This Forum is Closed
March 28, 2024, 07:43:10 am
Welcome, Guest. Please login or register.

Login with username, password and session length
News: GGF now has a permanent home: http://forum.globalgulag.com
 
  Home Help Search Links Staff List Login Register  
  Show Posts
Pages: 1 [2] 3 4 5
41  Science & Technology / Big Brother / Police State Tech / Darpa IXO. Most comprehensive video explaining high tech NWO tyranny on: December 07, 2010, 08:47:13 pm
DARPA Control Grid
http://video.google.com/videoplay?docid=-2301756762339435723
(20min)
DARPA’s iXo Artificial Intelligence Control Grid: ‘The Official Version’

This was constructed almost entirely using government / military quotes, animations, videos, images and photos. The narrative is sourced  ... all » from government quotes from start to finish. It is the “official version”, if you will, but in an unprecedented format.

It unveils the governments numerous and ongoing programs related to A.I., “NBIC”, the “Global Information Grid”, nanotechnology, biotechnology, autonomous drones, “naval sea-bases”, space weapons, weather modification… or more directly: domestic and global totalitarian technological domination. American Imperialism meets Artificial Intelligence.

The only debate is: what are we going to do to stop it? Time’s running out…

It mostly centers around DARPA materials, as they’re the fountainhead of all of this, but this is all a broad multi-agency effort. Some of the video content, the “OS” of the video, was screen captured from the DARPA sites old iXo interactive flash presentation, from almost a yearago, but is now no longer available.

Video by Ignorance Isn't Bliss
www.myspace.com/ignoranceisntbliss
42  General / Art / Satire / Cartoons / Parodies / The New World Order is good! It will be like the one-world govt in Star Trek! on: December 07, 2010, 05:03:44 pm
43  General / Wikileaks operation and the concept of controlled opposition / "Don't shoot messenger for revealing uncomfortable truths" -Assange on: December 07, 2010, 04:18:05 pm
Reposted in its entirety because it is an Editorial

Please visit the Australian

http://www.theaustralian.com.au/in-depth/wikileaks/dont-shoot-messenger-for-revealing-uncomfortable-truths/story-fn775xjq-1225967241332

"Don't shoot messenger for revealing uncomfortable truths"
WIKILEAKS deserves protection, not threats and attacks.

IN 1958 a young Rupert Murdoch, then owner and editor of Adelaide's The News, wrote: "In the race between secrecy and truth, it seems inevitable that truth will always win."

His observation perhaps reflected his father Keith Murdoch's expose that Australian troops were being needlessly sacrificed by incompetent British commanders on the shores of Gallipoli. The British tried to shut him up but Keith Murdoch would not be silenced and his efforts led to the termination of the disastrous Gallipoli campaign.

Nearly a century later, WikiLeaks is also fearlessly publishing facts that need to be made public.

I grew up in a Queensland country town where people spoke their minds bluntly. They distrusted big government as something that could be corrupted if not watched carefully. The dark days of corruption in the Queensland government before the Fitzgerald inquiry are testimony to what happens when the politicians gag the media from reporting the truth.

These things have stayed with me. WikiLeaks was created around these core values. The idea, conceived in Australia, was to use internet technologies in new ways to report the truth.

WikiLeaks coined a new type of journalism: scientific journalism. We work with other media outlets to bring people the news, but also to prove it is true. Scientific journalism allows you to read a news story, then to click online to see the original document it is based on. That way you can judge for yourself: Is the story true? Did the journalist report it accurately?

Democratic societies need a strong media and WikiLeaks is part of that media. The media helps keep government honest. WikiLeaks has revealed some hard truths about the Iraq and Afghan wars, and broken stories about corporate corruption.

People have said I am anti-war: for the record, I am not. Sometimes nations need to go to war, and there are just wars. But there is nothing more wrong than a government lying to its people about those wars, then asking these same citizens to put their lives and their taxes on the line for those lies. If a war is justified, then tell the truth and the people will decide whether to support it.

If you have read any of the Afghan or Iraq war logs, any of the US embassy cables or any of the stories about the things WikiLeaks has reported, consider how important it is for all media to be able to report these things freely.

WikiLeaks is not the only publisher of the US embassy cables. Other media outlets, including Britain's The Guardian, The New York Times, El Pais in Spain and Der Spiegel in Germany have published the same redacted cables.

Yet it is WikiLeaks, as the co-ordinator of these other groups, that has copped the most vicious attacks and accusations from the US government and its acolytes. I have been accused of treason, even though I am an Australian, not a US, citizen. There have been dozens of serious calls in the US for me to be "taken out" by US special forces. Sarah Palin says I should be "hunted down like Osama bin Laden", a Republican bill sits before the US Senate seeking to have me declared a "transnational threat" and disposed of accordingly. An adviser to the Canadian Prime Minister's office has called on national television for me to be assassinated. An American blogger has called for my 20-year-old son, here in Australia, to be kidnapped and harmed for no other reason than to get at me.

And Australians should observe with no pride the disgraceful pandering to these sentiments by Julia Gillard and her government. The powers of the Australian government appear to be fully at the disposal of the US as to whether to cancel my Australian passport, or to spy on or harass WikiLeaks supporters. The Australian Attorney-General is doing everything he can to help a US investigation clearly directed at framing Australian citizens and shipping them to the US.

Prime Minister Gillard and US Secretary of State Hillary Clinton have not had a word of criticism for the other media organisations. That is because The Guardian, The New York Times and Der Spiegel are old and large, while WikiLeaks is as yet young and small.

We are the underdogs. The Gillard government is trying to shoot the messenger because it doesn't want the truth revealed, including information about its own diplomatic and political dealings.

Has there been any response from the Australian government to the numerous public threats of violence against me and other WikiLeaks personnel? One might have thought an Australian prime minister would be defending her citizens against such things, but there have only been wholly unsubstantiated claims of illegality. The Prime Minister and especially the Attorney-General are meant to carry out their duties with dignity and above the fray. Rest assured, these two mean to save their own skins. They will not.

Every time WikiLeaks publishes the truth about abuses committed by US agencies, Australian politicians chant a provably false chorus with the State Department: "You'll risk lives! National security! You'll endanger troops!" Then they say there is nothing of importance in what WikiLeaks publishes. It can't be both. Which is it?

It is neither. WikiLeaks has a four-year publishing history. During that time we have changed whole governments, but not a single person, as far as anyone is aware, has been harmed. But the US, with Australian government connivance, has killed thousands in the past few months alone.

US Secretary of Defence Robert Gates admitted in a letter to the US congress that no sensitive intelligence sources or methods had been compromised by the Afghan war logs disclosure. The Pentagon stated there was no evidence the WikiLeaks reports had led to anyone being harmed in Afghanistan. NATO in Kabul told CNN it couldn't find a single person who needed protecting. The Australian Department of Defence said the same. No Australian troops or sources have been hurt by anything we have published.

But our publications have been far from unimportant. The US diplomatic cables reveal some startling facts:

► The US asked its diplomats to steal personal human material and information from UN officials and human rights groups, including DNA, fingerprints, iris scans, credit card numbers, internet passwords and ID photos, in violation of international treaties. Presumably Australian UN diplomats may be targeted, too.

► King Abdullah of Saudi Arabia asked the US to attack Iran.

► Officials in Jordan and Bahrain want Iran's nuclear program stopped by any means available.

► Britain's Iraq inquiry was fixed to protect "US interests".

► Sweden is a covert member of NATO and US intelligence sharing is kept from parliament.

► The US is playing hardball to get other countries to take freed detainees from Guantanamo Bay. Barack Obama agreed to meet the Slovenian President only if Slovenia took a prisoner. Our Pacific neighbour Kiribati was offered millions of dollars to accept detainees.

In its landmark ruling in the Pentagon Papers case, the US Supreme Court said "only a free and unrestrained press can effectively expose deception in government". The swirling storm around WikiLeaks today reinforces the need to defend the right of all media to reveal the truth.

Julian Assange is the editor-in-chief of WikiLeaks.

Source: The Australian
http://www.theaustralian.com.au

Reposted for fair use and discussion.
44  General / Wikileaks operation and the concept of controlled opposition / Paul Craig Roberts on Cablegate with the gloves off! on: December 07, 2010, 04:12:42 pm
Reposted in full because this is an Editorial.

Please visit Online Journal.

http://onlinejournal.com/artman/publish/article_6659.shtml

Commentary
WikiLeaks II - A government caught up in mendacity and lies
By Paul Craig Roberts
Online Journal Contributing Writer


Dec 6, 2010, 00:18

The reaction to WikiLeaks and its founder, Julian Assange, tells us all we need to know about the total corruption of our “modern” world, which in fact is a throwback to the Dark Ages.

Some member of the United States government released to WikiLeaks the documents that are now controversial. The documents are controversial, because they are official US documents and show all too clearly that the US government is a duplicitous entity whose raison d’être is to control every other government.

The media, not merely in the US but also throughout the English-speaking world and Europe, has shown its hostility to WikiLeaks. The reason is obvious. WikiLeaks reveals truth, while the media covers up for the US government and its puppet states.

Why would anyone with a lick of sense read the media when they can read original material from WikiLeaks? The average American reporter and editor must be very angry that his/her own cowardice is so clearly exposed by Julian Assange. The American media is a ****, whereas the courageous blood of warriors runs through WikiLeaks’ veins.

Just as American politicians want Bradley Manning executed because he revealed crimes of the US government, they want Julian Assange executed. In the past few days the more notorious of the dumbshits that sit in the US Congress have denounced Assange as a “traitor to America.” What total ignorance. Assange is an Australian, not an American citizen. To be a traitor to America, one has to be of the nationality. An Australian cannot be a traitor to America any more than an American can be a traitor to Australia. But don’t expect the morons who represent the lobbyists to know this much.

Mike Huckabee, the redneck Baptist preacher who was governor of Arkansas and, to America’s already overwhelming shame, was third runner up to the Republican presidential nomination, has called for Assange’s execution. So here we have a “man of God” calling for the US government to murder an Australian citizen. And Americans wonder why the rest of the world hates their guts.

The material leaked from the US government to WikiLeaks shows that the US government is an extremely disreputable gang of gangsters. The US government was able to get British Prime Minister Brown to “fix” the official Chilcot Investigation into how former Prime Minister Tony Blair manipulated and lied the British government into being mercenaries for the US invasion of Iraq. One of the “diplomatic” cables released has UK Defense Ministry official Jon Day promising the United States government that Prime Minister Brown’s government has “put measures in place to protect your interests.”

Other cables show the US government threatening Spanish Prime Minister Zapatero, ordering him to stop his criticisms of the Iraq war or else. I mean, really, how dare these foreign governments to think that they are sovereign?

Not only foreign governments are under the US thumb. So is Amazon.com. Joe Lieberman from Connecticut, who is Israel’s most influential senator in the US Senate, delivered sufficiently credible threats to Amazon to cause the company to oust WikiLeaks content from their hosting service.

So there you have it. On the one hand, the US government and the prostitute American media declare that there is nothing new in the hundreds of thousands of documents, yet, on the other hand, both pull out all stops to shut down WikiLeaks and its founder. Obviously, despite the US government’s denials, the documents are extremely damaging. The documents show that the US government is not what it pretends to be.

Assange is in hiding. He fears CIA and Mossad assassination, and to add to his troubles the government of Sweden has changed its mind, perhaps as a result of American persuasion and money, about sex charges that the Swedish government had previously dismissed for lack of credibility. If reports are correct, two women, who possibly could be CIA or Mossad assets, have brought sex charges against Assange. One claims that she was having consensual sexual intercourse with him, but that he didn’t stop when she asked him to when the condom broke.

Think about this for a minute. Other than male **** stars who are bored with it all, how many men can stop at the point of orgasm or when approaching orgasm? How does anyone know where Assange was in the process of the sex act?

Would a real government that had any integrity and commitment to truth try to blacken the name of the prime truth teller of our time on the basis of such flimsy charges?

Obviously, Sweden has become another two-bit punk puppet government of the US.

The US government has got away with telling lies for so long that it no longer hesitates to lie in the most blatant way. WikiLeaks released a US classified document signed by Secretary of State Hillary Clinton that explicitly orders US diplomats to spy on UN Security council officials and on the Secretary General of the United Nations. The cable is now in the public record. No one challenges its authenticity. Yet, last week, the Obama regime, precisely White House Press Secretary Robert Gibbs, declared that Hillary had never ordered or even asked US officials to spy on UN officials.

As Antiwar.com asked: Who do you believe, the printed word with Hillary’s signature or the White House?

Anyone who believes the US government about anything is the epitome of gullibility.
Paul Craig Roberts was Assistant Secretary U.S. Treasury, Associate Editor Wall Street Journal, Columnist for Business Week, Senior Research Fellow Hoover Institution Stanford University, and William E. Simon Chair of Political Economy in the Center for Strategic and International Studies, Washington, D.C. His latest book, HOW THE ECONOMY WAS LOST, has just been published by CounterPunch/AK Press. He can be reached at PaulCraigRoberts@yahoo.com.

Copyright © 1998-2007 Online Journal
Email Online Journal Editor

Reposted here for Fair Use and discussion.

Help support Online Journal
http://onlinejournal.com/artman/publish/article_4869.shtml
45  Health, Family & Eugenics / Eugenics / Depopulation / War On Family / Re: Maury Show Paternity Test daytime TV Psyops pushed by **** eugencists on: December 07, 2010, 03:19:04 am
brother truther tenther (what the heck does "tenther" refer to?):

It's actually birther truther tenther:

http://en.wikipedia.org/wiki/Birther
http://en.wikipedia.org/wiki/Truther
http://en.wikipedia.org/wiki/Tenther

But going back to what you are saying, I admit that the Maury Show dehumanization psyop is totally obvious to us that are awake, but it isn't for the average American.

I also have this posted on the Prison Planet Forum, and most everyone there is awake, but I wanted to show the connections to how this psyop works.
46  Health, Family & Eugenics / Eugenics / Depopulation / War On Family / Maury Show Paternity Test daytime TV Psyops pushed by **** eugencists on: December 07, 2010, 02:12:32 am


The Maury Show is biggest psyop I have ever seen on daytime television.  They get these ghetto trash and trailer trash women who don't know who their "baby's daddies" are because they sleep around so much, and then the whole segment is the women and the suspected father arguing that they are "100% sure" that they are the father or not.  Then Maury comes in with the "results" and then the audience cheers when the man is the father, or get shocked when he isn't.

This show is incredibly painful to watch when you are awake, and live outside of the GIG/NWO matrix.

The dehumanization, the break-up of the family, the normalization of promiscuity, and a DNA genetics test coming in like a magic wand that solves the "conflict" so that way the man can become enslaved by the Rockefeller-founded unconstitutional family courts, is sooo sick.

Anyways, the DNA testing is done by this corporation, and as usual, the Board of Directors have interesting ties:





http://www.dnacenter.com/management.html

Dr. Michael Baird | Chief Scientific Officer
Dr. Baird is Chief Scientific Officer, Laboratory Director, and DNA Technical Leader. He received his doctorate in genetics from the University of Chicago. He then joined LifeCodes, where he held the positions of, Senior Scientist, Laboratory Director, and Vice President of Laboratory Operations. Dr. Baird has published over 50 articles in peer review journals as well as chapters in books about the use of DNA for identification. He was the first to testify in a criminal trial involving DNA evidence and has since testified in over 350 criminal cases.  Dr. Baird currently serves as a chair of the Relationship Testing Standards Committee of the AABB, is a fellow in the American Academy of Forensic Sciences, and member of the AABB, American Society of Human Genetics, the American Genetics Society, the American Society of Histocompatibility and Immunogeneitcs, the International Society of Forensic Genetics, and the American Society of Hematology.

Jerry Watkins | Vice President of Operations
Jerry Watkins serves as Vice President of Operations for DDC. Jerry is responsible for the overall direction and guidance of our client services, sales, contract services, case management, laboratory and information technology teams. Since joining DDC in 2004, he has served in various aspects of operations from sales manager to general manager, before being appointed VP of Operations in April of 2010.  He has over 15 years of sales and operations experience in consumer products and distribution. Prior to DDC, he served in various leadership positions within Target Corporation, most recently within the Store Leadership Group. Before Target, he managed a sales team within the Consumer Products group for Gateway Computers.

[Watkins was in charge of the Target Forensics Lab.]



Now here's the real shocker.  The heads of the Laboratory Operations.  Eugenics/Genetics tied in with mass media and industry.  OMFG

http://www.dnacenter.com/staff.html

Dr. Michael Baird | Laboratory Director
Dr. Baird has decades of experience in the field of DNA testing. In 1982, he was at the forefront of DNA testing as part of a team that pioneered DNA identity testing, eventually offering it on a commercial scale. In 1987, he was the first DNA expert to testify in a U.S. court case and has since testified in hundreds of court cases involving DNA and forensics. In 2007, Dr. Baird was appointed by the courts as the DNA expert in the paternity case involving Anna Nicole Smith's daughter, Dannielynn.  Dr. Baird has written and published numerous articles and manuscripts in the field of DNA technology, paternity testing, and forensics. He has appeared on several national TV shows that featured DNA testing. NBC News hired him as their on-air DNA expert during the OJ Simpson trial. He has also been interviewed on Larry King Live, Nancy Grace, Court TV, and others.  An active member of the AABB for over 20 years, Dr. Baird is the current chair of the Relationship Testing Standards Program Unit. He is in charge of rewriting the Standards for Relationship Testing Laboratories, 9th Edition, which will become effective in January 2010

Dr. Thomas Reid | Associate Laboratory Director
Dr. Reid is DDC's primary technical expert for cases involving unusual or complex family relationships. He specializes in extended DNA testing such as genetic reconstruction and siblingship studies. In April of 2006, his expertise was called upon to lend his expertise in the effort to perform genetic reconstruction analysis to help identify victims of the hurricane Katrina.  Dr. Reid obtained his Ph.D. in Biochemistry from Wayne State University in Detroit, MI, specializing in molecular biology. Before joining DDC he worked at the Centers for Disease Control, investigating the effects of carcinogens on DNA. He has been with DDC since 2000 and has led several laboratory research projects, including developing more STR markers to add to DDC's testing battery for unusual and difficult DNA cases.

Dr. Marco Scarpetta | Associate Laboratory Director
Marco Scarpetta, Ph.D. joined DDC in 2009. He has been in the field of human identity testing for 15 years, and has experience in both forensic casework and paternity. He is active in the aaBB, the governing body of paternity testing. He has been involved in several high profile cases on both the forensic and paternity sides of DNA testing, and he has reviewed well over 200,000 paternity cases.

