them are defunct today and haven’t produced the fruits the boosters were expecting.

I know Cryptome as been in the biz a lot longer and has the pedigree so I wondered if you’d be willing to speak on this subject.

If you would, it would be hugely appreciated.

Thanks and hope to hear from you.

Best Wishes,

Luke
@lukeallnutt

 


To Luke Allnutt <AllnuttL[at]rferl.org>
Date: 08/08/2012 01:01 PM
Subject: Re: interview request

We would be pleased to participate in an interview.

Our preference is to do it by email. Please provide questions when convenient.

Best regards,

John and Deborah

 


From: Luke Allnutt <AllnuttL[at]rferl.org>
Date: 05:13 AM 8/9/2012
Subject: Re: interview request

Dear John and Deborah,

Thanks very much for agreeing to answer a couple of questions. Here goes:

To your knowledge, what has been the most successful digital whistleblowing site started in the wake of WikiLeaks? a) in terms of the protections they offer leakers and b) in terms of the material they have produced.

Public Intelligence (publicintelligence.net), for a group-sponsored website. (Although there are dozens around the world)Crytocomb.org, for a single-person website. (Although there are dozens others around the world)

The multi-personed Anonymous in many iterations and global locations, for material distributed through a variety of outlets.

The hundreds of outlets, websites, blogs, social media, news fora, which do not claim to be leak sites but produce that kind of material along with other materials.

A number of whistleblowing sites, set up in the last couple of years, are flagging. Some are defunct; others are operational but don’t seem to have produced much. Why do you think that is?

Most are not meant to be long-lived in order to avoid attack against a prolonged operation.Multiplicity diffuses targetability.

Material is being distributed by less-publicized means, not publicized at all or concealed in other types of material.

A substantial number are fake sites operated by officials to sting, fail, confuse and stigmatize.

What would be the biggest challenge for someone wanting to start up a whistleblowing website? Cost, time, pressure from governments, establishing a secure system, data overload?

Believing that it cannot be done, that operators will be criminalized, that security is impossible, that it is too hard, that it is too expensive. None of these are true.

How do people submit documents to Cryptome? Just by email? Does that provide the leaker with protection?

By a variety of means, and ingenuity is ever fertile. We advise sources to protect themselves, that we cannot do that nor can any other outlet, that promised protection and security is always fraudulent, either by design or by ignorance. This is not limited to disclosures but covers all forms of security from national to personal.

Would you consider a WikiLeaks-style drop box/submission form that might better protect identities?

Drop boxes are one among many and only one is never enough. Submitters should have many identities, one is never enough.

Do you know of a highly secure open source drop box that could be used by digital whistleblowing start-ups?

There are quite a few, and they are evanescent, variable, deceptive, self-serving and none are risk-free. No source should ever trust an outlet because outlets never expose themselves to risk as great as risk to a source. No outlet should ever trust a source because sources never expose themselves to risk as great as risk to an outlet. Treachery and deception should be expected, that is the essence of disclosures, aka, leaks — they are agenda-driven, meant to delude, deceive, propagandize, cheat, profit, muddle, distort and much more.Disclosures are always partial and nobody should believe them until wedded to other forms of information.

“Leaks,” a particularly venal form of disclosure due to the term’s invention for over-dramatization for newsworthiness, aim at seducing and manipulating consumers, therefore should be considered to be advertizing, to wit, caveat emptor.

Cryptome does not call its material leaks, whistleblowing or secret-spilling, due to the excessive abuse of those advertizing terms.

Thanks again for offering to answer these questions. Look forward to your answers.

Very Best Wishes,

Luke

 


From: Luke Allnutt <AllnuttL[at]rferl.org>
Date: 02:02 PM 8/14/2012
Subject: Re: interview request

John, Deborah:

Thanks so much for your answers. I have one follow-up question for you, related to something you said.

“A substantial number are fake sites operated by officials to sting, fail, confuse and stigmatize.”

Do you have any specific examples you could share with me?

Best Wishes,

Luke

 


To: Luke Allnutt <AllnuttL[at]rferl.org>
Date: 03:33 PM, 8/14/2012
Re: interview request

This site provides a variety of “fake sites operated by officials to sting, fail, confuse and stigmatize:”

http://leakdirectory.org/index.php/Leak_Site_Directory

This paper proposes official fake sites as well using the manipulative term “responsible disclosure:”

http://cryptome.org/2012/08/whistleblowing-wl-world.htm

The US Freedom of Information program is a fake official disclosure mechanism.

Press offices of government agencies, corporations and organizations are fake leak sites.

Best regards,

John and Deborah

__________

To: Luke Allnutt <AllnuttL[at]rferl.org>
Date: 03:38 PM, 8/14/2012
Re: interview request

Correction:

Freedom of Information programs in all nations, not just the US, are official fake leak sites.

You will not take offense as a journalist when we note that RFERL is an official fake leak site.

John and Deborah

TOP-SECRET – Center for Naval Analyses Study: The War in Southern Afghanistan 2001-2008

https://publicintelligence.net/wp-content/uploads/2012/08/CNA-WarSouthernAfghanistan.png

This study examines the history of the fighting in southern and western Afghanistan since 2001. The Marine Corps Intelligence Activity sponsored the study. Its purpose is to give Marines a basic understanding of what has happened in southern and western Afghanistan. Most Marines will operate in that area and we hope a historical reference source will be useful.

If the study has any single argument it is that government misrule has been a driving factor behind the continuing violence in southern and western Afghanistan. The Afghan government favored warlords, handicapped competent governors, took part in the poppy trade, and allowed the police to abuse the people. Scarcity of security forces and collateral damage from Coalition operations did not help either. Yet above all, we find it unlikely that the instability in southern and western Afghanistan today could have been averted without addressing government misrule.

The study is divided into 3 sections:

• The first section looks at the history of the fighting in southern Afghanistan from 2001 to 2006, when few Coalition forces were in the area. The focus is upon Helmand and Kandahar.

• The second section looks at the history of the fighting in southern Afghanistan from 2006 to 2008, a period of intense violence when Coalition reinforcements tried to hold back the Taliban tide. Again, the focus is upon Helmand and Kandahar, although we do cover events the western province of Farah.

• The third section looks at the history of the fighting in Farah province in detail.

Please also note the index at the end of the study, which hopefully enables Marines to lookup topics of interest quickly.

The War in Southern Afghanistan, 2001–2006

Southern Afghanistan has always been the heart of the Taliban. It is where the Taliban originated and from where they conquered the vast majority of the country. It is now the main battlefield of the war in Afghanistan. Since 2006, the Taliban have held Kandahar, Afghanistan’s second city, under threat. If they succeed in wresting it from the Afghan government, the state of Afghanistan will be dealt a crippling blow; perhaps a mortal one. How did it come to this? After a supposedly crushing defeat at the hands of the Northern Alliance and United States, how did the Taliban all but regain control of the south? This paper attempts to answer that question, focusing on the period from 2002 to the middle of 2006. A second paper will look at how the Afghan government and Coalition have tried to push back the Taliban since the middle of 2006.

The key points from this section are:

• The resurgence of the Taliban in southern Afghanistan is largely due to a US and Afghan policy of backing warlords. The policy of working with warlords from certain tribes resulted in the exclusion of other tribes.
• The Taliban won over the allegiance of these marginalized tribes as well as other marginalized groups.
• With new tribal allies and a cut of the poppy trade, the Taliban were able to marshal sufficient resources to take on the government.
• Poppy eradication increased local opposition to the government.
• The government could not rally enough popular support to defeat the Taliban.
• The scarcity of Coalition forces allowed the Taliban to openly challenge the government but better government policies could have stopped the Taliban from having any popular or tribal support in the first place.

The Marine Corps Intelligence Activity sponsored this research. The conclusions herein do not necessarily represent the position of the United States Marine Corps.

Collateral Damage

Some Coalition operations, including air strikes in prosecution of the high value targeting campaign, may have had a negative impact. In 2008, there were 2,118 civilian casualties reported throughout Afghanistan, an increase from the 1,523 reported in 2007. Nearly 900, 41 percent of the 2008 total, occurred in the south. While 567 of those casualties in the south were caused by insurgents, more attention was drawn to the 274 deaths caused by Coalition forces.

Casualties caused by Coalition military operations were often cited in the press as a reason for declining popular support with the Afghan people. Polls backed up these reports. Support of the US military throughout the country steadily declined, from 78 percent of respondents in 2006 to 71 percent in 2007 and 63 percent in 2009. Air strikes were particularly criticized, even by President Karzai. In a 2009 poll, 77 percent of respondents said that air strikes were unacceptable in fighting the Taliban because they endangered too many civilians. US forces began to rely heavily on air strikes once operational restrictions were lifted in 2005. In just six months during 2006, the United States conducted more than 2,000 air strikes throughout Afghanistan, with a particular focus on southern Afghanistan.

Nearly 2,000 tons of munitions were dropped in 2007, which decreased in 2008 to 1,314 tons.

The Taliban exploited the effects of the air strikes. Following Hezbollah’s example, the Taliban provided aid for airstrike victims’ families, enabling them to “garner support in the southern provinces.” The United States has since attempted to mirror that strategy. One reason why casualties caused by Coalition military operations tended to receive criticism is that the Taliban were faster at releasing information (often fabricated). The Coalition used an anachronistic approach in which public messages had to go through several layers of bureaucracy to be approved for accuracy before being signed off for release. As a special operations officer observed, “the Taliban’s ‘message is out on the street within hours,’ while the coalition is still ‘trying to get ground truth … The first with the most news has established the agenda and everybody else’s after that is just kind of secondary.’”

Does this mean the war is unwinnable? That assessment cannot be made at this point. There is simply not enough information. The situation is not bad enough to say that defeat is inevitable, or even highly likely. Too many counterinsurgencies have fallen apart only after the military situation became far worse; the South Vietnamese in 1974 or the Soviets in Afghanistan in 1988, for example. Of course, other counterinsurgencies have been defeated under far better conditions; the French in Algeria in 1960, the Rhodesians in 1980, for example. It is common to say that the safe haven in Pakistan will make counterinsurgency very difficult, if not impossible. Yet insurgencies in Iraq, Colombia, and Oman were all dealt serious blows in spite of the existence of a nearby safe haven. All this can only leave us undecided. Perhaps if Kandahar was about to fall, Coalition outposts were being overrun, and insurgents were moving on Kabul, or if mass protests were breaking out across the United States, we could say with some certainty that the war is lost. But that is not the case today. The counterinsurgency is difficult but is not necessarily doomed to defeat.

So what insights does history give us about the way ahead? A narrative history such as this cannot truly recommend the right strategy but it can certainly help inform strategy. First, it is hard to read the history and not leave with the impression that more forces would be useful. The ease with which the Taliban returned to the south, the besieging of the British and Canadian forces in their lonely outposts, the travails of Musa Qala, and Taliban shadow government all stem partly from a scarcity of forces.

Second, any strategy ought to consider how the Coalition can improve its counterinsurgency techniques. The Coalition took too many years to get to the holding and building and the advisory effort necessary for success. Even today collateral damage remains a major concern. Our air strikes and house searches may be offending potential allies and pushing them into the arms of the Taliban.

Finally, it is hard to see how lasting success will be achieved without addressing government misrule. Fixing abusive, corrupt, and biased government leaders and police is no easy task. But it is not impossible. Advisors can mentor. Money can be used to induce better behavior. Bad leaders can be removed. Good leaders can be promoted. Local government bodies can be restructured. Nothing underlies the rise of the insurgency in southern and western Afghanistan as much as government misrule.

These insights may sound negative. To an extent they are, but there is cause for optimism. For if the difficulties in Afghanistan come partly from our own mistakes, or those of the Afghan government, then better decisions may be able to improve the situation. Victory is not assured. Neither is defeat.

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

CNA-WarSouthernAfghanistan

Movie – Robert Riggs Featured “Free To Murder Again” Serial Killer Kenneth McDuff

This is the single most popular episode of the series. It features Investigative Reporter Robert Riggs pursuit of serial killer Kenneth McDuff. McDuff is the only criminal in Texas History to receive three death penalties. He murdered dozens of women after receiving a highly questionable early parole from the Texas prison system.

WIE MICH DIE STASI-“GoMoPa”-SCHEISSHAUSFLIEGEN MIT GOOGLE-EINTRÄGEN ERPRESSEN WOLLTEN

https://berndpulch.org/bernd-pulch-der-beweis-%E2%80%93-so-wollte-der-serienbetruger-klaus-maurischat-uns-zwingen-die-berichterstattung-uber-den-%E2%80%9Cnachrichtendienst%E2%80%9D-%E2%80%9Cgomopa%E2%80%9D-einzustellen/

https://berndpulch.org/2011/02/24/weitere-erpressung-des-vorbestraften-serienbetrugers-klaus-maurischat-gomopa/

ERPRESSUNG VON MERIDAN CAPITAL DURCH DIE ANONYMEN “GoMoPa”-Scheisshausfliegen (Eigenbezeichnung)

http://www.google.com/url?sa=t&rct=j&q=bernd%20pulch%20erpressung%20durch%20gomopa&source=web&cd=11&ved=0CBgQFjAAOAo&url=http%3A%2F%2Finvestment-magazin.tv%2F%3Fpage_id%3D2953&ei=z3KtTpFhg9HhBMi_hPMO&usg=AFQjCNHlD6h04-uOBIxRsta0CDm6PjB_bw

DIE SÜDDEUTSCHE ZEITUNG, DAS HANDELSBLATT UND DIE FAZ SOWIE EX-CAPITAL-CHEFREDAKTEUR BRUNOWSKY ÜBER DIE ERPRESSUNGEN DER “GoMoPa”-Scheisshausfliegen (Eigenbezeichnung) BEISPIEL WIRECARD ETC

https://berndpulch.org/2011/09/27/suddeutsche-zeitung-uber-die-kriminellen-machenschaften-der-gomopa-3/

https://berndpulch.org/faz-frankfurter-allgemeine-zeitung-uber-gomopa/

http://meridiancapital.wordpress.com/

http://brunowsky.blogspot.co.at/2011/11/nepper-schlepper-bauernfanger-im.html#links

http://www.handelsblatt.com/finanzen/boerse-maerkte/boerse-inside/marktgeruechte-finanzaufsicht-untersucht-kursachterbahn-bei-wirecard/3406252.html

Jessica White Bodypainting-SI Swimsuit

Jessica White Bodypainting, Sports Illustrated Swimsuit 2009

Opfer berichten über die dubiosen Zusammenhänge zwischen STASI, RAF, NSU und “GoMoPa”

http://www.victims-opfer.com/?p=30890

http://www.victims-opfer.com/?p=31147

http://www.victims-opfer.com/?tag=gomopa&paged=6

 

Communist Terror – Pusscat Riot sentenced to 2 yeras for Punk Prayer

https://i0.wp.com/static.guim.co.uk/sys-images/Guardian/About/General/2012/7/30/1343669073793/Trial-on-Pussy-Riot-punk--008.jpg

  Three members of an all-girl Russian punk band were each sentenced to two years in prison Friday for staging a guerrilla performance of a song that criticized Vladimir Putin.

