noworldsystem.com


Russia Creates Mind Control Weapons

Russia Creates Mind Control Weapons

http://www.youtube.com/watch?v=SB3Qpe_7wuA

 



Jesse Ventura’s Conspiracy Theory: HAARP

Jesse Ventura’s Conspiracy Theory: HAARP

http://www.youtube.com/watch?v=5-bGMdTTvc0

http://www.youtube.com/watch?v=89D3mjle0f0

http://www.youtube.com/watch?v=Nq_ceMHzkLo

http://www.youtube.com/watch?v=uD1CVnMJxCk

http://www.youtube.com/watch?v=fLtZXUEWYhg

http://www.youtube.com/watch?v=Ri6mWNuYnEo

 



Global treaty could ban file-sharers from Internet after ‘three strikes’

Global treaty could ban file-sharers from Internet after ‘three strikes’
File-sharers could be jailed under proposed ACTA provisions

Raw Story
November 4, 2009

http://www.youtube.com/watch?v=gMIUwxEgVpY

Leaked details of the Anti-Counterfeiting Trade Agreement being negotiated in secret by most of the world’s largest economies suggest Internet file-sharers could be blocked from accessing the Internet if they are repeatedly accused of sharing copyrighted material, say media and digital-rights watchdogs.

And the worst-case scenario could see popular Web sites like YouTube and Flickr shut down because of a provision in the treaty that would force them to monitor everything uploaded to the site for copyright violations.

Internet law professor Michael Geist published details of “leaked” portions of the discussions on ACTA on his blog Tuesday, as a new round of ACTA negotiations began in Seoul, South Korea. The US, along with all the countries of the European Union as well as Japan, Canada, Australia and a handful of other countries, are involved in the negotiations.

“The provisions would pave the way for a globalized three-strikes and you’re out system,” Geist blogged Wednesday, referring to a proposal from copyright holders to have Internet service providers cut off service to anyone accused at least three times of illegally sharing copyrighted material.

DARPA Plans for Interplanetary Internet

 



Google-Earth To Track People In Real-Time

Editor’s Note: This could be the start of the New World Order MATRIX, where every ‘thing’ in the world can be located and tracked on the internet
Augmented Google-Earth Tracks Real-Time People, Cars, Weather

Cryptogon
September 30, 2009

http://www.youtube.com/watch?v=iGe2DGe_FFQ

The surveillance side of this is the chickenfeed. There’s something far more sinister than the simple surveillance… an angle we haven’t heard about yet.

Tice never did tell his story to Congress about this different aspect of the program.

Well, my guess is that it has something to do with providing surveillance data for this SEAS World Sim thing, and that individual Americans are being watched and potentially targeted with it. Tice’s background seems to involve a lot of traditional electronic warfare, radar and ELINT stuff. Maybe Tice’s deal involved the collection of the mobile phone GPS and/or triangulation data which would provide realtime spacial/geographic data to the SEAS system. In other words, SEAS sees you. They could bring up a map of a city and plot your path based on the information that your phone is exchanging with the mobile network.

Synthetic Environments for Analysis and Simulation

Via: Popular Science:

Researchers from Georgia Tech have devised methods to take real-time, real-world information and layer it onto Google Earth, adding dynamic information to the previously sterile Googlescape.

They use live video feeds (sometimes from many angles) to find the position and motion of various objects, which they then combine with behavioral simulations to produce real-time animations for Google Earth or Microsoft Virtual Earth.

They use motion capture data to help their animated humans move realistically, and were able to extrapolate cars’ motion throughout an entire stretch of road from just a few spotty camera angles.

From their video of an augmented virtual Earth, you can see if the pickup soccer game in the park is short a player, how traffic is on the highway, and how fast the wind is blowing the clouds across the sky.

Up next, they say they want to add weather, birds, and motion in rivers.

 

Ubiquitous Computing: Big Brother’s All-Seeing Eye

http://www.youtube.com/watch?v=2I3T_kLCBAw

http://www.youtube.com/watch?v=SKZm34jsNHY

DARPA building search engine for video surveillance footage

 



Should we fear neuro-war more than normal war?

Should we fear neuro-war more than normal war?

FP
September 7, 2009

A new opinion piece in Nature (ungated version via a somewhat dubious Website) takes biologists to task for allowing the militarization of their work for the development of neuro-weapons — chemical agents that are weaponized in spray or gas form to induce altered mental states.

The Russian military’s use of fentanyl to incapacitate Chechen terrorists — and kill 120 hostages in the process — during the 2002 Nord-Ost seige was something of a wakeup call in this area. It’s no secret that the U.S. and other militaries are interested in these potential weapons (I wrote about a 2008 DoD-commisioned study on cognitive enhancement and mind control last November.) According to the Nature story, some companies are now marketing oxytocin based on studies showing that in spray form, it can increase feelings of trust in humans, an application discussed in the 2008 study.

Blogger Ryan Sager wonders what would have happened if the Iranian government had had such a weapon during this summer’s protests. He continues:

Now, some would argue that the use of non-lethal agents is potentially desirable. After all, the alternative is lethal measures. But the author of the opinion piece, Malcolm Dando, professor of International Security in the Department of Peace Studies at Bradford University in the UK, doesn’t see it that way:

At the Nord-Ost siege, for instance, terrorists exposed to the fentanyl mixture were shot dead rather than arrested. Likewise, in Vietnam, the US military used vast quantities of CS gas — a ‘non-lethal’ riot-control agent — to increase the effectiveness of conventional weapons by flushing the Viet Cong out of their hiding places.

While we might want to believe that we would use such weapons ethically going forward, the idea of a dictator in possession of such weapons is rather chilling — moving into science-fiction-dystopia territory.

I suppose. Though I think I’m going to continue to be most worried about them having nuclear weapons. The Iranian regimes rigged an election; killed tortured and hundreds of protesters; and coerced opposition leaders into giving false confessions. I don’t think it would have been that much worse if they had had weaponized oxytocin on their hands.

Sager is right that this is a topic worthy of debate, but I find it strange that research on weapons designed to incapacitate or disorient the enemy seems to disturb people a lot more than research on weapons designed to kill them. As for the idea that neurological agents could facilitate other abuses, Kelly Lowenberg writes on the blog of the Stanford Center for Law and the Neurosciences:

Or is our real concern that, by incapacitating, they facilitate brutality toward a defenseless prisoner? If so, then the conversation should be about illegal soldier/police abuse, not the chemical agents themselves.

I think this is right. New technology, as it always does, is going to provoke new debates on the right to privacy, the treatment of prisoners, and the laws of war, but the basic principles that underly that debate shouldn’t change because the weapons have.

 



Global Warming Caused By Chemtrails & HAARP

Global Warming Caused By Chemtrails & HAARP -History Channel

http://www.youtube.com/watch?v=Tb93w6pExyo

 

Where Did The Clouds Go?

http://video.google.com/videoplay?docid=-2815320198655156407&hl=en#

Danger In The Sky – The Chemtrail Phenomenon

DARPA’s iXo Artificial Intelligence Control Grid

 



Australia To Enforce Mandatory Internet Censorship

Australia To Enforce Mandatory Chinese-Style Internet Censorship
Government to block “controversial” websites with universal national filter

Paul Joseph Watson
Prison Planet
October 29, 2008

The Australian government is set to impose Chinese-style Internet censorship by enforcing a universal national filter that will block websites deemed “controversial,” as part of a wider agenda to regulate the Internet according to free speech advocates.

A provision whereby Internet users could opt out of the filter by contacting their ISP has been stripped from the legislation, meaning the filter will be universal and mandatory.

The System Administrators Guild of Australia and Electronic Frontiers Australia have attacked the proposal, saying it will restrict web access, raise prices and slow internet traffic speeds.

The plan was first created as a way to combat child pornography and adult content, but could be extended to include controversial websites on euthanasia or anorexia,” reports the Australian Herald Sun.

Communications minister Stephen Conroy revealed the mandatory censorship to the Senate estimates committee as the Global Network Initiative, bringing together leading companies, human rights organisations, academics and investors, committed the technology firms to “protect the freedom of expression and privacy rights of their users”. (Complete black is white, up is down, double talk).

Human Rights Watch has condemned internet censorship, and argued to the US Senate “there is a real danger of a Virtual Curtain dividing the internet, much as the Iron Curtain did during the Cold War, because some governments fear the potential of the internet, (and) want to control it.”

Speaking from personal experience, not only are “controversial” websites blocked in China, meaning any website that is critical of the state, but every website the user attempts to visit first has to pass through the “great firewall,” causing the browser to hang and delay while it is checked against a government blacklist.

This causes excruciating delays, and the user experience is akin to being on a bad dial-up connection in the mid 1990’s. Even in the center of Shanghai with a fixed ethernet connection, the user experience is barely tolerable.

Not only are websites in China blocked, but e mails too are scanned for “controversial” words and blocked from being sent if they contain phrases related to politics or obscenities.

Googling for information on certain topics is also heavily restricted. While in China I tried to google “Bush Taiwan,” which resulted in Google.com ceasing to be accessible and my Internet connection was immediately terminated thereafter.

The Australian government will no doubt insist that their filter is in our best interests and is only designed to block child pornography, snuff films and other horrors, yet the system is completely pointless because it will not affect file sharing networks, which is the medium through which the vast majority of such material is distributed.

If we allow Australia to become the first “free” nation to impose Internet censorship, the snowball effect will only accelerate – the U.S. and the UK are next.

Indeed, Prime Minister Tony Blair called for Internet censorship last year.

In April 2007, Time magazine reported that researchers funded by the federal government want to shut down the internet and start over, citing the fact that at the moment there are loopholes in the system whereby users cannot be tracked and traced all the time. The projects echo moves we have previously reported on to clamp down on internet neutrality and even to designate a new form of the internet known as Internet 2.

Moves to regulate the web have increased over the last two years.