Dr. Julie Heinig | Assistant Laboratory Director
Dr. Heinig is in charge of the forensic laboratory operations at DNA Diagnostics Center. She performs DNA testing on crime scene evidence for DDC Forensics. Dr. Heinig designed and prepared DDC's forensic laboratory for accreditations by the prestigious FQS-I (Forensic Quality Services-International)/ISO IEC17025 and ASCLD/LAB-International, setting up the laboratory policies and procedures and performing validation studies.

Before joining DDC, Dr. Heinig spent 4 years as a Senior Forensic Scientist/DNA Analyst at the Cuyahoga County Coroner's office, where she performed testing on the highly publicized Dr. Sam Sheppard case. Dr. Heinig has appeared as an expert in a number of court cases testifying on her own casework and that of other scientists. She has extensive experience in processing crime scenes.

Dr. Heinig is an experienced lecturer, having hosted seminars and given lectures at the Coroner's office and offsite to various groups including attorneys, physicians and universities. She has also conducted crime scene evidence collection workshops for law enforcement agencies.

Dr. Leigh Hanna | Assistant Laboratory Director
Dr. Hanna received her Master's Degree in Molecular Sciences from the University of Tennessee Health Science Center. She then completed her doctoral dissertation in molecular microbiology at Purdue University. Dr. Hanna reviews paternity cases and also participates in research and development projects in the laboratory. She has been focusing on several new technologies for relationship testing, such as developing additional markers for extended testing and mitochondrial DNA sequencing.

Dr. Hanna has played an integral role in the laboratory's recent mtDNA haplogroup project, which aims to develop and improve upon currently available markers for genealogy research. Ancestry DNA testing has been gaining attention as a "recreational DNA test" in the media, and the technology is still being continually improved and refined. DDC is actively pursuing research and development efforts in this field with the hope of offering this service.



Also of note,  Maury is an NBC-Universal show, which is run by parent company General Electric.

http://www.nbcuni.com/About_NBC_Universal/Executive_Bios/gaspin_jeff.shtml

47  General / Wikileaks Cables / Cable: ANALYZING THE CIVIL UNREST -- THE ISLAMIC FACTOR (Embassy Paris) on: December 07, 2010, 02:07:15 am
http://213.251.145.96/cable/2005/11/05PARIS7835.html

C O N F I D E N T I A L SECTION 01 OF 04 PARIS 007835

SIPDIS

DEPT ALSO FOR EUR/WE, DRL/IL, INR/EUC, EUR/ERA, EUR/PPD,
AND EB
DEPT OF COMMERCE FOR ITA
DEPT OF LABOR FOR ILAB

E.O. 12958: DECL: 04/07/2015
TAGS: PGOV ELAB EU FR PINR SOCI ECON
SUBJECT: ANALYZING THE CIVIL UNREST -- THE ISLAMIC FACTOR

REF: A. (A) PARIS 7682 AND PREVIOUS

¶B. (B) EMBASSY PARIS DAILY REPORT FOR OCTOBER 28 -
NOVEMBER 16 (PARIS SIPRNET SITE)
¶C. (C) PARIS 7527

Classified By: Pol/MC Josiah Rosenblatt for reasons 1.4 (b) and (d)

¶1. (SBU) Summary: The perpetrators of the urban rampaging
(refs) in France are by and large of Arab-African and
Black-African background. In most cases, they are also
Muslims, raising the question as to what extent their
religious affiliation helps explain the explosion in France's
immigrant suburbs. There is widespread agreement that
unemployment and lack of education, and not religious
affiliation, are the primary factors underlying the angry
hopelessness of urban youth. That said, responsible
commentators on the situation -- from officials who monitor
potential support for terrorist activities to rights
activists with long experience working in troubled
neighborhoods -- see religious affiliation as a complicating
factor. Thus far most of the youths in question, while
happening to be Muslim by culture, are generally not viewed
as individually inspired by Islam, just as Islamic political
groupings are generally not viewed as being directly behind
the violence. Observers note, however, that these groups
have not hesitated to try to exploit the unrest for their own
purposes, just as extremist and nativist politicians on the
far-right have played to racism and xenophobic fears. The
government's decision to turn to Muslim leaders to quell the
unrest is itself seen by some as misdirected and a bad
precedent, in contradiction with the French republic's strict
secularism. In sum, while efforts to politicize the unrest
are seen as unsuccessful to date, there is concern that not
"getting it right" in dealing with the problems of France's
underclass Muslims could eventually produce the very Islamic
extremism identity that (almost) no one wants. End summary.

No direct links to Islamic extremism
------------------------------------

¶2. (C) Though it has carefully watched for it, the French
Government has not discerned any significant link between
Islamic extremism and the recent unrest. As Christophe
Chaboud, head of the Ministry of Interior's counter-terrorism
coordination body (known by its French acronym - UCLAT),
categorically reconfirmed to PolOff on November 15, "we (the
GoF) have not found any link between Islamic extremists and
those fomenting the unrest. He acknowledged that police and
internal intelligence organizations have received "a few"
signs that some Islamic extremists have participated in the
violence. That said, he believed that they were acting as
individuals and not as members of a coordinated, Islamic
group.

Fears of extremist and criminal exploitation
--------------------------------------------

¶3. (C) Chaboud reported that GoF monitoring of websites and
blogs (in France and abroad) nonetheless reveals that
extremists are trying to exploit the unrest to their
advantage, claiming (for example) that it results from GOF
attempts to control and muzzle Islam in France. Asked
whether there was any connection between organized criminal
gangs and Islamic extremists in exploiting the unrest,
Chaboud said those in the "revolt movement" were, at most,
only petty criminals. Indeed, police are quoted in press as
observing that where organized crime is strongest is often
where there has been, counter to conventional expectations,
little unrest, presumably because drug-selling organizations
view burning cars as bad for business. (See also ref C for
the views of a investigating judge on the connection between
criminality and current unrest.)

Just hoodlums?
--------------

¶4. (SBU) Samira Cadasse, vice-president of a leading women's
rights group that focuses on empowering women in poor
immigrant communities, told PolOff that the small groups of
youths responsible for car burnings and police taunting are
the same ones who "hold hostage" suburban housing projects
throughout France. Cadasse's NGO -- "Ni Putes Ni Soumises
(NPNS -- translated literally as "Neither Whores nor
Submissives") focuses on the difficulties poor, often Muslim
women of immigrant background face in resisting
discrimination from French society as well as oppression
within their own cultural traditions. Cadasse said NPNS has
tried to highlight for years the way frustrated, angry,
aimless young men in poor neighborhoods, under the blind eye
of French authorities, visit their powerlessness first and
foremost on their female relatives.
Or "Islamic" hoodlums?
----------------------

¶5. (SBU) Contrary to much of the media reporting, Cadasse
said she definitely also perceived an Islamist element behind
some of the violence. Exclaiming that, "we all know who
these guys are," she claimed they had shaved their (Islamic)
beards in order to spread violence. These unemployed
Islamist youths were the same troublemakers who had sought to
repress women in the troubled suburban neighborhoods. She
also believed it significant that there were no girls among
the troublemakers. That said, while Cadasse clearly believed
that the misapplication of tenets some attribute to Islam
abets the widespread oppression of women in these immigrant
communities, she stopped well short of calling the "big
brothers" committed Islamist fundamentalists.

No role models or jobs
----------------------

¶6. (SBU) Cadasse identified lack of jobs as the real root of
the problem, which was compounded by the relative generosity
of the social safety net. As a result, young men sat idle at
home, while receiving a generous -- but ultimately
insufficient and humiliating -- 950-euro stipend from the
government. They could not afford to move away from their
parents, but at the same time accepted no parental control.
She did not think it accurate to portray these youths as
victims; these young men were guilty of arson and other
crimes and should be punished. At the same time, she thought
it would be difficult to break the vicious cycle. Cadasse
saw the current crisis -- due to larger failures and
shortfalls in education, employment opportunities and housing
-- as very difficult to resolve, and doubted that the
government had the will do go beyond the "Band-Aid" solutions
employed in the past.

30 years of "ghettoization"
---------------------------

¶7. (SBU) According to Cadasse, the government's history of
treating only the symptoms rather than the causes of minority
unemployment and social exclusion, and its failure to curb a
thirty-year ghettoization trend among French immigrant
communities, "has been an error" of governments of both left
and right. Cadasse was pessimistic about the prospects of
bettering the circumstances of France's immigrants of Arab
background. She said that overall, "we're no better off than
22 years ago" -- at the time of the "march of the beurs" -- a
turning point in North African immigrant activism. While she
did not envision a "Marshall plan" for France's
inner-city-like suburbs, she believed that "drastic measures"
were necessary nonetheless. PM de Villepin's pledge to
reverse the budget cuts to associations (like NPNS) and to
offer a range of other social program enhancements was a
positive start. Government funding was also critical for
secular NGOs like NPNS to combat the influence of Islamists.
But she doubted the government had the will to stay the
course. In her view, it was too tempting for the government
to focus on security in an attempt to appeal to
far-right-leaning voters in the upcoming presidential
election.

¶8. (SBU) Comment: French NGOs are largely dependent on
government support, and typically receive 80 percent or more
of their funding from the state. These associations are
essential to holding together the social fabric of poor
neighborhoods, providing everything from food kitchens to
tutoring to psychological support activities. Soon after
President Chirac's re-election in 2002, the state financing
of these associations was cut severely. Prime Minister
Villepin last week promised to restore the cuts. The
government appears to understand that diminishing the
viability of these secular, state-funded charitable
organization risks a vacuum that could be filled by home
grown, Islamist self-help organizations. End Comment.

GOF guilty of using religion?
-----------------------------

¶9. (SBU) Interestingly, some see the government itself as
guilty to some degree of having violated the principle of
secularism it holds so dear. In a meeting with the rector of
the Grand Mosque of Lyon on November 15, one Muslim religious
leader's criticized the government for violating France's
strict separation of the religious and the public. The
Rector, Kamel Kabtane, took to task the government's effort
to use Muslim religious figures to calm the situation in
troubled neighborhoods. Kabtane said that many of his
fellow-clerics were also ambivalent about the French
government's call on religious leaders to "do the work of the
government and security forces." "If farmers started
protesting", said the Rector, "the government wouldn't call
on the Archbishop to resolve the situation." He warned
against attributing a religious dimension to socio-economic
problems; there was a risk it could become a self-fulfilling
prophecy.

Better ecumenical than Muslim-only
----------------------------------

¶10. (SBU) Kabtane went on to point out that, "the government
says that France is a secular state, but then -- when it
serves its purposes to do so -- it turns around and calls on
religious leaders to solve non-religious problems that the
secular state should have been addressing over the last 20-30
years." Kabtane has not issued a statement condemning the
violence or calling upon the perpetrators to stop, as he
believes it is important not to conflate the actions of
violent youths with Islam. If religious leaders are to be
involved, he believes it would be preferable to adopt an
ecumenical rather than a sectarian approach. To that end, he
was organizing a meeting of religious leaders from the
Muslim, Christian, and Jewish communities in Lyon on November
¶16. His aim was to convince those present to issue a joint
statement condemning the violence and calling for it to end.

The risk of an anti-Muslim backlash
-----------------------------------

¶11. (SBU) Kabtane indicated that he was much more worried
about backlash against Muslims following on the recent unrest
than about any putative use of the unrest by fundamentalists.
On November 12, a Molotov cocktail was thrown over the wall
into the Grand Mosque of Lyon. Then on November 13, someone
threw a Molotov cocktail over the wall of a mosque in
Saint-Chamond (a town near Lyon). Kabtane said that Muslims
were paying the price for the fact that French politicians --
and foreign media -- have blamed the violence on "Muslims"
and "immigrants" instead of on "unemployed" or
"underprivileged" youths. (Comment: We have now heard
reports of a handful of such attacks against mosques. In all
likelihood, they were perpetrated by right-wing,
anti-immigrant nativists. End Comment.) Kabtane added that
he was satisfied with the demonstrations of support he had
received from French authorities in the wake of the attack on
the mosque. The local prefect visited the site the following
morning, and Interior Minister Sarkozy had telephoned Kabtane
to offer support.

The French school system as the key
-----------------------------------

¶12. (SBU) During a public affairs talk show on the evening
of November 13, conservative philosopher Alain Finkelkraut
addressed how "the Republic" could reclaim the troubled,
inner-city-like neighborhoods "lost" to both law and order
and social integration. Finkelkraut poetically evoked his
experience in France's public school system, stressing its
role in separating youths from surrounding society in order
better to inculcate the values that underpin the "Republican
ideal" of equal citizenship blind to race, nationality,
religion and social class. Finkelkraut lamented the way
"society had invaded the schools," bringing with it a raft of
demands, identities, exceptions and resentments that, taken
together, interfered with the inculcation of a shared
national identity. In Finkelkraut's view, taking back the
neighborhoods for "Republican" law and order was the lesser
half of the battle. Providing, to those most removed from
the possibility of it, the convictions and opportunities
required for successfully integrating into French society was
the more difficult, and most urgent challenge, facing France
today.

Otherwise sectarianism could follow
-----------------------------------

¶13. (SBU) Finkelkraut warned that failure to meet this
challenge would inevitably open the door to the ascendancy of
separate, alternative identities focused on religion.
Controversial Islamic activist Tarik Ramadan, who also
participated in the round-table discussion, indirectly
confirmed as much. Turning around the image of "the Republic
needing to take back the neighborhoods", Ramadan, unctuously,
but deftly, argued for the right of "the neighborhoods" --
their cultures, identities, religion, etc. -- to "take the
Republic."

The French fear of "communitarism"
----------------------------------

¶14. (SBU) Former Prime Minister Alain Juppe -- spending a
semester teaching in Canada -- posted a long piece to his
blog (www.al1jup.com) that clearly identified "Islam in
France," specifically "radical Islam," as a factor also
"responsible" for the current unrest. In Juppe's view,
"French Islam's" refusal -- so far -- to "solemnly proclaim"
its acceptance of the "separation of the temporal from the
spiritual" and its recognition of "non-negotiable, universal
human rights" (including gender equality) contributes to the
difficulty of integrating those who live in the neighborhoods
where radical Islam presents itself as an alternative model
for social organization.

Comment
-------

¶15. (SBU) The gangs of underclass youths who are the
perpetrators of the car burnings and urban violence in France
are not Islamists, nor are they at all motivated by religion.
It is highly misleading to characterize them -- as is often
done in media coverage -- as "insurgent" and "Muslim" youths.
The anger felt by these youths stems from how they are
trapped and without a future -- facing pervasive racial
prejudice, and without the skills and education needed to
get-a-life of employment and conventional respect.

¶16. (SBU) That said, the dominant religion in France's
low-income housing projects affected by the recent violence
is Islam, and there are those intent on "saving" these
communities from their social ills by re-founding them on
religious, as opposed to secular, principles, in effect
filling the vacuum where French republican values have failed
to take root. Whether or not Islamic organizations and
fundamentalist proselytizing will make significant inroads
among the inhabitants of France's immigrant suburbs of course
depends on the effectiveness of the GOF's social programs and
the willingness of French society at large to face up to its
pervasive prejudices against Blacks and Arabs.

Please visit Paris' Classified Website at:
http://www.state.sgov.gov/p/eur/paris/index.c fm

Stapleton
48  General / Wikileaks Cables / Re: Cable: "U.S.-UK interoperability" on: December 07, 2010, 02:05:56 am
From Joint Vision 2020
http://globalgulag.freesmfhosting.com/index.php/topic,711.0.html


Interoperability—the ability of systems,
units, or forces to provide services from
other systems, units, or forces and to use the
services so exchanged to enable them to operate
effectively together (Joint Pub 1-02).


Interoperability
Interoperability is the foundation of effective
joint, multinational, and interagency operations.
The joint force has made significant progress
toward achieving an optimum level of interoperability,
but there must be a concerted effort toward
continued improvement. Further improvements
will include the refinement of joint
doctrine as well as further development of common
technologies and processes. Exercises, personnel
exchanges, agreement on standardized operating
procedures, individual training and
education, and planning will further enhance
and institutionalize these capabilities. Interoperability
is a mandate for the joint force of 2020—
especially in terms of communications, common
logistics items, and information sharing. Information
systems and equipment that enable a common
relevant operational picture must work from
shared networks that can be accessed by any appropriately
cleared participant.

Although technical interoperability is essential,
it is not sufficient to ensure effective operations.
There must be a suitable focus on procedural
and organizational elements, and decisionmakers
at all levels must understand each other’s capabilities
and constraints. Training and education, experience
and exercises, cooperative planning, and
skilled liaison at all levels of the joint force will not
only overcome the barriers of organizational culture
and differing priorities, but will teach members
of the joint team to appreciate the full range
of service capabilities available to them.
The future joint force will have the embedded
technologies and adaptive organizational
structures that will allow trained and experienced
people to develop compatible processes and procedures,
engage in collaborative planning, and
adapt as necessary to specific crisis situations.
These features are not only vital to the joint
force, but to multinational and interagency operations
as well.


Multinational operations—a
collective term used to describe
military actions conducted by
forces of two or more nations usually
undertaken within the structure
of a coalition or alliance (Joint
Pub 1-02).

Multinational Operations
Since our potential multinational partners
will have varying levels of technology, a tailored
approach to interoperability that accommodates
a wide range of needs and capabilities is necessary.
Our more technically advanced allies will
have systems and equipment that are essentially
compatible, enabling them
to interface and share information
in order to operate
effectively with U.S. forces
at all levels. However, we
must also be capable of operating
with allies and coalition
partners who may be
technologically incompatible—
especially at the tactical
level. Additionally, many
of our future partners will have significant specialized
capabilities that may be integrated into a
common operating scheme. At the same time, the
existence of these relationships does not imply
access to information without constraints. We
and our multinational partners will continue to
use suitable judgment regarding the protection of
sensitive information and information sources.
In all cases, effective command and control is
the primary means of successfully extending the
joint vision to multinational operations. Technological
developments that connect the information
systems of partners will provide the links that
lead to a common relevant operational picture
and improve command and control. However, the
sharing of information needed to maintain the
tempo of integrated multinational operations also
relies heavily on a shared understanding of operational
procedures and compatible organizations.
The commander must have the ability to evaluate
information in its multinational context. That
context can only be appreciated if sufficient regional
expertise and liaison capability are available
on the commander’s staff. A deep understanding
of the cultural, political, military, and
economic characteristics of a region must be established
and maintained. Developing this understanding
is dependent upon shared training and
education, especially with key partners, and may
require organizational change as well. The overall
effectiveness of multinational operations is therefore
dependent on interoperability between organizations,
processes, and technologies.

Interagency coordination—the coordination
that occurs between elements of the
Department of Defense and engaged U.S.
Government agencies, nongovernmental organizations,
private voluntary organizations,
and regional and international organizations
for the purpose of accomplishing an objective
(Joint Pub 1-02).