The members of Pussy Riot — one of whom is a permanent resident of Canada — have already been in jail for six months.

Their conviction and sentencing on Friday triggered a wave of global protests at Russian embassies in cities around the world.

Immediately after the decision was issued, Twitter came alive with supporters of the band slamming the ruling and calling on like-minded sympathizers to join demonstrations.

Maria Alyokhina, 24, Nadezhda Tolokonnikova, 22, and Yekaterina Samutsevich, 29, were charged with hooliganism connected with religious hatred after they stormed into a central cathedral in Moscow and briefly performed a song that entreated the Virgin Mary to protect Russia from Putin.

Videos of the performance show masked band members jumping, kicking and punching the air near the altar of the church, while also bowing down in an apparent mockery of orthodox prayer.

It has been described as a “punk prayer,” though the judge in their trial said the obscenity-laced, flash mob-style performance showed a “complete lack of respect” for Orthodox believers and was a premeditated violation of public order.

The incident took place in February, when Putin was on the verge of winning a new term as Russian president.

In recent weeks the case has made headlines around the world and support has galvanized for the women, two of whom have young children and have not been allowed to see their families.

“It is exposing the actual concerns that we have been expressing for quite some time about the restriction on freedom of expression, freedom of association and freedom of assembly,” said David Diaz-Jogeix, of the human rights advocacy group Amnesty International.

The group has been calling for the immediate and unconditional release of the band members, saying their performance did not constitute a criminal act.

A number of international pop stars have expressed their support for the group, including Paul McCartney, Madonna and Bjork.

But Diaz-Jogeix said within Russia people are also standing up for the group and going public with their support.

“No matter what the decision is, what I think is important is that the Russian society is mobilizing together with help from international countries such as Canada,” he told CTV’s Canada AM before the decision was released.

Prosecutors had asked for three-year sentences for the women, down from the possible seven-year maximum. Putin himself had said he hoped the sentencing would not be “too severe.”

Lynn Flatley, who has organized a Toronto demonstration in support of the women, said she was inspired to take action after learning about their case.

“I felt it was so wrong on so many levels I felt I had to do something. I had never done anything like this but it was a tipping point for me,” she told Canada AM.

Die regierungskritischen Musikerinnen der russischen Punk-Band Pussy Riot müssen für zwei Jahre ins Gefängnis.

Ein Moskauer Gericht verurteilte die drei jungen Frauen am Freitag wegen religiös motivierten Rowdytums. Die Bandmitglieder hatten im Februar in einer Moskauer Kathedrale den Altarraum gestürmt und in einem “Punk-Gebet” ihre Wut über Wladimir Putin zum Ausdruck gebracht. Das Verfahren wirft ein Schlaglicht auf den umstrittenen Umgang Russlands mit der Meinungsfreiheit und hat international eine Welle der Solidarität ausgelöst. Dagegen bekennen nur wenige Russen Sympathie für die Angeklagten. Die Staatsanwaltschaft hatte jeweils drei Jahre Haft gefordert.

Der Vorwurf “Rowdytum aus religiösem Hass” hätte den Angeklagten im Alter von 22, 24 und 30 Jahren bis zu sieben Jahre Gefängnis eintragen können. Die Richterin bezeichnete bei der Verlesung des Strafmaßes das Vorgehen der Frauen in der Kirche als Blasphemie und Sakrileg. Die in Handschellen gelegten Angeklagten hatten ihren Schuldspruch zuvor schweigend vernommen. Nach Meinung der Pussy-Riot-Aktivistinnen und ihrer Unterstützer steht der Prozess für die Gefährdung von Freiheitsrechten. “Unsere Inhaftierung ist ein klares und eindeutiges Signal, dass dem ganzen Land die Freiheit genommen werden soll”, schrieb die Angeklagte Nadeschda Tolokonnikowa aus der Untersuchungshaft.

 

 

Kate Winslet Net Worth – $ 35 Million

 

File:KateWinsletByAndreaRaffin2011.jpg

Kate Winslet was born in England and has an estimated net worth of $35 million dollars. An actress who became known internationally for her first film role in “Heavenly Creatures”, Kate Winslet has gone on to have both commercially and critically successful career. She has starred in such films as, “Sense and Sensibility”, “Titanic”, “Eternal Sunshine of the Spotless Mind”, and won an Oscar for her work in “The Reader”.

TOP-SECRET – U.S. Strategic Bombing Survey: The Effects of the Atomic Bombings of Hiroshima and Nagasaki June 1946

https://publicintelligence.net/wp-content/uploads/2012/08/USSBS-NagasakiHiroshima.png

 

The following report was compiled by the U.S. Strategic Bombing Survey convened during the Roosevelt administration to analyze strategic bombing in both the European and Pacific campaigns during World War II.  The following report from 1946 on the atomic bombings of Hiroshima and Nagasaki is held at the Harry S. Truman Library and Museum.  A more legible version of the report from a later printing is also available online from the Roger Williams University Library.

 

The available facts about the power of the atomic bomb as a military weapon lie in the story of what it did at Hiroshima and Nagasaki. Many of these facts have been published, in official and unofficial form, but mingled with distortions or errors. The U.S. Strategic Bombing Survey, therefore, in partial fulfillment of the mission for which it was established, has put together in these pages a fairly full account of just what the atomic bombs did at Hiroshima and Nagasaki. Together with an explanation of how the bomb achieved these effects, this report states the extent and nature of the damage, the casualties, and the political repercussions from the two attacks. The basis is the observation, measurement, and analysis of the Survey’s investigators. The conjecture that is necessary for understanding of complex phenomena and for applying the findings to the problems of defense of the U.S. is clearly labeled.

When the atomic bombs fell, the U.S. Strategic Bombing Survey was completing a study of the effects of strategic bombing on Germany’s ability and will to resist. A similar study of the effects of strategic bombing on Japan was being planned. The news of the dropping of the atomic bomb gave a new urgency to this project, for a study of the air war against Japan clearly involved new weapons and new possibilities of concentration of attack that might qualify the effectiveness of air power. The directors of the Survey, therefore, decided to examine exhaustively the effects of the atomic bombs, in order that the full impact on Japan and the implications of their results could be confidently analyzed. Teams of experts were selected to study the scenes of the bombings from the special points of emphasis of physical damage, civilian defense, morale, casualties, community life, utilities and transportation, various industries, and the general economic and political repercussions. In all, more than 110 men – engineers, architects, fire experts, economists, doctors, photographers, draftsmen – participated in the field study at each city, over a period of ten weeks from October to December, 1945. Their detailed studies, now being published, are listed in an appendix to this summary report.

In addition, close liaison was maintained with other investigating units. Cooperation was received from, and extended to, the following groups:

– The Joint Commission for the Investigation of the Atomic Bomb in Japan
– The British Mission to Japan
– The Naval Technical Mission to Japan

Special acknowledgement is due to the medical groups of the Joint Commission, whose data and findings have been generously made available to the Survey. On medical aspects of the bombings, the Joint Commission was the chief fact-finding group; it will present its definitive report in the near future. In other fields, however — particularly the study of physical damage and the impact on community life — the Survey collected its own data and is the primary source.

II. The Effects of the Atomic Bombings

A. The Attacks and Damage

1. The Attacks

A single atomic bomb, the first weapon of its type ever used against a target, exploded over the city of Hiroshima at 0815 on the morning of 6 August 1945. Most of the industrial workers had already reported to work, but many workers were enroute and nearly all the school children and some industrial employees were at work in the open on the program of building removal to provide firebreaks and disperse valuables to the country. The attack came 45 minutes after the “all clear” had been sounded from a previous alert. Because of the lack of warning and the populace’s indifference to small groups of planes, the explosion came as an almost complete surprise, and the people had not taken shelter. Many were caught in the open, and most of the rest in flimsily constructed homes or commercial establishments.

The bomb exploded slightly northwest of the center of the city. Because of this accuracy and the flat terrain and circular shape of the city, Hiroshima was uniformly and extensively devastated. Practically the entire densely or moderately built-up portion of the city was leveled by blast and swept by fire. A “fire-storm”, a phenomenon which has occurred infrequently in other conflagrations, developed in Hiroshima: fires springing up almost simultaneously over the wide flat area around the center of the city drew in air from all directions. The inrush of air easily overcame the natural ground wind, which had a maximum velocity of 30 to 40 miles per hour two to three hours after the explosion. The “fire-wind” and the symmetry of the built-up center of the city gave a roughly circular shape to the 4.4 square miles which were almost completely burned out.

The surprise, the collapse of many buildings, and the conflagration contributed to an unprecedented casualty rate. Seventy to eighty thousand people were killed, or missing and presumed dead, and an equal number were injured. The magnitude of casualties is set in relief by a comparison with the Tokyo fire raid of 9/10 March 1945, in which, though nearly 16 square miles were destroyed, the number killed was no larger and fewer people were injured.

At Nagasaki, three days later, the city was scarcely more prepared, though vague references to the Hiroshima disaster had appeared in the newspaper of 8 August. From the Nagasaki Prefectural Report on the bombing, something of the shock of the explosion can be inferred:

“The day was clear with not very much wind — an ordinary midsummer’s Day. The strain of continuous air attack on the city’s population and the severity of the summer had vitiated enthusiastic air raid precautions. Previously, a general alert had been sounded at 0748, with a raid alert at 0750; this was cancelled at 0830, and the alertness of the people was dissipated by a great feeling of relief.”

The city remained on the warning alert, but when two B-29’s were again sighted coming in the raid signal was not given immediately; the bomb was dropped at 1102 and the raid signal was given a few minutes later, at 1109. Thus only about 400 people were in the city’s tunnel shelters, which were adequate for about 30 per cent of the population.

“When the atomic bomb exploded, an intense flash was observed first as though a large amount of magnesium had been ignited, and the scene grew hazy with white smoke. At the same time at the center of the explosion, and a short while later in other areas, a tremendous roaring sound was heard and a crushing blast wave and intense heat were felt. The people of Nagasaki, even those who lived on the outer edge of the blast, all felt as though they had sustained a direct hit, and the whole city suffered damage such as would have resulted from direct hits everywhere by ordinary bombs.”

“The Zero area where the damage was most severe was almost completely wiped out and for a short while after the explosion no reports came out of that area. People who were in comparatively damaged areas reported their condition under the impression that they had received a direct hit. If such a great amount of damage could be wreaked by a near miss, then the power of the atomic bomb is unbelievably great.”

In Nagasaki, no fire storm arose, and the uneven terrain of the city confined the maximum intensity of damage to the valley over which the bomb exploded. The area of nearly complete devastation was thus much smaller: only about 1.8 square miles. Casualties were lower also; between 35,000 and 40,000 were killed, and about the same number injured. People in the tunnel shelters escaped injury, unless exposed in the entrance shaft.

The difference in the totals of destruction to lives and property at the two cities suggests the importance of the special circumstances of layout and construction of the cities, which affect the results of the bombings and must be considered in evaluating the effectiveness of the atomic bombs. An account of the nature and history of each city will give meaning to the details of the damage and disorganization at each.

2. HIROSHIMA

The city of Hiroshima is located on the broad fan-shaped delta of the Ota River, whose seven mouths divide the city into six islands which project finger-like into Hiroshima Bay of the Inland Sea. These mouths of the river furnished excellent firebreaks in a city that is otherwise flat and only slightly above sea level. A highly developed bridge system with 81 important bridges, joined the islands. A single kidney shaped hill in the eastern part of the city, about one-half mile long and rising to an elevation of 221 feet, offered some blast protection to structures on the eastern side opposite the point of fall of the bomb. Otherwise, the city was uniformly exposed to the spreading energy from the bomb.

The city boundary extends to some low hills to the west and northeast and embraces 26.36 square miles, only thirteen of which were built up. Seven square miles were densely or moderately built up, the remainder being occupied by sparsely built-up residential, storage, hilly sections. In the central area, no systematic separation of commercial, industrial, and residential zones existed, though there were rough functional sections. The main commercial district was located in the center of the city, and with the adjoining Chugoku Regional Army Headquarters occupied the greater portion of the central island. Residential areas and military barracks overlapped and surrounded this central area. The bulk of the industries were located on the perimeter of the city, either on the southern ends of the islands (where the Hiroshima airport was also situated) or to the east of the city. The residential, commercial, and military — contained 75 percent of the total population. If there were, as seems probable, about 245,000 people in the city at the time of the attack, the density in the congested area must have been about 46,000 per square mile. Five completed evacuation programs and a sixth then in progress had reduced the population from its wartime peak of 380,000.

In Hiroshima (and in Nagasaki also) the dwellings were of wood construction; about one-half were one story and the remainder either one and one-half or two stories. The roof coverings were mostly either hard- burnt black tile. There were no masonry division walls, and large groups of dwellings clustered together. The type of construction, coupled with antiquated fire-fighting equipment and inadequately trained personnel, afforded even in peacetime a high possibility of conflagration. Many

wood framed industrial buildings were of poor construction by American standards. The principal points of weakness were the extremely small tendons, the inadequate tension joints, and the inadequate or poorly designed lateral bracings. Reinforced concrete framed buildings showed a striking lack of uniformity in design and in quality of materials. Some of the construction details (reinforcing rod splices, for example) were often poor, and much of the concrete was definitely weak; thus some reinforced concrete buildings collapsed and suffered structural damage when within 2,000 feet of ground zero, and some internal wall paneling was demolished even up to 3,800 feet. (For convenience, the term “ground zero” will be used to designate the point on the ground directly beneath the point of detonation, or “air zero”.)

Other buildings, however, were constructed far more strongly than is required by normal building codes in America, to resist earthquakes. Furthermore, construction regulations in Japan have specified since the 1923 earthquake that the roof must safely carry a minimum load of 70 pounds per square foot whereas American requirements do not normally exceed 40 pounds per square foot for similar types. Though the regulation was not always followed, this extra strong construction was encountered in some of the buildings near ground zero at Hiroshima, and undoubtedly accounts for their ability to withstand atomic bomb pressures without structural failures. Nearly 7 percent of the residential units had been torn down to make firebreaks.

Hiroshima before the war was the seventh largest city in Japan, with a population of over 340,000, and was the principal administrative and commercial center of the southwestern part of the country. As the headquarters of the Second Army and of the Chugoku Regional Army, it was one of the most important military command stations in Japan, the site of one of the largest military supply depots, and the foremost military shipping point for both troops and supplies. Its shipping activities had virtually ceased by the time of the attack, however, because of sinkings and the mining of the Inland Sea. It had been relatively unimportant industrially before the war, ranking only significance. These factories were not concentrated, but spread over the outskirts of the city; this location, we shall see, accounts for the slight industrial damage.

The impact of the atomic bomb shattered the normal fabric of community life and disrupted the organizations for handling the disaster. In the 30 percent of the population killed and the additional 30 percent seriously injured were included corresponding proportions of the civic authorities and rescue groups. A mass flight from the city took place, as persons sought safety from the conflagration and a place for shelter and food. Within 24 hours, however, people were streaming back by the thousands in search of relatives and friends and to determine the extent of their property loss. Road blocks had to be set up along all routes leading into the city, to keep curious and unauthorized people out. The bulk of the dehoused population found refuge in the surrounding countryside; within the city the food supply was short and shelter virtually non-existent.