– In a display of bi-partisanship, there have been calls for all out mandatory ISP snooping on all US citizens by both Democrats and Republicans alike.

– In December 2006, Republican Senator John McCain tabled a proposal to introduce legislation that would fine blogs up to $300,000 for offensive statements, photos and videos posted by visitors on comment boards. It is well known that McCain has a distaste for his blogosphere critics, causing a definite conflict of interest where any proposal to restrict blogs on his part is concerned.

– During an appearance with his wife Barbara on Fox News in November 2006, George Bush senior slammed Internet bloggers for creating an “adversarial and ugly climate.”

– The White House’s own de-classified strategy for “winning the war on terror” targets Internet conspiracy theories as a recruiting ground for terrorists and threatens to “diminish” their influence.

– The Pentagon has also announced its effort to infiltrate the Internet and propagandize for the war on terror.

– In an October 2006 speech, Homeland Security director Michael Chertoff identified the web as a “terror training camp,” through which “disaffected people living in the United States” are developing “radical ideologies and potentially violent skills.” His solution is “intelligence fusion centers,” staffed by Homeland Security personnel which will are already in operation.

– The U.S. Government wants to force bloggers and online grassroots activists to register and regularly report their activities to Congress. Criminal charges including a possible jail term of up to one year could be the punishment for non-compliance.

– A landmark November 2006 legal case on behalf of the Recording Industry Association of America and other global trade organizations sought to criminalize all Internet file sharing of any kind as copyright infringement, effectively shutting down the world wide web – and their argument was supported by the U.S. government.

– A landmark legal ruling in Sydney goes further than ever before in setting the trap door for the destruction of the Internet as we know it and the end of alternative news websites and blogs by creating the precedent that simply linking to other websites is breach of copyright and piracy.

– The European Union, led by former Stalinist John Reid, has also vowed to shut down “terrorists” who use the Internet to spread propaganda.

– The EU data retention bill, passed after much controversy and implemented in 2007, obliges telephone operators and internet service providers to store information on who called who and who emailed who for at least six months. Under this law, investigators in any EU country, and most bizarrely even in the US, can access EU citizens’ data on phone calls, sms’, emails and instant messaging services.

– The EU also proposed legislation that would prevent users from uploading any form of video without a license.

– The US government is also funding research into social networking sites and how to gather and store personal data published on them, according to the New Scientist magazine. “At the same time, US lawmakers are attempting to force the social networking sites themselves to control the amount and kind of information that people, particularly children, can put on the sites.”

Governments are furious that their ceaseless lies are being exposed in real time on the World Wide Web and have resolved to stifle, regulate and control what truly is the last outpost of real free speech in the world. Internet censorship is perhaps the most pertinent issue that freedom advocates should rally to combat over the course of the next few years, lest we allow a cyber-gag to be placed over our mouths and say goodbye to our last medium of free and open communication.

 

DARPA building search engine for video surveillance footage

Ars Technica
October 21, 2008

The government agency that birthed the Internet is developing a sophisticated search engine for video, and when complete will allow intelligence analysts to sift through live footage from spy drones, as well as thousands of hours worth of archived recordings, in order to spot a variety of selected events or behaviors. In the past month, the Defense Advanced Research Projects Agency announced nearly $20 million in total contracts for private firms to begin developing the system, which is slated to take until at least 2011 to complete.

According to a prospectus written in March but released only this month, the Video and Image Retrieval and Analysis Tool (VIRAT) will enable intel analysts to “rapidly find video content of interest from archives and provide alerts to the analyst of events of interest during live operations,” taking both conventional video and footage from infrared scanners as input. The VIRAT project is an effort to cope with a growing data glut that has taxed intelligence resources because of the need to have trained human personnel perform time- and labor-intensive review of recorded video.

The DARPA overview emphasizes that VIRAT will not be designed with “face recognition, gait recognition, human identification, or any form of biometrics” in mind. Rather, the system will search for classes of activities or events. A suggested partial list in the prospectus includes digging, loitering, exploding, shooting, smoking, following, shaking hand, exchanging objects, crawling under a car, breaking a window, and evading a checkpoint. As new sample clips are fed into the system, it will need to recognize the signature features of new classes of search terms.

Read Full Article Here

 

EU Set to Move ‘Internet of Things’ Closer to Reality

Daniel Taylor
Old-Thinker News
November 2, 2008

If the world-wide trend continues, ‘Web 3.0′ will be tightly monitored, and will become an unprecedented tool for surveillance. The “Internet of Things”, a digital representation of real world objects and people tagged with RFID chips, and increased censorship are two main themes for the future of the web.

The future of the internet, according to author and “web critic” Andrew Keen, will be monitored by “gatekeepers” to verify the accuracy of information posted on the web. The “Outlook 2009″ report from the November-December issue of The Futurist reports that,

“Internet entrepreneur Andrew Keen believes that the anonymity of today’s internet 2.0 will give way to a more open internet 3.0 in which third party gatekeepers monitor the information posted on Web sites to verify its accuracy.”

Keen stated during his early 2008 interview withThe Futurist that the internet, in its current form, has undermined mainline media and empowered untrustworthy “amateurs”, two trends that he wants reversed. “Rather than the empowerment of the amateur, Web 3.0 will show the resurgence of the professional,” states Keen.

Australia has now joined China in implementing mandatory internet censorship, furthering the trend towards a locked down and monitored web.

The Internet of Things

Now, the European Union has announced that it will pursue the main component of Web 3.0, the Internet of Things (IoT).

According to Viviane Reding, Commissioner for Information Society and Media for the EU, “The Internet of the future will radically change our society.” Ultimately, the EU is aiming to “lead the way” in the transformation to Web 3.0.

Reporting on the European Union’s pursuit of the IoT, iBLS reports,

“New technology applications will need ubiquitous Internet coverage. The Internet of Things means that wireless interaction between machines, vehicles, appliances, sensors and many other devices will take place using the Internet. It already makes electronic travel cards possible, and will allow mobile devices to exchange information to pay for things or get information from billboards (or streetlights).”

The Internet of Things consists of objects that are ‘tagged’ with Radio Frequency Identification Chips (RFID) that communicate their position, history, and other information to an RFID reader or wireless network. Most, if not all major computer companies and technology developers (HP, Cisco, Intel, Microsoft, etc.) are putting large amounts of time and money into the Internet of Things.

Cisco and Sun Microsystems have founded an alliance to promote the Internet of Things and further its implementation.

South Korea is at the forefront in implementing ubiquitous technology and the Internet of Things. An entire city, New Songdo, is being built in South Korea that fully utilizes the technology. Ubiquitous computing proponents in the United States admit that while a large portion of the technology is being developed in the U.S., it is being tested in South Korea where there are less traditional, ethical and social blockades to prevent its acceptance and use. As the New York Times reports

“Much of this technology was developed in U.S. research labs, but there are fewer social and regulatory obstacles to implementing them in Korea,” said Mr. Townsend [a research director at the Institute for the Future in Palo Alto, California], who consulted on Seoul’s own U-city plan, known as Digital Media City. ‘There is an historical expectation of less privacy. Korea is willing to put off the hard questions to take the early lead and set standards.’

An April 2008 report from the National Intelligence Council discussed the Internet of Things and its possible implications.

A timeline shown in the April 2008 NIC report

The report outlines uses for the technology:

“Sensor networks need not be connected to the Internet and indeed often reside in remote sites, vehicles, and buildings having no Internet connection. Smart dust is a term that some have used to express a vision of tiny, wireless-connected sensors; more recently, others use the term to describe any of several technologies that range from the size of a pack of gum to a pack of cigarettes, and that are widely available to system developers.

Ubiquitous positioning describes technologies for locating objects that may reside anywhere, including indoors and underground locations where satellite signals may be unavailable or otherwise inadequate.

Biometrics enables technology to recognize people and other living things, rather than inanimate objects. Connected everyday objects could recognize authorized users by means of fingerprint, voiceprint, iris scan, or other biometric technology.”

These trends towards internet censorship and the internet of things are undoubtedly going to continue, but restricting your free speech and violating your privacy will be harder with your outspoken resistance.

http://www.youtube.com/watch?v=2I3T_kLCBAw

http://www.youtube.com/watch?v=SKZm34jsNHY

DARPA spies on analyst brains; hopes to offload image analysis to computers
http://arstechnica.com/news.ars/post/20..-image-analysis-to-computers.html

Security services want personal data from sites like Facebook

http://www.guardian.co.uk/politics/2008/oct/15/terrorism-security

UK.gov says: Regulate the internet

http://www.theregister.co.uk/2008/10/20/government_internet_regulation/

 



Packs Of Robots Will Hunt Uncooperative Humans

Packs Of Robots Will Hunt Uncooperative Humans

New Scientist
October 23, 2008

The latest request from the Pentagon jars the senses. At least, it did mine. They are looking for contractors to provide a “Multi-Robot Pursuit System” that will let packs of robots “search for and detect a non-cooperative human”.

One thing that really bugs defence chiefs is having their troops diverted from other duties to control robots. So having a pack of them controlled by one person makes logistical sense. But I’m concerned about where this technology will end up.

Given that iRobot last year struck a deal with Taser International to mount stun weapons on its military robots, how long before we see packs of droids hunting down pesky demonstrators with paralysing weapons? Or could the packs even be lethally armed? I asked two experts on automated weapons what they thought – click the continue reading link to read what they said.

Both were concerned that packs of robots would be entrusted with tasks – and weapons – they were not up to handling without making wrong decisions.

Steve Wright of Leeds Metropolitan University is an expert on police and military technologies, and last year correctly predicted this pack-hunting mode of operation would happen. “The giveaway here is the phrase ’a non-cooperative human subject’,” he told me:

“What we have here are the beginnings of something designed to enable robots to hunt down humans like a pack of dogs. Once the software is perfected we can reasonably anticipate that they will become autonomous and become armed.

We can also expect such systems to be equipped with human detection and tracking devices including sensors which detect human breath and the radio waves associated with a human heart beat. These are technologies already developed.”