Interagency Operations
The primary challenge of interagency operations
is to achieve unity of effort despite the diverse
cultures, competing interests, and differing
priorities of the participating organizations, many
of whom guard their relative independence, freedom
of action, and impartiality. Additionally,
these organizations may lack the structure and resources
to support extensive liaison cells or integrative
technology. In this environment and in
the absence of formal command relationships,
the future joint force must be proactive in improving
communications, planning, interoperability,
and liaison with potential interagency
participants. These factors are important in all aspects
of interagency operations, but particularly
in the context of direct threats to citizens and facilities
in the U.S. homeland. Cohesive interagency
action is vital to deterring, defending
against, and responding to such attacks. The joint
force must be prepared to support civilian authorities
in a fully integrated effort to meet the needs
of U.S. citizens and accomplish the objectives
specified by the National Command Authorities.
All organizations have unique information
assets that can contribute to the common relevant
operational picture and support unified action.
They also have unique information requirements.
Sharing information with appropriately cleared
participants and integration of information from
all sources are essential. Understanding each
other’s requirements and assets is also crucial.
More importantly, through training with potential
interagency partners, experienced liaisons must be
developed to support long-term relationships, collaborative
planning in advance of crises, and compatible
processes and procedures. As with our
multinational partners, interoperability in all
areas of interaction is essential to effective interagency
operations.

READ MORE OF JOINT VISION 2020 HERE:  http://www.dtic.mil/doctrine/jel/jfq_pubs/1225.pdf

AND HERE:
Anti_Illuminati for dummies. The ultimate study guide for the layman.
http://globalgulag.freesmfhosting.com/index.php/topic,711.0.html

49  General / Wikileaks Cables / Cable: "U.S.-UK interoperability" on: December 07, 2010, 02:04:28 am
http://213.251.145.96/cable/2009/12/09LONDON2768.html

Viewing cable 09LONDON2768, SHADOW DEFENSE MINISTER FOX PLEDGES CLOSE U.S.-UK

VZCZCXYZ0000
PP RUEHWEB

DE RUEHLO #2768/01 3441648
ZNY CCCCC ZZH
P 101648Z DEC 09
FM AMEMBASSY LONDON
TO RUEHC/SECSTATE WASHDC PRIORITY 4287
INFO RUEHNO/USMISSION USNATO PRIORITY 1304
RUEKJCS/SECDEF WASHDC PRIORITY
RHEHNSC/NSC WASHDC PRIORITY

C O N F I D E N T I A L LONDON 002768

NOFORN
SIPDIS

EO 12958 DECL: 12/09/2019
TAGS PGOV, PREL, MOPS, MARR, AF, UK, PK, IR, IN, CH, RS,
SA, NATO
SUBJECT: SHADOW DEFENSE MINISTER FOX PLEDGES CLOSE U.S.-UK
COOPERATION IF TORIES GAIN POWER

Classified By: Ambassador Louis Susman for reasons 1.4 b and d

¶1. (C/NF) Summary. During a December 9 meeting with the Ambassador, Shadow Secretary of State for Defense Liam Fox affirmed his desire to work closely with the U.S. if the Conservative Party wins power in next year’s general election. He highlighted the importance of the U.S.-UK Defense Trade and Cooperation Treaty insofar as it advances the goal of U.S.-UK interoperability. The Treaty “means a lot to us,” Fox emphasized, adding that “we (Conservatives) intend to follow a much more pro-American profile in procurement.” Fox, who accompanied Conservative Party leader David Cameron on a December 4-6 visit to Afghanistan, (septel) expressed confidence regarding U.S. leadership in Afghanistan and optimism about the way forward. (Note: In a December 8 Chatham House speech, Fox affirmed the importance of the Afghanistan mission and analyzed challenges facing NATO.) Fox predicted that negotiations with Iran would fail; he stated that the U.S. and UK should work together to prevent a nuclear arms race in the Middle East. He faulted the Labour government for policies which reinforce the Indian government’s long-held view that HMG’s foreign relations on the subcontinent are “skewed to Pakistan.” End Summary.

U.S.-UK Interoperability
------------------------

¶2. (C/NF) Ambassador Susman met December 9 with Liam Fox, Shadow Secretary of State for Defense. (Mike Threadgold, Head of Fox’s Private Office, and U.S. Embassy Political Officer Chris Palmer attended the meeting as notetakers.) Fox, a committed Atlanticist, underscored his desire to work closely with the U.S. if the Conservative Party wins power in next year’s general election. He affirmed that when Winston Churchill first raised the notion of the “special relationship” it was as a wartime leader. The special relationship will remain strategically central to UK foreign policy regardless of which party is in power in the UK, Fox underlined. However, the relationship will be especially close in the defense sphere under Tory leadership, Fox stated. He affirmed his desire to increase joint defense procurement with the United States. Increasing U.S.-UK “interoperability is the key” since the U.S. and UK will continue to fight together in the future.

¶3. (C/NF) Fox stressed that the U.S.-UK Defense Trade and Cooperation Treaty (Note: SFRL hearings on the Treaty were to be held December 10) is extremely important insofar as it advances the goal of interoperability. Fox expressed appreciation for the Ambassador’s update regarding the likelihood of Senate approval of the Treaty soon. The Treaty “means a lot to us,” Fox emphasized, adding that “we (Conservatives) intend to follow a much more pro-American profile in procurement. The key is interoperability.” Fox asserted that some within the Conservative Party are less enthusiastic, asserting that “we’re supposed to be partners with, not supplicants to, the United States.” Fox said he rebuffed these assertions, and he welcomed the Ambassador’s reassurance that senior U.S. leaders value the UK as an equal partner.

Afghanistan
-----------

¶4. (C/NF) Fox, who accompanied Conservative Party leader David Cameron on a December 4-6 visit to Afghanistan (septel), expressed confidence regarding U.S. leadership in Afghanistan and optimism about the way forward. He noted that he hoped to meet with NSA Jones, Ambassador Eikenberry, and General Petraeus during the December 11-13 Regional Security Summit in Bahrain. Fox also stated that he planned to meet DASD Flournoy in Washington December 18; Fox will visit Washington and New York December 17-20. (Note: In a December 8 Chatham House speech (see paragraph 9), Fox affirmed the importance of the Afghanistan mission to the NATO Alliance and the importance of explaining to the British people with “clarity, conviction, and consistency” “what the national security threats are that compel us to be in Afghanistan.” End Note.)

Iran
----

¶5. (C/NF) Turning to Iran, Fox observed that there are three possible outcomes in Iran: regime change, behavioral change for the regime’s leaders, and “a change of leadership within
the regime.” The first two options “won’t happen” soon, although we could be “in the beginning of the end game.” When regime change comes it will likely be a “bloody end,” Fox stated. The regime’s strong hold on power, its implacable hatred of the U.S. and Israel, and the Iranian Revolutionary Guard Corps stranglehold on the economy make it extremely unlikely that the regime will change from within, he said. He predicted that international negotiations with Iran would fail. He said that Iran’s Independence Day in February would provide the next opportunity for the international community to evaluate the strength of Iran’s internal opposition, based on the size of demonstrations. Fox stated that he had recently met with a group of wealthy, Iranian expatriates, most of whom expressed support for Iran’s obtaining a nuclear bomb. “Persian nationalism” more than Islamic fundamentalism is the basis of Iranian popular support for a nuclear weapons program.

¶6. (C/NF) The U.S. and UK need to work together to prevent a nuclear arms race in the Middle East, Fox said. He expressed support for the establishment of a U.S. nuclear umbrella in the Middle East. Russia would play a more constructive role in regard to Iran if it began to fear “encirclement” by China and Iran. China could be more helpful under the right circumstances, Fox said. (Note: Shadow Foreign Secretary William Hague told the Ambassador in a subsequent meeting (septel) that in his view China would probably not be more helpful in regard to Iran in the foreseeable future, although Russia would likely play a more constructive role. End Note.)

India-Pakistan
--------------

¶7. (C/NF) Turning to India, Fox criticized the Labour government for policies which reinforce the Indian government’s long-held view that HMG’s foreign relations on the subcontinent are “skewed to Pakistan.” Fox predicted this would not be a factor under a Conservative government, since the Conservatives are “less dependent” than the Labour Party on votes from the British-Pakistani community.

NATO
----

¶8. (SBU/NF) During his meeting with the Ambassador, Fox touched on the future of the NATO Alliance, affirming the importance of the ongoing strategic transformation debate and the future of NATO. Fox focused on NATO in a December 8 Chatham House speech on “The Way Forward for NATO.” In those remarks, Fox asserted that “NATO’s mission in Afghanistan has created further debate on NATO’s role and even of NATO’s survival as a defense alliance.” The speech highlights that “neither the financial burden nor the fighting burden is properly shared between NATO allies” and that the pending Strategic Concept should address collective responsibilities.  Fox’s speech affirms the importance of strategic nuclear forces to the Alliance, as stated in the 1999 Strategic Concept; the speech commits a future Conservative government to “maintaining Britain’s round-the-clock, independent, submarine-based, and strategic nuclear deterrent.” The speech concludes that, despite its shortcomings, NATO is a “necessity” and “in order to successfully face the threats of the 21st century, NATO is the only way forward.” (Note: The full text of the speech is available at www.chathamhouse.org.uk End Note.)
Visit London’s Classified Website: http://www.intelink.sgov.gov/wiki/Portal:Unit ed_Kingdom
Susman
50  General / Wikileaks Cables / Diplomatic Cables explained on: December 07, 2010, 02:02:50 am
What's a "Diplomatic Cable"?
And why is the State Department still using them?
By Brian PalmerPosted Monday, Nov. 29, 2010, at 6:35 PM ET

read full article here:
http://www.slate.com/id/2276198/


Excerpt from article:

...For many years the term cable referred to the formal telegrams that consular staffers would send across the oceans and around the world in Morse code. Employees on the other end would decipher the pulses coming through their headphones or decode printed sheets of dots and dashes. (As recently as the Cuban Missile Crisis, American and Soviet diplomats were sending urgent messages via Western Union.) But in more recent times, the cable started to function almost exactly like an e-mail, and as of 2008, the State Department handles both modes of communication with the same Microsoft Outlook-based computer system.

So what's the difference between a modern-day cable and an e-mail? It has more to do with content than method of delivery. Both travel from computer to computer, but e-mails are reserved for person-to-person messages that are not intended for, or not of interest to, anyone but the addressees. Cables, on the other hand, usually contain more important information that's meant to be accessible to other diplomatic and military staff with the appropriate security clearance. As such, every electronic message that's classified as a cable is uploaded into a database for permanent storage. When drafting a cable, a sender can specify where the information should be saved, depending on its sensitivity. (Confidential messages, for example, end up in a networked database called ClassNet.) Put simply, if you want to send a personal note to Hillary Clinton about the agenda for next week's meeting, you'd use an e-mail. If you're transmitting an assessment of the Afghan elections, you'd send a cable.

This distinction isn't always very clear. Ever since State Department employees got e-mail access in the 1990s and early 2000s, higher-ups have worried that important information will end up in e-mails that eventually get deleted. The new messaging software is intended, in part, to address this hole in the record-keeping system by allowing senders or recipients of regular e-mail to note (by checking a box) that their message is to be maintained in a long-term database as a FOIA record. Naturally, this capability makes the system for sending cables redundant, and in fact people inside the department have noted that there's little functional difference between the two. The developers responsible for the new communications program even proposed eliminating the "cable" classification altogether. But Foggy Bottom old-timers objected, arguing that to get rid of cables would be an abandonment of a grand diplomatic tradition.
51  General / Wikileaks operation and the concept of controlled opposition / List of mirrors to Wikileaks on: December 07, 2010, 02:02:04 am
Wikileaks.org and cablegate.wikileaks.org have been shut down.

The list of mirrors is at http://wikileaks.ch/mirrors.html

This is a copy of the full (current) list:


Mirror List

Wikileaks is currently mirrored on 507 sites (updated 2010-12-06 14:02 GMT)