On August 7, the commander of the Second Army assumed general command of the counter-measures, and all military units and facilities in the area were mobilized for relief purposes. Army buildings on the periphery of the city provided shelter and emergency hospital space, and dispersed Army supplies supplemented the slight amounts of food and clothing that had escaped destruction. The need far exceeded what could be made available. Surviving civilians assisted; although casualties in both groups had been heavy, 190 policemen and over 2000 members of the Civilian Defense Corps reported for duty on 7 August.

The status of medical facilities and personnel dramatically illustrates the difficulties facing authorities. Of more than 200 doctors in Hiroshima before the attack, over 90 percent were casualties and only about 30 physicians were able to perform their normal duties a month after the raid. Out of 1,780 nurses, 1,654 were killed or injured. Though some stocks of supplies had been dispersed, many were destroyed. Only three out of 45 civilian hospitals could be used, and two large

Army hospitals were rendered unusable. Those within 3,000 feet of ground zero were totally destroyed, and the mortality rate of the occupants was practically 100 percent. Two large hospitals of reinforced concrete construction were located 4,900 feet from ground zero. The basic structures remained erect but there was such severe interior damage that neither was able to resume operation as a hospital for sometime and the casualty rate was approximately 90 percent, due primarily to falling plaster, flying glass, and fire. Hospitals and clinics beyond 7,000 feet, though often remaining standing, were badly damaged and contained many casualties from flying glass or other missiles.

With such elimination of facilities and personnel, the lack of care and rescue activities at the time of the disaster is understandable; still, the eyewitness account of Father Siemes* shows how this lack of first aid contributed to the seriousness of casualties. At the improvised first aid stations, he reports:

“…Iodine is applied to the wounds but they are left uncleansed. Neither ointment nor other therapeutic agents are available. Those that have been brought in are laid on the floor and no one can give them any further care. What could one do when all means are lacking? Among the passersby, there are many who are uninjured. In a purposeless, insensate manner, distraught by the magnitude of the disaster, most of them rush

by and none conceives the thought of organizing help on his own initiative. They are concerned only with the welfare of their own families–in the official aid stations and hospitals, a good third or half of those that had been brought in died. They lay about there almost without care, and a very high percentage succumbed. Everything was lacking, doctors, assistants, dressings, drugs, etc…”

Effective medical help had to be sent in from the outside, and arrived only after a considerable delay. Fire fighting and rescue units were equally stripped of men and equipment. Father Siemes reports that 30 hours elapsed before any organized rescue parties were observed. In Hiroshima, only 16 pieces of fire-fighting equipment were available for fighting the conflagration, three of them borrowed. However, it is unlikely that any public fire department in the world, even without damage to equipment or casualties to personnel, could have prevented development of a conflagration in Hiroshima, or combatted it with success at more than a few locations along its perimeter. The total fire damage would not have been much different.

All utilities and transportation services were disrupted over varying lengths of time. In most cases, however, the demand fell off even more precipitously than the available supply, and where the service was needed it could be restored at a minimal level. Thus, through railroad service was possible on 8 August, only two days after the attack, when fire trucks still had to be used to pump water into the locomotives because of insufficient water pressure. Electric power from the general network was available in most of the surviving parts of the city on 7 August, and only one plant, the Engineering Division of Mitsubishi Heavy Industries, was hampered in its recovery by the inability to obtain sufficient power for several weeks.

The water reservoir, which was of reinforced concrete and earthcovered, was undamaged; it was nearly two miles from the blast center. However, 70,000 breaks of pipe connections in buildings and dwellings were caused by blast and fire effects. No subsurface pipes were crushed and no leaks resulted from blast as a direct cause, though several leaks in underground mains resulted from falling debris. Pressure in the city center dropped to zero because of the connection breaks and the damage to a 16-inch and a 14- inch water main where they crossed damaged bridges. Six sewer pumping stations were rendered inoperable by fire and blast within a radius of one mile. The remaining eight stations were only slightly damaged, but no effort was made to repair or operate them. Water tables rose at flood periods and lands behind revetments were inundated.

Trolley cars, trucks, and railroad rolling stock suffered extensive damage. Transportation buildings (offices, stations, living quarters, and a few warehouses) were damaged by fire in the passenger station area, but damage was slight to the roundhouses, transit sheds, warehouses, and repair units in the classification and repair area. About 200 railroad employees were killed, but by 20 August, 14 days after the attack, 80 percent of the employees were at work.

The electric power transmission and distribution system was wrecked; only power equipment of rugged construction, such as transformers, resisted the blast and heat within the devastated areas. Instruments were damaged beyond repair, and switches, switchyard insulators, cables, and copper bus work were rendered unusable. The telephone system was approximately 80 percent damaged, and no service was restored until 15 August 1945.

Industry in the center of the city was effectively wiped out. Though small workshops numbered several thousand, they represented only one- fourth of the total industrial production of Hiroshima, since many of them had only one or two workers. The bulk of the city’s output came from large plants located on the outskirts of the city: one-half of the industrial production came from only five firms. Of these larger companies, only one suffered more than superficial damage. Of their working force, 94 percent were uninjured. Since electric power was available, and materials and working force were not destroyed, plants ordinarily responsible for nearly three-fourths of Hiroshima’s industrial production could have resumed normal operation within 30 days of the attack had the war continued.

Immediately after the attack, the presence of these nearly intact industries spurred counter-measures in an effort to retain for the nation’s war effort the potential output of the city. The prefectural governor issued a proclamation on 7 August, calling for “a rehabilitation of the stricken city and an aroused fighting spirit to exterminate the devilish Americans”. To prevent the spread of rumors and brace morale, 210,000 out-of-town newspapers were brought in daily to replace the destroyed local paper. On 16 August, regular rationing was resumed. Care of the injured and disposal of corpses remained urgent, but other steps were few.

By 1 November, the population of Hiroshima was back to 137,000. The city required complete rebuilding. The entire heart, the main administrative and commercial as well as residential section, was gone. In this area only about fifty buildings, all of reinforced concrete, remained standing. All of these suffered blast damage and all save about a dozen were almost completely gutted by fire; only five could be used without major repairs. These burnt-out structural frames rose impressively from the ashes of the burned over section where occasional piles of rubble or twisted steel skeletons marked the location of brick or steel frame structures. At greater distances light steel frame and brick structures remained undamaged. Blast damage to wood frame buildings and to residences extended well beyond the burned over area, gradually becoming more erratic and spotty as distances were reached where only the weakest buildings were damaged, until in the outer portions of the city only minor disturbances of the tile roofs or breakage of glass were visible. The official Japanese figures summed up the building destruction at

62,000 out of a total of 90,000 buildings in the urban area, or 69%. An additional 6,000 or 6.6% were severely damaged, and most of the others showed glass breakage or disturbance of roof tile. These figures show the magnitude of the problem facing the survivors.

Despite the absence of sanitation measures, no epidemics are reported to have broken out. In view of the lack of medical facilities, supplies and personnel, and the disruption of the sanitary system, the escape from epidemics may seem surprising. The experience of other bombed cities in Germany and Japan shows that this is not an isolated case. A possible explanation may lie in the disinfecting action of the extensive fires.

In later weeks, disease rates rose, but not sharply.

3. Nagasaki

Nagasaki is located on the best natural harbor of western Kyushu, a spacious inlet in the mountainous coast. The city is a highly congested urban pattern extending for several miles along the narrow shores and up the valleys opening out from the harbor. Two rivers, divided by a mountain spur, form the two main valleys in whose basins the city lies: the Urakami River, in whose basin the atomic bomb fell, running into the harbor from a NNW direction, and the Nakashima River, running from the NE. This mountain spur and the irregular lay-out of the city effectively reduced the area of destruction.

The main residential and commercial districts are intermingled in these two river basins. The large industrial plants stretch up the west shore of the bay and up the Urakami Valley. Though the metropolitan area of the city is officially about 35 square miles and stretches far into the countryside, the heavily built-up area is confined by the terrain to less than four square miles. The greatest population density thus approximated 65,000 per square mile even after the evacuations.

Despite its excellent harbor, Nagasaki’s commercial importance, though great in previous centuries, had declined in recent years because of the city’s isolated peninsular position and the difficulties of transportation through the mountains by inadequate roads and railroad facilities. As a naval base it had been supplanted by Sasebo. Industry gradually increased in importance, primarily under Mitsubishi influence. The four largest companies in the city were the Mitsubishi Shipyards, Electrical Equipment Works, Arms Plant, and Steel Works, employing nearly 90 percent of the city’s labor force. Administratively, Nagasaki was by 1941 of merely local importance despite being the seat of the prefectural government.

Before the atomic bombing on 9 August, Nagasaki had experienced five small-scale air attacks in the previous twelve months, by an aggregate of 136 planes which dropped a total of 270 tons of high explosive, 53 tons of incendiary, and 20 tons of fragmentation bombs.

Of these, a raid of 1 August 1945 was most effective, with several bombs falling in the Mitsubishi Shipyards and Steel Works. The scale of effect can be roughly measured, however, by comparing the toll of building damage with that from the atomic bomb; in all these raids 276 residential buildings and 21 industrial buildings were destroyed or badly damaged. When the atomic bomb fell, Nagasaki was comparatively intact.

Because the most intense destruction was confined to the Urakami Valley, the impact of the bomb on the city as a whole was less shattering than at Hiroshima. In addition, no fire storm occurred; indeed, a shift in wind direction helped control the fires. Medical personnel and facilities were hard-hit, however. Over 80 percent of the city’s hospital beds and the Medical College were located within 3,000 feet of the center of the explosion, and were completely destroyed. Reinforced concrete buildings within this range, though standing, were completely gutted by fire; buildings of wooden construction were destroyed by fire and blast. The mortality rate in this group of buildings was between 75 and 80 percent. Exact casualty figures for medical personnel are unknown, but the city seems to have fared better than Hiroshima: 120 doctors were at work on 1 November, about one-half of the pre-raid roster. Casualties were undoubtedly high: 600 out of 850 medical students at the Nagasaki Medical College were killed and most of the others injured; and of the 20 faculty members 12 were killed and four others injured.

Utilities and services were again disrupted. Both gas plants were destroyed, and the replacement time was estimated at several months. Though the basic water supply was not affected, thousands of residential feeder-line breaks were supplemented by eight breaks on a fourteen-inch main line and four breaks where another main line crossed a bridge. Electric power distribution and transmission systems were effectively destroyed in the area of heaviest destruction, but power could be supplied to the other parts of the city almost immediately.

Shipping was virtually unaffected. Trolley service was halted both by the interruption in power supply and by damage to street cars. Nagasaki is at the end of a railroad spur line. The major damage was sustained by track and railroad bridges. The rails buckled intermittently for a distance of 5,000 to 7,500 feet from ground zero, at points where burning debris set fire to wooden cross ties. Three bridges were displaced; rails were distorted and the tracks had to be completely rebuilt. The railroad stations were completely destroyed by blast and fire and the electric signal system was severely damaged. Rolling stock was slightly damaged, primarily by fire. Although the damage to equipment was not extensive, it was severe enough to curtail traffic for 48 hours, during which time sufficient emergency repair work was performed to permit resumption of limited traffic.

Control of relief measures was in the hands of the Prefecture. The sequence of clearance and repair activities illustrates the activities that were carried on.

The city’s repair facilities were completely disorganized by the atomic bomb, so that with the single exception of shutting off water to the affected areas no repairs were made to roads, bridges, water mains, or transportation installations by city forces. The prefecture took full responsibility for such restoration as was accomplished, delegating to the scattered city help the task of assisting in relief of victims. There were only three survivors of 115 employees of the street car company, and late as the middle of November 1945 no cars were running. A week after the explosion, the water works officials made an effort to supply water to persons attempting to live in the bombed out areas, but the leakage was so great that the effort was abandoned. It fell to the prefecture, therefore, to institute recovery measures even in those streets normally the responsibility of the city. Of the entire public works construction group covering the Nagasaki City area, only three members appeared for work and a week was required to locate and notify other survivors. On the morning of 10 August, police rescue units and workers from the Kawaminami shipbuilding works began the imperative task of clearing the Omura-Nagasaki pike, which was impassable for 8,000 feet. A path 6 1/2 feet wide was cleared despite the intense heat from smouldering fires, and by August 15 had been widened to permit two-way traffic. No trucks, only rakes and shovels, were available for clearing the streets, which were filled with tile, bricks, stone, corrugated iron, machinery, plaster, and stucco. Street areas affected by blast and not by fire were littered with wood. Throughout the devastated area, all wounded had to be carried by stretcher, since no motor vehicles were able to proceed through the cluttered streets for several days. The plan for debris removal required clearance of a few streets leading to the main highway; but there were frequent delays caused by the heat of smoldering fires and by calls for relief work. The debris was simply raked and shoveled off the streets. By 20 August the job was considered complete. The streets were not materially damaged by the bomb nor were the surface or the abutments of the concrete bridges, but many of the wooden bridges were totally or partially destroyed by fire.

Under the circumstances — fire, flight of entire families, destruction of official records, mass cremation — identification of dead and the accurate count of casualties was impossible. As at Hiroshima, the season of the year made rapid disposal of bodies imperative, and mass cremation and mass burial were resorted to in the days immediately after attack. Despite the absence of sanitary measures, no epidemics broke out here. The dysentery rate rose from 25/100,000 to 125/100,000. A census taken on 1 November 1945 found a population of 142,700 in the city.

At Nagasaki, the scale of destruction was greater than at Hiroshima, though the actual area destroyed was smaller because of the terrain and the point of fall of the bomb. The Nagasaki Prefectural Report describes vividly the impress of the bomb on the city and its inhabitants:

“Within a radius of one kilometer from ground zero, men and animals died almost instantaneously from the tremendous blast pressure and heat; houses and other structures were smashed, crushed and scattered; and fires broke out. The strong complex steel members of the structures of the Mitsubishi Steel Works were bent and twisted like jelly and the roofs of the reinforced concrete National Schools were crumpled and collapsed, indicating a force beyond imagination. Trees of all sizes lost their branches or were uprooted or broken off at the trunk.

“Outside a radius of one kilometer and within a radius of two kilometers from ground zero, some men and animals died instantly from the great majority were seriously or superficially injured. Houses and other structures were completely destroyed while fires broke out everywhere. Trees were uprooted and withered by the heat.

“Outside a radius of two kilometers and within a radius of four kilometers from ground zero men and animals suffered various degrees of injury from window glass and other fragments scattered about by the blast and many were burned by the intense heat. Dwelling and other structures were half or only partially damaged.”

While the conflagration with its uniformly burnt out area caught the attention at Hiroshima, the blast effects, with their resemblance to the aftermath of a hurricane, were most striking at Nagasaki. Concrete buildings had their sides facing the blast stove in like boxes. Long lines of steel framed factory sheds, over a mile from ground zero, leaned their skeletons away from the explosion. Blast resistant objects like telephone poles leaned away from the center of the explosion; on the surrounding hills trees were blown down within considerable areas. Although there was no general conflagration, fires contributed to the total damage in nearly all concrete structures. Evidence of primary fire is more frequent than at Hiroshima.