Another commentator often in the news for his views on military robot autonomy is Noel Sharkey, an AI and robotics engineer at the University of Sheffield. He says he can understand why the military want such technology, but also worries it will be used irresponsibly.

“This is a clear step towards one of the main goals of the US Army’s Future Combat Systems project, which aims to make a single soldier the nexus for a large scale robot attack. Independently, ground and aerial robots have been tested together and once the bits are joined, there will be a robot force under command of a single soldier with potentially dire consequences for innocents around the corner.”

What do you make of this? Are we letting our militaries run technologically amok with our tax dollars? Or can robot soldiers be programmed to be even more ethical than human ones, as some researchers claim?

 



DARPA Wants Real-Time Images of Inside Your House

DARPA Wants Real-Time Images of Inside Your House

Wired Magazine
October 23, 2008

The Pentagon wants to be able to peer inside your apartment building — picking out where all the major rooms, stairways, and dens of evil-doers are.

The U.S. military is getting better and better at spotting its enemies, when they’re roaming around the streets. But once those foes duck into houses, they become a whole lot harder to spot. That’s why Darpa, the Defense Department’s way-out research arm, is looking to develop a suite of tools for “external sensing deep inside buildings.” The ultimate goal of this Harnessing Infrastructure for Building Reconnaissance (HIBR) project: “reverse the adversaries’ advantage of urban familiarity and sanctuary and provide U.S. Forces with complete above- and below-ground awareness.”

By the end of the project, Darpa wants a set of technologies that can see into a 10-story building with a two-level basement in a “high-density urban block” — and produce a kind of digital blueprint of the place. Using sensors mounted on backpacks, vehicles, or aircraft, the HIBR gear would, hopefully, be able to pick out every room, wall, stairway, and basement in the building — as well as all of the “electrical, plumbing, and installation systems.”

Darpa doesn’t come out and say it openly. But it appears that the agency wants these HIBR gadgets to be able to track the people inside these buildings, as well. Why else would these sensors be required to “provide real-time updates” once U.S. troops enter the building? Perhaps there’s more about the people-spotting tech, in the “classified appendix” to HIBR’s request for proposals.

There are already a number of efforts underway, both military and civilian, to try to see inside buildings. The Army has a couple of hand-held gadgets that can spot people just on the other side of a wall. Some scientists claim that can even catch human breathing and heartbeats beyond a barrier.

Darpa’s Visibuilding program uses a kind of radar to scan structures. The problem isn’t sending the radio frequency (RF) energy in. It’s “making sense of the data produced from all the reflected signals” that come back, Henry Kenyon wrote in a recent Signal magazine article. Besides processing data from the inside a structure, the system also must filter a large amount of RF propagation in the form of randomly reflected signals. Although radar technologies exist that can track people in adjacent rooms, it is much more difficult to map an entire building. “Going through one wall is not that bad, but a building is basically an RF hall of mirrors. You’ve got signals bouncing all over the place,” Darpa program manager Dr. Edward J. Baranoski says. Field trials are supposed to get underway this fall.

 



Secret Radiation Guns Used In Iraq

Secret Radiation Guns Used In Iraq
Woodward compares clandestine program to Manhattan Project, could secret weapon be terrifying radiation canon?

Paul Joseph Watson
Prison Planet
September 9, 2008

Pulitzer Prize-winning journalist Bob Woodward revealed to Larry King last night that the U.S. has embarked on a “secret killing program” in Iraq which has dramatically reduced attacks on coalition troops by wiping out terrorists, but what could this secret weapon possibly be?

A CNN report details Woodward’s revelations.

The program — which Woodward compares to the World War II era Manhattan Project that developed the atomic bomb — must remain secret for now or it would “get people killed,” Woodward said Monday on CNN’s Larry King Live.

“The top secret operations will “some day in history … be described to people’s amazement,” Woodward told King.

While he would not reveal the details, Woodward said the terrorists who have been targeted were already aware of the capabilities.

“The enemy has a heads up because they’ve been getting wiped out and a lot of them have been killed,” he said. “It’s not news to them.”

For the weapon to be comparable to the atomic bomb, one would speculate that it must employ some kind of exotic new technology and is potentially related to neutron bomb and electromagnetic weapons research.

As far back as 2002, a Cox News Service report entitled Super-Secret Microwave Weapons May Be Used In Iraq, speculated that the military was preparing to utilize high-powered microwave weapons that send bursts of electromagnetic energy which completely disable enemy electronic devices.

However, Woodward’s discussion of the secret weapon wiping out alleged terrorists in large numbers suggests it may be a far more barbaric device than an EMP weapon, which would more traditionally be used against standing armies rather than scattered insurgents.

One possibility is that the weapon is something similar that described to film maker Patrick Dillon by Iraqi infantryman Majid al-Ghazali – a frightening giant flame-thrower type device that instead shoots out “concentrated lightning bolts” or radiation bursts that result in vehicles and people being almost literally liquidized.

During a street battle in Baghdad on April 12 2003, Al-Ghazali describes witnessing American troops unveil an oddly configured tank which “suddenly let loose a blinding stream of what seemed like fire and lightning, engulfing a large passenger bus and three automobiles.”

“Within seconds the bus had become semi-molten, sagging “like a wet rag” as he put it. He said the bus rapidly melted under this withering blast, shrinking until it was a twisted blob about the dimensions of a VW bug. As if that were not bizarre enough, al-Ghazali explicitly describes seeing numerous human bodies shriveled to the size of newborn babies. By the time local street fighting ended that day, he estimates between 500 and 600 soldiers and civilians had been cooked alive as a result of the mysterious tank-mounted device.”

Al-Ghazali adds that following the battle, U.S. troops were scrupulous about burying the evidence of the weapon’s deadly consequences, but that telltale signs remained which he showed to journalist Dillon.

Dillon, a battlefield medic in Vietnam, Somalia and Kosovo, stated, “I’ve seen a freaking smorgasbord of destruction in my life, flame-throwers, napalm, white phosphorous, thermite, you name it. I know of nothing short of an H-bomb that conceivably might cause a bus to instantly liquefy or that can flash broil a human body down to the size of an infant. God pity humanity if that thing is a preview of what’s in store for the 21st century.”

An interview with Majid al-Ghazali can be viewed below along with a further exploration of exotic weapons systems being employed in Iraq. Aid workers and others have backed up reports of terrifying new weapons systems being deployed that cause horrific injuries and agonizing deaths. Woodward’s characterization of the victims merely as “terrorists” conceals the fact that a great number of the victims of these brutal weapons are no doubt innocent people caught up in the fighting.

http://www.youtube.com/watch?v=9oe92UbdoIY

http://www.youtube.com/watch?v=xcNSVG1ikBg

http://www.youtube.com/watch?v=Nw2B_-zy0JU

 



Future Drugs Will Make Troops Want to Fight

Future Drugs Will Make Troops Want to Fight
Potential technologies to picture what someone is thinking, drugs that give soldiers super-human power and awareness, robots controlled with the brain and land-mines that release drugs to incapacitate suspects is in the works.

Wired
August 13, 2008

Drugs that make soldiers want to fight. Robots linked directly to their controllers’ brains. Lie-detecting scans administered to terrorist suspects as they cross U.S. borders.

These are just a few of the military uses imagined for cognitive science — and if it’s not yet certain whether the technologies will work, the military is certainly taking them very seriously.

“It’s way too early to know which — if any — of these technologies is going to be practical,” said Jonathan Moreno, a Center for American Progress bioethicist and author of Mind Wars: Brain Research and National Defense. “But it’s important for us to get ahead of the curve. Soldiers are always on the cutting edge of new technologies.”

Moreno is part of a National Research Council committee convened by the Department of Defense to evaluate the military potential of brain science. Their report, “Emerging Cognitive Neuroscience and Related Technologies,” was released today. It charts a range of cognitive technologies that are potentially powerful — and, perhaps, powerfully troubling.

Here are the report’s main areas of focus:

  • Mind reading. The development of psychological models and neurological imaging has made it possible to see what people are thinking and whether they’re lying. The science is, however, still in its infancy: Challenges remain in accounting for variations between individual brains, and the tendency of our brains to change over time.

    One important application is lie detection — though one hopes that the lesson of traditional lie detectors, predicated on the now-disproven idea that the physiological basis of lying can be separated from processes such as anxiety, has been learned.

    Mind readers could be used to interrogate captured enemies, as well as “terrorist suspects” passing through customs. But does this mean, for example, that travelers placed on the bloated, mistake-laden watchlist would have their minds scanned, just as their computers will be?

    The report notes that “In situations where it is important to win the hearts and minds of the local populace, it would be useful to know if they understand the information being given them.”

  • Cognitive enhancement. Arguably the most developed area of cognitive neuroscience, with drugs already allowing soldiers to stay awake and alert for days at a time, and brain-altering drugs in widespread use among civilians diagnosed with mental and behavioral problems.

    Improved drug delivery systems and improved neurological understanding could make today’s drugs seem rudimentary, giving soldiers a superhuman strength and awareness — but if a drug can be designed to increase an ability, a drug can also be designed to destroy it.

    “It’s also important to develop antidotes and protective agents against various classes of drugs,” says the report. This echoes the motivation of much federal biodefense research, in which designing defenses against potential bioterror agents requires those agents to be made — and that raises the possibility of our own weapons being turned against us, as with the post-9/11 anthrax attacks, which used a military developed strain.

  • Mind control. Largely pharmaceutical, for the moment, and a natural outgrowth of cognitive enhancement approaches and mind-reading insight: If we can alter the brain, why not control it?

    One potential use involves making soldiers want to fight. Conversely, “How can we disrupt the enemy’s motivation to fight? […] How can we make people trust us more? What if we could help the brain to remove fear or pain? Is there a way to make the enemy obey our commands?”
  • Brain-Machine Interfaces. The report focuses on direct brain-to-machine systems (rather than, for example, systems that are controlled by visual movements, which are already in limited use by paraplegics.) Among these are robotic prostheses that replace or extend body parts; cognitive and sensory prostheses, which make it possible to think and to perceive in entirely new ways; and robotic or software assistants, which would do the same thing, but from a distance.

