2/9/8 Information Warfare: part 2 of Fear & Terror Factory

"The internet needs to be dealt with as if it were an enemy "weapons system".
Information Operation Roadmap Part 3: "We Must Fight the Net" (see below)

"We will wage information warfare, but we will fight with infantry"
1997 US Army War College: "WE HAVE ENTERED AN AGE OF CONSTANT CONFLICT..."(see below)

n "The United States must cultivate a mental view toward world settlement after this war which will enable us to impose our own terms, amounting perhaps to a pax- americana."
U.S. Department of State - Source: Minutes S-3 of the Security Subcommittee, Advisory Committee on Postwar Foreign Policy, 6 May, 1942, Notter File, Box 77, Record Group 59, Records of the Department of State, National Archives, DC.

"It is not a matter of what is true that counts, but a matter of what is perceived to be true."
Henry Kissinger

Digest commentary:
Control of communications and information -- control of the internet -- is central to the bipartisan U.S. world war for global rule. The U.S. mainstream media is loyally silent on the scope and implications of this fundamental suppression of freedom of information, communication and organizing.
Microsoft's attempted hostile Yahoo takeover certainly represents greater concentration of corporate power and control. But, along with other internet and telecom corps. collaboration with the "war on terrorism", beyond the concentration of capital, it is an emblematic function of the "homeland's" deepening fascist state infrastructure.
Microsoft is a major 'private' partner with the U.S. govt. in deconstructing "internet 1" and rebuilding the internet architecture for "internet 2". Already underway, this is being sold incrementally and innocuously to the public as specific tech. advances, personal protection from porn, spam -- and especially dark-skinned "terrorists" lurking under every bed.

When the world's #1 terrorist state promises protection from "anti-american terrorists", remember: those "terrorists" R us, all of us around the world who expose, oppose and fightt the genocidal global domination agenda of U.S. imperialism, its proxies, allies, agents, and apologists.

The monstrous "GWOT" pretext, based on decades-long-planned 'big lies' and crimes against humanity, combines all forms of war, overt and covert, international and domestic, 'conventional' military supplemented by 'strategic non-violence': Information warfare is pivotal to its entire futile, fascist goal of "full spectrum dominance".

Secret Pentagon "Roadmap"
National Security Archive Electronic Briefing Book No. 177
For more information contact:
Kristin Adair / Thomas Blanto 202 994 7000Washington, D.C., January 26, 2006 -
A secret Pentagon "roadmap" on war propaganda, personally approved by Secretary of Defense Donald Rumsfeld in October 2003...The document calls on DoD to enhance its capabilities in five key Information Operations (IO) areas: electronic warfare (EW), PSYOP, Operations Security (OPSEC), military deception and computer network operations (CNO)....

President Clinton's secret Presidential Decision Directive (PDD-68), issued on April 30, 1999, expanded public diplomacy and public affairs operations beyond USIA and the Department of State to include all agencies and set out the objective of IPI "to synchronize the informational objectives, themes and messages that will be projected overseas . . . to prevent and mitigate crises and to influence foreign audiences in ways favorable to the achievement of U.S. foreign policy objectives."...

The "long war": Pentagon to Release 20-Year Plan
the United States is engaged in a generational conflict akin to the Cold War, the kind of struggle that might last decades to root out terrorists across the globe and battle extremists who want to rule the world [editor: no pun intended]

"We, the winners, are a minority......We live in an age of multiple truths. He who warns of the "clash of civilizations" is incontestably right.....One of the defining bifurcations of the future will be the conflict between information masters and information victims.......
Information destroys traditional jobs and traditional cultures; it seduces, betrays, yet remains invulnerable. How can you counterattack the information others have turned upon you? There is no effective option other than competitive performance. For those individuals and cultures that cannot join or compete with our information empire, there is only inevitable failure (of note, the internet is to the techno-capable disaffected what the United Nations is to marginal states: it offers the illusion of empowerment and community) ... The next century will indeed be American, but it will also be troubled. We will find ourselves in constant conflict, much of it violent. The United States Army is going to add a lot of battle streamers to its flag. We will wage information warfare, but we will fight with infantry. And we will always surprise those critics, domestic and foreign, who predict our decline..." [...]

P20G: Into the Dark: The Pentagon Plan to Foment Terrorism
From the Moscow Times, Nov. 1, 2002.
Darkness Visible: The Pentagon Plan to Foment Terrorism is Now in Operation (2005)
From the Moscow Times, Jan. 25, 2005. This is the follow-up to "Into the Dark."