Because parts of the city were protected by hills, more than one-half of the residential units escaped serious damage. Of the 52,000 residential units in the city on 1 August, 14,146 or 27.2 percent were completely destroyed (by Japanese count) (11,494 of these were burned) ; 5,441 or 10.5 percent were half-burned or destroyed; many of the remaining units suffered superficial or minor damage. In 558 non-residential buildings in the built-up area of Nagasaki which the Survey studied, almost 60 percent of the usable floor area was destroyed or structurally damaged.

Only 12 percent was undamaged, the rest suffering superficial or minor damage.

The survival of a higher percentage of the buildings, then, distinguishes Nagasaki from Hiroshima; so also, on the other hand, does the damage to factories. In Nagasaki, only the Mitsubishi Dockyards among the major industries was remote enough from the explosion to escape serious damage. The other three Mitsubishi firms, which were responsible together with the dockyards for over 90 percent of the industrial output of the city, were seriously damaged. The Arms Plant and the Steel Works were in the main area of damage. Plant officials estimated that 58 percent of the value of the former and 78 percent of the value of the latter were destroyed: Survey investigators considered the two plants to be 50 percent destroyed. The Mitsubishi Electric Works were on the edge of the main area of destruction, but suffered 10 percent structural damage.

One or two paragraphs from the report of the commanding officer of Sasebo Naval District will illustrate the sort of damage done to industrial installations. Of two plants of the Mitsubishi Arms Works, he reports:

“With the exception of the tunnel workshops and the half-underground workshops, the Ohashi and Mori Machi Plants were completely destroyed by collapse. Reinforced concrete structures in these plants were severely damaged internally – ceilings collapsed, fittings of all sorts were destroyed, and equipment was damaged. Casting and forging shops in the Ohashi Plant were destroyed by fire, which broke out in those structures. The Mori Machi Plant was nearly completely destroyed by fire. Taking both plants together, 60% of the machinery installations was damaged. In the Ohashi Plant, from 80 to 90% of the machinery can be used again; in the Mori Machi Plant only 40 to 50% of the machinery can be used in the future.”

Or of the Mitsubishi Steel Works:

“Plant structures here (some north-light steel framed structures) suffered extensive damage to roofs and walls as steel plates were blown off. The frames themselves were bent, twisted, or toppled over, and several buildings caught fire. Hardly any of the machinery in the plant can be used again in its present condition. However, nearly 70% of the machinery can be repaired.”

In general, (as has proved true with high explosive or incendiary bombs also), the damage to machinery and other contents of a factory was less than damage to the buildings. In addition, the air burst of the atomic bomb meant that it acted indirectly on machine tools and other building contents. Though a few tools were blown over by blast, almost all the serious damage was caused by debris from damaged buildings, overturning through mass movement of buildings, or burning of buildings.

Thus the extent and sort of damage to machinery depended on the construction of the buildings housing them. In wood frame buildings, 95 percent of the machines were seriously damaged, but in reinforced concrete or steel framed buildings only one-third or one-fourth of the machines were affected seriously. As would be expected, fire caused much damage to machines in timber framed shops (practically all of which were destroyed up to 7,000 feet from ground zero) and some damage in other types of structure. Debris was a major cause of damage only in certain reinforced concrete buildings, where walls and roofs collapsed.

Shortage of raw materials had reduced operations at these four Mitsubishi plants to a fraction of their capacity. Had the raw material situation been normal and had the war continued, it is estimated that restoration of production would have been possible though slow. The dockyard, which was affected mainly by the 1 August attack rather than by the atomic bomb, would have been able to produce at 80 percent of full capacity within three or four months. The steel works would have required a year to get into substantial production, the electric works could have resumed production at a reduced rate within two months and been back at capacity within six months, and the arms plants would have required 15 months to reach two-thirds of their former capacity.

TMZ – Kristen Stewart — PISSED She’s the Fall Guy

Kristen Stewart is royally PISSED OFF that she’s the bad guy in the whole Rupert Sanders affair… but this whole DEBACLE may actually be COMPLETELY FAKE!

Die Terroranleitung der STASI im Original – The German STASI Memo – Original Document

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

terroranleitung_mfs1

 

Serial Killers: Snowtown (Full Documentary Movie)

John Bunting
Robert Wagner
Mark Haydon
James Vlassakis

The Snowtown murders, more commonly known in Australia as the Bodies in Barrels murders, were the murders of 11 people in South Australia, Australia between August 1992 and May 1999 (a twelfth charge relating to the death of Suzanne Allen was dropped due to lack of evidence). The crimes were uncovered when the remains of eight victims were found in barrels of acid located in a rented former bank building in Snowtown on 20 May 1999. The town of Snowtown is 145 kilometres (90 mi) north of Adelaide, the capital of South Australia. Though Snowtown is frequently linked with the crimes, the bodies had been held in a series of locations in South Australia at different times and were only moved to Snowtown in early 1999 after the accused became aware that police were investigating them regarding several missing person cases, very late in a crime spree that had spanned almost seven years. Only one victim was killed in Snowtown; none of the victims or the perpetrators were from that town.
Eight bodies were found in six plastic barrels in the disused bank vault on 20 May 1999. Three days later two bodies were found buried in a backyard in the Adelaide suburb of Salisbury North, a suburb north of Adelaide. By the end of June, nine of the 10 victims had been identified. The discoveries followed a lengthy, covert criminal investigation by South Australian Police. During the investigation two deaths already known to authorities were found to have been murders perpetrated by the “Snowtown” murderers.
A total of four people were arrested and charged over the murders. All were convicted of the murders or assisting in the murders. The court decided that John Justin Bunting was the ringleader of this conspiracy. More than 250 suppression orders prevented publication of details of this case. In early 2011, a judge lifted the remaining orders in response to a request by the producers of the film Snowtown, a dramatic account of the murders.

STASI-Opfer dokumentieren die Morde und die Mordstudie von STASI-Oberst Ehrenfried Stelzer

Cryptome unveils – Shorrock: Spies for Hire Abraxas and TrapWire

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

spies-for-hire

TMZ – Martin Scorsese — The Greatest Movie Of ALL TIME

We asked Martin Scorsese — possibly the greatest movie director who ever lived — what his favorite movie is … AND HE ACTUALLY ANSWERED.

STASI – Die geheimen Trefforte enthüllt

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

Text-Geheime-Trefforte

Video – Ecuador Grants Assange Asylum

DemocracyNow.org – As Ecuador prepared to announce its decision on granting asylum to WikiLeaks founder Julian Assange, Britain threatened to raid the Ecuadorian embassy in London where Assange has taken refuge for the past two months. Britain told Ecuador that giving Julian Assange asylum would not change a thing and that it might still revoke the diplomatic status of Quito’s embassy in London to allow the extradition of the WikiLeaks founder to Sweden, to face questioning over alleged sexual misconduct. We’re joined by Michael Ratner, an attorney for Julian Assange and President Emeritus of the Center for Constitutional Rights; and by Ben Griffin, an activist with Veterans for Peace U.K., participating in a vigil in support of Assange outside the Ecuadorean embassy in London. “Is this really about the U.S. being the ‘hidden hand’ behind what the British are doing so they can eventually get a hold of Julian Assange, try him for espionage and put him in a jail?” Ratner asks. “That’s what’s going on here — lets not kid ourselves.”

Watch all Democracy Now! reports on Julian Assange at:http://www.democracynow.org/topics/julian_assange

To watch the complete weekday independent news hour, read the transcript, download the podcast, search our vast archive, or to find more information about Democracy Now! and Amy Goodman, visithttp://www.democracynow.org/

FOLLOW DEMOCRACY NOW! ONLINE:
Facebook: http://www.facebook.com/democracynow
Twitter: @democracynow
Subscribe on YouTube: http://www.youtube.com/democracynow
Listen on SoundCloud: http://www.soundcloud.com/democracy-now
Daily Email News Digest: http://www.democracynow.org/subscribe

Please consider supporting independent media by making a donation to Democracy Now! today, visit http://www.democracynow.org/donate/YT

Full Movie – Twisted ~ Ivan Milat (Serial Killer Documentary 2012)

The Backpacker Murders is a name given to serial killings that occurred in New South Wales, Australia during the 1990s. The bodies of seven missing young people aged 19 to 22 were discovered partly buried in the Belanglo State Forest, 15 kilometres (9.3 mi) south west of the New South Wales town of Berrima. Five of the victims were international backpackers visiting Australia (three German, two British), and two were Australian travellers from Melbourne.
Australian Croat Ivan Milat was convicted of the murders and is serving seven consecutive life sentences plus 18 years.

TOP-SECRET from the FBI – Three Charged with Making Threats Against University of Pittsburgh

PITTSBURGH—A federal grand jury in the Western District of Pennsylvania today returned two indictments charging a resident of Dublin, Ireland, with a series of crimes related to e-mailed threats targeting the University of Pittsburgh, three federal courthouses, and a federal officer. A third indictment charges two Ohio men for additional online threats against the university, announced U.S. Attorney David J. Hickton.

A 35-count indictment named Adam Stuart Busby, 64, of Dublin, as the sole defendant. According to the indictment, from March 30, 2012 until April 21, 2012, Busby sent more than 40 e-mails targeting the University of Pittsburgh campus. The e-mailed bomb threats resulted in more than 100 evacuations at the University of Pittsburgh, greatly disrupting the university community. The indictment charges Busby with 17 counts of wire fraud, 16 counts of maliciously conveying false information in the form of bomb threats, and two counts of international extortion.

A separate but related four-count indictment alleges that on June 20 and 21, 2012, Busby maliciously conveyed false information through the Internet claiming bombs had been placed at U.S. courthouses located in Pittsburgh, Erie, and Johnstown, Pennsylvania. In addition, Busby is charged with threatening David J. Hickton, a federal officer, while he was engaged in the performance of his official duties.

A one-count indictment named Alexander Waterland, 24, of Loveland, Ohio; and Brett Hudson, 26, of Hillsboro, Ohio, as defendants. According to the indictment, between April 25, 2012 and May 23, 2012, Waterland and Hudson engaged in a conspiracy targeting the University of Pittsburgh with interstate threats claiming they were associates of the computer hacking group Anonymous. The threats—posted on YouTube by a user calling himself “AnonOperative13,” sent via e-mail, and publicized via Twitter—attempted to extort the chancellor of the university into placing an apology on the university’s website. The threats claimed that if the chancellor did not comply with their demands, confidential information stored on the computer servers of the University of Pittsburgh would be released.

The maximum penalty for wire fraud is 20 years in prison. The maximum penalty for maliciously conveying false information is 10 years in prison. The maximum penalty for extortionate threats is two years in prison. Because all counts charged are felonies, the maximum fine on each count is $250,000. The law provides for a maximum sentence of five years in prison, a fine of $250,000, or both for Waterland and Hudson. Under the federal sentencing guidelines, the actual sentence imposed would be based upon the seriousness of the offenses and the prior criminal history, if any, of the defendants.

Assistant U.S. Attorney James T. Kitchen is prosecuting these cases on behalf of the government.

The FBI, the Western Pennsylvania Joint Terrorism Task Force, and the University of Pittsburgh Police Department conducted the investigation leading to the indictment in these cases.

An indictment is an accusation. A defendant is presumed innocent unless and until proven guilty.

The Little Shop of Horrors – Full Movie

 

A clumsy young man nurtures a plant and discovers that it’s a bloodthirsty plant, forcing him to kill to feed it.

 

Perhaps the greatest movie ever shot in two days, Little Shop of Horrors was originally conceived as a followup to Roger Corman‘s black comedy A Bucket of Blood (1959). Jonathan Haze plays Seymour Krelboin, a schlemiel’s schlemiel who works at the Skid Row flower shop of Mr. Mushnick (Mel Welles). Experimenting in his spare time, Seymour develops a new plant species that he hopes will lead him to fame and fortune. Unfortunately, the mutated pl…

Bar Refaeli-Sports Illustrated Swimsuit Video

Bar Refaeli, Sports Illustrated Swimsuit 2009 Cover Model

Cryptome unveils Datamaxx NYPD Microsoft Spying

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

datamaxx-nypd-ms

TMZ – Michael Phelps’ Bro-tastic Mankini Vacation

Katharina Witt, Vera Lengsfeld, Anke Jauch and Timothy Garton Ash – FILE-BASED AUTOBIOGRAPHIES AFTER 1989

FILE-BASED AUTOBIOGRAPHIES AFTER 1989

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

ubc_2011_fall_roy_catherine

SECRET – Trapwire Spying System – NYPD-MS Spying System

Renamed Trapwire Spying System – NYPD-Microsoft Domain Spying System

11 August 2012. Extensive Trapwire comments on Justin Ferguson’s Twitter: https://twitter.com/not_me

10 August 2012. Add link to Zip file of 20 Stratfor/Trapwire emails posted to Privatepaste as listed below. Privatepaste has a notice that it will close due to abuse.

http://cryptome.org/2012/08/trapwire-privatepaste.zip

9 August 2012

Background:

2012-00519            NYPD Domain Awareness Spy System July 2012       July 30, 2012
2012-00518            NYPD Domain Awareness Spy System April 2009      July 30, 2012

NYPD-Microsoft Domain Spying System

NYPD released information on an earlier Domain Awareness System in 2009 in response to a citizen push-back such as a 2004 Chatham Green/ACLU law suit. (Chatham Green the name of a housing complex adjoining NYPD Headquarters negatively impacted by security appartus)

It is not yet clear how the new version, developed with Microsoft, differs from the earlier one. It may be that the name has been retained to avoid having to conduct environmental impact and other mandated studies done for the 2009 version — an evasion tactic amply used by governmental and corporate interests.

The Domain Awareness System is a component of a much broader, global surveillence system of the NYPD. A recent HOPE9 video on the topic: Cryptome Tracks the NYPD Ring of Steel and Deborah Natsios/Cryptome Trial by Jury: Judging the NYPD Ring of Steel

 


Justin Ferguson sends:

Date: Thu, 9 Aug 2012 08:46:50 -0400
Subject: Fwd: Domain Awareness System

Two emails forwarded from other lists, first email is more of an overview. Second email is a bunch of copy/pastes from Stratfor emails.

re: company with deep CIA links running cross-site surveillance program for apparently 7-8 years, includes facial recognition/etc.

It’s uhm, everywhere.

———- Forwarded message ———-
Date: Thu, Aug 9, 2012 at 7:29 AM
Subject: Domain Awareness System

Ah, I forgot a couple details & had some typos; when I said “Ottawa and Canada”, I meant Ottawa and London. I totally forget Austin, et cetera.

Here’s a bunch of links to copy/pastes from stratfor emails detailing a lot of what I had to say in the prior email. There’s like 10+ pages of hits in the stratfor dumps, so it’s not all of it, just what I had bookmarked while reading into it some.

Cheers.