    Many questions surrounding the safety of current brain-machine interfaces: The union of metal and flesh only lasts so long before things break down. But assuming those can be overcome, questions of plasticity arise: What happens when a soldier leaves the service? How might their brains be reshaped by their experience?

Like Moreno said, it’s too early to say what will work. The report documents in great detail the practical obstacles to these aims — not least the failure of reductionist neuroscientific models, in which a few firing neurons can be easily mapped to a psychological state, and brains can be analyzed in one-map-fits-all fashion.

But given the rapid progress of cognitive science, it’s foolish to assume that obstacles won’t be overcome. Hugh Gusterson, a George Mason University anthropologist and critic of the military’s sponsorship of social science research, says their attempt to crack the cultural code is unlikely to work — “but my sense with neuroscience,” he said, “is a far more realistic ambition.”

Gusterson is deeply pessimistic about military neuroscience, which will not be limited to the United States.

“I think most reasonable people, if they imagine a world in which all sides have figured out how to control brains, they’d rather not go there,” he said. “Most rational human beings would believe that if we could have a world where nobody does military neuroscience, we’ll all be better off. But for some people in the Pentagon, it’s too delicious to ignore.”

 

Brain will be battlefield of future, warns US intelligence report

The Guardian
August 14, 2008

Rapid advances in neuroscience could have a dramatic impact on national security and the way in which future wars are fought, US intelligence officials have been told.

In a report commissioned by the Defense Intelligence Agency, leading scientists were asked to examine how a greater understanding of the brain over the next 20 years is likely to drive the development of new medicines and technologies.

They found several areas in which progress could have a profound impact, including behaviour-altering drugs, scanners that can interpret a person’s state of mind and devices capable of boosting senses such as hearing and vision.

On the battlefield, bullets may be replaced with “pharmacological land mines” that release drugs to incapacitate soldiers on contact, while scanners and other electronic devices could be developed to identify suspects from their brain activity and even disrupt their ability to tell lies when questioned, the report says.

“The concept of torture could also be altered by products in this market. It is possible that some day there could be a technique developed to extract information from a prisoner that does not have any lasting side effects,” the report states.

The report highlights one electronic technique, called transcranial direct current stimulation, which involves using electrical pulses to interfere with the firing of neurons in the brain and has been shown to delay a person’s ability to tell a lie.

Drugs could also be used to enhance the performance of military personnel. There is already anecdotal evidence of troops using the narcolepsy drug modafinil, and ritalin, which is prescribed for attention deficit disorder, to boost their performance. Future drugs, developed to boost the cognitive faculties of people with dementia, are likely to be used in a similar way, the report adds.

Greater understanding of the brain’s workings is also expected to usher in new devices that link directly to the brain, either to allow operators to control machinery with their minds, such as flying unmanned reconnaissance drones, or to boost their natural senses.

For example, video from a person’s glasses, or audio recorded from a headset, could be processed by a computer to help search for relevant information. “Experiments indicate that the advantages of these devices are such that human operators will be greatly enhanced for things like photo reconnaissance and so on,” Kit Green, who chaired the report committee, said.

The report warns that while the US and other western nations might now consider themselves at the forefront of neuroscience, that is likely to change as other countries ramp up their computing capabilities. Unless security services can monitor progress internationally, they risk “major, even catastrophic, intelligence failures in the years ahead”, the report warns.

“In the intelligence community, there is an extremely small number of people who understand the science and without that it’s going to be impossible to predict surprises. This is a black hole that needs to be filled with light,” Green told the Guardian.

The technologies will one day have applications in counter-terrorism and crime-fighting. The report says brain imaging will not improve sufficiently in the next 20 years to read peoples’ intentions from afar and spot criminals before they act, but it might be good enough to help identify people at a checkpoint or counter who are afraid or anxious.

“We’re not going to be reading minds at a distance, but that doesn’t mean we can’t detect gross changes in anxiety or fear, and then subsequently talk to those individuals to see what’s upsetting them,” Green said.

The development of advanced surveillance techniques, such as cameras that can spot fearful expressions on people’s faces, could lead to some inventive ways to fool them, the report adds, such as Botox injections to relax facial muscles.

Land-mines that release drugs to incapacitate an enemy
http://www.guardian.co.uk/science/2008/aug/13/military.neuroscience

Future Wars To Be Fought With Mind Drugs
http://www.roguegovernment.com/news.php?id=11432

 



FDA Approved Implantable Microchips in 2004

FDA Approved Implantable Microchips in 2004

Press TV
August 12, 2008

Despite efforts by proponents of implantable identification microchips to popularize them, most Americans are strongly against the use of VeriChip.

In 2004, the US Food and Drug Administration (FDA) granted clearance for VeriChip, an identification system using implantable Radio-frequency identification (RFID) technology, consisting of a handheld reader, a microchip approximately the size of a grain of rice (containing a unique 16-digit ID number), which is implanted in the right arm, and a database.

VeriChip Corporation, the producer of the microchips, considers them as a fast and secure way of accessing medical information for thousands of patients brought in emergency departments either unconscious or unable to communicate due to medical conditions.

The US and certain other countries are currently implanting these microchips in the body of infants. There has also been talk of replacing ID and credit cards with VeriChip.

On the other hand, the VeriChip seems to have been only a means of distracting the public from a far more sophisticated project, conducted by the Defense Advanced Research Projects Agency (DARPA) — the central research and development organization for the US Defense Department.

DARPA has been investing in a new implantable chip called Multiple Micro Electrode Array (MMEA); a chip which is surgically implanted directly into a human nerve or into specific area of the brain and connects the brain to a computer.

While the medical advantages of these implantable microchips cannot be denied, a grain of rice in the right arm may prove to be much more decisive.

Perhaps the Wachowski brothers were right about a computer-controlled world of the future.

Tracking humans in the future: Big Brother’s All-Seeing Eye
http://noworldsystem.com/2008..-brothers-all-seeing-eye/

RFID Chip Implants Cause Cancer in Lab-Rats
http://noworldsystem.com/2008/08/01/rfid-chip-implants-cause-cancer-in-lab-rats/

UK Wants To Microchip Prisoners
http://noworldsystem.com/2008/06/23/uk-wants-to-microchip-prisoners/

U.S. School District to Begin Microchipping Students
http://noworldsystem.com/2008/06/..-begin-microchipping-students/

Bilderberg Plans Microchip Implant Campaign in America
http://noworldsystem.com..crochip-implant-campaign-in-america/



New York Turns Into a High-Tech Police Fortress

New York Turns Into a High-Tech Police Fortress

Antifascist
August 14, 2008

http://www.youtube.com/watch?v=9YII-lDn0E8

http://www.youtube.com/watch?v=1P9lmZSRDr0

Operation Sentinel, a new program unveiled by the New York City Police Department (NYPD) and U.S. Department of Homeland Security (DHS), would encircle Manhattan with thousands of surveillance cameras that photograph every car or truck entering and exiting the city across its network of bridges and tunnels.

Information captured by this intrusive project would be stored in a huge database for an undisclosed period of time. Additionally, a network of sensors installed at toll plazas would allegedly be able to capable detect radiological materials that could be used in potential terror plots, the New York Times reports.

However, the New York Civil Liberties Union (NYCLU) has denounced the proposal as “an attack on New Yorkers’ right to privacy.” NYCLU Executive Director Donna Lieberman lambasted this outrageous proposal saying,

“The NYPD’s latest plan to track and monitor the movements of millions of law-abiding people is an assault on this country’s historical respect for the right to privacy and the freedom to be left alone. That this is happening without public debate, and that elected officials have had no opportunity to study this program is even more alarming.” (“NYCLU: NYPD Plan to Track Millions of Law-Abiding People is an Assault on Privacy Rights,” New York Civil Liberties Union, August 12, 2008)

Last month I reported on a high-tech surveillance system under development by the Defense Advanced Research Projects Agency (DARPA) called “Combat Zones That See” (CTS).
The 2003 program was predicated on the notion that once thousands of digital CCTV networks were installed across occupied or “homeland” cities, CTS would provide occupying troops–or police–with “motion-pattern analysis across whole city scales.” Based on complex algorithms linked to the numeric recognition of license plate numbers and scanned-in human profiles, CTS would furnish troops–or cops–real-time, “situational awareness” of the “battlespace.”

Despite repeated attempts by NYCLU to obtain information on Operation Sentinel, NYPD and DHS have refused to provide any information about their mega-surveillance system. While all traces of CTS disappeared from DARPA’s website, portions of the program have resurfaced with a vengeance, courtesy of the NYPD and DHS.

According to New York Times reporter Al Baker,

Data on each vehicle–its time-stamped image, license plate imprint and radiological signature–would be sent to a command center in Lower Manhattan, where it would be indexed and stored for at least a month as part of a broad security plan that emphasizes protecting the city’s financial district, the spokesman, Paul J. Browne, said. If it were not linked to a suspicious vehicle or a law enforcement investigation, it would be eliminated, he said. (“City Would Photograph Every Vehicle Entering Manhattan and Sniff Out Radiation,” The New York Times, August 12, 2008)

Data on each vehicle–its time-stamped image, license plate imprint and radiological signature–would be sent to a command center in Lower Manhattan, where it would be indexed and stored for at least a month as part of a broad security plan that emphasizes protecting the city’s financial district, the spokesman, Paul J. Browne, said. If it were not linked to a suspicious vehicle or a law enforcement investigation, it would be eliminated, he said. (“City Would Photograph Every Vehicle Entering Manhattan and Sniff Out Radiation,” The New York Times, August 12, 2008)

“It is one tool of ensuring that if there is somebody on a terrorist watch list or someone driving erratically, or if a pattern develops that raises suspicions, it gives them an opportunity to investigate further and–if need be–track down the drivers or the passengers,” he said. “The bottom line is they can’t frisk everybody coming into Manhattan; they cannot wand everyone, as they do at airports. This is a passive collection of data that is not as personally invasive as what they do at airports.”