Israeli Professor Says Terrorist groups active on the Internet
There are hundreds of sites on the Internet serving terrorist groups and their supporters, according to a study done by the * US Institute of Peace (USIP). The study undertaken by Gabriel Weimann, a professor at the Haifa University in Israel and currently a senior fellow at USIP, writes that today all active terrorist groups have established their presence on the Internet.....
Prof. Weimann points out that by its very nature, the Internet is an ideal arena for activity by terrorist organisations since it offers easy access, little or no regulation, censorship or government control, potentially huge audiences around the world, anonymity of communication, fast flow of information, inexpensive development and maintenance of web presence, a multimedia environment and the ability to shape coverage in the traditional mass media which increasingly uses the Internet as a source for news stories.A survey undertaken for the study showed that the Internet is used by groups of all description and persuasions, from Marxist to Islamist to racist to anarchist. [...]

Army's information technology strategic plan
Army CIO/G-6 Campaign Plan, 2008-2015
Published October 2007
Normally released as 500-day plans, this version of the Army's information technology strategic plan discusses future goals for 2008-2015.
The document's introduction stated, "Our Army faces an ever-changing and evolving enemy and we must be able to respond rapidly to defeat emerging threats. The current operating environment and projections of persistent conflict dictate the need to rapidly develop capabilities for both the current and future forces. Further, the rapid pace of Information Technology (IT) change will create opportunities necessitating transformation of our development and procurement process to exploit these opportunities and effectively integrate them into the force. This transformation must include the ways and means to identify and mitigate risks associated with procurement and acquisition in the global IT market space.
The Global Information Grid (GIG) is the Department of Defense's approach to information and decision superiority- a key to the National Military Strategy for continued information dominance. This decision superiority is based on shared information across the Army and with Joint, Interagency, and Multi-National coalitions and allies. LandWarNet is the Army's portion of the GIG and; therefore, key to Army's decision superiority. LandWarNet has been described as the Army's Battle Command and GIG-derived, orders-based, capabilities focused system of systems, train as you fight, and enhanced orders process. LandWarNet enables information-based Joint, Interagency, multi-national, civil defense, Warfighting and support operations, regardless of Joint Operational Phase, operational urgency, or the battlespace circumstances of its authorized users."

"The Cornerstones of Information Warfare"
According to [this] U.S. Air Force document, by Ronald Fogleman (General, USAF), then Chief of Staff, and Sheila E. Widnall, Secretary of the Air Force: "Information Warfare: any action to deny, exploit, corrupt, or destroy the enemy's information and its functions; protecting ourselves against those actions; and exploiting our own military information function. "This definition is the basis for the following assertions:
"Information warfare is any attack against an information function, regardless of the means. Bombing a telephone switching facility is information warfare. So is destroying the switching facility's software.
"Information warfare is any action to protect our information functions, regardless of the means. Hardening and defending the switching facility against air attack is information warfare. So is using an anti-virus program to protect the facility's software.
"Information warfare is a means, not an end, in precisely the same manner that air warfare is a means, not an end. We may use information warfare as a means to conduct strategic attack and interdiction, for example, just as we may use air warfare to conduct strategic attack and interdiction."

What Comprises Information Warfare?
"Recalling the definition, information warfare consists of activities that deny, exploit, corrupt, destroy, or protect information. Traditional means of conducting information warfare include psychological operations, electronic warfare, military deception, physical attack, and various security measures.
Psychological Operations use information to affect the enemy's reasoning.
Electronic Warfare denies accurate information to the enemy.
Military Deception misleads the enemy about our capabilities or intentions.
Physical Destruction can do information warfare by affecting information system elements through the conversion of stored energy to destructive power. The means of physical attack range from conventional bombs to electromagnetic pulse weapons.
Security Measures seek to keep the adversary from learning about our military capabilities and intentions."
"The Pentagon's long-range thinker, Andrew Marshall, made a rare public appearance Thursday to discuss the future of warfare...."

Full Spectrum Information Warfare Without Limits
Brent Jessop

Information Operation Roadmap Part 1: What Are Information Operations?
When the US military refers to full spectrum domination, they truly mean full spectrum. Information operations or information warfare is a key part of the military battlespace. Recently, a document entitled Information Operation Roadmap was declassified by the Pentagon because of a Freedom of Information Act request by the National Security Archive at George Washington University....

What Are Information Operations?
This document defined information operations as follows: "The integrated employment of the core capabilities of Electronic Warfare, Computer Network Operations, Psychological Operations, Military Deception and Operations Security, in concert with specified supporting and related capabilities, to influence, disrupt, corrupt or usurp adversarial human and automated decisions-making while protecting our own." - 22
The following series of articles will examine the Pentagon's intention of gaining full spectrum dominance in information warfare. Including, dominating the electro-magnetic spectrum and fighting the internet. Also on the use of psychological operations or PSYOP as defined by the Information Operation Roadmap...