[The 20 files listed below: http://cryptome.org/2012/08/trapwire-privatepaste.zip]

http://privatepaste.com/c56f6848d2/trapwireCentralizedDatabaseMGMGrandLinkedSystemEtc – centralized database, vegas hotels, linked sites, etc

http://privatepaste.com/e5b7f4a21d/trapwireNYC – NYC circa 2010

http://privatepaste.com/a9bc9274ea/trapwireAustin – Austin

http://privatepaste.com/04eaef4343/trapwireEveryHVTUSCANUK – note the last paragraph

http://privatepaste.com/90198aa545/trapwireTexasBorder – Texas border circa 2009

http://privatepaste.com/568f0a512a/trapwireWalkTheCatBack – Talking about images to analyze and walking the cat back

http://privatepaste.com/318e0e652b/trapwireHVTCitizens – Trapwire for certain citizens that are important, but not USSS important

http://privatepaste.com/670091f5b0/trapwireLondonStockExchange – London Stock Exchange

http://privatepaste.com/b62ceaf254/trapwireNYCDCVegasLondonOttawaLA – NYC, DC, Vegas, London, Ottawa, LA

http://privatepaste.com/fba46e24ca/trapwireAustinDPSAllocated1Point8M – 1.8M for trapwire & equipment from Austin DPS

http://privatepaste.com/caf299c230/trapwireOnDesksOfUSSSMI5LAPDRCMPNYPD – trapwire on the desks of USSS CP, MI5, RCMP, LAPD CT, NYPD CT

http://privatepaste.com/5a71bac416/trapwireDCMetroNationalParkPoliceEtc – trapwire DC metro, National Park Police, etc

http://privatepaste.com/e6031c14f6/trapwireLAPD – trapwire LAPD as a prototype

http://privatepaste.com/febefa287f/trapwirePentagonArmyUSMCNavy – trapwire Army, Pentagon, USMC, Navy

http://privatepaste.com/58a60bff35/trapwireNSIFBIFtMeadeSevenYears – Trapwire 7 years circa 2011, National SAR Initiative (NSI), FBIs eGuardian, Ft. Meade, etc

http://privatepaste.com/f7b7ac02ab/trapwireAmtrackDHSFusionCenters – Amtrack, DHS fusion centers, DC Metro

http://privatepaste.com/7add918e4c/trapwireBehaviorPatternsToIdentifySurveillance – “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.

http://privatepaste.com/d503851f0c/trapwireSalesforceGoogleDHSInstitute – salesforce, google, DHS institute

http://privatepaste.com/626712c0fa/trapwireNigerianPresidentialPalace – Nigerian Presidential Palace

http://privatepaste.com/bf0a0abf67/trapwireScotlandYardDowningWhiteHouseWalMartDell – Scotland Yard, 10 Downing St, White House, Wal-Mart, Dell

On Thu, Aug 9, 2012 at 6:22 AM, JF wrote:

> I’m not entirely sure how this is new so to speak, they’ve had this
> capability for years from the ‘trapwire’ system (trapwire.com formerly
> abraxas applications– a subdivision of intelligence contractor
> abraxas and staffed almost exclusively by ex-CIA, see page 137 of
> ‘spies for hire’).
>
> Per the stratfor email dump, the trapwire system contains
> functionality like facial recognition and is installed at every HVT in
> the continental US, in addition to Ottawa and Canada– but confirmed
> in LA, NYC, NJ, DC, Las Vegas, et cetera. It’s essentially a system
> setup to detect surveillance, so if you’ve ever taken a picture of
> basically anything ‘important’ you probably flagged a ‘suspicious
> activity report’ (SAR). It’s logged to a central database and then
> cross-site reports are disseminated. If you’re familiar with the ‘see
> something say something’ or ‘iWatch’ programs, that’s the public
> reporting component, but in the email dumps when explaining similar
> systems they note repeatedly that trapwire has the capability to walk
> the cat back you just need a few pictures of the persons. From the
> emails, what’s been enumerated specifically is NY/DC mass transit,
> unspecified sections of LA, London Stock Exchange, Scotland Yard, #10
> Downing, the White House. From googling, we can find that NJ transit,
> all army bases, the department of energy, the marines, et cetera are
> as well. No idea if they got the contract, but they were apparently
> trying to get it into the Nigerian presidential palace as well.
>
> It’s not just in public sector areas, it sounds like any big
> corporation that wants in gets to link their CCTV/surveillance systems
> into it as well– apparently salesforce.com, google, potentially Dell,
> Wal-Mart, & Coca-cola, et cetera are all linked in.
>
> Throughout the email dumps they repeatedly ask for non-attribution and
> you have to google stalk quite a bit to really find much, but this
> magazine has an article on it
> http://www.cjimagazine.com/archives_PDF/CJI_Magazine_Archive_2006_11-12.pdf
> and what’s been released of the stratfor emails contains a lot of
> chatter about it and the parts that haven’t been released yet contain
> quite a bit more.
>
> I guess my biggest concern is that the parent company is the company
> that at least used to develop NOC companies/persona’s for the agency,
> several members of the executive board also sit on the ‘ntrepid
> networks’ board– which produces the software to create online
> persona’s/sock puppet accounts as part of Operation Earnest Voice for
> DoD (http://www.guardian.co.uk/technology/2011/mar/17/us-spy-operation-social-networks),
> that basically the entire executive staff and regular employee’s are
> also ex-agency and I just refuse to believe that the CIA is passing up
> such a golden opportunity to get into the surveillance feeds from
> basically everywhere in the country (and all over London and Ottawa).
>
> That doesn’t even include the tie in’s to DHS & their fusion centers,
> the secret service accounts, etc etc. If you ask me, it sounds like
> that system is the CIAs version of the Trailblazer project. We’ll have
> to wait on FOIA requests to confirm that though. Another interesting
> point is going to be that with foreign links, they (the CIA) have the
> authority to spy on them, but I wonder how they keep clear of FISA &
> their own charter/eo 12333/et cetera. I bet they dont.
>
> I’ve been kind enough to CC several of the people behind trapwire in
> case they have comments or want to further enlighten us, but I
> wouldn’t hold my breath. Hopefully they make sure to thank Mr.
> Burton’s big mouth for helping bring this to light.
>
> Best Regards,
>
> Justin N. Ferguson
>
> On Thu, Aug 9, 2012 at 5:51 AM, Its from Onion <aredandgold@msn.com> wrote:
>>
>> http://newyork.cbslocal.com/2012/08/08/nypd-unveils-crime-and-terror-fighting-domain-awareness-system/
>>
>> NEW YORK (CBSNewYork) – A dramatic new way to track criminals and potential
>> terrorists was unveiled Wednesday by Mayor Michael Bloomberg and NYPD
>> Commissioner Ray Kelly.
>>
>> It melds cameras, computers and data bases capable of nabbing bad guys
>> before they even know they’re under suspicion.

 



	

Full Movie – Dr. Harold Shipman – Doctor Death Serial Killer Documentary Full HD

Dr Harold Fredrick Shipman[1] (14 January 1946 — 13 January 2004) was an English doctor and one of the most prolific serial killers in recorded history with 250+ murders being positively ascribed to him.
On 31 January 2000, a jury found Shipman guilty of 15 murders. He was sentenced to life imprisonment and the judge recommended that he never be released.
After his trial, the Shipman Inquiry, chaired by Dame Janet Smith, investigated all deaths certified by Shipman. About 80% of his victims were women. His youngest victim was a 41-year-old man.[2] Much of Britain’s legal structure concerning health care and medicine was reviewed and modified as a direct and indirect result of Shipman’s crimes, especially after the findings of the Shipman Inquiry, which began on 1 September 2000 and lasted almost two years. Shipman is the only British doctor who has been found guilty of murdering his patients.

TOP-SECRET-(U//FOUO) Joint Improvised Explosive Device Defeat Organization (JIEDDO) Attack the Network Lexicon

https://publicintelligence.net/wp-content/uploads/2012/08/JIEDDO-ATN-Lexicon.png

This first edition of the Attack the Network (AtN) Lexicon was produced by the Joint Improvised Explosive Device Defeat Organization (JIEDDO). The lexicon contents were developed after extensive interviews with military units who successfully employed AtN principles and practices to reduce the number and effectiveness of Improvised Explosive Devices (IEDs) in the Counter-Insurgency (COIN) environment where they encountered multiple and sometimes interconnected adversary networks. The lexicon contents were further developed and refined by subject matter experts from over fifty organizations across the Departments of Defense, Justice, and Homeland Security.

PURPOSE

This lexicon is intended to provide a common operational vocabulary across the many organizations and technical/military disciplines who must coordinate their efforts to successfully attack the many different varieties of adversary networks. Adoption and widespread use of the terms in this lexicon will improve information exchange among AtN practitioners at the tactical, operational, and strategic levels. This lexicon will:

• Standardize reporting and improve database content management
• Enable AtN-related education and training
• Serve as an information resource for staffs preparing to enter an AtN operational environment
• Support the harmonization and development of AtN policy and doctrine

SCOPE

While the original requirements and applications that led to the creation of this AtN Lexicon involved IED networks in the COIN environment, the terminology herein is not limited to that particular AtN application. The AtN Lexicon provides terminology commonly used to attack networks in a more generic sense so that this document can be used for AtN in any application domain (IED, drug, criminal, insurgent, etc.)

 

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

JIEDDO-ATN-Lexicon

Revealed – The Richest Politicians In America

Richest Politicians: Who are the richest politicians in America? The job of an elected official entails tirelessly fighting for the rights of the oppressed, and putting the needs of your constituents ahead of your own. But you don’t need to be poor to be a public servant. In fact, just the opposite is true. The median net worth of a Congress member was roughly $913,000. So out of all the Governors, Congressman, Presidents and Mayors who has the most money? As a public servant you are required to disclose your assets and liabilities to prevent conflicts of interest. Most wealthy people who enter politics choose to place their assets into blind trusts which basically means that someone is investing money on your behalf but you have no input or idea on what is being bought. You are able to set goals, for example that you want your money invest very conservatively in blue chip stocks, but you would never know that you own X amount of shares of a particular company. If you did know that you owned 5% of, for example, a pharmaceutical company or a defense contractor, it could very easily influence how you vote on issues that would impact those industries. Finally, as you will see, being a successful and popular politician is very good for your wallet after you leave office. Our former representatives can make great money in their retirement years through speaking engagements, book deals and more. But what we really want to know is who are the richest politicians serving our country today

Richest Politicians:

  • #1: Michael Bloomberg Net Worth – $19.5 Billion
  • #2: Michael McCaul Net Worth – $294 Million
  • #3: Mitt Romney Net Worth – $250 Million
  • #4: Darrell Issa Net Worth – $220 Million
  • #5: Jane Harman Net Worth – $200 Million
  • #6: John Kerry Net Worth – $194 Million
  • #7: Jared Polis Net Worth – $160 Million
  • #8: Bill and Hillary Clinton Net Worth – $101.5 Million
  • #9: Rick Scott Net Worth – $103 Million
  • #10: Jay Rockefeller Net Worth – $86 Million
  • #11: Mark Warner Net Worth – $76 Million
  • #12: Frank Lautenberg Net Worth – $55 Million
  • #13: Richard Blumenthal Net Worth – $53 Million
  • #14: Dianne Feinstein Net Worth – $45 Million
  • #15: Vern Buchanan Net Worth – $45 Milion
  • Source: http://www.celebritynetworth.com/articles/entertainment-articles/10-richest-politicians-america/

Full Movie – Spokane Serial Killer Robert Yates

Robert Lee Yates, Jr. (born May 27, 1952) is an American serial killer from Spokane, Washington. From 1996 to 1998, Yates is known to have murdered at least 16 women, all of whom were prostitutes working on Spokane’s “Skid Row” on E. Sprague Avenue. Yates also confessed to two murders committed in Walla Walla in 1975 and a 1988 murder committed in Skagit County. In 2002, Yates was convicted of killing two women in Pierce County. He currently is on death row at the Washington State Penitentiary.

SECRET – JIEDDO Report: Al‐Shabaab’s Exploitation of Alternative Remittance Systems (ARS) in Kenya

https://publicintelligence.net/wp-content/uploads/2012/08/JIEDDO-AlShabaabARS.png

 

(U) Al-Shabaab, an al-Qaida ally, relies on a broad range of funding sources to support its terrorist and paramilitary operations in Somalia. However, little comprehensive information is available on the character and extent of this funding network within the large communities of Somali expats in Kenya. Existing reports suggest that alternative remittance systems (ARS), especially hawaladars, are a reliable source of income for Somalis still living in Somalia. Expat family members living in Kenya rely on these systems to transfer money to their relatives in Somalia. Recent reports suggest al-Shabaab is a beneficiary of these services1. Al-Shabaab could exploit current and future hawaladar networks in Kenya to transit funds to support IED operations against US or allied humanitarian or military operations. Thus, networks of undocumented and unmonitored hawaladars within the country could pose a threat to future counterterrorism or humanitarian operations in the region. Further study of the role of ARS in Kenya in the funding of al-Shabaab operations is recommended.

• (U) Kenya maintains the largest Somali expat and refugee community in the world, according to the 2005 United National High Commission on Refugees (UNHCR) Statistical Yearbook
• (U) Somali refugees and expats living in Kenya are a key source of cash funds for family members who remain in Somalia, exploiting Kenya’s mostly ungoverned informal financial markets
• (U) Al-Qaida is suspected of using Kenya’s ungoverned, informal ARS networks to deliver the funds needed to acquire the material and technology, and develop the training needed to manufacture improvised explosive devices (IEDs)
• (U) Al-Qaida could exploit emerging criminal networks, smuggling routes, and black market transit points in Kenya and surrounding countries to support future IED operations
• (U) More research is required to identify the possible effect of Kenyan ARS networks on al-Qaida IED operations in Somalia

(U) Kenya’s Criminal Networks Rising

(U) Various recent reports note Kenya’s increasing role in narcotics and human trafficking and regional organized crime. It points to an increasingly hospitable environment for terrorist financing and logistical support that could be used in current and future IED operations.

(U) In a March 2009 report on the global narcotics trade, the State Department notes that Kenya is “developing into a major money laundering country…” and key transit point in the narcotics trade in the region. The report also identifies Nairobi’s Eastleigh Estate as “an informal remittance hub for the Somali Diaspora, transmitting millions of dollars every day from Europe, Canada and the U.S. to points throughout Somalia.”

(U) Narcotics and human trafficking, black market networks and smuggling routes that transit Kenya could be exploited for current and future Al-Shabaab IED operations along with use of ungoverned hawaladar networks to provide key funding at the operational cell level. All of these elements represent unknown potential for current and future support of Al-Shabaab IED operations.

(U) Cultural Perspective

(U) A 2005 report noted that Somali ARS, commonly known as hawilda services, transfer money from Western expats through Jeddah and Dubai.8 The report also identifies a lack of reliable financial systems in Somalia and a cultural distrust of governmental systems in general as key causes for the common use of ARS in these populations.

(U) Conclusion

(U) Kenya has the largest Somali expat and refugee community outside of Somali and is a suspected source of funding and logistical support for the al-Qaeda’s linked group al-Shabaab. The extent of that support, its scope and makeup are unknown. Available information sources are of mixed reliability, and often based on regional news reporting and hearsay. However, there are two general conclusions from existing open source media. First, Kenya’s networks of unregulated ARS services could be a reliable source of unregulated fund transfers to al-Shabaab and its cells. Second, emerging networks of criminal gangs, organized crime, narcotics and human trafficking create social instability and a regional criminal environment that al-Shabaab could exploit to support current and future IED operations.