wikileaks.as50620.net   wikileaks.tard.is       freeus.jsdev.org
wikileaks.enzym.su   freeus.jsdev.org   wikileaks.cellue.de
wikileaks.kafe-in.net       wl.opsec.eu       wl.donatepl0x.com
wikileaks.challet.eu   wikileaks.kister.org   wl.gernox.de
wikileaks.morningtime.com   wikileaks.renout.nl   wikileaks.fdn.fr
wikileaks.gonte.se   wikileaks.kaptenkong.se   wikileaksmirror.proxelsus-hosting.de   
leaks.gooby.org   wikileaks.dubronetwork.fr       wikileaks.perry.ch
wikileaks.sbr.im   wikileaks.u0d.de   wikileaks.81-89-98-125.blue.kundencontro...
www.f**kip.de   wikileaks.psytek.net   wl.mrkva.eu
wikileaks.joworld.net   www.wlmirror.com   wikileaks.chiquitico.org
wikileaks.rout0r.org   www.gruiiik.org   wikileaks.adhelis.com
wikileaks.high-color.de   wikileaks.holarse-linuxgaming.de       wl.alfeldr.de
wikileaks.jikan.fr   wikileaks.huissoud.ch   wikileaks.geekview.be
wikileaks.fs-cdn.net   wikileaks.burnzone.de   wikileaks.dysternis.de
wikileaks.nulset.net   wikileaks.franslundberg.com   wikileaks.krkr.eu   
wl.yoltie.net   wikileaks.gnourt.org   wikileaks.theunfamiliar.co.uk
wikileaks.zeitkunst.org   wikileaks.aelmans.eu   wikileaks.serverius.net
wikileaks.synssans.nl   wl.ernstchan.net   wikileaks.yasaw.net
zwartemarktplaats.com   wikileaks.dena-design.de   wikileaks.zone84.net
wikileaks.subastas-xxx.com   wikileaks.iuwt.fr   wikileaks.chmod.fi
wlmirror.wildeboer.net   www.wikileaks.freelists.com.a u   leaked.rndm.ath.cx
wikileaks.splichy.cz   wleaks.3sge.pulsedmedia.com   wleaks.hellfire.pulsedmedia.c om
wikileaks.palisades-berlin.de   wikileaks.razor1911.com   wikileaks.dokansoft.com.ar
wikileaks.thinkfurther.de   wikileaks.trankil.info   wikileaks.gonte2.nu
leaks.stumcomie.com   wikileaks.timburke.org   wikileaks.ehcdev.com
wikileaks.zurk.org   wikileaks.myscripts24.de   wikileaks.breit.ws
wikileaks.emilts.com   wikileaks.ruicruz.pt   wikileaks.now-pages.com
wikileaks.ego-world.org   cablegate.r3blog.nl       www.wikileakz.eu
wikileaks.realprogrammer.org   wikileaks.the-secret-world.info   wikileaks.superjoesoftware.co m
wikileaks.rtjuette.de   wikileaks.rustigereigers.nl   mirror1.wikileaks.lu
mirror2.wikileaks.lu   internaluse.net   wikileaks.r00t.la
wikileaks.cordover.id.au   brd.mcbf.net   wikileaks.spurious.biz
wikileaks.1407.org   wikileaks.mollar.me   azow.selb.us
wikileaks.furdev.org   wikileaks.datkan.net       wikileaks.nortemagnetico.es
wikileaks.threefingers.ca   wikileaks.brenne.nu       www.anontalk.com
wikileaks.hutonline.nl   vm8157.vps.tagadab.com   nl1.wikileaksmirror.nl
wikileaks.noomad.org   wikileaks.xcplanet.com   www.wikileaks.nw-ds.com
wikileaks.infinium.org.uk   wikileaks.piratskasit.cz   peoplerule.info
wikileaks.sirobert.com   wikileaks.solvare.se   wikileaks.marktaff.com
wikileaks.hmaks.com   im.wikileak.im   wikileaks.aamjanata.com
www.wikigoteo.dialetheia.net   wikileaks.dft-labs.eu   wikileaks.julietvanree.com
wikileaks.argenton.ch   wikileaks.i0i.co   wikileaks.lionelwood.com
wikileaks.antifan.de       wasiutynski.net   wikileaks.diedx.nl
wikileaks.chram.net   wikil3aks.dyndns.org   wikileaks.encgmail.com
wikileaks.yoerin.nl   wikileaks.mcpond.co.nz   wikileaks.siwhine.org
wikileaks.schroth.cx   wikileaks.delight.ch   wikileaks.moochm.de
wikileaks.syncaddict.net   www.hallitus.info   info.patourie-systems.com
wikileaks.softic.cz   wikileaks.redhog.org   wikileaks.brokenbydesign.org
wikileaks.nisd.dk   wikileaks.sentientrobot.net   wikileaks.kronoss.org
wikileaks.s4ku.com   wikileaks.glembotzky.com   wikileaks.nperfection.com
wikileaks.laquadrature.net   wikileaks.legrandsoir.info   wikileaks.artwww.net
wikileaks.39mm.net   leaks.uaqv.com   wikileaks.krtek.net
www.emilts.com   leaks.3nglish.co.uk   wikileaks.explain-it.org
wikileaks.dunnewind.net   wl.fcharlier.net   wikileaks.poete.eu.org
wikileaks.datenscheibe.org   wikileaks.kapitein.org   www.wikileaks.djity.net
wikileaks.nodemaster.de   wikileaks.listepik.net   wikileaks.explain-it.org
wikileaks.sedrati-dinet.net   wikileaks.rigacci.org   wikileaks.ratm.ch
wikileaks.tonbnc.fr   cablegate.sentientrobot.net   wikileaks.ist-bremer.de
wikileaks.spinrise.com   wikileaks.rothnet.org   wikileaks.webtito.be   
wikileaks.lainconscienciadepa blo.net   wikileaks.g33kthug.co.uk   wikileaks.b166er.net
wikileaksmirror.matstace.me.u k   87.106.58.253   wikileaks.virii.lu
wikileaks.junkle.org   leaks.iamfos.co   wikileaks.wass-media.com
wikileaks.karlsen.co   wikileaks.lupine.me.uk       wikileaks.webprofiles.org
wikileaks.azatoth.net   wl.unbloggbar.org   santocristo.info
wikileaks.back2hack.cc   wikileaks.supercrapule.com   wl.treymassingill.com
wikileaks.poliisi.mobi   wikileaks.karlsen.co   wikileaks.rickfalkvinge.se
wikileaks.amette.eu   wikileaks.batsh.it   wikileaks.freei.me
wikileaks.chsdl.de   last.to   wikileaks.iheartfreedom.ca
wikileaks.rackstack.com   wikileaks.serverlicious.org   wikileaks.excds.se
wikileaks.under.ch   leaks.kooll.info   wikileaks.nldla.com
cablegate.dyndns.info   wikileaks.afturgurluk.org   wikileaks.phasebook.net
wikileaks.emquadat.com   wikileaks3.no-ip.org   wikileaks.hermans.net
wikileaks.urli.eu   wikileaks.laotracarboneria.ne t   wikileaks.datapusher.net
wleaks.shellmix.com   wikileaks.citizen-boycott.org   wikileaks.in-edv.de
wl.hor.de   wl.rekursion.ch   naixt-genne.com
wikileaks.aircraftdispatch.ne t   wikileaks.cimeterre.info   wikileaks.2qt.us
wikileaks.rhgnet.de   wikileaks.crypton-technologies.net   wikileaks.xgstatic.fr
wikileaks.medienfuzzis.com   wl.creative-guerillas.com   wikileaks.philpep.org   
wikileaks.para-dice.de   wikileaks.outcast.no   wikileaks.bandsal.at   
wikileaks.concretedonkey.cz.c c   wikileaks.oualid.net   wikileaks.webterrorist.net
wl.22web.net   wikileaks.deepdata.de   wikileaks.theano.de
wikileaks.buzzworkers.com   wikileaks.electric-castle.net   wikileaks.caseid.org
wikileaks.luchaspopulares.org   wikileaks.paysen.net   wikileaks.atpolitics.com
wikileaks.otnf.tk   wikileaks.nslu2-info.de   leaks.letsneverdie.net
wikileaks.yasaw.net   wikileaks.atpolitics.com   mhym.de
www.wikileaks.videoteppista.n et   wikileaks.deutero.org   wikileaks.grokia.se
wikileaks.tamcore.eu   wikileaks.youfailed.de   wikileaks.stephaneerard.fr
wikileaks.jotocorp.com   wikileaks.canariaswireless.ne t   wikileaks.thearksakura.com
wikileaks.thefrackin.info   wikileaks.maero.dk   wikileaks.metrogeek.fr
wikileaks.simplaza.net   wikileaks.fellr.net   wikileaks.mindfreakonline.de
wl.dixon.pl   wikileaks.zombix.pcriot.com   wikileaks.wkellner.com
wl.thj.no   wikileaks.sodom.se   wikileaks.macventure.de
wikileaks.damn1337.de   wikileaks.bitciple.com   wl-mirror.sokoll.com
wikileaks.224charenton.net   help.majestan.com   wikileaks.giggsey.com
wl.kallix.net       wikileaks.unknowntruth.net   wl.kaizer.se
wikileaks.legalsutra.org   wikileaks.kitara.nl   wikileaks.kyak106.com
wikileaks.marpeck.net   wikileaks.leech.it   wikileaks.pamphleteer.de
wikileaks.return0.de   wikileaks.0x04.com   wikileaks.mirror.jfet.org
wikileaks.nerdhero.org   wikileaks.3ofcoins.net   wikileaks.g0rn.com
wikileaks.chpwn.com   wikileaks.f**k.cc   wikileaks.hoppipolla.net
wikileaks.slackdev.com   wikileaks.openmafia.org   wikileaks.paper.st
wikileaks.efremigio.es   wikileaks.zanooda.com   wikileaks.wtfstfu.org
wikileaks.freedomofspee.ch   www.elajt.info   wikileaks.chuso.net
wikileaks.letras.net   wikileak.eicat.ca   wikileaks.0xff.it
wikileaks.apileofbytes.com   wikileaks.revspace.nl   leaks.curaj.tv
wikileaks.mumu.cz   wikileaks.kassala.de   wikileaks.chpwn.com
wikileaks.k-ribou.com   wikileaks.stasi.fi   wikileaks.milchi.de
wl.kollegstufe.org   leaks.freudian.sl   wikileaks.laez.nl
wikileaks.dexite.de   74.63.248.219   wl.ownage4u.nl
wikileaks.peer7.de   wikileaks.infinityloop.es   wikileaks.orfeu.es
wikileaks.myke.us   wikileaks.noova.de       wikileaks.leckerbits.com
wikileaks.byteserv.de   wikileaks.zro.co   raubmordkopiert.ws
wikileaks.adoutte.com   wikileaks.iodev.org   wikileaks.ludost.net
wikileaks.roethof.net       wikileaks.thespinlight.com   wikileaks.apathie.net
wl.mimamau.de   www.wikileaks.ufone.de   wikileaks.mooo.se
wikileaks.neofosis.com   wikileaks.eglin.net   www.mistermikileaks.com
wikileaks.pwnt.nl   majjj.com   wikileaks.antoniojperez.info
wikileaks.ig33k.com   wikileaks.extensity.co.nz   wikileaks.rudemusic.net
wikileaks.adoutte.com   dgmx2k.dyndns.org:800   wl.fuldaecho.de
wikileaks.nc23.de   www.wikileaks-backup.com   wikileaks.bynoob.com
wikileaks.martindv.es   mirror.friendsofwikileaks.org .uk   wikileaks.disknode.org
wikileaks.adundo.com   wikileaks.lazzurs.net   wikileaks.deathserv.net
wikileaks.tollofsen.se   wikileaks.brokenco.de   wikileaks.buckyslan.com
wikileaks.moell.us   wikileaks.classcast.de   wikileaks.datenwelten.de
www.priv.us   wikileaks.neopt.org   wikileaks.samhargreaves.eu
www.finngaria.de   wikileaks.skvorsmalt.cz   wikileaks.neurd.org
wlmirror.cosego.com   leaks.boerdy.net   wikileaks.gundam.eu   
novgorod.zunedevwiki.org       wikileaks.biz.tm   wl.i2pbote.net
leaks.underrun.org   wikileaks.simleb.cc   wl.stefanpopp.de
wikileaks.tejero.ca   www.keepinformationfree.com   whatever.grillcheeze.com
wikileaks.olivu.com   wikileaks.jieji.org   wikileaks.zakulisa.org
wlm.flooble.net   wikileaks.eondream.com   www.shamanhouse.com
wikileaks.galama.net   wikileaks.eondream.com   wikileaks.goodlifebikes.ca
wl.newscenterx.de   wikileaks.kofuke.org       wikileaks.xr3.cc
dev.quadodo.net   wikileaks.yacy.info   wikileaks.anarka.nl
wikileaks.happyforever.com   wikileaks.data-get.org   wikileaks.humanpets.com
wikileaks.hellopal.biz   wleaks.verymad.net   whitenetdownloads.com
WL.sanvicentemedia.com   wikileaks.lotek.org   wikileaks.profithost.net
wikileaksmirror.eu   wikileaks.chronzz.co   wikiconstitution.info
wikileaks.tinychan.org   wikileaks.holy.jp   leaks.no.net
www.wikileaks.angelbeast.org   www.wikileaks.angelbeast.org   wikileaks.drewhavard.com
wikileaks.keladi.org   wikileaks.awardspace.us   wikijm.com
wikileaks.pandas.es   wikileaks.mustashwax.com   wikileaks2.info
wikileaks.artwww.net   wikileaks.oneeyedman.net   wikileaks.openconnector.net
wikileaks.jordanroy.net   wikileaks.crazzy.se   wikileaks.moo2ah.com
wl.udderweb.com   www2181u.sakura.ne.jp   wikileaks.blackwire.com
wikileaks.rlsjrnl.info   wikileaked.jamestheawesome.ki cks-ass.net   wikileaks-in.ganesh.me
wikileaks.luotettu.net   wikileaks.xakep.name   wikileaks.jejaring.org
wikileaks.mahut.sk   wl2.gernox.de   wikileaks.mine-server.info
wikileaks.revoleaks.com   bonsainetz.de   www.spacemission.org
wikileaks.media.pl   wikileaks.imrof.li   wikileaks.hoper.dnsalias.net
wikileaks.escism.net   wikileaks.lelapinblanc.eu   wikileaks.tryptamine.net
wikileaks.piratenpartei-nrw.de   wikileaks.cancamusa.net   wikileaks.aamjanata.com
wikileaks.joevr.org   wikileaks.toile-libre.org   wikileaks.parano.me
wikileaks.slite.org   wikileaks.zvdk.nl   wikileaks.picturesbyphilipk.d e
wikileaks.hostingjuice.com   wikileaks.editia.info   wikileaks.renout.nl
wikileaks.phoeney.de   wikileaks.msga.se   wikileaks.infotubo.com
wikileaks.adzi.net   www.example.sk   wikileaks.wazong.de
RealnoeBlinDelo.com   wikileaks.matschbirne.com   wikileaks.aadnoy.no
wikileaks.erfassungsschutz.ne t   wikileaks.aleph-0.net   wikileaks.oliverbaron.com
wikileaks.vyus.de   wikileaks.ladstaetter.at   wikileaks.willjones.eu
wikileaks.anti-hack.net   wikileaks3.piratenpartij.nl   wikileaks.ninanoe.net
wikileaks.g0tweb.com   74.207.247.66   wikileaks.schuijff.com
wikileaks.iqaida.de   fremont.ca.us.wikileaks-mirror.com   wikileaks.version2.nl
newark.nj.us.wikileaks-mirror.com   london.uk.eu.wikileaks-mirror.com   dallas.tx.us.wikileaks-mirror.com
zurich.ch.wikileaks-mirror.com   wikileaks.zici.fr   wikileaks.tunny.ch
wikileaks.breit.ws   wikileaks.weltgehirnmaschine. de   wikileaks.csbnet.se
wikileaks.digital-revolution.at   wikileaks.nijhofnet.nl       leaks.mooninhabitants.org
wikileaks.ralforolf.com   wikileaks.pancake-pirates.org      93.90.28.65
52  Science & Technology / Internet / Internet II / DoD/DHS/NATO bypasses congress to militarize entire USA via secret cyber memo on: December 07, 2010, 01:58:11 am
retrieved from
http://www.dhs.gov/ynews/releases/pr_1286984200944.shtm

Joint Statement by Secretary of Defense Robert Gates and Secretary of Homeland Security Janet Napolitano on Enhancing Coordination to Secure America's Cyber Networks

Release Date: October 13, 2010

For Immediate Release
Office of the Press Secretary
Contact: 202-282-8010

“Reflecting President Obama’s strong commitment to building an administration-wide approach to combating threats to our cyber networks and infrastructure, the Department of Defense (DoD) and the Department of Homeland Security (DHS) have signed a memorandum of agreement that will align and enhance America’s capabilities to protect against threats to our critical civilian and military computer systems and networks.

Effective cybersecurity means protecting critical networks against a wide range of state and non-state actors that do not adhere to physical borders.

With this memorandum of agreement, effective immediately, we are building a new framework between our Departments to enhance operational coordination and joint program planning. It formalizes processes in which we work together to protect our nation’s cyber networks and critical infrastructure, and increases the clarity and focus of our respective roles and responsibilities. The agreement embeds DoD cyber analysts within DHS to better support the National Cybersecurity and Communications Integration Center (NCCIC) and sends a full-time senior DHS leader to DoD’s National Security Agency, along with a support team comprised of DHS privacy, civil liberties and legal personnel. The agreement will ensure both agencies’ priorities and requests for support are clearly communicated and met.

This structure is designed to put the full weight of our combined capabilities and expertise behind every action taken to protect our vital cyber networks, without altering the authorities or oversight of our separate but complementary missions. We will improve economy and efficiency by better leveraging vital technologies and personnel to serve both Departments’ missions in full adherence to U.S. laws and regulation. This memorandum of agreement furthers our strong commitment to protecting civil liberties and privacy. [INSERT: LMAO, yeah right]

We look forward to building on this vitally important step toward greater collaboration as we continue to work together on new and better ways to protect our economy and critical networks against evolving threats by those who seek to harm the United States.”





http://www.dhs.gov/xlibrary/assets/20101013-dod-dhs-cyber-moa.pdf


MEMORANDUM OF AGREEMENT
BETWEEN
THE DEPARTMENT OF HOMELAND SECURITY
AND
THE DEPARTMENT OF DEFENSE
REGARDING CYBERSECURITY
1.
PARTIES. The parties to this Agreement are the Department of Homeland Security (DHS) and the Department of Defense (DoD).
2.
AUTHORITY. This Agreement is authorized under the provisions of the Homeland Security Act (2002); the Economy Act; U.S. Code Title 10; Executive Order 12333; National Security Directive 42; Homeland Security Presidential Directive-5; Homeland Security Presidential Directive-7; and National Security Presidential Directive54/
Homeland Security Presidential Directive-23.
3.
PURPOSE. The purpose of the Agreement is to set forth terms by which DHS and DoD will provide personnel, equipment, and facilities in order to increase interdepartmental collaboration in strategic planning for the Nation's cybersecurity, mutual support for cybersecurity capabilities development, and synchronization of current operational cybersecurity mission activities. Implementing this Agreement will focus national cybersecurity efforts, increasing the overalI capacity and capability of both DHS' s homeland security and DoD's national security missions, while providing integral protection for privacy, civil rights, and civil liberties.
4.
SCOPE. DoD and DHS agree to collaborate to improve the synchronization and mutual support of their respective efforts in support of U.S. cybersecurity. Departmental relationships identified in this Agreement are intended to improve the efficiency and effectiveness of requirements formulation, and requests for products, services, technical assistance, coordination,and performance assessment for cybersecurity missions executed across a variety of DoD and DHS elements. They do not alter existing DoD and DHS authorities, command relationships, or privacy, civil liberties, and other oversight relationships. In establishing a framework to provide mutually beneficial logistical and operational support, this Agreement is not intended to replicate or aggregate unnecessarily the diverse line organizations across technology development, operations, and customer support that collectively execute cybersecurity missions.
5.
RESPONSIBILITIES.
A. Department of Homeland Security.
1) Identify and assign, in coordination with the Department of Defense, a DHS Director, Cybersecurity Coordination who will be in the National Protection and
Programs Directorate and will be located at the National Security Agency (NSA) but will not be in the NSA chain of command. This individual will also act as the DHS Senior Cybersecurity Representative to U.S. Cyber Command (USCYBERCOM).
2) Receive DoD requests for cybersecurity support and consider DoD requirements, as appropriate and consistent with applicable law and DHS mission requirements and authorities, related to operational planning and mission coordination.
3) Identify qualified DHS personnel to perfom DHS functions under the sole supervision and direction of DHS officials as follows:
a.
Assign DHS personnel to work at NSA as part of a Joint Coordination Element (JCE) performing the functions ofjoint operational planning, coordination, synchronization, requirement translation, and other DHS mission support for homeland security for cybersecurity under the direct supervision of the Director, Cybersecurity Coordination;
b.
Assign personnel to work at the NSA Directorate of Acquisition for .
collaborative acquisition and technology development;
c.
Assign or detail, as appropriate, personnel to work at the National Security Agency/Central Security Services (NSA/CSS) Threat Operations Center (NTOC) to promote joint operational planning, coordination, synchronization, requirement translation, and other DHS mission suppOl1 for homeland security for cybersecurity; and
d.
Assign representatives from the Office of the General Counsel, Privacy Oftice, and the Office for Civil Rights and Civil Liberties to support the DHS Director, Cybersecurity Coordination, at NSA, and coordinate with the 000 countcrparts identified in paragraph B.2.d.
4) Ensure that DHS personnel have current security clearances (TS/SCI) upon assignment to NSA, including training on the appropriate handling and dissemination of classified and sensitive information in accordance with DoD, Intelligence Community and NSA regulations. 5) Provide funding for DHS mission requirements, salaries, and training unique to DHS personnel for assignments under paragraph 5.A.3.
6) Provide appropriate access, administrative support, and space for an NSA Cryptologic Services Group (CSO) and a USCYBERCOM Cyber Support Element (CSE) collocated with the National Cybersecurity and Communications Integration Center (NCCIC), at DHS, and integration into DHS's cybersecurity operational activities. DHS \ViII provide all necessary DHS equipment and connectivity to permit both CSG and CSE entities the capability to carry out their respective roles and responsibilities.
7) DHS Director, Cybersecurity Coordination.
a.
Provide requests for cybersecurity planning, technology, and where appropriate other support to NSA and USCYBERCOM and advocate for such requests based on DHS requirements to protect Federal Executive branch, non-DoD, non-national security systems, and U.S. critical infrastructure and key resources.
b.
Convey to and coordinate within DHS any NSA and USCYBERCOM requests for support or requirements regarding cybersecurity operations.
c.
Participate in and lead, as appropriate, joint planning and other processes.
d.
Promote and facilitatc strong communications between DHS and DoD senior
leadership, including that of NSA, on cybersecurity matters ofjoint interest,
including engaging in joint operational planning and mission coordination.
e.
Maintain cognizance of DHS and, as appropriate, of DoD, NSA, and
USCYBERCOM cybersecurity activities, to assist in deconfliction and
promote synchronization of those activities.
f.
Assist in coordinating DoD and DHS efforts to improve cybersecurity threat
information sharing between the public and private sectors to aid in
preventing, detecting, mitigating, and/or recovering from the effects of an
attack, interference, compromise, or incapacitation related to homeland
security and national security activities in cyberspace.
B. Department of Defense.
1) Direct the Director ofNSA (DIRNSA) and Commander, USCYBERCOM, to undertake collaborative activities and provide cybersecurity support envisioned in this agreement and subsequent implementing agreements.
2) National Security Agency.
a.
Assign an NSA SES-equivalent to serve as the NSA lead to the Joint Coordination Element (JCE). This NSA ofticial will coordinate and work with the DHS Director, Cybersecurity Coordination in carrying out the activities of the Joint Coordination Element. This NSA official will not be in the DHS chain of command, and his OT her performance ratings will be prepared by NSA with input from the DHS Director, Cybersecurity Coordination. This NSA official will supervise and direct all NSA personnel assigned to the JCE.
b.
Receive and coordinate DHS requests for cybersecurity support and consider DHS requirements, as appropriate and consistent with applicable law and NSA mission requirements and authorities, in operational planning and mission coordination.
c.
Provide appropriate access, facilities, and administrative support (including necessary equipment and connectivity) to support the Director, Cybersecurity Coordination and DHS personnel assigned or detailed to the three entities listed below. NSA will provide all necessary NSA equipment and connectivity to permit DHS personnel with the capability to carry out their roles and responsibilities.
i. NSA Directorate of Acquisition
11. Joint Coordination Element to be located at NSA
111. NSNCSS Threat Operations Center
d.
Identify representatives from its Office of the General Counsel and Privacy Office to work with counterparts at 000, USCYBERCOM, and DHS to support the implementation of this Agreement.
e.
Collocate a Cryptologic Services Group at the NCCIC at DHS, for support to and operational synchronization with DHS's cybersecurity operations and the National Cyber Incident Response Plan (NCIRP).
f.
Assign or detail qualified personnel in accordance with this Agreement both to serve in JCE positions and in CSG positions as mutually agreed.