Information Operation Roadmap Part 2: Maximum Control of the Entire Electro-Magnetic Spectrum

Information Operation Roadmap Part 3: "We Must Fight the Net"
The 2003 Pentagon document entitled the Information Operation Roadmap was released after a Freedom of Information Request by the National Security Archive at George Washington University in 2006...

Fighting the Net
"We Must Fight the Net. DoD [Department of Defense] is building an information-centric force. Networks are increasingly the operational center of gravity, and the Department must be prepared to "fight the net." " - p.6
"DoD's "Defense in Depth" strategy should operate on the premise that the Department will "fight the net" as it would a weapons system." - p.13...
"Control of space and cyberspace. Much as control of the high seas - and the protection of international commerce - defined global powers in the past, so will control of the new "international commons" be a key to world power in the future. An America incapable of protecting its interests or that of its allies in space or the "infosphere" will find it difficult to exert global political leadership."-p. 51
"Although it may take several decades for the process of transformation to unfold, in time, the art of warfare on air, land, and sea will be vastly different than it is today, and "combat" likely will take place in new dimensions: in space, "cyber-space," and perhaps the world of microbes." - p.60

Internet 2
Part of the Information Operation Roadmap's plans for the internet are to "ensure the graceful degradation of the network rather than its collapse." p.45...

Information Operation Roadmap Part 4: Information Warfare Using Aggressive Psychological Operations

Information Operation Roadmap Part 5: Information Warfare Without Limits

Spychief Wants to Tap Into Cyberspace:
Spychief Mike McConnell is drafting a plan to protect America’s cyberspace that will raise privacy issues and make the current debate over surveillance law look like “a walk in the park

Marching into Cyberspace
Greg Bruno
When Rear Admiral Mark Fox kicked off the Defense Department’s first briefing for online journalists in February 2007, he made no secret of his views on traditional media (PDF)... “I appreciate how bloggers allow [us] to get our message through the media filter directly to the American people.” ...The Pentagon’s Bloggers Roundtable, which dates to February 2007, offers a new twist to Internet outreach: it links military commanders with bloggers to discuss current events and posts briefing transcripts online. Other new government blogs include the Homeland Security Leadership Journal and GovGab, a U.S. General Services Administration site filled with tips on good living. The blog that has caused the biggest stir, however, is arguably the U.S. State Department’s Dipnote. Inaugurated in September, it features observations from department employees and encourages readers to comment on U.S. foreign policy. Sample of candid comments[...]

Your Govt. Cares, Listens and Watches Over You Around the Clock, Everywhere
“...laying the bricks one at a time for a police state...”
Domestic Spying, Inc.
Tim Shorrock
A new U.S. intelligence institution will allow government spy agencies to [digest note: legally] conduct broad surveillance and reconnaissance inside the country for the first time. Contractors like Boeing, BAE Systems, Harris Corporation, L-3 Communications and Science Applications International Corporation are already lining up for possible work...The plan for the NAO builds on a domestic security infrastructure that has been in place for at least seven years... intelligence and reconnaissance agencies that were historically confined to spying on foreign countries have been used extensively on the home front since 2001.... In addition to the powerful mapping and signals tools provided by the NGA and the NSA, domestic agencies will also have access to measures and signatures intelligence (MASINT) managed by the Defense Intelligence Agency (DIA), the principal spying agency used by the secretary of defense and the Joint Chiefs of Staff. ... a software package called SOCET GXP uses Google Earth software as a basis for creating three-dimensional maps that U.S. commanders and soldiers use to conduct intelligence and reconnaissance missions. Eric Bruce, one of the BAE employees back from the Middle East, said his team trained U.S. forces to use the GXP software “to study routes for known terrorist sites” ... Another new BAE tool displayed in San Antonio was a program called GOSHAWK, which stands for “Geospatial Operations for a Secure Homeland – Awareness, Workflow, Knowledge.” It was pitched by BAE as a tool to help law enforcement and state and local emergency agencies prepare for, and respond to, “natural disasters and terrorist and criminal incidents.”... BAE was broadcasting that it is not simply a contractor for agencies involved in foreign intelligence, but has an active presence as a supplier to domestic security agencies, a category that includes the Department of Homeland Security (DHS), the FBI as well as local and state police forces stretching from Maine to Hawaii....“To ensure freedom in the world, the United States continues to address the challenges introduced by terrorism,” a Boeing handout said. Its new software, the company said, will allow information to be “shared efficiently and uninterrupted across intelligence agencies, first responders, military and world allies.”...
The NGA was also used extensively during Hurricane Katrina , when the agency provided overhead imagery -- some of it supplied by U-2 photoreconnaissance aircraft -- to federal and state rescue operations. The data, which included mapping of flooded areas in Louisiana and Mississippi, allowed residents of the stricken areas to see the extent of damage to their homes and helped first-responders locate contaminated areas as well as schools, churches and hospitals that might be used in the rescue.... In every situation that the NGA is used domestically, it must receive a formal request from a lead domestic agency, according to agency spokesperson David Burpee. That agency is usually FEMA, a unit of DHS.