“It is one tool of ensuring that if there is somebody on a terrorist watch list or someone driving erratically, or if a pattern develops that raises suspicions, it gives them an opportunity to investigate further and–if need be–track down the drivers or the passengers,” he said. “The bottom line is they can’t frisk everybody coming into Manhattan; they cannot wand everyone, as they do at airports. This is a passive collection of data that is not as personally invasive as what they do at airports.”

NYPD Monitors Ring Of Steel Plan
http://www.dailyexpress.co.uk/posts/view/56882

 



Anthrax Victim’s Widow Blames U.S. Government

Anthrax Victim’s Widow Blames U.S. Government

AP
August 5, 2008

The widow of a tabloid photo editor who died in the 2001 anthrax attacks insisted in a $50 million federal lawsuit filed years ago that the U.S. government was ultimately responsible for his death.

The widow of a tabloid photo editor who died in the 2001 anthrax attacks insisted in a $50 million federal lawsuit filed years ago that the U.S. government was ultimately responsible for his death.

Now that the FBI is pinning the blame on government scientist Bruce Ivins, the lawsuit brought by Maureen Stevens looks positively clairvoyant. And results of the FBI investigation could have a major effect on the outcome of her case.

“We were right all along,” Patrick Hogan, the son-in-law of Maureen and the late Robert Stevens, said in a telephone interview Tuesday. “It seems to me it’s pretty much a slam dunk.”

Stevens was a photo editor at American Media Inc., the publisher of the National Enquirer, Sun and Globe gossip tabloids, when he was exposed to anthrax that was mailed to AMI offices in Boca Raton. Stevens died Oct. 5, 2001, the first of five people to be killed and 17 others to be sickened in the anthrax attacks.

Two years later, Maureen Stevens filed her lawsuit. In it, she claims the U.S. government was negligent because it failed to safeguard strains of the deadly anthrax bacteria at the U.S. Army disease research center at Fort Detrick, Md.

The government, her lawsuit says, “owed a duty of care, the highest degree of care” in handling of anthrax and supervising employees who had access to it. Although she didn’t know it when the lawsuit was filed, Ivins was one of those employees, a microbiologist who was working on an anthrax antidote. Ivins committed suicide last week as he was being investigated.

“One of the real areas of satisfaction, if you can call it that, is that we’ve maintained all along this was an inside job,” said Richard Schuler, Maureen Stevens’ attorney.

The case is unique among the legal actions brought after the anthrax attacks, according to the lawyers involved. Employees of a postal facility in Washington, D.C., where two workers died, sued the Postal Service for allegedly failing to protect them, but a federal judge in 2004 ruled the service is immune.

If the federal government ultimately names Ivins as the anthrax attack perpetrator, Schuler said the government’s lawyers should drop their long battle and settle the lawsuit. He noted that another scientist wrongly implicated by the FBI in the plot, Steven Hatfill, recently was paid $5.8 million to settle his lawsuit against the Justice Department.

“It’s been a long road for this family,” Schuler said. “I hope somebody who has some authority will call us and make it right with this family.”

Maureen Stevens declined an interview request, deferring to her attorney. The lawsuit, also filed on behalf of the couple’s three grown children, seeks a maximum of $50 million in compensatory damages for the government’s alleged negligence in Stevens’ death. Schuler said that figure represents the upper reaches of a possible damage award or settlement.

Two of the Stevens children did not return phone messages or e-mails seeking comment Tuesday. Hogan, husband of daughter Heidi, said he’s hopeful that the FBI has its man in Ivins.

“It seems to me they botched this thing from the beginning. It was one of their own people,” Hogan said. “I’m just very happy that they actually found somebody.”

Read Full Article Here

Hair Samples in Anthrax Case Don’t Match
http://www.washingtonpost.co..icle/2008/08/13/AR2008081303731_pf.html

DARPA-linked Cycorp “Predicted” the Anthrax Attacks – 6 months before they happened.
http://www.911blogger.com/node/17033

 



A ’Frankenrobot’ with a biological brain

A ’Frankenrobot’ with a biological brain

http://www.youtube.com/watch?v=aAtL3d6igjw

Uncle Sam Wants Your Brain
http://blog.wired.com/wiredscience/2008/08/uncle-sam-wants.html

Military Report Touts Brain Altering Drugs, Mind Control To Make Soldiers Want To Fight
http://infowars.net/articles/august2008/140808Soldiers.htm

 



Army uses “Calmatives”, non-lethal Chemical Weapons

Army uses “Calmatives”, non-lethal Chemical Weapons
The US Army’s XM1063 projectile is designed to be ’non-lethal’ – but is it peaceful or hovering on the brink of illegality?

Guardian
July 10, 2008

Is the XM1063 a stink bomb, a banana skin, or a bad trip? It’s hard to know. XM1063 is the code name for the US army’s new secret weapon which will “suppress” people without harming them, as well as stopping vehicles in an area 100m square. But is it a violation of chemical weapons treaties, or a welcome move towards less destructive warfare using non-lethal weapons?

Exactly how it works is classified, but we have established some details. The first part of the weapon is an artillery round – or as the army puts it, “a non-lethal personal suppression projectile” – fired from a 155mm howitzer, with a range of 28km. It scatters 152 small non-explosive submunitions over a 1-hectare area; as each parachutes down, it sprays a chemical agent. Development was overseen by the US Army’s Armament Research, Development and Engineering Centre (Ardec).

A presentation by the makers, General Dynamics, says the XM1063 will “suppress, disperse or engage personnel” and “deny personnel access to, use of, or movement through a particular area, point or facility” (=see PDF).

Smelling it out

Experts suggest three possible payloads: an existing riot-control agent, malodorants or a new chemical agent. Existing agents include CS gas and a form of pepper spray. But these seem unlikely choices, because their effects only last minutes, and could wear off before friendly forces arrive. They could also face a legal challenge: the 1997 Chemical Weapons Convention prohibits the use of riot control agents in warfare

“The matter is further complicated if pepper gas was used as the irritant since this is a plant toxin,” says Steve Wright of Leeds Metropolitan University. “Such toxins are explicitly banned.”

The possibilities seem to boil down to anti-traction agents (which make the whole area impossibly slippery), a malodorant or some novel chemical agents.

Anti-traction agents are possible, but seem unlikely because research in this area (such as Darpa’s Black Ice program) still seems to be at an early stage. It would be unusual for an agency to still be doing basic research when another is about to field a finished product.

A malodorant is a super stinkbomb with a truly intolerable smell. The Pentagon has been working on such chemicals for years, and a recent US army briefing on future artillery concepts specifically mentions artillery-delivered malodorants. (see PDF)

This might sidestep the Chemical Weapons Convention with the argument that malodorants are not chemical weapons. However, Ralf Trapp, an independent disarmament consultant formerly with the Organisation for the Prohibition of Chemical Weapons, challenges this interpretation.

“That argument rests on the assumption that there are no other toxic effects of these chemicals, and that one can control the dose so that one never crosses into the dose range for toxic effects,” says Trapp. “It also is based a concept of toxicity that is centuries out of date – malodorants do have a physiological effect and toxicity is not limited to lethality.”

Finally, there is the possibility that the US has decided to ignore the convention and use new non-lethal chemical agents. This approach has supporters in high places. Before the Iraq war in 2003, Donald Rumsfeld pushed for rules of engagement that would allow US forces to use non-lethal chemicals.

Until the 1980s, the US maintained stockpiles of a chemical incapacitant known as BZ or Agent Buzz. BZ is a psychoactive chemical causing stupor, confusion and hallucinations lasting for more than 24 hours. It has an evil reputation, but this is based largely on rumour as few facts are available. Most people have only heard of BZ in connection with the film Jacob’s Ladder. This depicted soldiers exposed to a secret chemical weapon in Vietnam with terrible results, including permanent psychosis.

“We are reaping the whirlwind today because of government secrecy in the past,” says Jim Ketchum, who ran the BZ testing program in the 1960s. “It has allowed critics to make unsupportable claims about agents such as BZ without rejoinder from the government research community.” Although the US is known to have been active in this area since 2000, no comments are available from researchers on non-lethal chemical agents – now termed “calmatives”, whatever their chemical action.

Ketchum has written a book, Chemical Warfare Secrets Almost Forgotten, about his experiences of testing BZ on hundreds of volunteers. The effects are very different to those portrayed by Hollywood. None suffered physical harm, mental breakdown or any lasting after-effects. Rather than driving subjects berserk, it has a sedative action. But unlike the fentanyl used in 2002 by Russian police when they stormed a Moscow theatre where Chechen rebels were holding hostages, BZ does not rely on sedation for its effects and does not carry the same risk.

Clouding the issue

Ketchum is now retired, and his successors have had decades to develop more effective and safer agents. But strict secrecy is still in place and there is no information about current research. Ketchum argues that the use of incapacitants would save lives, especially in situations where insurgents are mixed with the civilian population. Others believe that such agents are not just illegal but a step towards unlimited chemical weapons.

“It shouldn’t be forgotten that the horrors of gas warfare in the first world war began with teargas, followed up with lethal firepower,” says Wright.

As a sideline, the XM1063 projectile also has a “vehicle area denial” component composed of nanoparticles. The US army has researched chemicals to interefere with engine combustion in the past, including work with ferrocene (normally used as an anti-knock additive) which prevent engines from working, with the idea is that this would stop any vehicle within the affected area. However, the potential health risks are unknown, especially when nanoparticles are involved.