g.
Engage with DHS and USCYBERCOM in joint operational planning and mission coordination.
h.
Provide funding for NSA mission requirements, salaries and training unique
to NSA for personnel identified in B.2.c.
3) USCYBERCOM.
a.
Receive DHS requests for cybersecurity support and consider DHS requirements, as appropriate and consistent with applicable law and USCYBERCOM mission requirements and authorities, in operational planning and mission coordination.
b.
Collocate a Cyber Support Element at the NCCIC at DHS, for support to and operational synchronization with DHS's cybersecurity operations and the NCIRP.
c.
Assign qualified personnel to CSE positions.
d.
As needed to implement this Agreement, provide, on a reimbursable basis, appropriate access, administrative support and space for DHS personnel.
e.
Provide funding for USCYBERCOM mission requirements and training unique to its personnel during the assignment.
f.
Engage with DHS and NSA in joint operational planning and mission coordination.
C. Joint DoD-DHS.
1) Synchronize the roles and relationships of the proposed DoD Integrated Cyber Center (ICC) and the current DBS National Cybersecurity and Communications Integration Center (NCCIC).
2) Develop agenda of appropriate supporting actions, including consideration of the establishment of a Joint Program Office (JPO).
3) Develop jointly appropriate agreements, including necessary funding mechanisms, to implement the objectives and responsibilities of this Agreement pursuant to applicable authority.
6.
OVERSIGHT. To oversee the activities described in the preceding paragraphs, the Deputy Secretary of Homeland Security and the Deputy Secretary of Defense will conduct monthly oversight meetings suppo11ed by the DHS Deputy Under Secretary, National Protection and Programs Direclorate (NPPD); the Principal Deputy Under Secretary of Defense for Policy and the Director ofNSAlCommander, USCYBERCOM.
7.
POINTS OF CONTACT.
Philip Reitinger                                                     James N. Miller
Deputy Under Secretary                                        Principal Deputy Under Secretary for Defense Policy
National Protection and Programs Directorate            Department of  Defense
Department of Homeland Security                           2100 Defense Pentagon 
Washington, DC 20528                                          Washington, DC 20301-2100


8.
OTHER Provisions. Nothing in this Agreement is intended to conflict with law, regulation, Presidential order or directive, or the directives of DHS or DoD. If a term of this Agreement is inconsistent with such authority, then that term shall be invalid, but the remaining terms and conditions of this Agreement shall remain in full force and effect. This Agreement shall be interpreted and implemented in a manner that respects and complies with (and does not abrogate) the statutory and regulatory responsibilities of the Secretary of Homeland Security and the Secretary of Defense. This Agreement does not obligate funds.
9.
EFFECTIVE DATE. This Agreement is effective upon signature of both parties.
10.
MODIFICATION AND REVIEW. This Agreement may be modified upon the mutual written consent of the parties. This Agreement will be reviewed by the parties after one year.
11.
TERMINATION. The terms of this Agreement, as modified with the, consent of both parties, ,,,,ill remain in effect until terminated. Either party upon 30 days written notice to the other party may terminate this Agreement.
APPROVED BY:
Janet Napolitano                                     Robert Gates
Secretary of Homeland Security                 Secretary of Defense
9-27-10                                                9-24-10
53  General / General Discussion / Re: Anti_Illuminati for dummies. The ultimate study guide for the layman. on: December 07, 2010, 01:49:51 am
The evolution of P-Tech and the entire new set of Artificial Intelligence systems rely on CORBA, AGILE, and other frameworks developed by the Object Management Group (OMG).

http://www.omg.org/
http://www.omg.org/spec/CORBA/
http://www.omg.org/spec/UML/
http://www.oracle.com/agile/index.html



About the Object Management Group™ (OMG™)

OMG has been an international, open membership, not-for-profit computer industry consortium since 1989. Any organization may join OMG and participate in our standards-setting process. Our one-organization-one-vote policy ensures that every organization, large and small, has a effective voice in our process. Our membership includes hundreds of organizations, with half being software end-users in over two dozen vertical markets, and the other half representing virtually every large organization in the computer industry and many smaller ones. Most of the organizations that shape enterprise and Internet computing today are represented on our Board of Directors.

OMG Task Forces develop enterprise integration standards for a wide range of technologies, including: Real-time, Embedded and Specialized Systems, Analysis & Design, Architecture-Driven Modernization and Middleware and an even wider range of industries, including: Business Modeling and Integration, C4I, Finance, Government, Healthcare, Legal Compliance, Life Sciences Research, Manufacturing Technology, Robotics, Software-Based Communications and Space.

OMG’s modeling standards, including the Unified Modeling Language™ (UML®) and Model Driven Architecture® (MDA®), enable powerful visual design, execution and maintenance of software and other processes, including IT Systems Modeling and Business Process Management. OMG’s middleware standards and profiles are based on the Common Object Request Broker Architecture (CORBA®) and support a wide variety of industries.

54  The Economy / Financial Crisis Forum / Buy Physical Silver to crash JP Morgan on: December 03, 2010, 07:26:35 pm
Want JP Morgan to crash? Buy silver
The campaign to buy silver and force JP Morgan into bankruptcy could work, because of the liabilities accrued by its short-selling

http://www.guardian.co.uk/commentisfree/2010/dec/02/jp-morgan-silver-short-selling-crash


http://www.youtube.com/watch?v=6JjiqWQbN5s
55  Science & Technology / Chemtrails / Weather Modification / 1000s of Geoengineering/Chemtrail Documents Exposed! on: December 03, 2010, 06:41:41 pm
"Chemtrails" is a slang term, and when you enter chemtrails into a search engine, you will get a couple of reliable sites, but most of the search engines'  results are websites comprised mostly speculation, hypotheses, guesswork, or outlandish kook stuff.

Once you find the right establishment "buzzword" and enter it into a search engine using Boolean operators (or the "advanced search" function), you will uncover so many white papers, scientific studies, and policy reports, on "chemtrails" your head will spin.

The buzzword in this case is "geoengineering" or more specifically "climate geoengineering"

Here are some more "buzzwords" or phrases to find more PDFs on chemtrail phenomenon:

Copy and paste the following phrases exactly how they are, and put them into a search engine:  (I used google, yahoo, and bing, and each search engine found different pdfs)

"climate geoengineering" filetype:pdf

climate geoengineering filetype:pdf

"solar radiation management" filetype:pdf

inject atmospheric aerosols filetype:pdf

"aluminum oxide" climate filetype:pdf

"aluminum oxide" particles filetype:pdf

"mount pinatubo" climate filetype:pdf


You can also find PowerPoint Presentations too, just change the input for the boolean operator to PPT.  For example, copy and paste the following into a search engine:

climate geoengineering filetype:ppt

The first result I had when I put that phrase into Google was a PPT from NASA "science talks", where they "explore" the possibility of climate geoengineering, with the disclaimer they have no intentions of doing it, but they do cite studies where geoengineering experiments have been done.

I highly recommend downloading these PDFs, and burn them to CDs, printing them, or storing them on a separate server, because they do get taken down!  I don't like tooting my horn, but I have blown some of the biggest documents cited in the truther/patriot community before, and they disappear quick from the original source.  Luckily, facsimiles of those documents are still circulating around the four winds of the world wide web, thanks to people reposting!  I couldn't give two hoots about taking credit, because I just want the information out there, because I want to expose and crush the NWO scum so bad, as that is my only purpose in life.

I'm still sifting through all of this data, but from the puzzle pieces that I have found, there is a NASA connection, Rutgers Climate Lab connection, Hughes Aircraft Company (which has been acquired by Raytheon and Boeing) connection, a Lawrence Livermore Laboratory connection, a Berkley connection, a UN IPCC and East Anglia connections,  a FAS connection, a CFR connection, a Royal Society connection, and many more connections to list.

I am going to sift through this data, with all of your guys' help, and try to connect the dots. Eventually, we can name names, and find out who is responsible for the chemtrail mess, so we can hopefully have them prosecuted for conducting unethical studies against unwilling participants.
56  Science & Technology / Weapons Tech / The Electromagnetic Spectrum In Low-Intensity Conflict by CAPT Paul E. Tyler on: December 03, 2010, 06:37:24 pm
http://library.binarydissent.com/ems_in_lic.pdf



If somebody would like to go treeing-backwards through the citations in the last pages of this document, find those studies, and repost them to this thread, that would be awesome!
57  Science & Technology / Weapons Tech / Directed Energy Weapons on: December 03, 2010, 06:36:28 pm
WEAPONEERING THE FUTURE:
DIRECT ENERGY WEAPONS EFFECTIVENESS NOW AND
TOMORROW
Chadwick F. Fager, Major, USAF
April 2007
Blue Horizons Paper
Center for Strategy and Technology
Air War College

http://www.au.af.mil/au/awc/awcgate/cst/bh_fager.pdf
58  Science & Technology / Weapons Tech / Active Denial System on: December 03, 2010, 06:35:26 pm


The Air Force Research Laboratory Directed Energy Directorate Active Denial System is a counter-personnel, non-lethal, directed energy weapon. Traveling at the speed of light, the energy strikes the subject and only reaches a skin depth of about 1/64th of an inch. It produces a heat sensation that within seconds becomes intolerable and forces the targeted individual to instinctively move. U.S. Air Force photo.



Active Denial System:
http://www.youtube.com/watch?v=dmuyLIrSjxI



Read white papers on Active Denial System:
http://www.google.com/search?q=%22active+denial+system%22+filetype%3Apdf+site%3A.mil
59  General / General Discussion / Re: Anti_Illuminati for dummies. The ultimate study guide for the layman. on: December 03, 2010, 06:30:39 pm


Cloud computing

Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, as with the electricity grid.  Most cloud computing infrastructures consist of services delivered through common centers and built on servers. Clouds often appear as single points of access for consumers' computing needs.

Cloud computing is a natural evolution of the widespread adoption of virtualization, Service-oriented architecture and utility computing. Details are abstracted from consumers, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on the Internet, and it typically involves over-the-Internet provision of dynamically scalable and often virtualized resources. It is a byproduct and consequence of the ease-of-access to remote computing sites provided by the Internet. This frequently takes the form of web-based tools or applications that users can access and use through a web browser as if it were a program installed locally on their own computer. NIST provides a somewhat more objective and specific definition here. The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network, and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents. Typical cloud computing providers deliver common business applications online that are accessed from another Web service or software like a Web browser, while the software and data are stored on servers.



In today's computing, most consumers have a personal hard drive.  In the future, personal hard drives will no longer be made, and all of your data will be stored on an outside server.

Carbonite, which is advertised heavily on Beck, Hannity, and Limbaugh's shows is an example of cloud computing.  All of the contents of your personal hard drive end up on a Carbonite server if you sign up for their service.
60  The War Room / False Flag Alerts / Namibian airport official arrested over 'test device' found in luggage on: December 03, 2010, 06:26:52 pm
Namibian airport official arrested over 'test device' found in luggage
By the CNN Wire Staff
November 20, 2010 1:36 p.m. EST

Berlin, Germany (CNN) -- The head of safety at a Namibian airport has been arrested on suspicion of placing a piece of luggage containing a "test device" among the baggage of an Air Berlin flight, the German Interior Ministry said Saturday.

The Windhoek International Airport official, who was not identified, "has confessed," the ministry said in a statement. He was arrested by Namibian police Friday evening.

Lt. Gen. Sebastian Ndeitunga, commander of the Namibian police, said the man was identified from closed-circuit television footage. Police believe the man acted alone, Ndeitunga said.

"His actions have tarnished the reputation of Namibia; it has tarnished the reputation of the Namibian security forces," Ndeitunga said at a news conference Saturday.

He declined to identify the suspect, and said any potential motives were not immediately known. He said the suspect will be formally charged Monday.

The device was found Wednesday in a suspicious piece of luggage that was about to be loaded onto the Air Berlin flight from Namibia. It was identified as a product from a U.S. company that is designed to test security.

Namibian police on Friday warned that whoever is responsible for planting the device would be severely dealt with, saying that Namibia was not to be used as an unauthorized testing ground for aviation security.

"The preliminary investigations have revealed that the suspicious parcel does not contain any explosive substances; however, it is an explosive simulation training device, manufactured by an American-based company, 'Larry Copello Incorporated,' " Ndeitunga said.

The device is a training aid to help screeners identify explosive devices, said Larry Copello, the founder and CEO of the company. Copello described the device as "non-hazardous ...not a threat to anyone."

Copello said his company sells such devices to law enforcement agencies, governments and corporate clients, but did not know to whom this particular device was sold. He learned of the Namibia incident on Thursday when the FBI called him and said he is cooperating with the investigation.

An official with the U.S. Transportation Security Administration said Friday that the agency is working with German and Namibian authorities to determine the origin of the device and the reason it was to be transported on the plane.

"We applaud the vigilance of the aviation security authorities who discovered the device and took quick action to ensure that it did not pose a threat to the aircraft and passengers," the TSA official said.

READ REST OF ARTICLE HERE:
http://www.cnn.com/2010/WORLD/europe/11/20/germany.suspicious.bag/?hpt=T2
61  Science & Technology / Big Brother / Police State Tech / An introduction to Ptech on: December 03, 2010, 06:23:45 pm
This news clip is a very good introduction to Ptech, if you don't know what it is.

http://www.youtube.com/watch?v=hmXkFMlEGWg
62  Science & Technology / Big Brother / Police State Tech / The Delphi Group connection to Ptech on: December 03, 2010, 06:22:44 pm


I came across this PDF file from the Ptech DATA DUMP from archive.org Wayback machine (July 1998):

http://web.archive.bibalex.org/web/20000823031901/www.ptechinc.com/delphi.pdf


Delphi Opinion
Building a Business Process Framework Ptech's FrameWork
July 1998



From Vision to Reality
Imagine the following scenario:
The CEO of a major financial institution is presenting his plan for re-engineering an enterprise process to the board of directors. As he flips through PowerPoint slides depicting diagrams of the proposed process the participants in the meeting are each scribbling away on their note pads. The line-of-business manager is making lists of people who will be affected along with notes about the rules that will govern the interactions of the new teams. The Director of IT is drawing a schematic of the infrastructure and applications that will need to be in place. The business consultant is drawing a process map, and the director of IT is listing existing and future applications that will be the foundation for deploying this grand vision. Each of our hypothetical  participants has his or her own vision of the CEO’s grand scheme. Are they aligned? Will they work in concert? Has the CEO adequately articulated his vision? Has he thought through all of its implications? And if the answer to all of these questions is yes, then how long will it take to realize the vision? Will competition, the market, customers wait idly until its fruition?
What if the CEO was able to draw on a library of process objects to illustrate his vision? The objects would represent the collective knowledge of the enterprise’s business strategies, architecture, and systems. Best of all, the objects could be stitched together as easily as the circles and boxes of a PowerPoint presentation, but they would contain the knowledge of the rules, constraints, and relationships of each object. The finished diagram could be checked for validation, passed on to the CIO who would map the companies IT architecture, then embellished by the line-ofbusiness manager with a finer level of detail which involves the roles of individuals and detailed processes. Finally the IT director could work with his staff to attach the various applications objects to the architecture. And after the vision was deployed it could easily be reconfigured to map to changing market dynamics.

Far fetched? An unlikely prospect? Not if you are using a new genre of technology from Ptech for knowledge-based process modeling and automation. Ptech’s FrameWork uses an object-based business process modeling approach to allow organizations to construct elaborate models of their processes from vision to deployment. The key benefits of this approach are straightforward:
• Minimize distortion of business strategy from vision to implementation
• Speed deployment of business strategy
• Maximize the agility and integrity of ongoing business process change

These three benefits all speak to the principle problem faced by companies in today’s highly volatile markets — speeding the time required to get from “Concept to Code.” (Think of concept as the articulation of a strategy and code as the implementation of that strategy.) Companies can no longer afford the application backlog that has typified IT for so long. New concepts and strategies must be deployed quickly if they are to be useful. In order to keep pace with shortening market and product cycles, and at the same time preserve the luxury of strategic thinking, business processes must be deployed in months, weeks, even days.

The Challenge of Process Modeling
The current state of affairs in most organizations, however, is that strategy and business process definition flows from the top down while systems and applications development flows from the bottom up. The dichotomy creates a collision of vision between the business and the systems of an enterprise. The turbulence generated by this weather front disrupts the integrity of business strategy, impedes the ability of a company to respond to its markets and customers, and stifles the collaboration that is necessary to insure alignment between three dimensions of every process: the prescribed, physical, and practical.
Unfortunately, often organizations rely on different communities, tools, and practices to support each of these three process dimensions. The result is miscommunication and a basic lack of cohesion between the three.

Delphi’s Model for designing, deploying, and modifying a business process involves the following three distinct process dimensions:
• Prescribed (Process) Layer - Organization: this is the way an organization defines a process and assumes it should work. Most often this is based on definition from outdated sources or peripheral parties (such as managers and executives).
• Physical Layer - Infrastructure: this is the way the organization’s information systems (electronic and otherwise) support any given process or set of processes. Most often this was created in pieces and is not a cohesive solution.
• Practical (Logical) Layer - People: this is the way people naturally work together, and often how they work around obstacles and impediments of the other two layers. It is more spontaneous and rarely documented — for both fear of retribution and job security.

This is illustrated in the graphic below:

The Three Layers of an Organization


Figure 1: The organization typically exists in three
layers: the prescribed layer is an archaic remnant
of the way control was originally meant to occur;
the physical layer is the technology installed to
expedite processes; and the practical layer is the
way in which the process is actually done. The
agility and integrity of a business process architecture
stems from a combination of all three layers in
a single unified framework.


Bringing these three process dimensions into alignment is the key to creating organizational agility. If a single framework could be used to
accomplish this, then the enterprise truly can be said to have a process architecture and collaborative process knowledge.

Ptech accomplishes this by providing a tool set that offers a consistent framework across the entire enterprise for architecting a business process - from its concept to its deployment.
The visual tools provided in Ptech’s FrameWork allow process engineers to clearly define and depict business process. However, they also support the full spectrum of process design, providing a single toolset for translating organizational mission into vision, vision to goals, goals to objectives, and ultimately objectives into the tactical applications and their programming code. This creates seamless integrity of a business process throughout an enterprise.
A visual language, which can be shared throughout the enterprise, also has the added benefit of providing a tool for publishing an organization’s process knowledge capital. This is an essential facility for creating an awareness of an organization’s processes by depicting them in easily understood form. Again this is not simply a matter of drawing a diagram of the process but more importantly being able to auto-generate the diagram from a live process. In the case of Ptech that depiction can even be delivered in HTML form over the web for true enterprise-wide delivery.
The power of this approach is further leveraged by the fact that Ptech’s architecture supports the use of any process definition language. Whatever the conventions or semantics of the organizational visioning, process definition, and even the programming language, Ptech can map to and incorporate this nomenclature to its process conventions.

Ultimately, the Ptech approach allows organizations to “build the builders” of process – rather than hardwire process solutions which may only appeal to one community, a single line of business model, or the methodology de jure. The result is an amazingly flexible process environment that constantly fits the methods, practices, and semantics of the enterprise.