"...the battle is really about something much bigger"...fascist capitalist state - industry merger
Wider Spying Fuels Aid Plan for Telecom Industry
The United States intelligence agencies in cahoots with major telecom providers are intercepting and reviewing your communications. This is occurring without warrants. For months, the Bush administration has waged a high-profile campaign, including personal lobbying by President Bush and closed-door briefings by top officials, to persuade Congress to pass legislation protecting companies from lawsuits for aiding the National Security Agency’s warrantless eavesdropping program. But the battle is really about something much bigger. At stake is the federal government’s extensive but uneasy partnership with industry to conduct a wide range of secret surveillance operations in fighting terrorism and crime[SIC] . The N.S.A.’s reliance on telecommunications companies is broader and deeper than ever before, according to government and industry officials, yet that alliance is strained by legal worries and the fear of public exposure. “The intelligence community cannot go it alone,” Mike McConnell, the director of national intelligence, wrote in a New York Times Op-Ed article Monday urging Congress to pass the immunity provision. “Those in the private sector who stand by us in times of national security emergencies deserve thanks, not lawsuits.” Attorney General Michael B. Mukasey echoed that theme in an op-ed article of his own in The Los Angeles Times on Wednesday, saying private companies would be reluctant to provide their “full-hearted help” if they were not given legal protections. The government’s dependence on the phone industry, driven by the changes in technology and the Bush administration’s desire to expand surveillance capabilities inside the United States, has grown significantly since the Sept. 11 attacks. The N.S.A., though, wanted to extend its reach even earlier. In December 2000, agency officials wrote a transition report to the incoming Bush administration, saying the agency must become a “powerful, permanent presence” on the commercial communications network, a goal that they acknowledged would raise legal and privacy issues....

“Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.”
Social Repression and Internet Surveillance
H. Res. 1695, 1955 & S.1959
By Nikki Alexander
...Jane Harman (D-CA) sponsored H.Res.1955 her partner, Dave Reichert (R-WA), authored the original bill, H.Res.1695....establishes a National Commission and Center of so-called “Excellence” to censor and crush social concerns which are subjectively perceived to be “threats” by RAND spokesmen, who supplied the content for this bill. RAND coined the folksy epithets “homegrown terrorism,” “violent radicalization” and “ideologically based violence” to invalidate expressions of social conscience that conflict with corporate interests... it characterizes individuals who care deeply about international human rights, national sovereignty and ecological protection as “homegrown terrorists” who have been “violently radicalized” by “extremist belief systems.” This bill quotes RAND ideology verbatim.
The Internet... is being systematically strangled by surveillance devices that police the flow of information; filtering web servers, search engines, web sites, email content and keystrokes...The Open Net Initiative reports, “With respect to online surveillance, the United States may be among the most aggressive states in the world in terms of listening to online conversations.” ...

Packaged as a pretext for “preventing terrorism”, the authors of this bill claim that, “The Internet has aided in facilitating violent radicalization, ideologically based violence, and the homegrown terrorism process in the United States by providing access to broad and constant streams of terrorist-related propaganda to United States citizens.”..
The Baltimore Sun reported In November that George Bush requested $154 million in preliminary funding to “prevent cyberspace attacks”...expected to become a seven-year, multibillion-dollar program to “track threats” in cyberspace on both government and private networks... These Government crimes would be permanently institutionalized through the National Security Agency CAEIAE program, the Center of so-called “Excellence” designated by this bill... What Harman describes as “vertical information sharing from the Intelligence Community to the local level and from local sources to State and Federal agencies” is equivalent to The Third Reich’s Ministry for Popular Enlightenment and Propaganda which terrorized German citizens from Party Headquarters through a chain of command that reached all the way down into local communities. With modern telecommunications technology this terror campaign of “intelligence sharing” will persecute citizens in the privacy of their homes, monitoring their online conversations and reporting dissidents to the Gestapo... Inventing a special “Civil Rights and Civil Liberties Officer” embedded in this unlawful operation to create rules for handling the Constitutional rights of US citizens should raise a red flag....Assigning one individual to tailor those rules to an illegal Cointelpro operation...

Masquerading as an “academic” assembly, the political appointees to this Commission will have “relevant expertise” in Information Technology, Juvenile Justice, Corrections, Counterterrorism, Intelligence and Local Law Enforcement. All members of the group will be endowed with sweeping investigative powers and unlimited access to classified files in all branches of government ~ A McCarthy Inquisition with a mandate to hold hearings, administer oaths, take testimony and propose “initiatives to intercede” in the so-called “radicalization process,” a RAND euphemism for crushing social dissent.... The bill requires only that the Commission produce a public “version” of its findings before disbanding, permitting secret versions to permanently remain at the Center of so-called “Excellence” as a catalyst for Government abuse by Federal, State and local law enforcement agents trained to believe that their targets deserve persecution...
RAND spokesman, Brian Jenkins whose personal ideology is fully incorporated into this bill said to Jane Harman’s Committee: “Unless a way of intervening in the radicalization process can be found, we are condemned to stepping on cockroaches one at a time.” ... the precise terminology used by Nazis to justify exterminating Jews.