Testing of the XM1063 was completed successfully last year and it is due for low-rate production from 2009. Ardec says that the production decision is on hold awaiting further direction from the program manager. It seems the decision on whether to enter a new age of chemical warfare now rests with the military rather then civilians. Unless put under pressure, the US Army seems unlikely to give any details of what’s in the surprise package until it is used. And maybe not even then.

Pentagon “Calmatives”: Biochemical Substances as Incapacitating Weapons of War and Social Control
http://globalresearch.ca/index.php?context=va&aid=9573

 



Microwave Gun Makes People Hear Things

Microwave Gun Makes People Hear Things

Wired
July 7, 2008

The U.S. military bankrolled early development of a non-lethal microwave weapon that creates sound inside your head. But in the end, the gadget may be just as likely to wind up in shopping malls as on battlefields, as I report in New Scientist.

The project is known as MEDUSA – a contrived acronym for Mob Excess Deterrent Using Silent Audio. And it should not be confused with the Long Range Acoustic Device and similar gadgets which simply project sound. This one uses the so-called “microwave auditory effect”: a beam of microwaves is turned into sound by the interaction with your head. Nobody else can hear it unless they are in the beam as well.

The effect has long been a laboratory curiosity, with no application. But, over the years, the military has been intrigued. The idea (dubbed “the telepathic ray gun”) was mentioned in a 1998 US Army study, which turned up in a recent Freedom of Information Act document dump. Five years later, the Navy decided to put some R&D dollars into the project. Now, as I note on the New Scientist website, Dr. Lev Sadovnik of the Sierra Nevada Corporation has provided more details.

There are health risks, he notes. But the biggest issue from the microwave weapon is not the radiation. It’s the risk of brain damage from the high-intensity shockwave created by the microwave pulse. Clearly, much more research is needed on this effect at the sort of power levels that Dr. Sadovnik is proposing. But if it does prove hazardous, that does not mean an end to weapons research in this area: a device that delivered a lethal shockwave inside the target’s skull might make an effective death ray.

Dr. Sadovnik also makes the intriguing suggestion that, instead of being used at high power to create an intolerable noise, it might be used at low power to produce a whisper that was too quiet to perceive consciously but might be able to subconsciously influence someone. The directional beam could be used for targeted messages, such as in-store promotions. Sadovnik even suggests subliminal advertising, beaming information that is not consciously heard (a notion also spotted on the US Army’s voice-to-skull page). While the effectiveness of subliminal persuasion is dubious, I can see there might be some organizations interested in this capability. And if that doesn’t work, you could always point the thing at birds. They seem to be highly sensitive to microwave audio, so it might be used to scare flocks away from wind farms — or shoo pigeons from city streets.

 

US wants sci-fi killer robots for terror fight

Scotsman
July 6, 2008

KILLER robots which can change their shape to squeeze under doors and through cracks in walls to track their prey are moving from the realms of science fiction to the front line in the fight against terrorism.

The US military has signed a £1.6m deal with a technology firm to design robots which are intelligent enough to work out how to wiggle through small spaces to reach their target.

The action film, Terminator 2: Judgment Day, featured a seemingly unstoppable killer

robot played by Robert Patrick. The machine was made from liquid metal and could change its form to slide under doors and walk through iron bars.

America’s Defense Advanced Research Projects Agency (Darpa) and the Army Research Office has awarded the contract to iRobot, which has developed other robots for the military.

They want scientists to come up with a design for a tiny robot able to move under its own power and change shape so it can get through gaps less than half an inch wide.

The US administration has not said what it wants the robot to do but
its specification says: “Often the only available points of entry are small openings in buildings, walls, under doors, etc. In these cases, a robot must be soft enough to squeeze or traverse through small openings, yet large enough to carry an operationally meaningful payload.”

In an effort to inspire creative ideas, the US military has pointed to examples in nature of creatures which are able to squeeze through narrow gaps and change their form.

Helen Greiner, co-founder and chairwoman of iRobot, said: “Through this programme, robots that reconstitute size, shape and functionality after traversal through complex environments will transcend the pages of science fiction to become real tools for soldiers in theatre.”

But Scottish-based experts believe the challenge may be too much even for the US military’s budgets and technology.

Mike Cates, professor of physics at Edinburgh University, said: “There are materials which can change their shapes and then regain them. There are alloys, known as memory metals, which are used in glasses and which can regain their shape. The difficulty in this case is all the other elements which need to be added to a device such as this, such as the circuitry and some form of system to propel it.”

Brian Baglow, of technology firm Indoctrimat, said: “As well as designing the materials for this, the sensor systems will be a problem. It’s not easy for them to work out where the gaps are which they can get through.”

‘Invisible Wars’ of the Future: E-Bombs, Laser Guns and Acoustic Weapons
http://www.globalresearch.ca/index.p..code=20080706&articleId=9522

Army Yanks ’Voice-To-Skull Devices’ Site
http://blog.wired.com/defense/20..y-removes-pa.htmlpreviouspost

The Other MEDUSA: A Microwave Sound Weapon
http://blog.wired.com/defense/2007/08/the-other-medus.htmlpreviouspost

US ’Sonic Blasters’ Sold To China
http://blog.wired.com/defense/2008/05/us-sonic-blaste.htmlpreviouspost

Protesters Panic Over ’Crap Cannon’
http://blog.wired.com/defense/2008/..esters-fear.htmlpreviouspost

I Was a Sonic Blaster Guinea Pig
http://blog.wired.co../i-was-a-puke-ra.htmlpreviouspost

Acoustic “Device” or Acoustic Weapon?
http://blog.wired.com/defense/2007/05/acoustic_device.htmlpreviouspost

 



BigDog: The Future Of Policing In America?

BigDog: The Future Of Policing In America?

http://www.youtube.com/watch?v=mmVaLp8icoU

 



Pentagon: $520 Million For Space Weapons

Pentagon: $520 Million For Space Weapons

Wired
March 13, 2008

We all know that the Pentagon has more space weapons technology in mind than just a single, satellite-shooting missile. But trying to pin down how much the Defense Department is spending on space combat research — and on what projects — is an absolute bitch. The programs are spread across at least a dozen different accounts; much of the technology involved is “dual use” — meaning, it could help with another military matters, too; and that’s before you get into the Defense Department’s “black,” classified budget.

Over the years, the gang at the Center for Defense Information has done a good a job as anyone at this thankless task. They’ve just released their survey of the Pentagon’s 2009 budget, highlighting research that could lead to arms in space. By the absolute most conservative estimate, we’re talking $520 million dollars in next year’s budget. The real number is likely several multiples of that.

The projects mostly involve ways to disable potentially hostile satellites; many have other uses, as well. They include a giant laser, to help spot targets in orbit (and to improve space imaging, in the meantime); micro satellites, that could disable another country’s orbiters (or repair our own); a series of jammers, to block enemy satellite signals; and missile interceptors, based in space.

At first glance, an anti-missile might not seem like a space weapon project. But, as last month’s satellite shoot-down showed, the same gear used to intercept a missile can also be repurposed to blast a sat. Especially if the gear is already in space.

Rare Night Shuttle Launch On 03/11/08
http://news.yahoo.com/s/ap/20080311/ap_on_sc/space_shuttle&printer=1

Rocket lifts off with secret satellite
http://news.yahoo.com/s/ap/..unch;_ylt=Ag._DGGa9HsVVmItkl3K5n6s0NUE

Top Defense commander hints at taking offensive actions in space, cyberspace
http://www.govexec.com/story_page.cfm?articleid=39514&dcn=todaysnews

Darth Cheney Wants Space Based Weapons
http://ap.google.com/article/ALeqM5gvsKHCj_jjvCkYgE9lKl3x9xkEvAD8VBJP0O1

 



FBI Stops Crime Fighting – Now Spying On US Citizens

FBI Stops Crime Fighting – Now Spying On US Citizens

Lompoc Record
March 11, 2008

A team of research analysts at Syracuse University has been tracking the FBI’s activity in domestic crime investigations. The results are revealing.

For example, in 2007, the FBI made 2,300 referrals of cases to be prosecuted to the U.S. Justice Department. In 1993, the FBI made 20,900 such referrals.

Two decades ago, FBI investigations contributed 36 percent of the total cases prosecuted by the Justice Department. Last year, the FBI referrals were down to 16 percent.

So, if FBI agents aren’t investigating crime in the United States, what are they doing? Ferreting out terrorists, apparently, and invading your privacy in the process.

Internal audits indicate the FBI has continued, and even expanded, its pursuit of information on American citizens – made possible by the Patriot Act – although it was ordered by a federal judge last year to cease and desist.

The judge’s ruling came after testimony that the FBI had issued more than 140,000 “national security letters” in the period from the beginning of 2003 through 2005. In his ruling, the federal judge called such snooping the “legislative equivalent of breaking and entering.”

So, in the opinion of at least one judge, instead of solving crime and helping to put criminals behind bars, the FBI has instead focused its energies on violating the privacy rights of U.S. citizens.

Those national security letters allow the FBI to comb through phone, Internet and bank records in an effort to thwart terrorism. It seems highly unlikely that there are many terrorists, or U.S. citizens with connections to terrorist groups, among the hundreds of thousands of citizens whose lives have now been pried into by the FBI.

FBI officials admitted last week that the federal judge’s order to stop snooping, or at least slow the pace, had basically been ignored. The bureau apparently continues to eavesdrop.

The mental image is inescapable – the United States as become a nation of frightened people, cowering in a corner, giving up all semblance of privacy and civil freedoms in an effort to keep from being terrorized.

At least that’s the image the Bush administration fosters in its relentless, unending search for the evildoers of the world.

NSA Rebuilds Total Information Awareness
http://www.news.com/8301-13578_3-9890761-38.html

FBI Spying Abuses Reported
http://www.nytimes.com/2008/03/13/washington/13fbi.html

 



DARPA’s Control Freak Technology

DARPA’s Control Freak Technology

TruthNews
December 12, 2007

According to Wired, the Pentagon is “about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person’s life, index all the information and make it searchable…. What national security experts and civil libertarians want to know is, why would the Defense Department want to do such a thing?”