Figure 2: Ptech provides a complete framework for
defining the enterprise strategy, business architecture,
BPR, and process in the semantics of, and with the
methods most appropriate for the organization.


The Process Control Room - Heart and Soul of the Enterprise
An essential ingredient of Ptech’s approach is what is referred to as the process control room. Control rooms, such as those used in a nuclear power plant to monitor vital functions, provide the ability to instantly alter and reconfigure the myriad functions of the power plant in order to address a potential problem before it becomes a crisis. In a business setting a control room serves an added function, helping to instantly reconfigure an enterprise to take advantage of opportunities. The control room model also radically alters the approach an organization takes to reengineering, from a crisis-driven model to an opportunity based model.
Many re-engineering efforts are undertaken in response to a crisis. But if we wait for results to indicate the effectiveness of a process change, we will be perpetually behind the response curve or responding outside the optimal time frame for the
action to have any effect on the problem or the opportunity. Companies who do not have the ability to reconfigure themselves rapidly are consistently outpaced by both the market and their competitors.
The alternative is a process control room, which can be used to quickly translate new market strategy into action. Process modeling tools, such
as FrameWork, allow astute organizations to couple their knowledge base with the variability
of a chaotic market environment.
Yet for all of this there are many naysayers who refuse to believe that process modeling and enterprise architectures are possible to build.
Some say that there are just too many variables involved in most chaotic business scenarios, which makes them impossible to model. Just the opposite is true. Organizations follow definite rules and patterns - and these become much more obvious as an organization's internal awareness and responsiveness increase through the use of business modeling tools.

Rather than reengineering to fix inefficient processes, reengineering becomes part of the entire initiative to prevent processes from becoming inefficient in the first place. Instead of a one-time, top-down process design effort, reengineering becomes a continuous approach for all in the organization.
The people who know the most about a process are the ones who work on it and redesign it as needed. Supported by a new set of technological tools for modeling, people are able to modify the rules of the work that they perform. A strategy that governs the guidelines and constraints under which the work can be designed back this up. The result is a constant state-of-the-art process.
Unfortunately, nothing can replace the insights and information you obtain by getting deep into the trenches with end-users. Ultimately, the true measure of a good analysis tool is the degree of intimacy it creates with the process and end-users. The approach used by Ptech to bridge the chasm from concept to code provides this.
Perhaps most importantly, the tool should be free of product or methodology bias. In other words, the analytical tool should be a neutral ground for the free exchange of ideas between the information systems professional and the end-user.
While some process modeling toolsets may provide, in the best case, a complete scenario out of the box,
Ptech provides the option of a complete scenario or a complete customized scenario. Given the variety of people, tools, methods and processes in the modern enterprise, it is inconceivable to imagine using any other approach to map and modify an organization’s process assets. This is clearly a benchmark for any competitive organization.

©1998 The Delphi Group, 100 City Hall Plaza, Boston, MA 02108-2106 • (617) xxxxxxxx, www.delphigroup.com. All rights reserved.



This is a current (2010) partners list of the Delphi Group:

Delphi Group's Decision Point Consulting clients are comprised of Global 2000 enterprises from virtually every major industry category. The following is a partial, representative list.

    * American Express
    * AARP
    * Apple Computer
    * Bausch & Lomb
    * Blue Cross Blue Shield
    * Chase Manhattan Bank
    * City of Boston
    * The Clorox Company
    * Computervision
    * CoreStates Bank
    * Elf Autochem
    * GTE
    * IBM
    * Internal Revenue Service
    * Kellogg Company
    * Lawyers Title Insurance Corp.
    * Lehman Brothers
    * Lockheed Martin
    * Lone Star Gas
    * Mayo Foundation
    * Met Life
    * Nabisco
    * National Life Insurance of Vermont
    * New York Stock Exchange
    * Oak Ridge National Laboratories
    * Owens Corning
    * Pfizer
    * R.W. Johnson Pharmaceutical
    * SC Johnson Wax
    * State of Washington
    * The Prudential Insurance Company
    * Transport Canada
    * Union Pacific Railroad
    * West Valley Nuclear

About Delphi Group.

For more than 20 years Delphi has been providing unparalled insight at the intersection of business and technology.
We are "Strategic Business Advisors and Technology Market Makers" focusing on the intersection of business and technology - what we call biztech. No other advisor provides Delphi Group's depth of understanding in our areas of coverage. We dedicate our company to the evolution of these markets and build successful communities of providers and end-users around them.
Today you have the resources to come up to speed on any technology in a matter of minutes. What you need is depth, community, and objectivity. That's what Delphi Group delivers. The factors to our success lie in creating a resource for your organization that offers the greatest depth in understanding key technology markets, access to the largest community of buyers and suppliers of these technologies, unimpeachable objectivity and an intense commitment to developing a team with some of the brightest and most committed people in the industry.

Our values are the core of our success and the success of our clients.

1) Build client relationships based on integrity and supported by a written guarantee of objectivity and best price/value for all of our services

2) Consistently exceed expectations in all of our services

3) Accurately portray a balanced analysis of the markets and technologies we track

4) Never underestimate the power of human capital and the important context it must provide for technology decisions

5) Dedicate ourselves to the success of our clients


Founder of Delphi Group's personal website
http://www.tomkoulopoulos.com/



PLEASE READ THIS disturbing 2002 Delphi Group White Paper entitled
THE ADVENT OF THE GLOBAL GRID

http://www.delphigroup.com/whitepapers/pdf/WP_2002_GlobalGrid_Locked.pdf




Here's another 2002 White paper by Delphi Group, it's entitled:
Web Services at the Desktop - A NEW WORLD ORDER

http://www.delphigroup.com/whitepapers/pdf/2002-magna-carta.pdf

Take a look at the groups participating in an Enterprise Summit mentioned in this "New World Order" report
Applied Knowledge Group
Aventis Pharmaceuticals
Baxter Healthcare
Bechtel Communications
Brobeck, Phleger & Harrison, LLP
CIO Magazine
Cisco Systems
CNA Insurance
Coors Brewing Company
Delphi Group
Ford Motor Company
General Motors
Fujitsu Network
Communications
H Lundbeck A/S
Hale and Dorr
Hewlett-Packard Company
INCAD sro
Infonet Services Corporation
Innovative Emergency Management
Intel
Journal of The Hyperlinked Organization
Kiesling Associates
LLP
McKesson
Naval Facilities
Engineering
Command
Novellus Systems
Perot Systems
Pricewaterhouse-Coopers LLP
Research in Motion
Schneider
Automation, Inc.
Social Security Administration
The World Bank
Unisys Corporation
United States Postal Service
US GSA-National
Capital Region
US Pacific Fleet
USGS Center for Biological Informatics (USGS)
63  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:17:41 pm
DHS
Coast Guard

http://www.d13publicaffairs.com/go/doc/21/266191/

Date: Tuesday, April 7, 2009
NEWS RELEASE
Multiple agency operation at Portland’s Terminal 6

SEATTLE — Multiple agencies participated in the Maritime Visible Intermodal Prevention and Response (VIPR) operation at Terminal 6 in Portland, Ore., Tuesday.

Teams were deployed to Terminal 6 to verify Transportation Worker Identification Card (TWIC) credentials and use certified explosives-detection canine teams from the Transportation Security Administration (TSA).

The successful interagency operation ensured the safety and security of passengers, facilities and vessels, and was the first VIPR operation involving a marine facility in the Portland metro area.

VIPR operations are designed to enhance the Department of Homeland Security networks to ensure the capability and flexibility to manage resources while allowing normal business to continue. 

The Coast Guard, Customs and Border Protection, TSA, Immigration and Customs Enforcement, Port of Portland, Portland Police Bureau and Port of Portland Police Department all participated in this operation.

VIPR teams are comprised of Department of Homeland Security and other federal agencies, and are designed to enhance security by working in mass transit, aviation, maritime, rail and other transportation modes alongside local law enforcement agencies during specific periods of time or events.

If you would like to learn more about VIPR teams visit the TSA website at www.TSA.gov.

64  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:17:16 pm

Transit Agency Wasted Time Babysitting Federal Agents
by San Francisco Examiner   
Thursday, 02 April 2009

http://www.hstoday.us/index.php?option=com_content&task=view&id=7908&Itemid=195/print/

Last Fourth of July, a large group of federal law enforcement and security officials swooped down on the BART system with little or no advance notice. They were a Visible Intermodal Prevention and Response team from a Homeland Security program that sends federal agents to hundreds of transit systems annually to help beef up protection against terrorism.

According to a Transportation Security Administration spokesman, the VIPR team’s mission is to share Washington, D.C.’s anti-terrorist security tactics with local transit police and train them in federal procedures, plus sometimes also serving as extra staff for special events. In theory, this sounds like a good idea.

But the way it worked out for BART on July 4 raised serious concerns about the program’s effectiveness. The foul-up came to light in the Federal Transit Administration’s own evaluation report, which included BART input.

The visiting agents were not from California and did not know the Bay Area, let alone the BART system. So BART’s undermanned police force had to play tour guide to the feds instead of soaking up anti-terrorism wisdom. This unexpected babysitting duty weakened BART officers’ standard crime-prevention coverage and endangered riders.

"Details of the VIPR team’s qualifications and training were not released to BART police," the FTA report charged. "[But] it was clear that they had not been trained on the BART system." Lack of preparation by VIPR officials "raised a serious liability, security and safety concern for everyone involved."

Chief BART spokesman Linton Johnson acknowledged to The Examiner that the VIPR concept "is a good idea" and additional security is welcome as BART struggles to staff its police roster during the recession. The transit agency is also used to sharing the intricacies of its system with Bay Area police and fire
departments.

Click here for the full story [DEAD LINK]
65  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:16:50 pm
http://osd.gov.com/osd/200707_July/DHS_Daily_Report_2007-07-05.pdf

Page 6-

13. July 03, CNN — Security increased in eight city transit systems for holiday. The
Transportation Security Administration (TSA) will deploy special teams to help enhance transit
system security in eight cities over the July Fourth holiday, officials said Tuesday, July 3. The
teams −− consisting of K−9 explosive detection units, air marshals, transportation inspectors,
and behavior detection officers −− will be deployed in New York, Washington, DC, Boston,
Chicago, Los Angeles, Philadelphia, Houston, and San Francisco. Called Visual Intermodal
Protection and Response (VIPR) teams, they will focus on ground transportation systems as
well as airports in some of those cities. TSA spokesperson Lara Uselding in Chicago said the
VIPR team there will work in mass−transit areas but not in the airport. The deployment comes
amid elevated security concerns and because of the expected high numbers of people using
mass transit during the Independence Day celebrations. The VIPR teams were created after the
2004 train bombings in Madrid, Spain, that killed 191 people, according to the TSA Website:
http://www.tsa.gov/press/happenings/us_vigilance.shtm. [DEAD LINK]
Source: http://www.cnn.com/2007/US/07/03/tsa.viper/index.html
66  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:16:27 pm
http://www.tampagov.net/appl_tampa_announcements/ViewRelease.asp?ReleaseID=6612

VIPR Technology Used at Greyhound Bus Terminal TPD partners with TSA and the Department of Homeland Security to Test Public Transportation Security
 
Tampa, FL February 16, 2010 -

WHAT: Tampa Police Assistant Chief Marc Hamlin and Transportation Security Administration Federal Security Director Gary Milano demonstrate Visible Intermodal Prevention and Response (VIPR)
operation.

WHEN: Tuesday, February 16, 2010, 8:30 a.m.

LOCATION: Greyhound Bus Facility, 610 Polk Street, Tampa

DETAILS:
Anyone entering the bus terminal in Downtown Tampa on Tuesday will be searched by the VIPR teams. The drill is part of the Department of Homeland Security's initiative to ensure Tampa is prepared to respond to a large scale incident such as, a terrorist attack or natural disaster. TPD and TSA are partnering with the Department of Homeland Security's Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) and the Tampa International Airport (TIA) police department canine unit to conduct the exercise.

The TSA utilizes VIPR operations to increase visible security in all modes of transportation. In order to accomplish this, specialized VIPR teams are formed consisting of security and law enforcement professionals from participating partner agencies who are trained to respond to transportation security emergencies. The VIPR teams provide detection capabilities and are a visible deterrent in all modes of transportation.

There is no credible information to suggest a specific threat at this time. This exercise is designed to enhance the coordination of local and federal agencies during an emergency.

67  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:16:01 pm
http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_09-24_Feb09.pdf

Department of Homeland Security Office of Inspector General
Effectiveness of TSA's Surface
Transportation Security Inspectors
OIG-09-24
February 2009


(Type in "VIPR" in the search function of your PDF reader program, to skim through this 41 page document)




68  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:15:40 pm
Hooray for Soetoro Stimulus!!! 8.00 Jobs created for VIPR teams!

http://www.recovery.gov/Transparency/RecipientReportedData/pages/RecipientProjectSummary508.aspx?AwardIdSur=47844&AwardType=Grants

Grants - AWARD SUMMARY

DELAWARE RIVER PORT AUTHORITY

American Recovery and Reinvestment Act Rail and Transit Security-Law Enforcement
Clarification of Codes


AWARD OVERVIEW
Award Number    2009-RA-R1-0094    Funding Agency    Department of Homeland Security

Total Award Amount    $2,085,000    Project Location - City    Camden

Award Date    07/31/2009    Project Location - State    NJ

Project Status    Less Than 50% Completed    Project Location - Zip    081011949

Jobs Reported    8.00    Congressional District    01

Project Location - Country    US    

Recipient Information (Grants)
Recipient Information (Grants)
Recipient Name    DELAWARE RIVER PORT AUTHORITY
Recipient DUNS Number    047331624
Recipient Address    2 RIVERSIDE DR
Recipient City    CAMDEN
Recipient State    New Jersey
Recipient Zip    081031003
Recipient Congressional District    01
Recipient Country    USA
Required to Report Top 5 Highly Compensated Officials    No

Projects and Jobs Information
Projects and Jobs Information
Project Title    American Recovery and Reinvestment Act Rail and Transit Security Grant Program-Law Enforcement
Project Status    Less Than 50% Completed
Final Project Report Submitted    No
Project Activities Description    Police Protection
Quarterly Activities/Project Description    The VIPR Team has increased both uniformed and plain clothes presence throughout the rail line operation with specific emphasis on AM and Evening Load times; During this quarter a VIPR Team Operation was conducted with the Department of Homeland Security and TSA. The exercise included screening of packages for IED (Improvised Explosive Device) and components of IED's;

Jobs Created    8.00
Description of Jobs Created    The 8 police officers hired in 1st qtr 2010 are considered VIPR Teams; VIPR activities consist of uniformed and plain clothes police officers who provide a visible presence to detect, deter, disrupt and defeat suspicious activity for the benefit of the traveling public. The VIPR team is also tasked with the responsibility of conducting counter surveillance activities along the rail line as well as in and around transit stations. Partnering with local and federal law enforcement agencies these VIPR resources provide deterrent presence and detection capabilities and introduce an element of unpredictablility to disrupt potential terrorist planning activities.



Purchaser Information (Grants)
Purchaser Information
Contracting Office ID    Not Reported
Contracting Office Name    Not Available
Contracting Office Region    Not Available
TAS Major Program    70-0563

Award Information
Award Information
Award Date    07/31/2009
Award Number    2009-RA-R1-0094
Order Number    
Award Type    Grants
Funding Agency ID    70
Funding Agency Name    Department of Homeland Security
Funding Office Name    Not Available
Awarding Agency ID    70
Awarding Agency Name    Department of Homeland Security
Amount of Award    $2,085,000
Funds Invoiced/Received    $391,205
Expenditure Amount    $391,205
Infrastructure Expenditure Amount    $0
Infrastructure Purpose and Rationale    Not Reported
Infrastructure Point of Contact Name    Not Reported
Infrastructure Point of Contact Email    Not Reported
Infrastructure Point of Contact Phone    Not Reported
Infrastructure Point of Contact Address    Not Reported
Infrastructure Point of Contact City    Not Reported
Infrastructure Point of Contact State    Not Reported
Infrastructure Point of Contact Zip    Not Reported

Product or Service Information (Grants)
Product or Service Information
Primary Activity Code    922120
Activity Description    Police Protection

Sub-Awards Information
Sub-Awards Information
Sub-awards to Organizations    0
Sub-award Amounts to Organizations    $0
Sub-Awards to Individuals    0
Sub-Award Amounts to Individuals    $0
Number of Sub-awards less than $25,000/award    0
Amount of Sub-awards less than $25,000/award    $0
Number of payments to vendors greater than $25,000    0
Total Amount of payments to vendors greater than $25,000/award    $0
Number of payments to vendors less than $25,000/award    0
Total Amount of payments to vendors less than $25,000/award    $0

Project Location Detail
Location Information
Latitude, Longitude    39º 56' 40", -75º 7' 48"
Congressional District    01
Address 1    2 Riverside Drive
Address 2    
City    Camden
County    Camden
State    NJ
Zip    081011949
69  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:14:58 pm
http://www.sfrta.fl.gov/docs/newsletters/2010/Feb2010news.pdf

February 2010
ONBOARD
The latest news from the South Florida Regional Transportation Authority - a partnership between Broward, Miami-Dade & Palm Beach counties.

SUPER BOWL
SAFETY BEHIND
THE SCENES
The game plan for protecting the
more than 70,000 football
enthusiasts attending the Super
Bowl was more than a year in the making. It
involved law enforcement agencies at the
local, state and federal levels, with more than
500 Miami-Dade police officers serving as the
core of the safety/security team. A Visible
Intermodal Prevention and Response (VIPR)
team was at the Golden Glades Station,
providing additional security for the almost
2,000 passengers who rode Tri-Rail to the
game. The VIPR team is made up of
Transportation Security Administration (TSA)
employees, Department of Homeland Security
(DHS) law enforcement and undercover
federal air marshals. Underscoring the
success of the security mission is the fact that
no incidents involving Tri-Rail passengers were
reported before, during or after the game.
70  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:14:38 pm
http://losangeles.fbi.gov/pressrel/pressrel10/la051810.htm

Press Release

For Immediate Release
May 18, 2010    FBI Los Angeles
Contact: Public Affairs Specialist Laura Eimiller
(310) 996-3343

Three-Day National Level Exercise Continues with Successful ‘Rendering Safe” of Improvised Nuclear Device at Los Angeles Coliseum

The FBI is coordinating a training exercise among multiple government and law enforcement organizations at the national and local level, to exercise response capabilities relative to a terrorist attack involving an improvised nuclear device. The exercise will take place Monday, May 17th through Wednesday, May 19th.

The exercise scenario involves the use of “national assets” deployed to respond to a notional improvised nuclear device at a sports complex in Los Angeles, California.

According to the scenario, law enforcement at various levels will be challenged with detecting the device, as well as multiple secondary devices, in Los Angeles, after learning that an initial device has already detonated in another part of the country. Responding local and national agencies will attempt to render the device safe and transport the device to a secure facility, using their collective resources and equipment.