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

JIEDDO-AlShabaabARS

TMZ – The Vegas Hot 100 — Bikini Babes Galore!

The Vegas Hot 100 competition was held over the weekend… so if seeing 100 smoking hot babes wearing tiny bikinis is your thing — then by all means, enjoy the HELL out of this AWESOME video!

Waffenausgabe an die Stasi-Agenten-Original-Dokument

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

waffenausgabe_eisenberg_okt_1989

TMZ – Katy Perry & John Mayer — Definitely Schtupping !

All of the speculation about John Mayer and Katy Perry can officially end… because TMZ has new video that pretty much confirms that those two love birds are indeed SCHTUPPING!

Die Zersetzung-Richtlinie der STASI – Heute so aktuell wie damals !

https://upload.wikimedia.org/wikipedia/commons/thumb/7/7d/Stasi_richtlinie1_76.jpg/422px-Stasi_richtlinie1_76.jpg

Die Zersetzung war eine vom Ministerium für Staatssicherheit (MfS) der DDR eingesetzte geheimpolizeiliche Arbeitstechnik. Sie diente zur Bekämpfung vermeintlicher und tatsächlicher politischer Gegner. Die im Rahmen einer 1976 erlassenen Richtlinie definierten Zersetzungsmaßnahmen wurden vom MfS vornehmlich in den 1970er und 1980er Jahren in Operativen Vorgängen gegen oppositionelle Gruppen und Einzelpersonen eingesetzt. Fast durchgehend konspirativ angewandt, ersetzten sie den offenen Terror der Ära Ulbricht.

Als repressive Verfolgungspraxis beinhaltete die Zersetzung umfangreiche, heimliche Steuerungs- und Manipulationsfunktionen bis in die persönlichsten Beziehungen der Opfer hinein. Das MfS griff dabei auf das Netz an „Inoffiziellen Mitarbeitern“ (IM), staatliche Einflussmöglichkeiten auf alle Arten von Institutionen sowie die „Operative Psychologie“ zurück. Durch gezielte psychische Beeinträchtigung oder Schädigung versuchte das MfS auf diese Weise, den als Gegnern bzw. Feinden wahrgenommenen Dissidenten und Oppositionellen die Möglichkeiten für „feindliche Handlungen“ zu nehmen.

Durch die Offenlegung zahlreicher Stasi-Unterlagen in Folge der politischen Wende in der DDR ist der Einsatz von Zersetzungsmaßnahmen durch das MfS gut dokumentiert. Schätzungen gehen von einer insgesamt vier- bis fünfstelligen Anzahl von Personen aus, die mit Zersetzungsmaßnahmen belegt wurden.[1] Schätzungen zufolge wurden unter 5000 von ihnen hierdurch „nachhaltig geschädigt“.[2] Opfer von Zersetzungsmaßnahmen haben bei nachweislicher systematischer, beruflicher und/oder gesundheitlicher Schädigung durch das MfS einen Anspruch auf Rehabilitation gemäß 2. SED-Unrechtsbereinigungsgesetz.

siehe

https://de.wikipedia.org/wiki/Zersetzung_%28Ministerium_f%C3%BCr_Staatssicherheit%29

DOWNLOAD THE ORIGINAL DOCUMENT HERE

zersetzungs_richtlinie

TOP-SECRET – Unravelling TrapWire: The CIA-Connected Global Suspicious Activity Surveillance System

https://publicintelligence.net/wp-content/uploads/2012/08/trapwire-screenshot-1024x718.png

 

A screenshot from the front page of trapwire.net, which is believed to be a web-based portal affiliated with the TrapWire system.

Public Intelligence

Hacked emails from the private intelligence firm Stratfor shed light on a global suspicious activity surveillance system called TrapWire that is reportedly in use in locations around the world from the London Stock Exchange to the White House.  The emails, which were released yesterday by WikiLeaks, provide information on the extent and operations of a system designed to correlate suspicious activity reports and other evidence that may indicate surveillance connected with a potential terrorist attack.

A proprietary white paper produced by TrapWire, formerly called Abraxas Applications, describes the product as “a unique, predictive software system designed to detect patterns of pre-attack surveillance.”  In an interview from 2005 with the Northern Virginia Technology Council, the CEO of Abraxas Corporation Richard “Hollis” Helms says the goal of TrapWire is to “collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.”  Fred Burton, the former CEO of Stratfor and current vice president, describes TrapWire in an email from November 2009 as “a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.”

Documents submitted with Abraxas’ initial trademarking of TrapWire, describe the system as utilizing “a facility’s existing technologies (such as pan-tilt-zoom [PTZ] cameras) and humans (security personnel, employees, and neighbors)” to collect data which is then “recorded and stored in a standardized format to facilitate data mining, information comparison and information sharing across the network.”  TrapWire “standardizes descriptions of potential surveillance activity, such as photographing, measuring and signaling” and then shares “threat information” across the network to track potential correlations across other locations on the network.

One thing that makes TrapWire a particularly interesting company is that its president, chief of operations and director of business development are all former employees of the Central Intelligence Agency.  According to a management page on TrapWire’s website, which has recently been removed for an undisclosed reason, the president and one of the founders of the company, Dan Botsch, “served 11 years as an Intelligence Officer with the Central Intelligence Agency, focusing on Russian and Eastern European affairs.”  Michael Maness, the company’s business development director, served over 20 years with the CIA, “where he directed counterterrorism and security operations in the Middle-East, the Balkans and Europe. As a senior operations officer and field operations manager, he was instrumental in combating Al-Qaeda’s operational units in the immediate wake of the September 11 terrorist attacks.”  Michael K. Chang, the company’s director of operations, served for “12 years with the Central Intelligence Agency as a counterterrorism operations officer and security officer” and even acted as personal security for the Director and Deputy Director of Central Intelligence.

Abraxas Corporation, the company that originally created TrapWire under its subsidiary Abraxas Applications, also has significant ties to the CIA.  The company was founded by Richard “Hollis” Helms in 2001, two years after he left the CIA where he had worked for nearly 30 years.  Many of the company’s past employees and management have worked at the CIA or other intelligence agencies. In fact, Tim Shorrock notes in his 2008 book Spies for Hire that so many employees of the CIA were thought to be going to work for private companies like Abraxas that in 2005 CIA Director Porter Goss had to ask the company to stop recruiting in the CIA Cafeteria at Langley. The Los Angeles Times reported in 2006 that Abraxas had a contract from the CIA for developing front companies and false identities for the Agency’s nonofficial cover (NOC) program.  The company and its work are so secretive that Shorrock reportedly called the company for comment and was told, “Sir, we don’t talk to the media.”

High-Profile Clients Around the World

The Stratfor emails on TrapWire detail the extent to which the software system is being utilized around the world, describing deals with clients representing domestic agencies, foreign governments and multinational corporations.  An email from Don Kuykendall, the chairman of Stratfor, in May 2009 describes how TrapWire’s clients “include Scotland Yard, #10 Downing, the White House, and many [multinational corporations].”  The email goes on to say how Stratfor is working to help introduce TrapWire to people at “Wal Mart, Dell and other Fred cronies.”  Another email from Fred Burton to Kuykendall in July 2011 describes how the Nigerian government is interested in opening a fusion center and may want to deploy TrapWire in the Nigerian Presidential Palace.

In another email Burton brags about Stratfor’s role in authoring situation reports that feed into the TrapWire system, saying that this is the Stratfor’s number one way of impressing potential clients in government positions.  “Do you know how much a Lockheed Martin would pay to have their logo/feed into the USSS CP? MI5? RCMP? LAPD CT? NYPD CT?” Burton asks, implying that TrapWire is in use by the U.S. Secret Service, the British security service MI5, the Royal Canadian Mounted Police, as well as counterterrorism divisions in both the Los Angeles and New York Police Department. In a 2009 thesis from the Naval Postgraduate School, the Los Angeles Joint Regional Intelligence Center (LA-JRIC), one of more than seventy fusion centers around the country, is listed as utilizing TrapWire.

The emails also suggest that TrapWire is in use at military bases around the country. A July 2011 email from Burton to others at Stratfor describes how the U.S. Army, Marine Corps and Pentagon have all begun using TrapWire and are “on the system now.”  Burton described the Navy as the “next on the list.”

The Information Sharing Environment – Suspicious Activity Reporting Evaluation Environment Report from 2010 describes how the Las Vegas Police Department is providing TrapWire software to at least fourteen different hotels and casinos in the area. Several emails make reference to the network running in Las Vegas and one discusses contacting a security officer at the MGM Grand to discuss the system’s practical implementation.

According to one particularly unusual email from Burton, TrapWire is reportedly in use to protect the homes of some former Presidents of the United States.

Burton also describes TrapWire as possibly “the most successful invention on the [global war on terror] since 9-11.”  Describing his connections with the company’s management, he adds “I knew these hacks when they were GS-12′s at the CIA. God Bless America. Now they have EVERY major [high-value target] in [the continental U.S.], the UK, Canada, Vegas, Los Angeles, NYC as clients.”

Links to Nationwide Suspicious Activity Reporting Initiative

TrapWire is also linked to the National Suspicious Activity Reporting (NSI) Initiative, a program designed to help aggregate reports of suspicious activity around the country.  One email from an executive at TrapWire states that “TrapWire SAR reports are fed directly/automatically into the National SAR Initiative” as well as “the FBI’s eGuardian system if/when there’s confirmed nexus to terrorism or major crimes (which is happening frequently).”  The email goes on to say that “our networks in LA, Vegas and DC all support See Something Say Something (S4 as I call it).”

Over the past few years, several cities around the U.S. have implemented websites allowing the public to report suspicious activity, including Washington D.C., Houston and even the U.S. Army.  These activities are part of a larger program called iWatch, which also feeds into TrapWire according to a leaked email:

iWatch pulls community member reporting into the TrapWire search engine and compares SARs across the country…with potential matches being fed back to the local LE agency. An amazing amount of good quality reporting is coming in from alert citizens (and police officers) in the DC area in particular.

TrapWire reportedly operates separate regional networks around the country, each with a number of different interconnected sites.  However, the president of the company Dan Botsch explains in an email to Fred Burton that the TrapWire system operators do “cross-network” some information from separate networks and that he believes one day the networks will begin to merge:

We have regional networks in which information sharing is limited to that network. If a network has 25 sites, those 25 sites match against each other’s reports. They can also send reports to any other site on the network and they can post reports to a network-wide bulletin board. Sites cannot share information across networks. 

However, we do cross-network matching here at the office. If we see cross-network matches, we will contact each affected site, explain that the individual(s) or vehicle they reported has been seen on another network, and then offer to put the affected sites into direct contact. We have not yet had a cross-network match. I think over time the different networks will begin to unite. I’m not exactly being prescient here, as there is already talk in Vegas and LA of combining their two networks. Same here in DC.

The use of TrapWire could eventually extend to fusion centers all around the country as congressional testimony from June 2011 indicates that the Washington D.C. Metropolitan Police Department is part of a trial project of the Department of Homeland Security to test the use of TrapWire.  The Texas Department of Public Safety, which operates the Texas Fusion Center, also purchased TrapWire software in 2010.

 

Editor’s Note: WikiLeaks has been inaccessible for some time now due to a sustained distributed denial of service attack.  All links to emails released by WikiLeaks are currently pointing to sites mirroring the content.  If WikiLeaks should come back online sometime soon, all emails associated with TrapWire should be accessible at the following URL: 

http://www.wikileaks.org/gifiles/releasedate/2012-08-09.html

Thanks to Justin Ferguson and others for helping to spread the information in these emails in the face of vigorous attempts to suppress them.

SI Swimsuit – Brooklyn Decker Video

Travel to Israel with super model Brooklyn Decker for her SI Swimsuit shoot

TMZ – Kim Kardashian & Kanye West — Flying Commercial!?

Alex Rodriguez (A.K.A A-Rod) – Net Worth $ 300 Million

Alex Rodriguez (A.K.A A-Rod) is an American professional baseball player with an estimated net worth of $300 million. He was born on July 27th 1975 in New York, New York. He currently plays third base for the New York Yankees but has previously played shortstop for the Texas Rangers and Seattle Mariners. His parents Victor and Lourdes are natives of the Dominic Republic. As a boy Victor was a good baseball player and as his life went on he continued to be a fan of the game. At a very young age Victor gave Alex a plastic bat and rubber ball. Little A-Rod would practice his hit every chance he got. Both Victor and Lourdes wanted young Alex and his siblings to experience their home of the Dominic Republic. They moved there and lived decently until the Country’s economic status could hold them no longer. They moved back to America where they landed in Miami, Florida. Alex enrolled in school without knowing any English. It was a very difficult move for him and the one thing that truly kept him going was baseball. He would play with friends every day until he became a part of a youth league baseball team. One day his father left to New York to look for work and never returned. His mother was left to raise and support the family.

Baseball soon becomes Alex’s whole life. He joined the Boys and Girls club team where he led his team to a National title. He continued to play ball for Westminster Christian which was a private school. The school was known for having one of Florida’s top baseball programs. By the end of his time there he had many scouts following him around. He was picked up by Mariners and reported to spring training in February of 1994. He made his starting debut as shortstop on July 8th 1984. This made him the third 18 year old shortstop since 1900. Sadly, the season was cut short by the 1994 baseball league strike. While with the Mariners he broke many records and became the star player but left them in 2000 and signed on with the Texas Rangers. His deal with them was the kind dreams are made off which was a ten year deal worth $252 million. Rodriguez played for the rangers from 2001-2003. During this time he set many personal records yet the Rangers still finished last AL western division. With all that being said A-Rod still managed to become MVP while still playing on the last place team in the AL western division. Because of this and Rodriguez’s expensive contract the Rangers chose to trade him. He ended up where his life began playing for the Yankees. He has played with the Yankees ever since and has been award the MVP award twice while there. In 2009 he and the Yankees won the World Series.

TMZ – Rihanna — Nivea Is DEAD to Me

Rihanna definitely knows how to hold a grudge … ’cause it’s obvious the pop star is still PISSED at Nivea … the company that reportedly fired her ass for being too damn sexy.

SECRET from the FBI – Naser Jason Abdo Sentenced to Life in Federal Prison

Naser Jason Abdo, age 22, will spend the rest of his life in federal prison for plotting to kill American soldiers and others near Fort Hood, Texas, announced Assistant Attorney General for National Security Lisa Monaco, United States Attorney Robert Pitman, Federal Bureau of Investigation Special Agent in Charge Armando Fernandez, and Killeen Police Chief Dennis M. Baldwin.

This morning in Waco, United States District Judge Walter S. Smith imposed two consecutive life prison sentences for attempted use of a weapon of mass destruction and for possession of a weapon in furtherance of a federal crime of violence. In addition, Judge Smith also sentenced Abdo to a total mandatory consecutive 60 years’ imprisonment for one count of attempted murder of officers or employees of the United States, two counts of possession of a firearm in furtherance of a federal crime of violence, and one count of possession of a weapon in furtherance of a federal crime of violence.