US warrantless wiretapping since 1990s predates 9/11
By John Leyden
12/19/07 "The Register" -- - Fresh evidence has emerged that the US government's warrantless wiretapping program predates the 9/11 terrorist attacks.
Secret surveillance operations that enabled the National Security Agency (NSA) to access telecommunications traffic data have been in place since the 1990s....
Negotiations between the NSA and AT&T in February 2001 allegedly involved replicating a New Jersey network centre to allow the US signals intelligence "access to all the global phone and email traffic that ran through it". The incident has become one aspect of a lawsuit which also brings in allegations that Verizon set up a dedicated fibre-optic line from New Jersey to a large military facility in Quantico. An AT&T technician at the time has provided evidence supporting the allegations. However, other AT&T technicians are due to testify that the project was confined to improving internal communications within the NSA. News that the NSA eavesdropped on the international communications of terrorism suspects making calls from the US without warrants first emerged two years ago. The latest revelations that this was a development of a much longer running practice that also involved US domestic calls come as the Bush administration is pushing Congress to pass legislation indemnifying telecoms carriers from liability in assisting law enforcement with warrantless eavesdropping programs. Since 2005, the warrantless wiretapping program has become the topic of 40 lawsuits. ®

Big Brother Really Is Watching:
Homeland Security is bankrolling futuristic profiling technology to nab terrorists before they strike.

Top Intel official: Change your definition of privacy
As Congress debates new rules for government eavesdropping, a top intelligence official says it is time that people in the United States changed their definition of privacy. Privacy no longer can mean anonymity, says Donald Kerr, the principal deputy director of national intelligence. Instead, it should mean that government and businesses properly safeguard people's private communications and financial information. [...]

"We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electronically control the brain. Someday armies and generals will be controlled by electric stimulation of the brain."
Dr José Delgado. Director of Neuropsychiatry, Yale University Medical School Congressional Record, No. 26, Vol. 118 February 24, 1974.

chemical lobotomies
Pentagon, Big Pharma: Drug Troops to Numb Them to Horrors of War
By Penny Coleman, widow of Iraq vet who committed suicide
In June, the Department of Defense Task Force on Mental Health acknowledged "daunting and growing" psychological problems among our troops: Nearly 40 percent of soldiers, a third of Marines and half of National Guard members are presenting with serious mental health issues. They also reported "fundamental weaknesses" in the U.S. military's approach to psychological health. That report was followed in August by the Army Suicide Event Report (ASER), which reported that 2006 saw the highest rate of military suicides in 26 years. And last month, CBS News reported that, based on its own extensive research, over 6,250 American veterans took their own lives in 2005 alone -- that works out to a little more than 17 suicides every day...On Dec. 12, Rep. Bob Filner, D-Calif., chairman of the House Veterans Affairs Committee, called a hearing on "Stopping Suicides: Mental Health Challenges Within the Department of Veterans Affairs."... But I find myself extremely anxious in the face of some of these new suggestions, specifically what is being called the Psychological Kevlar Act of 2007 and use of the drug propranalol to treat the symptoms of posttraumatic stress injuries. Though both, at least in theory, sound entirely reasonable, even desirable, in the wrong hands, under the wrong leadership, they could make the sci-fi fantasies of Blade Runner seem prescient.
The Psychological Kevlar Act "directs the secretary of defense to develop and implement a plan to incorporate preventive and early-intervention measures, practices or procedures that reduce the likelihood that personnel in combat will develop post-traumatic stress disorder (PTSD) or other stress-related psychopathologies, including substance use conditions. (Kevlar, a DuPont fiber, is an essential component of U.S. military helmets and bullet-proof vests advertised to be "five times stronger than steel.") The stated purpose of this legislation is to make American soldiers less vulnerable to the combat stressors that so often result in psychic injuries...

without chemical lobotomies, just amerikan values
Iraq: "We are trained killers" 4 Minute Video

Dead Souls: The Pentagon Plan to Create Remorseless "Warfighters"
Chris Floyd , Empire Burlesque

"To make a contented slave it is necessary to make a thoughtless one. It is necessary to darken the moral and mental vision and, as far as possible, to annihilate the power of reason."
Fredrick Douglass