Once again, “security experts and civil libertarians” fail to understand the authoritarian, psychopathic mind. Our rulers do these sort of things because they are the ultimate control freaks, paranoid and suspicious of the average person — or rather what the average person may do in order to get rid of the controllers, the parasites, who are compelled to spend billions of dollars on such projects, that is to say billions fleeced off the people they want to monitor and control. As usual, the excuse is they have to protect us from the terrorists, never mind they created the terrorists, too.

“The embryonic LifeLog program would dump everything an individual does into a giant database: every e-mail sent or received, every picture taken, every Web page surfed, every phone call made, every TV show watched, every magazine read,” Wired continues. “All of this — and more — would combine with information gleaned from a variety of sources: a GPS transmitter to keep tabs on where that person went, audio-visual sensors to capture what he or she sees or says, and biomedical monitors to keep track of the individual’s health.”

In fact, a large part of this is already in place, thanks to the NSA’s vacuum cleaner approach to searching for “al-Qaeda phone calls,” cataloguing millions of phone calls each and every day, reading email, snooping internet destinations with the help of the telecoms. As for GPS, you have one in your cell phone, as well as a way for the snoops to listen in on what you say, even when you think the phone is switched off.

If the government had its way — and it may very well in a few years, thanks to the bovine nature of the average American — you will be chipped or at minimum have an RFID in your wallet or purse, thus they will be track where you go and when.

This gigantic amalgamation of personal information could then be used to “trace the ‘threads’ of an individual’s life,” to see exactly how a relationship or events developed, according to a briefing from the Defense Advanced Projects Research Agency, LifeLog’s sponsor.

Someone with access to the database could “retrieve a specific thread of past transactions, or recall an experience from a few seconds ago or from many years earlier … by using a search-engine interface.”

For instance, it could be determined if you harbor “discontent” with the government, in other words if you’re with al-Qaeda.

On the surface, the project seems like the latest in a long line of DARPA’s “blue sky” research efforts, most of which never make it out of the lab. But DARPA is currently asking businesses and universities for research proposals to begin moving LifeLog forward. And some people, such as Steven Aftergood, a defense analyst with the Federation of American Scientists, are worried.

With its controversial Total Information Awareness database project, DARPA already is planning to track all of an individual’s “transactional data” — like what we buy and who gets our e-mail.

While the parameters of the project have not yet been determined, Aftergood said he believes LifeLog could go far beyond TIA’s scope, adding physical information (like how we feel) and media data (like what we read) to this transactional data.

“LifeLog has the potential to become something like ‘TIA cubed,'” he said.

No doubt, the pointy-heads in the Pentagon are particularly interested in this “how we feel” aspect of the program. Not even Orwell was able to imagine such a scary control device.

You see an image of our commander-guy on television or the web, your biomedical implant registers an elevated level or disgust, and the thought police are dispatched in SWAT fashion. It’s off to the re-education camp for you.

Of course, that’s really “blue sky” stuff at this point. Instead, for the moment, we’ll have to settle for DARPA tracking us on the internet, thanks to technology under development at Microsoft.

Read Full Article Here

 



FACEBOOK: Federal Human Data Mining Program
October 29, 2007, 12:38 pm
Filed under: Big Brother, CIA, Control Grid, Darpa, DoD, facebook, paypal, Surveillance

FACEBOOK: Federal Human Data Mining Program

http://www.youtube.com/watch?v=OwnTWZ1-UWY

 



Dragonfly or Insect Spy? Scientists at Work on Robobugs

Dragonfly or Insect Spy? Scientists at Work on Robobugs

Rick Weiss
Washington Post
October 10, 2007

Vanessa Alarcon saw them while working at an antiwar rally in Lafayette Square last month.

“I heard someone say, ‘Oh my god, look at those,’ ” the college senior from New York recalled. “I look up and I’m like, ‘What the hell is that?’ They looked kind of like dragonflies or little helicopters. But I mean, those are not insects.”

Out in the crowd, Bernard Crane saw them, too.

“I’d never seen anything like it in my life,” the Washington lawyer said. “They were large for dragonflies. I thought, ‘Is that mechanical, or is that alive?’ “

That is just one of the questions hovering over a handful of similar sightings at political events in Washington and New York. Some suspect the insectlike drones are high-tech surveillance tools, perhaps deployed by the Department of Homeland Security.

Others think they are, well, dragonflies — an ancient order of insects that even biologists concede look about as robotic as a living creature can look.

No agency admits to having deployed insect-size spy drones. But a number of U.S. government and private entities acknowledge they are trying. Some federally funded teams are even growing live insects with computer chips in them, with the goal of mounting spyware on their bodies and controlling their flight muscles remotely.

The robobugs could follow suspects, guide missiles to targets or navigate the crannies of collapsed buildings to find survivors.

The technical challenges of creating robotic insects are daunting, and most experts doubt that fully working models exist yet.

“If you find something, let me know,” said Gary Anderson of the Defense Department’s Rapid Reaction Technology Office.

But the CIA secretly developed a simple dragonfly snooper as long ago as the 1970s. And given recent advances, even skeptics say there is always a chance that some agency has quietly managed to make something operational.

“America can be pretty sneaky,” said Tom Ehrhard, a retired Air Force colonel and expert in unmanned aerial vehicles who is now at the Center for Strategic and Budgetary Assessments, a nonprofit Washington-based research institute.

Robotic fliers have been used by the military since World War II, but in the past decade their numbers and level of sophistication have increased enormously. Defense Department documents describe nearly 100 different models in use today, some as tiny as birds, and some the size of small planes.

All told, the nation’s fleet of flying robots logged more than 160,000 flight hours last year — a more than fourfold increase since 2003. A recent report by the U.S. Army Command and General Staff College warned that if traffic rules are not clarified soon, the glut of unmanned vehicles “could render military airspace chaotic and potentially dangerous.”

But getting from bird size to bug size is not a simple matter of making everything smaller.

“You can’t make a conventional robot of metal and ball bearings and just shrink the design down,” said Ronald Fearing, a roboticist at the University of California at Berkeley. For one thing, the rules of aerodynamics change at very tiny scales and require wings that flap in precise ways — a huge engineering challenge.

Only recently have scientists come to understand how insects fly — a biomechanical feat that, despite the evidence before scientists’ eyes, was for decades deemed “theoretically impossible.” Just last month, researchers at Cornell University published a physics paper clarifying how dragonflies adjust the relative motions of their front and rear wings to save energy while hovering.

That kind of finding is important to roboticists because flapping fliers tend to be energy hogs, and batteries are heavy.

The CIA was among the earliest to tackle the problem. The “insectothopter,” developed by the agency’s Office of Research and Development 30 years ago, looked just like a dragonfly and contained a tiny gasoline engine to make the four wings flap. It flew but was ultimately declared a failure because it could not handle crosswinds.

Agency spokesman George Little said he could not talk about what the CIA may have done since then. The Office of the Director of National Intelligence, the Department of Homeland Security and the Secret Service also declined to discuss the topic.

Only the FBI offered a declarative denial. “We don’t have anything like that,” a spokesman said.

The Defense Department is trying, though.

In one approach, researchers funded by the Defense Advanced Research Projects Agency (DARPA) are inserting computer chips into moth pupae — the intermediate stage between a caterpillar and a flying adult — and hatching them into healthy “cyborg moths.”

The Hybrid Insect Micro-Electro-Mechanical Systems project aims to create literal shutterbugs — camera-toting insects whose nerves have grown into their internal silicon chip so that wranglers can control their activities. DARPA researchers are also raising cyborg beetles with power for various instruments to be generated by their muscles.

“You might recall that Gandalf the friendly wizard in the recent classic ‘Lord of the Rings’ used a moth to call in air support,” DARPA program manager Amit Lal said at a symposium in August. Today, he said, “this science fiction vision is within the realm of reality.”

A DARPA spokeswoman denied a reporter’s request to interview Lal or others on the project.

The cyborg insect project has its share of doubters.

“I’ll be seriously dead before that program deploys,” said vice admiral Joe Dyer, former commander of the Naval Air Systems Command, now at iRobot in Burlington, Mass., which makes household and military robots.

By contrast, fully mechanical micro-fliers are advancing quickly.

Researchers at the California Institute of Technology have made a “microbat ornithopter” that flies freely and fits in the palm of one’s hand. A Vanderbilt University team has made a similar device.

With their sail-like wings, neither of those would be mistaken for insects. In July, however, a Harvard University team got a truly fly-like robot airborne, its synthetic wings buzzing at 120 beats per second.

“It showed that we can manufacture the articulated, high-speed structures that you need to re-create the complex wing motions that insects produce,” said team leader Robert Wood.

The fly’s vanishingly thin materials were machined with lasers, then folded into three-dimensional form “like a micro-origami,” he said. Alternating electric fields make the wings flap. The whole thing weighs just 65 milligrams, or a little more than the plastic head of a push pin.

Still, it can fly only while attached to a threadlike tether that supplies power, evidence that significant hurdles remain.

In August, at the International Symposium on Flying Insects and Robots, held in Switzerland, Japanese researchers introduced radio-controlled fliers with four-inch wingspans that resemble hawk moths. Those who watch them fly, its creator wrote in the program, “feel something of ‘living souls.’ “

Others, taking a tip from the CIA, are making fliers that run on chemical fuels instead of batteries. The “entomopter,” in early stages of development at the Georgia Institute of Technology and resembling a toy plane more than a bug, converts liquid fuel into a hot gas, which powers four flapping wings and ancillary equipment.

“You can get more energy out of a drop of gasoline than out of a battery the size of a drop of gasoline,” said team leader Robert Michelson.

Even if the technical hurdles are overcome, insect-size fliers will always be risky investments.

“They can get eaten by a bird, they can get caught in a spider web,” said Fearing of Berkeley. “No matter how smart you are — you can put a Pentium in there — if a bird comes at you at 30 miles per hour there’s nothing you can do about it.”