In May, a federal jury convicted Abdo of the above mentioned charges. Testimony presented at trial revealed that on July 27, 2011, Abdo unlawfully attempted to create and detonate a bomb in an attempt to kill, with pre-meditation and malice aforethought, members of the uniformed services of the United States and to shoot survivors of said detonation with a firearm. Evidence further revealed that Abdo did knowingly possess a .40 caliber semi-automatic pistol while carrying out his plot.

“This case serves as another reminder of the need for vigilance against extremists both at home and abroad,” said Lisa Monaco, Assistant Attorney General for National Security. “I thank the many federal, state, and local law enforcement officials who thwarted Abdo’s plot and were responsible for this successful prosecution.”

Following the sentencing hearing, United States Attorney Robert Pitman stated, “This prosecution demonstrates two important points. First, the prevention of tragic events such as Mr. Abdo was planning can be averted by alert citizens who pass along their concerns to law enforcement officials and by law enforcement officers who diligently perform their duties. And second, that those who use or plan violence to further their twisted agendas will be prosecuted as aggressively as the law allows and will, as in this case, spend the rest of their lives staring at the walls of a prison cell.”

Officers with the Killeen Police Department arrested Abdo on July 27, 2011. At the time of his arrest, the defendant, an absent without leave (AWOL) soldier from Fort Campbell, Kentucky, was in possession of the handgun, plus instructions on how to build a bomb as well as bomb making components. Testimony during the trial revealed that Abdo intended to detonate the destructive device inside an unspecified restaurant frequented by soldiers from Fort Hood.

“Today’s sentencing of Mr. Abdo is a conclusion to an investigation which defines what we hope to do every time, that is to prevent an act of terrorism before it occurs,” stated FBI Special Agent in Charge Armando Fernandez.

“This sentencing today provides a sense of comfort to the Killeen residents, especially those affiliated with the military, that Mr. Abdo will no longer be a threat to our community,” stated Killen Police Chief Dennis Baldwin.

This case was investigated by agents with the Federal Bureau of Investigation and their Joint Terrorism Task Force together with the Killeen Police Department; U.S. Army’s Criminal Investigation Command, 902nd MI Group and Explosives Ordnance Disposal; Bureau of Alcohol, Tobacco, Firearms, and Explosives; United States Marshals Service; Texas Department of Public Safety and the Texas Rangers; Bell County District Attorney’s Office; McLennan County Sheriff’s Office; and the Oak Grove (Kentucky) Police Department. Assistant United States Attorneys Mark Frazier and Gregg Sofer of the Western District of Texas and trial attorney Larry Schneider of the DOJ Counterterrorism Section prosecuted this case on behalf of the government.

TOP-SECRET – Romney Protection 01

 

[Image]Republican presidential candidate and former Massachusetts Governor Mitt Romney (L) and Rep. Paul Ryan (R-WI) (R) greet supporters during a campaign rally on August 11, 2012 in Manassas, Virginia. Mitt Romney kicked off a four day bus tour with an announcement of his running mate, Rep. Paul Ryan (R-WI).
[Image]Republican presidential candidate and former Massachusetts Governor Mitt Romney (L) and his running mate Rep. Paul Ryan (R-WI) wave to an overflow crowd before a campaign rally at Absolute Style furniture on August 12, 2012 in High Point, North Carolina. Mitt Romney continues his four day bus tour a day after announcing his running mate, Rep. Paul Ryan (R-WI).
[Image]Republican U.S. presidential candidate Mitt Romney greets supporters during a campaign stop at Absolute Style furniture store in High Point, North Carolina August 12, 2012.
[Image]Republican presidential candidate and former Massachusetts Governor Mitt Romney greets an overflow crowd before a campaign rally at Absolute Style furniture on August 12, 2012 in High Point, North Carolina. Mitt Romney continues his four day bus tour a day after announcing his running mate, Rep. Paul Ryan (R-WI).
[Image]Republican vice presidential candidate Rep. Paul Ryan (R-WI) greets an overflow crowd before a campaign rally at Absolute Style furniture on August 12, 2012 in High Point, North Carolina. Mitt Romney continues his four day bus tour a day after announcing his running mate, Rep. Paul Ryan (R-WI).
[Image]US Republican presidential candidate and former Massachusetts Governor Mitt Romney greets supporters prior to speaking during a campaign rally at Absolute Style furniture company in High Point, North Carolina, August 12, 2012. Romney and his running mate Wisconsin Representative Paul Ryan continue on the second day of a 4-day bus trip that will take Romney to 4 key swing states, Virginia, North Carolina, Florida and Ohio, and also to Ryan’s home state of Wisconsin.
[Image]Republican presidential candidate and former Massachusetts Governor Mitt Romney (R) looks on as his running mate Republican vice presidential candidate, U.S. Rep. Paul Ryan (R-WI) speaks to an overflow crowd outside of a campaign rally at the NASCAR Technical Institute on August 12, 2012 in Mooresville, North Carolina. Mitt Romney continues his four day bus tour a day after announcing his running mate, Rep. Paul Ryan (R-WI).
[Image]Republican vice presidential candidate, U.S. Rep. Paul Ryan (R-WI) shakes hands with supporters after speaking with Republican presidential candidate and former Massachusetts Governor Mitt Romney during the Mooresville Victory Rally August 12, 2012 at NASCAR Technical Institute in Mooresville, North Carolina. Mitt Romney will make stops in Florida and Ohio during his four-day bus tour.
[Image]Republican presidential candidate and former Massachusetts Gov. Mitt Romney shakes hands with supporters after speaking at the Mooresville Victory Rally with his running mate Republican vice presidential candidate, U.S. Rep. Paul Ryan (R-WI) August 12, 2012 at NASCAR Technical Institute in Mooresville, North Carolina. Mitt Romney will make stops in Florida and Ohio during his four-day bus tour.
[Image]Republican presidential candidate Mitt Romney, center, greets supporters at a rally Sunday, Aug. 12, 2012, in Mooresville, N.C. , at the NASCAR Technical Institute.
[Image]Republican presidential candidate, former Massachusetts Gov. Mitt Romney, and vice presidential running mate Rep. Paul Ryan, R-Wis. , left, greet supporters during a campaign event at the NASCAR Technical Institute, Sunday, Aug. 12, 2012, in Mooresville, N.C.
[Image]In this photo provided by the U.S. Coast Guard, Republican Presidential candidate Mitt Romney, second from right, shakes a person’s hand during a campaign rally in Manassas, Va. , Saturday, Aug. 11, 2012. Romney announced Wisconsin Congressman Paul Ryan, second from left, as his running mate during an event in Norfolk, Va. , launching a bus tour promoting The Romney Plan For A Stronger Middle Class in Virginia.
[Image]Members of the U.S. Secret Service are seen on the rooftop of a building near the site of a campaign rally for Republican presidential candidate, former Massachusetts Gov. Mitt Romney, in Manassas, Va. , Saturday, Aug. 11, 2012.
[Image]Wisconsin Representative Paul Ryan greets supporters after US Republican presidential candidate and former Massachusetts Governor Mitt Romney announced Ryan as his vice presidential running mate during a campaign rally at the Nauticus Museum after touring the USS Wisconsin in Norfolk, Virginia, August 11, 2012. Romney and his new running mate embark on the first day of a 4-day bus trip that will take the White House hopefuls to 4 key swing states, Virginia, North Carolina, Florida and Ohio.
[Image]Republican presidential candidate, former Massachusetts Gov. Mitt Romney (R) and U.S. Rep. Paul Ryan (R-WI) wave as Ryan is announced as his vice presidential running mate aboard the USS Wisconsin August 11, 2012 in Norfolk, Virginia. Ryan, a seven term congressman, is Chairman of the House Budget Committee and provides a strong contrast to the Obama administration on fiscal policy.

[Image]

[Image]US Republican presidential candidate and former Massachusetts Governor Mitt Romney and Wisconsin Representative Paul Ryan(2ndL) greet supporters after announcing Ryan as his vice presidential running mate during a campaign rally at the Nauticus Museum after touring the USS Wisconsin in Norfolk, Virginia, August 11, 2012. Romney and his new running mate embark on the first day of a 4-day bus trip that will take the White House hopefuls to 4 key swing states, Virginia, North Carolina, Florida and Ohio.
[Image]Republican presidential candidate, former Massachusetts Gov. Mitt Romney (C) arrives at the USS Wisconsin August 11, 2012 in Norfolk, Virginia. Mitt Romney will announce Rep. Paul Ryan (R-WI), a seven term congressman, as his Vice President pick. Ryan is Chairman of the House Budget Committee and provides a strong contrast to the Obama administration on fiscal policy.
[Image]Janna Ryan, wife of newly announced Republican vice presidential candidate, Wisconsin Rep. Paul Ryan, partially visible behind her, greets crowd members after her husband addressed the crowd Saturday, Aug. 11, 2012 in Norfolk, Va.
[Image]U.S. Secret Service agents guard the campaign bus of Republican presidential candidate and former Massachusetts Gov. Mitt Romney on August 10, 2012 in Norfolk, Virginia. Romney is kicking off a four-day bus tour that in addtion to Viriginia, will see the candidate visit Florida, North Carolina and Ohio.
[Image]The motorcade of Republican presidential candidate and former Massachusetts Gov. Mitt Romney drives towards Downtown Boston on August 10, 2012 in Belmont, Massachusetts. Mitt Romney visited his campaign headquarters a day before kicking off a four day bus tour that will visit Virginia, Florida, North Carolina and Ohio.
[Image]A U.S. Secret Service agent guards a door before Republican presidential candidate and former Massachusetts Gov. Mitt Romney arrived at his campaign headquarters on August 10, 2012 in Boston, Massachusetts. Mitt Romney visited his campaign headquarters a day before kicking off a four day bus tour that will visit Virginia, Florida, North Carolina and Ohio.
[Image]Republican presidential candidate and former Massachusetts Gov. Mitt Romney departs an Upper East Side event in Manhattan on August 9, 2012 in New York City. Mitt Romney is visiting New York for fundraising events today before travelling to Boston.
[Image]A secret service agent stands posted at a field as Republican presidential candidate and former Massachusetts Governor Mitt Romney meets with Iowa Secretary of Agriculture Bill Northey at a farm in Des Moines, Iowa August 8, 2012.
[Image]Republican presidential candidate and former Massachusetts Governor Mitt Romney (back C) shakes hands with supporters during a campaign event at Central Campus High School in Des Moines, Iowa August 8, 2012.

[Image]

[Image]Republican presidential candidate and former Massachusetts Gov. Mitt Romney campaigns at Stepto’s BBQ Shack in Evansville, Ind. , Saturday, Aug. 4, 2012.
[Image]Republican presidential candidate and former Massachusetts Gov. Mitt Romney greets supporters during a campaign event with Republican Governors at Basalt Public High School on August 2, 2012 in Basalt, Colorado. One day after returning from a six-day overseas trip to England, Israel and Poland, Mitt Romney is campaigning in Colorado before heading to Nevada.
[Image]Republican presidential candidate and former Massachusetts Gov. Mitt Romney steps off of a picnic table after speaking to an overflow crowd during a campaign event at the Jefferson County Fairgrounds on August 2, 2012 in Golden, Colorado. One day after returning from a six-day overseas trip to England, Israel and Poland, Mitt Romney is campaigning in Colorado before heading to Nevada.
[Image]U.S. Republican Presidential candidate Mitt Romney takes off his jacket as he walks to his limousine after visiting the Warsaw Uprising Memorial in Warsaw, July 31, 2012.
[Image]U.S. Republican presidential candidate, former Massachusetts Gov. Mitt Romney (C) talks with participants after his speech in the Hall of the University of Warsaw Library on July 31, 2012 in Warsaw, Poland. After visiting London, Israel, and the polish city of Gdansk, Romney visits the capital of Poland, Warsaw.
[Image]U.S. Republican presidential candidate Mitt Romney (C) is surrounded by security as he walks in the center of Gdansk Old Town, July 30, 2012.

[Image]

[Image]

[Image]Republican presidential candidate and former Massachusetts Gov. Mitt Romney and his wife Ann board their charter plane in Tel Aviv, Israel as they travel to Poland, Monday, July 30, 2012.
[Image]U.S. Republican Presidential candidate Mitt Romney (C) arrives surrounded by security to deliver foreign policy remarks at Mishkenot Sha’ananim in Jerusalem, July 29, 2012.
[Image]US Republican presidential candidate Mitt Romney greets people after placing a message, written on paper, in the ancient stones of the Western Wall in Jerusalem’s Old City on July 29, 2012, during the annual Tisha B’Av (Ninth of Av) fasting and a memorial day, commemorating the destruction of ancient Jerusalem temples. Romney is meeting Israeli leaders as he seeks to burnish his foreign policy credentials and portray himself as a better friend to Israel than President Barack Obama.

[Image]

[Image]

[Image]

[Image]

[Image]Israeli security is seen after the motorcade of Republican presidential candidate and former Massachusetts Gov. Mitt Romney arrives at the King David Hotel in Jerusalem, Sunday, July 29, 2012. [Image]
[Image]U.S. Republican Presidential candidate Mitt Romney is recognized by pedestrians at Grosvenor Place in London, July 27, 2012, as he was forced by gridlock traffic to walk from his hotel to the Irish Embassy to meet with Irish Prime Minister (Taoiseach) Enda Kenny.
[Image]U.S. Republican Presidential candidate Mitt Romney gets out of his SUV with a team of security as he arrives for a fundraising event in London, July 26, 2012.
[Image]Republican presidential candidate, former Massachusetts Gov. Mitt Romney arrives for a private fundraiser in Buffalo N.Y. , on Friday, June 29, 2012.
[Image]A U.S. Secret Service agent carries his weapon as he looks out from a motorcade vehicle as Republican presidential candidate Mitt Romney, not pictured, arrives for a private campaign finance event in New York, Thursday, June 28, 2012.
[Image]Secret Service vehicles escort the campaign bus of Republican presidential candidate, former Massachusetts Gov. Mitt Romney after leaving Yampa Valley Airport on May 28, 2012 in Yampa, Colorado. Mitt Romney will campaign in Colorado before heading to Las Vegas, Nevada.

Full Movie Report – Breaking a Female Paedophile Ring

TOP-SECRET – JIEDDO Report: Iranian Weapons Smuggling Activities in Afghanistan

https://publicintelligence.net/wp-content/uploads/2012/07/JIEDDO-IranWeaponsSmuggling.png

 

(U) This study investigates Iran’s strategy of smuggling weapons to Afghan insurgents. Based on the hypothesis that Iran utilizes its weapons smuggling networks as proxies to leverage against foreign threats with predictable results, this study will address Iran’s future weapons smuggling behaviors. Iran, like the United States, is a complex actor pursuing rational, national strategic objectives. The perceived dichotomy between Iran’s words and actions results in an atmosphere of suspicion surrounding Iranian motives that can potentially lead to unintended escalations between Iran and other nations. An increase in tensions between the U.S. and Iran, specifically over perceived threats to Iranian sovereignty, will be matched with an increase in the rate and quantity of weapons, an introduction of more capable weapons, or both. Given the elasticity of realizing strategic success by increasing the rate and quantity of weapons, Iran will likely attempt to quickly counter an imminent threat by deploying more destructive weapons comparable to those Iran supplies to Lebanese Hezbollah. Although these escalations may not result in full-scale war, Iran will engage in alternatives to direct conflict by using weapons supply networks to leverage regional insurgents, including Afghan militants, against Iran’s real and perceived threats. It is the purpose of this paper to identify the goals of Iran’s foreign policy, the means by which Iran pursues those goals, and the ability with which we can predict the threat to U.S. Forces posed by Iranian weapons smuggling to Afghan insurgents.