The uses of narcissistic myopia: "Social Networking" & U.S. "Strategic Non-Violence" warfare
Economic Forum moves to YouTube
Climate change topped the agenda as well as pursuing a workable peace process in the Middle East and how technology is ushering in a new age of social networking that knows no border
Interest has been strong, with more than 1 million hits registered on the YouTube site and hundreds of video replies. And as forum attendees - CEOs, academics or even astronauts - walk by, they are stopping to record quick messages or reply to questions left on the Web site.
Besides Spellings, they include Henry Kissinger and Rajendra Pachauri, the chief U.N. climate scientist who is chairman of the Intergovernmental Panel on Climate Change. Plus at least one attendee who is no stranger to multimedia or video. "Hello! My name is Bono. I'm a rock star ... sort of!" the U2 singer said. "In 2008, if we're able to get anywhere on the fight against extreme poverty or the climate crisis, we have to prove that we can keep the promises that we've already made."
Ed Sanders, who oversees international product marketing for YouTube in Europe, the Middle East and Africa, called the set-up a "tremendous means to get interaction going and to give people a voice... "It's something we want to do long term."..."That's their world and that's how you can communicate with them," she told The Associated Press. "It's through a medium like YouTube and blogs and those sorts of things."
Davos Question: http://youtube.com/user/thedavosquestion

The DNI Open Source Center, which gathers, translates, analyzes, and distributes unclassified open source intelligence from around the world, is steadily growing in capability and impact, according to Doug Naquin, the Center's Director.The Open Source Center, which replaced the CIA's Foreign Broadcast Information Service, is doing more analysis and outreach than it predecessor and is also exploring new media, said Mr. Naquin in a
recent speech. "We're looking now at YouTube, which carries some unique and honest-to-goodness intelligence," he said. "We have groups looking at what they call 'Citizens Media': people taking pictures with their cell phones and posting them on the Internet. Then there's Social Media, phenomena like MySpace and blogs.... A couple years back we identified Iranian blogs as a phenomenon worthy of more attention, about six months ahead of anybod else."...
Naquin addressed the Central Intelligence Retirees' Association October 3, 2007. The text of his remarks is athttp://www.fas.org/irp/eprint/naquin.pdf

GOOGLE: What Lurks in Its Soul?
...Google is compiling a genetic and biological database using the vast power of its search engines; scanning millions of books without traditional regard for copyright laws; tracing online searches to individual Internet users and storing them indefinitely; demanding cell phone numbers in exchange for free e-mail accounts (known as Gmail) as it begins to build the first global cell phone directory; saving Gmails forever on its own servers, making them a tempting target for law enforcement...
Google... has grander plans. The company is quietly working with maverick biologist Craig Venter and others on groundbreaking genetic and biological research. Google's immense capacity and turbo-charged search technology, it turns out, appears to be an ideal match for the large amount of data contained in the human genome... [...]

Wikileaks busts Gitmo propaganda team
The US detention facility at Guantanamo Bay has been caught conducting covert propaganda attacks on the internet. The attacks, exposed by government transparency group Wikileaks, include deleting detainees' ID numbers from Wikipedia, the systematic posting of unattributed "self praise" comments on news organization web sites in response to negative press, boosting pro-Guantanamo stories on the internet news site Digg and even modifying Fidel Castro's encyclopedia article to describe the Cuban president as "an admitted transexual" [sic]. Among the un- or mis-attributed responses to news stories were statements such as "[Guantanamo is] a very professional place full of true American patriots." and comments playing down the impact of leaked documents which among other matters mandated all Guantanamo detainees to have no contact with the Red Cross for at least the first 2-4 weeks after their arrival: "interesting document but not at all relevant today as much of this has changed over the years." ..


"to prevent the use of WMD"...
Pre-Emptive Nuclear Strike by the West a Key Option, NATO Told
By Ian Traynor
Calling for root-and-branch reform of NATO and a new pact drawing the US, NATO and the European Union together in a "grand strategy" to tackle the challenges of an increasingly brutal world, the former armed forces chiefs from the US, Britain, Germany, France and the Netherlands insist that a "first strike" nuclear option remains an "indispensable instrument"...The five commanders argue that the west’s values and way of life are under threat, but the west is struggling to summon the will to defend them.

Wolfowitz picked for arms control panel
The AP
WASHINGTON -- The State Department will name former World Bank chief Paul Wolfowitz to head a high-level advisory panel on arms control and disarmament...The move by Secretary of State Condoleezza Rice marks a return to government for Wolfowitz, a conservative with close ties to the White House. Wolfowitz was replaced as World Bank chief in June after a stormy-two-year tenure.