Below are descriptions of roles for many of the various agencies that would respond in the event of a suspected improvised nuclear device:

FBI:

Current federal laws and Presidential Directives assign the FBI with investigative and operational responsibility for threats and incidents involving weapons of mass destruction (WMD). Therefore, the FBI maintains investigative and technical resources capable of assessing WMD threats and responding to suspect devices. In addition to Joint Terrorism Task Forces and FBI field offices, WMD coordinators and Special Agent Bomb Technicians are responsible for coordination with partner federal and local agencies. It is critical that agencies work together to leverage resources for successful resolution.

Steven Martinez, FBI Assistant Director in Charge of the FBI’s Los Angeles Field Office, said, “Los Angeles is a global destination for commerce and tourism and home to world class attractions and symbols of American freedom. Therefore, law enforcement at all levels must train for the possibility that Los Angeles may be targeted for terrorism. Threats involving weapons of mass destruction are complex, and confronting them must be practiced constantly.”

NSAA:

The Department of Energy's National Nuclear Security Administration (NNSA) provides trained personnel and highly specialized equipment for radiological search, render safe, and consequence management. NNSA on-call duty teams deploy to support law enforcement during the search for and/or rendering safe of a potential terrorist device. Other on-call NNSA teams deploy in support of States/locals in mitigating the consequences of a real or possible release of radiological material. NNSA also staffs “Home Teams” which provide 24-hour reachback support and are available within 15-30 minutes of notification. These teams consist of scientists from the NNSA National Laboratories that are the Nation's experts in the identification of suspect radioactive materials, and in predicting the consequences of the release of radioactive material.

“Partnering with our federal, state and local responders to exercise our collective capabilities is an important part of the National Nuclear Security Administration's national security mission,” said NNSA Associate Administrator Joseph Krol. “With more than sixty years of expertise in handling, securing and detecting nuclear material, NNSA is uniquely equipped to share expertise and emergency response assets to ensure we can prevent and respond to nuclear and radiological incidents.”

LOS ANGELES COUNTY PUBLIC HEALTH:

“While our colleagues in intelligence and law enforcement work to make sure that our county never suffers a nuclear attack, Public Health is preparing to minimize casualties in the event that one occurs” said Jonathan E. Fielding, MD, MPH, Director of Public Health and Health Officer. “We have the capability to deploy radiation monitors throughout Los Angeles County and, in the event of a nuclear explosion or radiological event, we will immediately begin providing life-saving guidance to residents and first responders.”

LOS ANGELES COUNTY SHERIFF’S DEPARTMENT:

The Los Angeles County Sheriff's Department has a robust Preventative Radiation / Nuclear Detection (PRND) consisting of patrol capabilities as well as specialized units equipped with vehicle, boat and aerial mounted detection systems. The program is designed to assist our federal, state and local partners locate illicit nuclear materials and weapons prior to their use by terrorists or criminals. In the event that a Radiological Dispersal Device or Nuclear Weapon is located, Sheriff's HazMat Detail and Bomb Squad personnel have specialized equipment and training to begin the mitigation process until federal assets arrive to bring the incident to a successful conclusion.

Chief Michael Grossman of the Los Angeles County Sheriff’s Department, Homeland Security Division, said, “This exercise gives us the opportunity to collaboratively test the skills of our technicians within a multi-agency environment and evaluate the advanced technologies that will ultimately assist us in mitigating a nuclear threat.”

LOS ANGELES POLICE DEPARTMENT:

Los Angeles Chief of Police Charlie Beck said, “A scenario involving a weapon of mass destruction would require incredibly refined coordination among organizations, be them large, small, public or private. Finding out what works and what doesn't work in a simulated high-stakes exercise makes us better prepared for real-world scenarios.”

MAYOR LOS ANGELES

“In this region, we are proud that agencies and officials work together on a daily basis to prevent man-made crises and prepare for natural disasters," said Mayor Villaraigosa. ”Today, this collaboration and cooperation represent government at its best. We understand that public safety is our number one priority – and we’ll never waiver in the effort to protect our residents from either man-made or natural disasters…And today, this collaboration and cooperation… represent government at its best…”

U.S. CUSTOMS AND BORDER PROTECTION:

Our radiation detection equipment provides Customs and Border Protection (CBP) with a passive, non-intrusive means to screen trucks and other conveyances for the presence of nuclear and radiological materials. These systems are capable of detecting various types of radiation emanating from nuclear devices, dirty bombs, special nuclear materials, natural sources, and isotopes commonly used in medicine and industry. Non-intrusive Inspection (NII) technologies are force multipliers that enable CBP officers and agents to scan or examine larger portions of the stream of commercial traffic for contraband while facilitating the flow of legitimate trade, cargo and passengers. As the nation's primary border enforcement agency, CBP must do everything in its power to prevent terrorists and terrorist weapons, including weapons of mass destruction, from entering this country.

Christopher Perry, U.S. Customs and Border Protection’s Acting Director of Field Operations in Los Angeles, said, “U.S. Customs and Border Protection, Office of Field Operations in Los Angeles, is pleased to provide support to federal, state and local law enforcement agencies on the radiological screening component of this national exercise. Over the last several years, Non-Intrusive Inspection (NII) technologies have become a key component in CBP’s layered enforcement strategy. Technologies deployed throughout this exercise include large-scale X-ray and gamma-ray imaging systems as well as a variety of portable and hand-held technologies.”

TSA, FEDERAL AIR MARSHAL SERVICE:

Federal Air Marshal VIPR Team: Our main involvement in the exercise will be to deploy our VIPR (Visible Intermodal Protection and Response Team) and assigned with an FBI Team seek out illicit radiological sources that may present a threat to the public.


CALIFORNIA EMERGENCY MANAGEMENT AGENCY:

Matthew Bettenhausen, Agency Secretary for the California Emergency Management Agency, said, “In the event of an IND within the State of California, CalEMA will work to coordinate resources and make sure our local partners have the support they need to respond and save lives. While we have substantial capabilities to respond to the aftermath of a nuclear detonation, we believe the critical focus must be on the prevention of such an incident. The local, state and federal capabilities we have in the State of California are the best in the nation. The protocols and operating procedures we have developed and implemented here in the state are leading a national effort. We will use every opportunity we have to exercise our protocols so that we continue to improve how we work together to prevent and respond to a nuclear detonation."

LAX AIRPORT POLICE:

Chief George R. Centeno of the Los Angeles World Airports Police Department, said, ”The Los Angeles Airport Police has enhanced its patrol deployments and has activated a heightened Airport access plan called DRAPE. We will remain on red alert until further direction from the Department of Homeland Security. We have provided support to the Federal Bureau of Investigation, Los Angeles Police Department and have intelligence officers assigned to the Joint Regional Intelligence Center based in Los Angeles, California. Our resources will continue to work closely with these agencies to readily provide assistance when needed. In addition, Los Angeles Airport Polices' Critical Infrastructure Protection mission is an element used in the nation-wide preventative radiation/nuclear detection effort. Our detection program is coordinated with our local, state and federal partners who are involved in the interdiction of illicit radiological materials. Specially equipped and trained Airport Police officers are available to support the regional detection effort upon the request from federal, state or local authorities.”
71  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:14:13 pm
http://www.afge.org/Index.cfm?Page=TSAPolicies&fuse=Document&documentID=1867

TSA

OFFICE OF THE ASSISTANT SECRETARY
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES

1. PURPOSE: This directive establishes TSA policy and procedures for searches to prevent, prepare
for, protect against, or respond to acts of terrorism and to protect persons, facilities, and critical
infrastructure in all modes of transportation. The policy and procedures in this directive help to
ensure that these searches meet constitutional requirements.
2. SCOPE: This directive applies to TSA components that conduct, direct, or participate in
transportation security searches, including administrative and special needs searches, consent
searches, and searches by law enforcement officers, as warranted.
3. AUTHORITIES:
A. 6 U.S.C. 5 11 12
B. 49 U.S.C. 9 114
C. 49 U.S.C. 9 44901
D. 49 U.S.C. 9 44903
E. 49 U.S.C. § 44917
F. 49 CFR Chapter XI1
4. DEFINITIONS:
A. Administrative Search: A search conducted as part of a general regulatory plan in furtherance
of a specified government purpose, such as to determine compliance with TSA regulations or to
prevent the carrying of weapons or explosives on board an aircraft.
B. Aviation Direct Access Screening Program (ADASP): TSA screening of persons, their
accessible property, and vehicles as they enter or are present within a secured area, sterile area,
or Air Operations Area of an airport at a location other than the passenger screening
checkpoint.
C. Behavior Detection Officers (BDOs): TSA personnel who execute TSA's Screening
Passengers by Observation Technique (SPOT) Program, which identifies potentially high-risk
individuals based on physical and psychological reactions.
D. Consent Search: A search of a person, property, location, or vehicle based on permission.
E. Federal Air Marshal (FAM): A TSA law enforcement officer that derives his or her authority
from 49 U;S.C. 5 114(q), 49 U.S.C. Fj 44903(d), 49 U.S.C. 9 44917, and the Implementing
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES
Recommendations of the 911 1 Commission Act of 2007 (Public Law 1 1 0-53, 12 1 Stat. 266).
FAMs are TSA law enforcement officers that detect, deter, and defeat terrorist or other hostile
criminal acts targeting the Nation's transportation systems.
F. Gate Screening: The search of passengers and their accessible property at the boarding gate of
an aircraft.
G. Law Enforcement Officer: A sworn employee of a Federal, state or local government entity
with power of arrest, who is trained and commissioned to enforce the criminal laws of the
jurisdiction(s) in which he or she is commissioned.
H. Reverse Screening: Post-flight search of passengers, accessible property, and luggage
conducted after the aircraft has reached its destination and before passengers or baggage are
permitted to re-enter the sterile area of an airport.
I. Random Selection Protocol: A protocol used during an administrative or special needs search
to select which persons, property, or vehicles will be searched.
J. Reaulatorv Inspection: An administrative or special needs search, or other examination to
determine compliance with TSA regulations and orders, which may include inspection of
records, property, and premises of a regulated party.
K. Screening: The search of individuals and property in or around an airport, mass transit
location, or other transportation venue for the purpose of detecting threat item(s) and deterring
acts of terrorism.
L. Special Needs Search: A search conducted without a warrant and in furtherance of a special
governmental need, beyond the ordinary needs of law enforcement. In the context of
transportation security, special needs searches are designed to mitigate the risk to the public
posed by the introduction of threat items into the national transportation system.
M. Threat Item: An explosive, incendiary, weapon or other destructive substance that may pose a
threat to transportation security. The types of items that are characterized as threat items may
vary depending on risk factors such as the mode of transportation, the proximity to the
conveyance or transportation facility, or the lethality of the item. Prohibited items and items of
interest as identified in TSA aviation screening programs are subsets of threat items.
N. Transportation Security Inspector (TSI): Specially trained TSA employee who conducts
security assessments of transportation systems, works with transit officials to enhance the
security of their systems, provides technical assistance for security, and conducts inspections to
determine compliance with TSA regulations and orders.
0. Transportation Security Officer (TSO): An individual who is trained, certified, and authorized
in accordance with applicable TSA standards and directives to inspect individuals, accessible
property, andlor checked baggage for the presence of explosives, incendiaries, weapons, or
other prohibited items.
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES
P. Transportation Venue: A building, structure or location that facilitates the movement of
passengers or goods in the transportation sector.
Q. TSA Law Enforcement Officer: A law enforcement officer who derives his or her authority
from 49 U.S.C. f$ 114(q), and whose authority includes, but is not limited to: carrying a
firearm; making arrests without a warrant for any offense against the United States committed
in the officer's presence, or for any felony cognizable under the laws of the United States if
there is probable cause to believe that the person to be arrested has committed or is committing
the felony; and seeking and executing warrants for arrest or seizure of evidence issued under
the authority of the United States upon probable cause that a violation has been committed.
R. Vehicle Screening: An administrative or special needs search of vehicles for the purpose of
detecting and deterring the introduction of explosives, weapons, or other threat items into a
transportation venue.
S. Visible Intermodal Prevention and Response (VIPR) Program: TSA's deployment of
specialized teams to augment the security of any mode of transportation.
NOTE: VIPR teams may comprise any asset of DHS, including, but not limited to: FAMs,
TSIs, canine detection teams, and advanced screening technology.
5. RESPONSIBILITIES: All offices and individuals responsible for establishing and implementing
programs and procedures involving searches should ensure that searches are conducted in
accordance with this directive and other applicable law and policy.
A. Office of Security Operations (OSO) is responsible for:
(1) General oversight and training of Federal Security Directors (FSDs), BDOs, TSIs and
TSOs.
(2) Drafting procedures for screening operations and policies for regulatory inspections that are
consistent with this directive.
(3) Ensuring that OSO personnel receive appropriate training to carry out this directive.
B. Office of Law EnforcementIFederal Air Marshal Service (OLEIFAMS) is responsible for:
(1) General oversight and training of FAMs, Bomb Appraisal Officers, Explosive Security
Specialists, National Explosive Detection Canine Teams, and Assistant FSDs for Law
Enforcement.
(2) Drafting procedures for OLEIFAMS operations that are consistent with this directive.
(3) Ensuring that OLEIFAMS personnel receive appropriate training to carry out this directive.
(4) Planning, coordinating and deploying VIPR assets as designated TSA facilitator of the Joint
Coordination Center.
. . -.
TSA MANAGEMENT DIRECTIVE No. 100.4'
TRANSPORTATION SECURITY SEARCHES
C. FSDs are responsible for:
(1) Ensuring that all searches conducted by OSO personnel under his or her leadership are in
accordance with this directive.
(2) Ensuring that all searches conducted by OSO personnel under his or her leadership are in
accordance with TSA Standard Operating Procedures and policies for regulatory
inspections.
D. OLEIFAMS Special Agents in Charge (SACS) are responsible for ensuring that all searches
conducted by FAMs and Assistant FSDs for Law Enforcement under his or her leadership are
in accordance with OLERAMS authorities, protocols and this directive.
E. Joint Coordination Center (JCC) is responsible for:
(1) General oversight of the VIPR Program.
(2) Coordination and development of guidelines for VIPR operations.
(3) Monitoring active VIPR deployments.
(4) Ensuring that VIPR operations plans are distributed to all appropriate TSA components for
review.
F. Office of Intelligence is responsible for:
(1) Providing information and guidance to assist in the identification of current threats and
vulnerabilities that may form a predicate for searches.
(2) Providing risk analysis to assist in making search determinations.
G. Office of Chief Counsel (OCC) is responsible for:
(1) Reviewing Operations Plans, Standard Operating Procedures, Security Directives and other
policies and plans to help ensure compliance with legal requirements.
(2) Providing legal advice and guidance on issues related to searches.
H. VIPR Team Leaders are responsible for:
(1) On-site supervision of all VIPR operations.
(2) Ensuring that all searches conducted during VIPR operations are in accordance with this
Directive and approved operations plans, as applicable.
(3) Ensuring that all VIPR team members understand their responsibility and authority during
the VIPR operation, and have appropriate guidance to carry out VIPR operations.
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES
6. POLICY: TSA intends that TSA personnel use and implement this directive in carrying out their
functions. Nothing in this directive is intended to create any substantive or procedural rights,
privileges, or benefits enforceable in any administrative, civil, or criminal matter.
A. General: TSA will conduct searches in all modes of transportation for the purpose of
countering threats targeting transportation systems in the United States. Intelligence reports
indicate that Al-Qaeda and other terrorist groups continue to develop plans for multiple attacks
against transportation systems. Recent successfid, coordinated bombing attacks aimed at
incurring mass casualties in various transportation systems have occurred in Glasgow, Madrid,
London, and Mumbai, and numerous smaller attacks have taken place around the world over
the past several years. Terrorist groups continue to pursue a range of targets, tactics, and
capabilities to accomplish their objectives.
(1) Searches may vary with the mode of transportation and the security requirements of the
conveyance or transportation venue. Risk analysis and operational and strategic
intelligence may provide guidance in making search determinations.
(2) Types of searches will include administrative and special needs searches, consent searches,
and other searches consistent with the Fourth Amendment. Searches will be conducted to:
(a) enhance the security of persons and critical infrastructure;
(b) prevent, prepare for, protect against, and respond to acts of terrorism;
(c) determine compliance with transportation regulations; or
(d) augment the security of any mode of transportation at any location.
(3) Searches may be conducted by TSA personnel or at the direction of TSA, and may be
initiated by TSA Headquarters or local TSA officials. TSA will consult and coordinate with
Federal, state, and local law enforcement officials, as well as affected transportation
entities, as appropriate, when conducting search operations.
(4) Appropriate TSA managers, in consultation with OCC, shall establish procedures under
which searches will be conducted in various transportation venues.
B. Special Needs and Administrative Searches:
(1) The decision to conduct an administrative or special needs search at a specific
transportation venue may be based on or pursuant to:
(a) Considerations such as threat level, intelligence, overlapping coverage provided by
other layers of security, fluctuations in passenger volume, and available staff.
(b) TSA policies on conducting regulatory inspections.
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES
NOTE: To incorporate unpredictability and enhance deterrence, search locations may be
switched or the number, staffing, and scheduling of locations may vary so that deployment
patterns are shifting and difficult to predict.
(2) All administrative or special needs searches are to be tailored to the transportation security
purpose for which they are conducted. These searches should be designed to be minimally
intrusive, in that they should be no more intensive or extensive than reasonably necessary to
detect threat items or to determine compliance with TSA regulations.
(3) All administrative or special needs searches should be conducted according to established
procedures to ensure that the searches will be confined in good faith to their intended
purpose.
(4) When conducting an administrative or special needs search, the purpose of the search is to
detect threat items or to determine compliance with TSA regulations. Evidence of crimes
shall be referred to a law enforcement officer for appropriate action.
(5) During screening operations where some, but not all, persons or vehicles will be searched, a
random selection protocol should be used to ensure that selection authority is not arbitrarily
exercised. The random selection protocol should be determined in advance and recorded,
but may be designed to change at unpublished predetermined intervals to incorporate
unpredictability.
(6) To the extent that it is reasonable, notice should be provided to persons who will be subject
to search.
(a) For screening operations, the notice should be provided in such a manner as to allow
persons the opportunity to avoid the search by choosing not to enter the location.
:b) If practicable, TSA should seek the cooperation of airport, aircraft, mass transit, and
other transportation operators to place notice on websites in addition to notice provided
prior to the physical location of the search.
(7) Persons wishing to board a conveyance or enter a transportation venue may be subject to an
administrative or special needs search.
(a) Once the search has begun, persons may not withdraw from the search and may be
detained for a reasonable amount of time for the purpose of completing the search.
(b) Persons who refuse to submit to search may be denied boarding or entry into the
transportation venue. Denial of boarding may require the cooperation of the
transportation operator.
(Cool Examples of administrative or special needs searches include:
(a) ADASP;
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES
(b) gate screening;
(c) regulatory inspections;
(d) reverse screening; and
(e) vehicle screening.
(9) With appropriate training, any TSA personnel, including TSOs and TSIs, may conduct an
administrative or special needs search.
C. Consent Searches: Unlike an administrative or special needs search, the scope of a consent
search will depend on the scope of the permission given by the individual, and a person may
not be denied access or boarding to the transportation venue based solely on a refusal or
withdrawal of consent to a search.
(1) A search of a person, property, vehicle, or location based on consent may be conducted in
any transportation venue.
(2) Persons may decline to be searched or withdraw consent at any time.
(3) With appropriate training, any TSA personnel, including TSOs and TSIs, may conduct a
consent search.
D. Law Enforcement Searches:
(1) TSA law enforcement officers may engage in law enforcement activities consistent with
established authorities and protocols. This directive does not and is not intended to limit
the authority of TSA law enforcement officers.
(2) Law enforcement activities may include investigations, detentions, and searches, as
appropriate, and are not limited to administrative or special needs searches. This directive
does not and is not intended to explain or define the variety of law enforcement searches
that may be conducted
(3) The only TSA personnel who should engage in law enforcement activities are TSA law
enforcement officers.
7. PROCEDURES:
A. All searches should be conducted in accordance with Federal law and this directive.
B. Before conducting an administrative or special needs search, guidelines for the search should
be established.
C. All procedures and guidelines should be reviewed by OCC prior to implementation of the
procedures or guidelines.
*: '. 3 c
TSA MANAGEMENT DIRECTIVE No. 100.4
TRANSPORTATION SECURITY SEARCHES 1
D. When designing or conducting an administrative or special needs search, the following points
should be addressed, if applicable:
(1) How the search.is intended to enhance the security of persons and critical infrastructure, to
augment the security of any mode of transportation, or to ensure compliance with TSA
regulations.
(2) The threat item(s) that are the target of the search.
(3) How persons are given notice of the search.
(4) The procedures used to detect or deter the introduction of the designated threat item@).
(5) How the search procedures are tailored to protect personal privacy.
(6) The applicable random selection protocol, unless all persons and/or vehicles that pass
through the location will be searched.
8. EFFECTIVE DATE AND IMPLEMENTATION: This policy is effective immediately upon
signature.
APPROVAL
I /
Kip ~ a & l e ~ l Date 9-24-07
Filing Instructions: File 200.1.1
Effective Date: ' Date of Signature
Review Date: Two years from Effective Date
Distribution: Offices of Chief Counsel, Inspection, Intelligence, Law Enforcement/Federal
Air Marshal Service, Security Operations and all Federal Security Directors
and Special Agents in Charge
Point-of-Contact: Office of Chief Counsel, (571) 227-268112702
72  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:13:49 pm
Ohio Guard participates in multi-state homeland security exercise
   

