Inside Top Secret America: Dear Sheeple, We Are With the Government and We Are Here to Help
So this is actually a really great interactive tool of doom I stumbled across last year where you can take a look at the alphabet soup of doom facilities around you on a map or you can see what “openly secret” contractors are officially working under what branch of asshole we have running this drunken sailor ship we call America. Below is an interesting interview by Coleen Rowley with Democracy Now and one of the guys from the Washington Post who did the report. Or you can just jump right into the website. Anyone can navigate it. Just type your zip code or city and adjust the layers on the left according to what you want to see on the map. Look at the legend across the bottom of the map that shows how many spooky agencies are in your state. CLICK ON YOUR STATE for details of how much creepy crap is going on. Investigate your nearest “Fusion” Center. I provided a few screenshots so you can see some of the goodies on the site and the solid example of our American police state with the Secret California overview.
Disclaimer…don’t freak out when you find out that these places are operating right in your backyard. Remember…this is all for your own good in case of emergency so this has all been going on our in plain sight for many years. The reason I am posting this is so you can get an idea of the tangled web we are up against and what is going on in your particular area. This should be a starting point to research the “emergency staging” locations that affect you and your family. Last night I learned that my county nuclear evac site for our local nuclear plant on the ocean/fault line is the fairground in MY TOWN…maybe a mile from my house. Wonderful. Anyway…check it out. Take it in and do what you want with it. I prefer to prepare a little bit for everything I can since you can never really prepare for everything so knowing where these facilities around you will be useful when the SHTF.
As a wise sugar momma once told me about the DOOM…Get in. Do recon. And GET OUT. Educate. Accept. Adapt. Prepare!
California ranks first of 50 states in the number of domestically focused counterterrorism and homeland security organizations, and second overall in organizations established or newly involved in counterterrorism since 9/11. In dollar amount, the state ranked third in fiscal 2009 in federal homeland security spending and first in domestic preparedness and antiterrorism programs. Measured per capita, the state ranked 36th in overall federal government expenditures.
U.S. intelligence and homeland security agencies and the Department of Justice measure the potential terrorist threat to California by analyzing data, including the following: • California had 28 terrorism-related convictions from Sept. 11, 2001, through March 2010, according to the Justice Department, and ranks sixth in the nation in numbers of convictions. • The state has eight of the 64 urban metropolitan areas that have been designated by the federal government as "high-threat, high-density" with regard to acts of terrorism: Los Angeles/Long Beach, the San Francisco Bay Area, Riverside, Sacramento, San Diego, Anaheim/Santa Ana, the Oxnard area and Bakersfield. • Three major terrorist plots have been thwarted relating to California since 9/11: The Hayat plot in San Diego in 2005, the Kevin James plot in Los Angeles in 2005 and the liquid explosives plot relating to airliners flying to Washington, New York and Los Angeles in 2006. • On July 4, 2002, Egyptian national Hesham Mohamed Hadayet shot and killed two people and wounded four others at Los Angeles International Airport’s El Al ticket counter before he was fatally shot by an airline security guard. • California is one of five states with nation's largest immigrant populations, a measure that the Department of Homeland Security and the FBI associate with potential threats. In 2009, according to the DHS, California ranked first of all states with unauthorized immigrant population, with an estimated 2.6 million unauthorized immigrants. • The intelligence community also ranks California in the top 10 states with the largest Muslim populations, a measure that it applies to the threat of homegrown terrorists. • California ranks second (after Texas) in the number of "special interest aliens" who cross the southern border into the United States. According to U.S. intelligence agencies, they come from Lebanon, Iran and Somalia.
The Mexican border of California is a major corridor for both illegal immigration and drug-trafficking. Two of the three busiest land ports of entry on the Southwest border are located here. The San Ysidro Port of Entry, 15 miles south of downtown San Diego, is the busiest land border crossing in the world, receiving more than 40 million persons and 17 million vehicles annually. According to NORTHCOM intelligence, 35 tunnels have been discovered crossing the Mexico border into California since 1990.
California's homeland security apparatus largely predates 9/11. To coordinate counterterrorism for the 1984 Los Angeles Summer Olympic Games, the FBI initiated a working group with the Los Angeles Police Department and the L.A. County Sheriff's Department. This led to the formation of the Los Angeles Joint Terrorism Task Force (JTTF) in 1986. A Terrorism Early Warning Group (TEWG) was established in 1996, and by 9/11, federal and state counterterrorism authorities were operating from a loose-knit network of TEWGs and JTTFs.