New Weight in Army Manual on Stabilization
The manual describes the United States as facing an era of “persistent conflict” in which the American military will often operate among civilians in countries where local institutions are fragile and efforts to win over a wary population are vital. Lt. Gen. William B. Caldwell IV, the commander of the Army’s Combined Arms Center at Fort Leavenworth in Kansas, began briefing lawmakers on the document on Thursday. In an interview, he called it a “blueprint to operate over the next 10 to 15 years.”
“Army doctrine now equally weights tasks dealing with the population — stability or civil support — with those related to offensive and defensive operations,” the manual states. “Winning battles and engagements is important but alone is not sufficient. Shaping the civil situation is just as important to success.” In both Iraq and Afghanistan, the military is enmeshed in rebuilding local institutions, helping to restore essential services and safeguarding a vulnerable population. The new manual is an attempt to put these endeavors — along with counterinsurgency warfare — at the core of military training, planning and operations....“The most important tasks we are doing in Iraq and Afghanistan are building host-nation institutions, including security forces and governance.....

one example of how psyops works...24/7
Iran Attacks US Fifth Fleet! American Casualties Reported?
It is amazing what can be done in a 90-second "news segment." In just 90 seconds, we learn that five small Iranian speedboats have "harassed" and "threatened" a Navy frigate and two Navy destroyers – telling these monstrous military vessels they are about to explode! Explode? All three warships? Before we can say, "That's preposterous!" the segment quickly cuts to footage of small craft moving around the wounded USS Cole, just after the attack in 2000. Then the segment cuts back to a grim-faced admiral as he tells the American people that: " It is important to remember that we have been attacked by small high-speed boats. We have suffered casualties. And we take this deadly seriously."
So far as the viewer is concerned, the downing of the Iranian plane, the attack on the Cole, and Monday's "dangerous showdown" all take place within the first 58 seconds of this 90 second clip. Such is the "magic" of television....
And such are the "dark arts" of psychology... the dark art of classical conditioning. Which is much in evidence here. Even down to the timing. In keeping with best practice, the speedboat "incident," the airliner "accident," and the footage of the wounded Cole all take place in less than 60 seconds. Which, from a neuropsychological standpoint, is the precise amount of time required to forge the strongest possible synaptic link between these three visual events.... what we think about these experiences really does not alter their visceral effect upon us.
Psychologists call this process "seeding" the unconscious...This altogether unbelievable "incident" of five small Iranian speedboats threatening to "explode" three mighty American warships, bristling with cannons and missiles, bears an eerie similarity to the "false flag" Tonkin Gulf "incident" that Johnson used as a pretext to launch the Vietnam War in 1964, as summarized in this short YouTube video.

Hoover Planned Mass Jailing in 1950
A declassified document shows J. Edgar Hoover had a plan to suspend habeas corpus and imprison 12,000 Americans he suspected of disloyalty.... Habeas corpus, the right to seek relief from illegal detention, has been a fundamental principle of law for seven centuries. The Bush administration’s decision to hold suspects for years at Guantánamo Bay, Cuba, has made habeas corpus a contentious issue today... Hoover’s plan called for “the permanent detention” of roughly 12,000 suspects at military bases as well as in federal prisons... prisoners eventually would have had a right to a hearing under the Hoover plan. The hearing board would have been a panel made up of one judge and two citizens. But the hearings “will not be bound by the rules of evidence” ... Hoover sent his plan to the White House on July 7, 1950, 12 days after the Korean War began. It envisioned putting suspect Americans in military prisons. The only modern precedent for Hoover’s plan was the Palmer Raids of 1920, named after the attorney general at the time. The raids, executed in large part by Hoover’s intelligence division, swept up thousands of people suspected of being communists and radicals.
Previously declassified documents show that the F.B.I.’s “security index” of suspect Americans predated the cold war. In March 1946, Hoover sought the authority to detain Americans “who might be dangerous” if the United States went to war. In August 1948, Attorney General Tom Clark gave the F.B.I. the power to make a master list of such people....
In September 1950, Congress passed and the president signed a law authorizing the detention of “dangerous radicals” if the president declared a national emergency. Truman did declare such an emergency in December 1950, after China entered the Korean War. But no known evidence suggests he or any other president approved any part of Hoover’s proposal.


“People who shut their eyes to reality simply invite their own destruction, and anyone who insists on remaining in a state of innocence long after that innocence is dead turns himself into a monster.”
James Baldwin Biography