Protesters might even nab one with a net — one of many reasons why Ehrhard, the former Air Force colonel, and other experts said they doubted that the hovering bugs spotted in Washington were spies.

So what was seen by Crane, Alarcon and a handful of others at the D.C. march — and as far back as 2004, during the Republican National Convention in New York, when one observant but perhaps paranoid peace-march participant described on the Web “a jet-black dragonfly hovering about 10 feet off the ground, precisely in the middle of 7th avenue . . . watching us”?

They probably saw dragonflies, said Jerry Louton, an entomologist at the National Museum of Natural History. Washington is home to some large, spectacularly adorned dragonflies that “can knock your socks off,” he said.

At the same time, he added, some details do not make sense. Three people at the D.C. event independently described a row of spheres, the size of small berries, attached along the tails of the big dragonflies — an accoutrement that Louton could not explain. And all reported seeing at least three maneuvering in unison.

“Dragonflies never fly in a pack,” he said.

Mara Verheyden-Hilliard of the Partnership for Civil Justice said her group is investigating witness reports and has filed Freedom of Information Act requests with several federal agencies. If such devices are being used to spy on political activists, she said, “it would be a significant violation of people’s civil rights.”

For many roboticists still struggling to get off the ground, however, that concern — and their technology’s potential role — seems superfluous.

“I don’t want people to get paranoid, but what can I say?” Fearing said. “Cellphone cameras are already everywhere. It’s not that much different.”

 



NASA’s Nazi Past and its plan to Militarize Space

Arsenal of Hypocrisy

http://video.google.com/videoplay?docid=-4835966027154828456&hl=en

DARPA’s iXo Artificial Intelligence Control Grid
http://video.google.com/videoplay?docid=-2301756762339435723

 



StarWars In Iraq

StarWars In Iraq
Advanced new technology was and still is being used and tested in Iraq.

Learn about acoustic weapons, “Active Denial” weapons, microwave weapons and laser weapons and other non-lethal weapons. These weapons are currently secretly being used to torture citizens who question the government in countries like Norway and Canada. They are also secretly being used in open warfare (Like the 2006 Israeli invasion of Lebanon).

 


http://www.youtube.com/watch?v=e-a255YReLY
Part 1

 


http://www.youtube.com/watch?v=e0X5KcZeZ6Q
Part 2

 


http://www.youtube.com/watch?v=EwWzxaLeKs8
Part 3

 

Darpa’s iXo Control Grid
http://video.google.com.au/videoplay?docid=-2301756762339435723



FBI Wants Its Own Stasi

FBI Wants Its Own Stasi

Steve Watson
Infowars.net
July 26, 2007

In a move startlingly similar to that of the East German government during the Cold war, the FBI wants to recruit thousands of covert informants in the US and work with the CIA to train them in an effort to expand and adopt more aggressive intelligence capabilities.

ABC’s The Blotter reports that according to a recent unclassified report to Congress, the FBI, driven by a 2004 directive from President Bush, wants to recruit more than 15,000 informants in the US, entailing a complete overhaul of its database systems at a cost of around $22 million.

The FBI expects its informants to provide secrets about possible terrorists and foreign spies, although some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants. The FBI did not respond to requests for comment on this story.

The move comes in addition to other proposals to expand the collection and analysis of data on U.S. persons , retain years’ worth of Americans’ phone records and even increase so-called “black bag” secret entry operations, the Blotter reports.

Though the FBI has decided not to completely adopt CIA training methods on recruiting informants, which include bribery, extortion, and other patently illegal acts, the two are to work closely together on the program.

Though the reasoning is, as ever, to target terror cells in the US, the report also states that “some may also be expected to aid with criminal investigations, in the tradition of law enforcement confidential informants”.

Within the last two years it has come to light that the FBI, along with the Pentagon and the NSA has been spying on antiwar activists, rights groups and peace campaigners within the US, labeling some of them as “terrorists” and placing them within their databases.

It appears operations are now to be stepped up to include the Stasi like recruiting of informants within such groups to report what is deemed to be politically subversive behavior among American citizens.

In 2004 the ACLU revealed that after the terrorist attacks of Sept. 11, 2001 sparked the Bush administration’s “war on terrorism,” Attorney General John Ashcroft scrapped an FBI guideline—enacted after the agency infiltrated numerous groups during the 1960s and 1970s Civil Rights Movement—that blocked its agents from spying on groups and individuals unless they were investigating a crime.

By scrapping that policy, Gen. Ashcroft was, “essentially encouraging FBI agents to do fishing expeditions to spy in mosques, in anti-war meetings … without any reasonable suspicion that a crime was being committed,” ACLU attorney Ben Wizner said.

In late 2005 lawmakers expressed concern that the FBI was aggressively pushing the powers of the anti-terrorist USA Patriot Act to get access to private phone and financial records of ordinary people.

Around the same time it was revealed that the Bush administration had secretly authorized the National Security Agency to eavesdrop on Americans and others inside the United States to search for evidence of terrorist activity without [obtaining] court-approved warrants.

Though this was dubbed by the corporate mainstream media to be “a major shift in American intelligence-gathering practices”, eavesdropping on citizens is nothing new, the only shift that has occurred is that the government can now TELL us that they’re spying on us and it will slowly be accepted.

If the mainstream media is to be believed, the National Security Agency engages in “some eavesdropping inside the country,” There are hundreds of sources that prove however that the intelligence services have been operating similar programs for decades.

The FBI itself has been targeting domestic groups since its inception, the most notorious example being Hoover’s COINTELPRO (Counter-Intelligence Program) which covertly spied on all manner of organizations and individuals from Dr. Martin Luther King to the National Lawyers Guild .

Operation CHAOS under the CIA highlights another example of domestic spying:

“In June 1970 Nixon met with Hoover [FBI], Helms [CIA], NSA Director Admiral Noel Gaylor, and Defense Intelligence Agency (DIA) representative Lt. Gen. Donald V. Bennett and told them he wanted a coordinated and concentrated effort against domestic dissenters,” Verne Lyon – former CIA undercover operative .

For over fifteen years, the CIA, with assistance from numerous government agencies, conducted a massive illegal domestic covert operation called Operation CHAOS. It was one of the largest and most pervasive domestic surveillance programs in the history of this country. Throughout the duration of CHAOS, the CIA spied on thousands of U.S. citizens. The CIA went to great lengths to conceal this operation from the public while every president from Eisenhower to Nixon exploited CHAOS for his own political ends.”

There are also multiple Pentagon projects in operation that involve the collection of intelligence through domestic eavesdropping. One example is the Defense Department’s Counterintelligence Field Activity (CIFA)

Consider this from William M. Arkin of the Washington Post :

“CIFA already has these authorities, has its own agents, and collects information on common American citizens under the guise of “sabotage” and “force protection” threats to the military. Since 9/11, functions that were previously intended to protect U.S. forces overseas from terrorism and protect U.S. secrets from spies have been combined in one super-intelligence function that constitutes the greatest threat to U.S. civil liberties since the domestic spying days of the 1970’s.”

“On May 2, 2003, Deputy Secretary of Defense Paul Wolfowitz signed a memorandum directing the military to collect and report “non-validated threat information” relating to U.S. military forces, installations or missions. His memorandum followed from the establishment of the Domestic Threat Working Group after 9/11, the intent of which was to create a mechanism to share low-level domestic “threat information” between the military and intelligence agencies.”

Then we have the ” Total Information Awareness ” program whereby every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.”

Shortly after the announcement of TIA, the Pentagon backtracked and told us that TIA was shutting down, but on reading the second paragraph in this article , it becomes clear that the tools are there waiting to be used. The Pentagon has since started up multiple programs all bearing exact similarities to TIA.

The Tools of TIA include “LifeLog” which is described as “a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch”. Another tool is the MATRIX database , A federally funded crime database run by multiple states at once.

Operation TIPS and similar programs were geared towards turning citizens themselves into domestic spies.

Then of course there is the joint NSA / Government Communications Head Quarters of England (GCHQ) Project Echelon . This long running operation was first exposed in the mid nineties and then again most prominently by author James Bamford in his 1999 book Body of Secrets. Bamford comments, “The cooperation between the Echelon countries is worrying. For decades, these organizations have worked closely together, monitoring communications and sharing the information gathered. Now, through Echelon, they are pooling their resources and targets, maximizing the collection and analysis of intercepted information.”

In the greatest surveillance effort ever established, the NSA global spy system captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in the world. Quite obviously they cannot listen to everyone anywhere ALL the time, but they have the capability to choose when to listen and who to listen to, wherever they may be.

James Bamford famously recalled how the NSA successfully intercepted satellite calls from Osama Bin Laden in the late nineties as he was talking to his mother.

“I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.” – Senator Frank Church, quoted in ECHELON: America’s Secret Global Surveillance Network

Under the Clinton Administration Echelon certainly turned its attention to citizens of countries everywhere and monitored millions of calls and other communications.

Echelon expert Mike Frost, who spent 20 years as a spy for the Canadian equivalent of the National Security Agency, told CBS’s “60 Minutes” that the agency was monitoring “everything from data transfers to cell phones to portable phones to baby monitors to ATMs.”

Domestic spying is nothing new, there has been at least half a century of such activity in America. However, the general public will believe that government spying on them is new, and secondly, they will just accept it because they are being told in a very unsophisticated fashion, that it is keeping them safe.

On Tuesday current Attorney General Alberto Gonzales once again gave testimony concerning the ongoing investigations into the legality of “terrorist surveillance program” and seemed to confirm that numerous domestic surveillance programs are in operation.

The fact that less than 0.01% of Homeland Security cases are related to terrorism in America begs the question why does America need an army of secret police to keep tabs on its own citizens?

Domestic government surveillance is becoming accepted as the norm. The fact remains however that you cannot have a free state that relies upon a covert network of government spies and recruited informants to maintain law and order within its own borders.