Story and photos by Sgt. 1st Class Douglas L. Melvin
52nd Civil Support Team


http://www.ong.ohio.gov/stories/2010/07_July/Ohio_Guard_participates_in_HLS/story_20100727a.html

GALLIPOLIS, Ohio—Most people who hear the word “viper” think about a venomous snake or maybe a fast car. However, to more than 300 law enforcement and military personnel from Ohio, West Virginia and Kentucky, the acronym “VIPR” has a different meaning.

The Visible Intermodal Prevention and Response, or “VIPR” exercise was conducted June 16, 2010, and involved more than a 100-mile stretch of the Ohio River Valley region. The VIPR team concept was developed by the Transportation Security Administration (TSA) to augment local law enforcement agencies, providing an increased visible deterrent force for all modes of transportation for homeland security.

Law Enforcement agencies from Ohio, Kentucky and West Virginia, as well as members of the Ohio National Guard’s 52nd Civil Support Team (Weapons of Mass Destruction) and 1st Battalion, 137th Aviation Battalion participated in the exercise.

Ohio Guard members teamed up with agencies from the Ohio State Highway Patrol-Special Response Team (SRT), Columbus Fire Bomb Squad and the TSA. In all, 53 agencies swept through the region, familiarizing themselves with the area’s critical industrial infrastructure and developed interagency response tactics in the event of a terrorist attack. The exercise centered on critical infrastructures and transportation terminals that experts believe to be targeted sites for terrorist group planning and attacks.

“VIPR” team members used helicopters, emergency vehicles, reconnaissance aircraft-long range camera systems and Coast Guard patrol boats and watercraft to reconnoiter the area and respond to simulated emergencies.

“The 52nd took talking about interagency response, to actually doing, putting boots on the ground,” said Capt. Bill Logan, operations officer for the 52nd. “Our capability was greatly enhanced and facilitated by using rotary wing assets (UH-60 Blackhawks) from the 1-137th to get our strike team to the incident site in a hurry.”

Although not a new concept for military operations, the use of aviation assets to deploy personnel and equipment to a suspected Chemical, Biological, Radiological, Nuclear Explosive, Weapons of Mass Destruction (CBRNE/WMD) incident response sites was a first.

The VIPR interagency exercise developed and greatly improved joint operations between the 52nd, SRT, bomb squad and other emergency response agencies in the region.


Soldiers from the Ohio Army National Guard’s 1st Battalion, 137th Aviation Battalion, stand by at a make shift landing zone June 16, 2010, awaiting VIPR insertion teams to complete pre-board personnel and equipment inspections. The make shift landing zone was located near the “VIPR” response staging area for the exercise at a highway rest area near Gallipolis Ohio. (Ohio National Guard photo by Sgt. 1st Class Douglas Melvin)


VIPR response team personnel receive a pre-flight operation order and safety brief by Lt. Steve Rosta, commander of the Ohio State Highway Patrol Special Response Team during a June 16 multi-state and -agency homeland security exercise. The exercise scenario involved suspected terrorists operating in the area which was detected by VIPR aerial surveillance and involved Ohio National Guard civil support and aviation units. (Ohio National Guard photo by Sgt. 1st Class Douglas Melvin)


Exercise observer and controller, Capt. Alison Albers, deputy commander of the 52nd Civil Support Team (WMD), discusses tactical procedures and observations made during a multi-state and -agency homeland security exercise with a Columbus bomb xquad technician. Personnel from the two organizations worked in teams to assess suspected WMD devices and determine the best course of action to render the device safe. (Ohio National Guard photo by Sgt. 1st Class Douglas Melvin)
73  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:13:19 pm

VIPR Teams Enhance Security at Major Local Transportation Facilities

http://www.tsa.gov/press/happenings/vipr_blockisland.shtm

June 20, 2007

Following the Madrid train bombings, TSA stepped up its efforts to enhance security on rail and mass transit systems nationwide by creating and deploying Visible Intermodal Prevention and Response (VIPR) teams. Comprised of federal air marshals, surface transportation security inspectors, transportation security officers, behavior detection officers and explosives detection canine teams, VIPR teams over the past two years have augmented security at key transportation facilities in urban areas around the country, including New York City, Buffalo and Syracuse, N.Y., Los Angeles, Boston and Providence, R.I.

VIPR teams work with local security and law enforcement officials to supplement existing security resources, provide deterrent presence and detection capabilities, and introduce an element of unpredictability to disrupt potential terrorist planning activities.

Looking to expand the VIPR concept beyond the rail sector to other forms of mass transit, TSA has been reaching out to several high-volume ferry operators to provide additional security, particularly during the summer months when ridership is at its peak.

Just before Memorial Day 2007, VIPR teams were dispatched to the Point Judith (Block Island) Ferry Terminal in Rhode Island and the Cape May-Lewes Ferry in Cape May, N.J. Travelers taking the ferry to Martha's Vineyard out of Woods Hole, Mass. this summer can also expect to see VIPR teams in and around the ferry terminal.

When asked about benefits of VIPR operations around highly-traveled transportation systems in the greater-Providence area, Joseph S. Salter, TSA's federal security director for Rhode Island, said, "VIPR teams improve interagency communications and our ability to leverage resources quickly. Working closely with our transportation partners and law enforcement, we're ensuring resources are deployed efficiently and in a complementary fashion, providing an effective first line of defense against terrorism."
74  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:12:55 pm

TSA Supports VIPR Missions in Philadelphia
http://www.tsa.gov/press/happenings/vipr_philly.shtm

July 3, 2007

In Philadelphia on July 3, more than two dozen federal air marshals (FAMs), transportation security inspectors and transportation security officers (TSOs) fanned out at transportation facilities across the city for Visual Intermodal Prevention and Response (VIPR) operations. This week VIPR teams will also be at airports and mass transit systems in the National Capitol Region (Washington), New York, Boston, Houston, Los Angeles and San Francisco.

VIPR teams are designed to enhance security by working in mass transit, aviation, rail and other transportation modes along side local law enforcement agencies during specific periods of time or events. The exact makeup of teams is determined jointly with local authorities. During the past 18 months, TSA has partnered with local law enforcement to conduct 84 VIPR missions from coast to coast.

The Philadelphia teams worked in concert with police departments for the airport, Amtrak and Southeastern Pennsylvania Transportation Authority (SEPTA) to increase visibility, heighten vigilance and complement law enforcement efforts.

At the 30th Street Train Station, canine teams, uniformed inspectors and covert FAMS patrolled the busy station, as did similar teams at the Market East facility. At the airport, VIPR teams on the curb at every terminal, in ticketing lobbies and at secure area vehicle access gates also included TSOs, some trained in TSA's behavior detection techniques.

TSA surged VIPR teams to Philadelphia for Independence Day last year, screening Amtrak passengers at the 30th Street Station.

VIPR teams enhance TSA's ability to leverage a variety of resources quickly to increase visible security in any mode of transportation anywhere in the country and are a normal component of TSA's nimble, unpredictable approach to security.
75  General / General Discussion / Re: TSA VIPR teams on: December 03, 2010, 06:12:29 pm
http://thomas.loc.gov/cgi-bin/cpquery/?&dbname=cp111&sid=cp111OPtE9&refer=&r_n=hr157.111&item=&&&sel=TOC_224809&

Committee Reports
111th Congress (2009-2010)
House Report 111-157

House Report 111-157 - DEPARTMENT OF HOMELAND SECURITY APPROPRIATIONS BILL, 2010

VISIBLE INTERMODAL PROTECTION AND RESPONSE TEAMS

The Committee recommends $25,000,000 for new rail inspectors to create new Visible Intermodal Protection and Response (VIPR) teams, half of the amount requested. These teams conduct unannounced, high-visibility exercises in mass transit or passenger rail facilities. TSA has informed the Committee that the requested funding reflects the entire cost to create 15 new teams. Past experience has shown that TSA has had substantial difficulty in hiring rail inspectors. In fact, TSA carried over about 47 percent of its fiscal year 2008 surface transportation appropriation into fiscal year 2009 in part because of delays in hiring inspectors for VIPR teams. At this time, of the total 175 rail inspectors authorized, TSA has 65 inspector positions that remain unfilled. Until TSA can show progress in hiring additional inspectors, it is premature to approve an additional 338 positions.

Over the past two years, a number of entities have expressed concern about the effectiveness of VIPR teams. For example, a February 2009 DHS IG, report noted that surface transportation security inspectors do not add as much value in a VIPR exercise as other TSA participants, such as air marshals or screeners, because they are not trained in behavior detection, have no training in passenger screening, are unable to detect explosives, and are not law enforcement authorities. One year earlier, the IG reported that `participants and outside observers question the value of VIPR exercises.' In particular, the Federal Law Enforcement Officers Association described the VIPR exercises as `clearly a waste of scarce Federal Air Marshal resources'. Transportation security inspectors (TSI) also considered their participation in VIPR exercises `unproductive'. The IG noted that in their survey of TSIs, 70 percent selected VIPR exercises as one of two duties they performed that were the least effective use of their time.

Because of these concerns, last year the report accompanying the fiscal year 2009 Appropriations Act required TSA to report on performance standards to measure the success of its VIPR teams in detecting and disrupting terrorism. In addition, the report was also to identify the methodology used to determine the distribution of VIPR resources and personnel among the various modes of transportation. To date, the Committee has not received this report and cannot determine what is necessary to address these concerns and to make these teams more effective. These issues must be resolved before the agency increases staffing for VIPR teams by over 200 percent as requested.

TRANSPORTATION THREAT ASSESSMENT AND CREDENTIALING

-------------------------------------------------

-------------------------------------------------

Appropriation, fiscal year 2009     $116,018,000

Budget estimate, fiscal year 2010    191,999,000

Recommended in the bill              171,999,000

Bill compared with:                             

  Appropriation, fiscal year 2009    +55,981,000

  Budget estimate, fiscal year 2010  -20,000,000

-------------------------------------------------

MISSION

The mission of Transportation Threat Assessment and Credentialing (TTAC) is to reduce the probability of a successful attack on the transportation system through the application of threat assessment methodologies that are intended to identify known or suspected terrorist threats working in or seeking access to the Nation's transportation system. This appropriation consolidates the management of all TSA vetting and credentialing programs into one office and the following screening programs: Secure Flight; Crew Vetting; Transportation Worker Identification Credential; Registered Traveler; Hazardous Materials; and Alien Flight School.

RECOMMENDATION

The Committee recommends a direct appropriation of $171,999,000 for TTAC, $20,000,000 below the amount requested and $55,981,000 above the amount provided in fiscal year 2009. In addition, the Committee anticipates TSA will collect $44,900,000 in fees, including $16,900,000 in a variety of new fees TSA proposed under Aviation Security. Because these new fees will be paid for by users undergoing background and credential checks, it is more appropriate to have these activities administered by the TTAC program, which already manages similar activities for transportation workers and hazardous materials truck drivers. A comparison of the budget estimate to the Committee's recommended level by budget activity is as follows:

----------------------------------------------------------------------------

                                                Budget estimate Recommended

----------------------------------------------------------------------------

Direct Appropriation:                                                       

Secure flight                                       $84,363,000 $84,363,000

Crew and other vetting programs                     107,636,000  87,636,000

Subtotal, direct appropriations                     191,999,000 171,999,000

Fee Collections:                                                           

Transportation worker identification credential       9,000,000   9,000,000

Hazardous materials                                  15,000,000  15,000,000

Alien flight school (transfer from DOJ)               4,000,000   4,000,000

Certified cargo screening program                         - - -   5,200,000

Large aircraft security program                           - - -   1,600,000

Secure identification display area checks                 - - -  10,000,000

Other security threat assessments                         - - -     100,000

Subtotal, fee collections                            28,000,000  44,900,000

----------------------------------------------------------------------------
76  General / General Discussion / TSA VIPR teams on: December 03, 2010, 06:12:00 pm


Visible Intermodal Protection and Response (VIPR) teams consist of a combination of STSIs, Federal Air Marshals, explosive-detection canine teams, Aviation Security Inspectors, and Transportation Security Officers. The teams provide a random, announced, high-visibility surge into a transit agency, in addition to enhancing agency resources during special events. More than 50 mass transit deployments have occurred since the program was initiated in December 2005. Regional planning and execution is increasing the frequency of deployments and enhancing local expertise, thereby increasing the terrorism deterrent effect. Recent examples include VIPR deployments at the Massachusetts Bay Transportation Authority (MBTA) system in Boston, at Amtrak facilities in Boston, upstate New York, Philadelphia and Washington DC, and at the Niagara Frontier Transportation Authority and Amtrak facilities in Buffalo, New York. In March 2007, the New York Metropolitan Transportation Authority and TSA announced a joint initiative under which VIPR teams will supplement security operations on the Metro North commuter rail system and the Long Island Railroad.

http://www.tsa.gov/what_we_do/tsnm/mass_transit/force_multipliers.shtm

77  The War Room / WWIII / "It's a trick, we always use it." Criticizing Israel = antisemitism on: December 02, 2010, 03:59:32 am
If you criticize the State of Israel or its war machine policies, then you are dismissed as anti-Semitic by the establishment.

Shulamit Aloni admits on Democracy Now! that Israel brings up antisemitism in the United States, and "The Holocaust" in Europe, to shield itself from criticism of its bloodthirsty policies.

Watch the two and a half minute video here:
http://www.archive.org/details/itsATrickWeAlwaysUseIt.callingPeopleanti-semitic
78  Health, Family & Eugenics / Eugenics / Depopulation / War On Family / Re: Sterilization camps EXPOSED! on: December 02, 2010, 03:54:19 am
An Indian one-child policy propaganda video.

http://www.youtube.com/watch?v=mGV1Do4Bmt4
79  Health, Family & Eugenics / Eugenics / Depopulation / War On Family / Re: Sterilization camps EXPOSED! on: December 02, 2010, 03:53:45 am
VIDEO

Animated film to create awareness about family planning program among the people of India.
http://www.criticalpast.com/video/65675028643_Indian-civilians_increasing-population_animated-film_people-watching

Location: India
Date: 1965
Duration: 2 min 6 sec
Sound: Yes

Highlights the problem of increasing population and food scarcity in India. A van arrives in a village. Children and man stand along the side of a street. 'Van donated by International Planned Parenthood Federation' written on the van. The van arrives in the village to create awareness among the people about the family planning program. Woman and other members teach people about the importance of family planning. An animated film is shown to people regarding the family planning program. People watch the film. The film shows the family of a farmer. It shows that a farmer works hard on his farm to get a good crop. He gets a good crop. When he will have a big family, he will have to divide the land among many children.

US Government Archive number for this historic video is:
286.79 MPPCK
80  Health, Family & Eugenics / Eugenics / Depopulation / War On Family / Re: Sterilization camps EXPOSED! on: December 02, 2010, 03:53:18 am
VIDEO

Government takes measures for the control of population in India.
http://www.criticalpast.com/video/65675028642_Indian-civilians_scarcity-of-food_men-working_woman-teaching

Location: India
Date: 1965
Duration: 3 min 10 sec
Sound: Yes

Highlights the problem of increasing population and food scarcity in India. A board amidst a ground reads: 'Indian Institute of Technology Madras'. Building amidst the ground. Interior of a factory. Men work. Exterior of a temple. Statues on the walls of temple. A woman teaches other women about the importance of family planning. Women stand with their children. Trees and houses in the background. Woman teaches other women with the help of drawings and charts. Another woman teaches girls in a school. She teaches about the method of sterilization and its importance. Men go for sterilization. A woman talks to a man. A man drinks tea.

US Government Archive number for this historic video is:
286.79 MPPCK
Pages: 1 [2] 3 4 5
Powered by EzPortal
Bookmark this site! | Upgrade This Forum
Free SMF Hosting - Create your own Forum

Powered by SMF | SMF © 2016, Simple Machines
Privacy Policy
Page created in 0.077 seconds with 18 queries.