Manufacturing Threats: Sudan, Iran, And 'The War For Civilisation'
By David Edwards
12/26/07 Media Lens
News that British schoolteacher Gillian Gibbons had been jailed in Sudan after allowing her pupils to call a teddy bear Mohammed fed straight into the UK media’s hate factory and its “war for civilisation”. The Gibbons story was mentioned in a massive 257 articles in UK national newspapers in the first week, providing an excuse to boost claims of “genocide” in Sudan in 10 of these.... Whereas, over the last year, the term “genocide” has been used in 246 articles mentioning Sudan - many of these affirming that genocide has taken place - the results of the US-UK invasion of Iraq, and of the earlier sanctions regime, are essentially never described in similar terms.. The elusive but key truth is that mainstream politics and media have an astonishing capacity to make certain issues seem particularly real and important while consigning others to oblivion. To criticise the actions of the Iranian state, for example, is to have a voice - our words are likely to matter, they may well be heard; they can lead to discussion and even action. To criticise the actions of a government of marginal media interest is to be a voice in the wilderness - we might as well be muttering to ourselves in the bath. The temptation for a professional journalist is to be 'relevant', to accept mainstream parameters of debate, and to ignore the costs of his or her actions. By late 2002, establishment propaganda had made the need to take action to deal with Saddam Hussein’s regime seem real, urgent and important ... and so while the media continue to capitalise on any excuse to promote a “clash of civilisations” between the West and “militant Islam”, it remains a remarkable fact that the ‘threats’ faced are mostly invented. Much of the actual violence against the West has been, and will continue to be, in retaliation for grave Western crimes in Iraq, Afghanistan, Palestine and elsewhere consuming literally millions of lives.

Inherent Powers, Ignoble History Make New Idea Anything But Innocuous
by Peter Erlinder
At the beginning of the last century American philosopher George Santayana famously observed: “Those who can’t remember the past are condemned to repeat it.” The U.S. House recently confirmed Santayana’s warning about the danger of repeating the history...
Under media radar, the Democrat-sponsored “Prevention of Violent Radicalism and Homegrown Terrorism” bill (H.R. 1955) passed the House at the end of October by a vote of 404 (including the entire Minnesota delegation) to 6. The bill was tagged as non-controversial by the House leadership and is pending before the Senate.... According to the bill, “homegrown terrorists” can be anyone who “… intimidate(s) or coerce(s) the United States government, the civilian population … or any segment thereof, in furtherance of political or social belief,” a definition broad enough to include Americans who organize mass marches on Washington to “coerce” changes in government policy. The bill defines “violent radicals” as Americans who “…promot(e) extremist belief system(s) for the purpose of facilitating ideologically based violence to advance political, religious or social change…” - in other words, Americans who have not yet done anything illegal but who, commissioners believe, have thoughts that might lead to violence...
For at least 18 months this “Homegrown-Terrorism and Extremist Belief Commission” will be required to hold congressional hearings around the country, to uncover Americans with “political, religious or social” concerns who commissioners think might be “extreme” and/or potentially violent, whether any of these Americans has committed a crime or not. Virtually any politically, socially or religiously active person or group could be targeted by the commission to find out who is, and who is not, one of the “hidden enemy” among us. Witnesses who refuse to testify can expect to be held in “contempt of Congress,” ... Witnesses who do testify but say things that commissioners or their staff think are not true can be charged with perjury, or lying to a federal official... Either way, noncooperative witnesses can face up to a 10-year sentence.
Members of suspect political, religious and social groups, or Americans who might even know people the commission suspects...can expect the “commissioners” will want to know … “are you now, or have you ever been … associated with extremists, violent radicals or homegrown terrorists?”
For those who do remember history, this should sound uncomfortably familiar. These are the kinds of questions Americans were compelled to answer when testifying before another “legislative commission” during the anti-communist McCarthy-era witch-hunts.
In 1938, the House set up the House Un-American Activities Committee (HUAC) to find the dangerous Americans among us, which provided the model for Sen. Joe McCarthy’s ideological purges based on accusation and innuendo. But HUAC lasted long after McCarthy passed from the scene, and it was busily investigating anti-Vietnam War and civil rights activists when it was disbanded ... in 1975...If this “Son of HUAC” becomes law, any political, religious or social activist is fair game for HUAC-like congressional hearings...and will have to be prepared to answer the famous question … “are you now, or have you ever been…?” And also be prepared to face jail for refusing to answer, or for getting the answer “wrong.”...
Peter Erlinder, past president of the National Lawyers Guild, is a professor of constitutional criminal law at William Mitchell College of Law in St. Paul. His e-mail address is peter.erlinder@wmitchell.edu.

Manifestations of Intent
By Manuel Valenzuela
If you are not angered, indeed enraged, by the current state of the United States, then you have not been paying attention, or you just do not care enough about the future your children will inherit, and have to live in....the government, with the help of the corporate media, has terrorized the citizenry in an open and continuous act of psychological warfare... the government, along with the Ministry of Truth has instilled fear and insecurity into the population. It is they who, under any definition of terrorism, have become our terrorists, our real enemy, our internal bogeyman. Fear mongering has never been so easy and, when the collective trauma of 9/11 wears off, all that is needed to reinvigorate the senses of the masses are lies of further attack, more dehumanization of the 'enemy', propaganda of imminent threat and insecurity and, if all else fails, one more false flag event.