• (U) On balance, Iranian foreign policy shares many of the same goals as U.S. foreign policy in the region. The smuggling of Iranian weapons to Afghan insurgent groups is simply another tool to leverage against foreign threats while maintaining overall cooperation in the stabilization of Afghanistan.
• (U) Iran historically fosters some form of relationship with all regional actors, including its own enemies, in its pursuit of national interest. This strategy is not simply meant to counter U.S. regional interests, but to actively extend Iranian influence and maintain strategic awareness of important actors at the state, sub-state, and non-state levels.
• (U) Iran’s use of weapons smuggling networks is fairly predictable and meant to shape the manner in which foreign countries deal with Iran. If the U.S. and Iran maintain the status quo, Iran will continue to supply weapons to Afghan insurgents at the same quantity, rate and type as it has over the past several years. An increase in tensions between the U.S. and Iran, specifically over perceived threats to Iranian sovereignty, will be matched with an increase in the rate and quantity of weapons, an introduction of more capable weaponry, or both.
• (U) Insurgent access to Iranian conventional weapons can have a greater impact against U.S. Forces, reminiscent of how Lebanese Hezbollah’s used Iranian weaponry to frustrate Israeli military efforts during the 2006 war in southern Lebanon. Explosively Formed Penetrators (EFPs) smuggled to Afghan insurgents for use against U.S. Forces represents the current threshold above which Iran will likely not progress without significant escalation.

(U) Conclusion

(U) Iran provides arms and funding to Afghan insurgents as it continues to do so in Iraq. Iran’s intentions are the same in both Iraq and Afghanistan: to develop, fund and arm proxy networks to leverage against the perceived U.S. aim of pursuing an active regime change doctrine in Iran. Iran’s use of proxy weapons smuggling networks may be unpleasant, but in practice, Iran restrains the full potential of these networks in Iraq and Afghanistan. Iran can use its shared borders to more quickly and efficiently fund, train, and arm its proxy networks in Iraq and Afghanistan, yet Iran has deliberately withheld many of the high-powered rockets, SAMs and other munitions that Hezbollah fielded against Israel. Iran’s introduction of EFPs in Iraq and Afghanistan has irritated U.S. military and political leaders enough that an Iranian escalation of weapons is not necessary for Iran to apply an uncomfortable amount of pressure on the United States.

(U) Conceding the restrained nature of Iranian meddling in Afghanistan does not imply that Iran’s actions should be acceptable to U.S. policymakers. The United States has been careful to avoid leveling direct accusations against Iran for providing insurgents with weapons and training in both Iraq and Afghanistan. Official U.S. comments concerning the discovery of Iranian-made weapons in Afghanistan are careful to suggest that the Iranian government may not be the direct supplier. This backs Iran into a corner, but allows room for the possibility that sub-state actors such as al-Quds and criminal elements may covertly operate outside of regular Iranian government powerbrokers. Washington may be able to subtly shift Iranian threat perceptions if the U.S. can better define that Sunni fundamentalists pose an ideological threat with no resolution, while fears of U.S. intentions can be systematically disproved. A more difficult hurdle will be shaping an alliance against Sunni fundamentalists in Afghanistan that does not appear to undermine the legitimacy of the Iranian government’s carefully crafted image as the world’s only true Islamic Republic. Unlike Iraq, Afghanistan is not a majority Shi’a country, and Iran must tread more lightly in supporting Shi’a interests.

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

JIEDDO-IranWeaponsSmuggling

TMZ – German Olympian Canoers — Where Do They Row ?

Germany has an Olympic canoeing team… but for some reason Harvey is absolutely BAFFLED about where the heck these guys go to practice.

Cryptome unveils Shell’s Let’s Go! Mercy Poll

Shell’s Let’s Go! Mercy Poll

 


From: Shell’s Arctic Ready <alerts[at]arcticready.com>
Subject: Announcing Shell’s Let’s Go! Mercy Poll
Date: Tue, 31 Jul 2012 17:26:10 +0200 (CEST)

[] []
[] Help us play by the rules­your rules!

[]

To our fellow human stewards of the globe:

Following our immensely successful ad contest­with 12,000 ads, many thousands of tweets, 4 million page views, and widespread attention in the traditional media sector­we at Shell are proud to announce our newest social-media venture: the Let’s Go! Mercy Poll! It’s an innovative, humane way for you to help us help a few of our new Arctic neighbors­and, in the process, make sure your friends and neighbors remain firmly in favor of Arctic drilling.

Here’s how it works.

The US government has granted Shell “incidental harassment authorization” permits for a number of Arctic seals, whales, and other mammals, including several with widespread popularity, and some considered “endangered.” While our permits do not encourage “harassment” (defined as the disturbance of animals’ feeding, breeding, nursing, migration, shelter, and breathing activities), they do recognize that several thousand such individuals may unavoidably be affected in the course of normal oil exploration activities.

While we at Shell are grateful the US Government will tolerate the necessary disruption of the marine ecosystem in the pursuit of vital resources, we also recognize that many of our customers experience knee-jerk reactions to the news that so many mammals will be affected. It is to address these concerns that we at Shell are launching the Let’s Go! Mercy Poll, which allows you­the public­to openly and democratically determine which Arctic mammal could have its Level B Harassment “take” reduced by half during Shell’s upcoming Arctic drilling activities. For whichever animal first reaches 10,000 votes, our crew will keep a special lookout that will make their harassment less likely.

Please do not vote more than once, or for more than one mammal. Whichever species wins this poll, we at Shell will opt to willingly self-impose meaningful voluntary restrictions above and beyond the limits imposed by our permits, and will make every effort to reduce the number of individuals of that species affected by drilling operations in both our Beaufort and Chukchi seas operations. Of course, we can’t completely eliminate the harassment of even one species­prosperity has a price!­but with your encouragement we will consider reducing it very substantially.

Helping you help us help them. Let’s go!
Your friends at ArcticReady.com

 


 


 

 

 


 

Serial Killers ~ Dennis Nilsen – Full Movie

TOP-SECRET from the FBI – New Internet Scam

Malware
Example of monitor display when computer is infected with Reveton ransomware


New Internet Scam

‘Ransomware’ Locks Computers, Demands Payment

There is a new “drive-by” virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI.

“We’re getting inundated with complaints,” said Donna Gregory of the Internet Crime Complaint Center (IC3), referring to the virus known as Reveton ransomware, which is designed to extort money from its victims.

Reveton is described as drive-by malware because unlike many viruses—which activate when users open a file or attachment—this one can install itself when users simply click on a compromised website. Once infected, the victim’s computer immediately locks, and the monitor displays a screen stating there has been a violation of federal law.

The bogus message goes on to say that the user’s Internet address was identified by the FBI or the Department of Justice’s Computer Crime and Intellectual Property Section as having been associated with child pornography sites or other illegal online activity. To unlock their machines, users are required to pay a fine using a prepaid money card service.

“Some people have actually paid the so-called fine,” said the IC3’s Gregory, who oversees a team of cyber crime subject matter experts. (The IC3 was established in 2000 as a partnership between the FBI and the National White Collar Crime Center. It gives victims an easy way to report cyber crimes and provides law enforcement and regulatory agencies with a central referral system for complaints.)

fbithisweek.jpg
Podcast: Reveton Ransomware

“While browsing the Internet a window popped up with no way to close it,” one Reveton victim recently wrote to the IC3. “The window was labeled FBI and said I was in violation of one of the following: illegal use of downloaded media, under-age porn viewing, or computer-use negligence. It listed fines and penalties for each and directed me to pay $200 via a MoneyPak order. Instructions were given on how to load the card and make the payment. The page said if the demands were not met, criminal charges would be filed and my computer would remain locked on that screen.”

The Reveton virus, used by hackers in conjunction with Citadel malware—a software delivery platform that can disseminate various kinds of computer viruses—first came to the attention of the FBI in 2011. The IC3 issued a warning on its website in May 2012. Since that time, the virus has become more widespread in the United States and internationally. Some variants of Reveton can even turn on computer webcams and display the victim’s picture on the frozen screen.

“We are getting dozens of complaints every day,” Gregory said, noting that there is no easy fix if your computer becomes infected. “Unlike other viruses,” she explained, “Reveton freezes your computer and stops it in its tracks. And the average user will not be able to easily remove the malware.”

The IC3 suggests the following if you become a victim of the Reveton virus:

  • Do not pay any money or provide any personal information.
  • Contact a computer professional to remove Reveton and Citadel from your computer.
  • Be aware that even if you are able to unfreeze your computer on your own, the malware may still operate in the background. Certain types of malware have been known to capture personal information such as user names, passwords, and credit card numbers through embedded keystroke logging programs.
  • File a complaint and look for updates about the Reveton virus on the IC3 website.

TMZ – Nigerian Olympic Star: I’ve Never ACTUALLY Been to Nigeria!

TMZ – Ne-Yo — Makin’ it Rain on Drake’s EX!

DIE “GoMoPa” will dies verhindern – Stellungnahme von Magister Bernd Pulch

(DAS INVESTMENT MAGAZIN – DAS ORIGINAL – IMMOBILIEN VERTRAULICH) DAS ORIGINAL) – Mein Name ist Bernd Pulch, ich bin von Rechts wegen Magister.
Link zu meiner Magister-Arbeit
http://www.kepplinger.de/search/node/pulch
und
http://www.kepplinger.de/node/50
Ich bin der Erbe unseres Familienbuches und damit das Oberhaupt unserer Familie Pulch. Unsere Familie hat seit Jahrhunderten in Deutschland, USA und vielen anderen Ländern, erfolgreiche Unternehmer, Staatssekretäre, Banker, Richter, Anwälte, Politiker und auch Journalisten hervorgebracht. Wir lassen unseren guten Namen nicht durch vorbestrafte Anlagebetrüger, Cybermörder und Stasi/NS-Kriminelle verunglimpfen. Deren Taten und Fäkalsprache sprechen für sich und bedürfen keiner ernsthaften Auseinandersetzung.

Die bezahlten Betrüger sollen die Kapitalanlage-Verbrecher schützen.
Darum geht es im Kern. Wie auch schon unter
http://sjb-fonds-opfer.com/?page_id=11764
klar ersichtlich.

Der neueste Coup der Verbrecher, Sie kopieren unsere Belege und wollen weiter Verunsicherung säen.
Dies wird Ihnen nicht gelingen.

Hier ist die Info zu Meridian Capital

MERIDIAN CAPITAL ÜBER DIE SERIEN-RUFMÖRDER, FÄLSCHER UND GEWOHNHEITSVERBRECHER DER STASI-”GoMoPa”

https://docs.google.com/viewer?a=v&q=cache:I5z2fMcxYJ4J:berndpulch.files.wordpress.com/2011/08/finanznachrichten-meridian-gomopa.pdf+meridian+capital+gomopa&hl=de&gl=de&pid=bl&srcid=ADGEEShvOm4eRJcLwM3wpQIXK5nfT6w6N75VZFU2TRHTdeqnD7jRaEi_G5QfBdPLIvGmvkOvM6LDEg7-uvAmaBKXtmgWDBIQg7QUR0vPg-iqEYZluXOCiPq4c1i32RergKGs3G8e8Ie5&sig=AHIEtbSm2wfoU0mtZ4EMfMwZw92GOCCxMw

http://meridiancapital.wordpress.com/

http://www.victims-opfer.com/?p=30058
Ich werde die kriminellen Verantwortlichen und ihre kriminellen Helfershelfer bis zur letzten Konsequenz zur Verantwortung ziehen.
Magister Bernd Pulch

London
PS Ich bedanke mich bei investment-on.com sowie allen anderen Medien für die Möglichkeit, die Dinge gerade zu rücken.

Reporting by Kai Friedrich, Renate Kebes, edited by Magister Bernd Pulch* and Sandra Lowe

Aus sicherheitstechnischen Gründen geben wir zu unseren Mitarbeitern keine weiteren persönlichen Daten bekannt.

siehe unseren Kreuzzug gegen Cyber Stalking

*Magister Bernd M. Pulch (MA – Magister Artium)

Abschluss des Studiums der Publizistik (Note 2) , Komparatistik (Note 1) und Germanistik (Note 1-2) 1988

Universität Mainz

Magisterarbeit bei Professor Kepplinger über Dolf Zillmanns “Emotional Arousal Theory”1987, Mainz, 400 Seiten

Sie können die Magisterarbeit bei uns zum Preis von nur € 99,- über das Kontaktformular bestellen.

Die Zahlung erfolgt per Vorkasse. Die Lieferzeit beträgt ca. 14 Tage in Deutschland.

🤡🤡🤡😂Pop Stasi proudly presents Loosing Peter “Joker” Ehlers :”Bling – Bang – Bang – Born” – AI Parody✌️

Investment Magazin, Investment, Das Investment, Investment Magazine

Unveiled by Cryptome – CIA and Congressional Negligence and Exculpation – CIA’s Relationship with Congress,

DOWNLOAD THE ORIGINAL DOCUMENT HERE:

cia-congress

 

FEMEN in PARIS – Video

Usain Bolt Net Worth – $ 30 Million

Usain Bolt Net Worth

Usain Bolt Net Worth

Usain Bolt net worth: Usain Bolt is a Jamaican sprinter who is widely considered the fastest human on the planet and has a net worth of $30 million. Usain Bolt was born in Jamaica on August 21, 1986 to parents Wellesley and Jennifer. A high school school cricket coach recognized Usain’s speed and encouraged him to focus instead on track and field. Usain quickly became one of the most talented young sprinters in the world who would eventually set world records in the 100 meter, 200 meter, and 4x100m relay. Usain Bolt won three gold medals at the 2008 Beijing Olympics. He won five gold medals and two silver medals at World Championship competitions. Amazingly, Usain Bolt’s net worth is going to explode even more in the coming years thanks to his performance at the 2012 London Olympics. Considering Usain is only 25 years old today, he is young enough to compete in the 2016 Brazil Olympics. If that’s the case, and he stays on pace with earnings, Usain Bolt’s net worth should be well over $100 million when he arrives in Brazil in 2016.

Usain Bolt net worth: How he earned it:

In 2012, Usain Bolt was one of the highest paid athletes in the world with earnings of $20.3 million! Bolt makes the majority of his money from endorsement deals with brands like Gatorade, Nissan, Visa, Hublot, Virgin Media and Puma. Out of $20.3 million in earnings, $9 million came from Puma alone for him to wear their brand of shoes. Bolt also makes money through appearance fees and prize money. He charges $250-300,000 for a track meet appearance. At the 2010 Penn Relay, nearly 55,000 fans came out to watch Usain run, smashing previous track and field attendance records.