Within weeks of 9/11, the state-level California Anti-Terrorism Information Center (CATIC) was activated and focused on counterterrorism. Today, California's network of intelligence fusion centers has grown to seven, the most of any state in the nation. California piloted the Terrorism Liaison Officer (TLO) program in 2002, a statewide effort today that involves hundreds of law enforcement officers, firefighters, and emergency medical and public health personnel who function as local counterterrorism sources. California's Office of Homeland Security, established in February 2003, has grown into the multifaceted California Emergency Management Agency (CAL-EMA), established in 2009 to consolidate homeland security and emergency management functions. California is the only state to create a Maritime Security Council, which met for the first time in 2007. California ranks second in the nation, after Texas, in FBI JTTFs, with eight.
California is located in FEMA Region IX; the Defense Coordinating Office responsible for brokering and arranging federal military support for the state is located in Oakland.
California has eight Joint Terrorism Task Forces. The original California JTTF in Los Angeles was established in 1986, and the San Francisco JTTF was established in 1997.
Two other JTTFs are located at FBI field offices in Sacramento and San Diego. There are JTTF annexes in Fresno, Long Beach, Santa Ana (also known as the Orange County JTTF) and Riverside (also known as the Inland Empire JTTF). The U.S. attorney chairs Anti-Terrorism Advisory Councils (ATACs) in Los Angeles, Sacramento, San Francisco and San Diego. The U.S. Attorney's Office for the Central District of California in Los Angeles is the second largest U.S. attorney's office in the country, with an active national security section that works with the district's four JTTFs.
California was one of six states to initially test the DHS Homeland Security Information System-Intel (HSIN-Intel) pilot, which allows fusion centers to directly share classified information to identify trends and patterns that may represent links to terrorism.
California is a member of the Multi-State Information Sharing and Analysis Center (MS-ISAC), the Western States Information Network (WSIN), the Navy-sponsored Law Enforcement Information Exchange (LInX) and the Border Enforcement Security Task Force (BEST), an Immigration and Customs Enforcement (ICE)-led initiative, begun in 2006, designed to increase the flow of information between participating agencies regarding transnational criminal organizations and violent gangs operating along the southern border. The Regional Information Sharing Systems Intelligence Center in Sacramento covers Alaska, California, Hawaii, Oregon, Washington and Guam. Intelligence units are maintained by the Los Angeles Police Department (LAPD) and the San Diego Police Department. The Los Angeles County Sheriff's Department has a homeland security division that includes the fusion center and a specialized counterterrorism unit. In 2010, the LAPD was designated as one of 12 state agencies to participate in the Nationwide Suspicious Activity Reporting (SAR) initiative. At the federal level, the FBI operates Field Intelligence Groups (FIGs) in Los Angeles, Sacramento, San Diego and San Francisco. There are three Immigration and Customs Enforcement Field Intelligence Groups in California: The San Francisco FIG has jurisdiction for Northern California and northern Nevada. The Los Angeles FIG has jurisdiction for central California and southern Nevada. The San Diego FIG has jurisdiction for extreme Southern California. Workers at the Central Valley High Intensity Drug Trafficking Area (HIDTA) in Fresno and the Northern California HIDTA in San Francisco perform criminal intelligence analysis.
California operates seven state, regional and city-level fusion centers. The state Emergency Management Agency's Information Analysis, Watch and Warning Division provides structure, guidance and funding to the California State Terrorism Threat Assessment System, which encompasses:
The California State Terrorism Threat Assessment Center (STTAC), the primary state fusion center in Sacramento (formerly known as the California Anti-Terrorism Information Center (CATIC) and established in September 2001) and four Regional Terrorism Threat Assessment Centers (RTTACs), each of which corresponds with one of four FBI field offices in California. The STTAC provides statewide analysis, information tracking, pattern analysis, geographic report linkages, statewide intelligence products and regional investigative support throughout California. The RTTACs are responsible for developing a regional threat assessment picture, providing analytical functions and connecting directly to partners within the STTAS to share information, reports, and other threat and warning products. The regional fusion centers vary in size from 15 individuals in Sacramento and San Diego to more than 40 individuals in Los Angeles and San Francisco.
The Los Angeles Joint Regional Intelligence Center (JRIC), also known as the Los Angeles Regional Terrorism Threat Assessment Center.
The Northern California Regional Terrorism Threat Assessment Center, formerly known as the San Francisco Regional Terrorism Threat Assessment Center and incorporating the South Bay Terrorism Early Warning Group (TEWG), along with TEWGs from the East and West Bay Area.
The Central California Intelligence Center, formerly known as the Sacramento Regional Terrorism Threat Assessment Center.
The San Diego Law Enforcement Coordination Center (SD-LECC), also known as the San Diego Regional Terrorism Threat Assessment Center, includes San Diego and Imperial counties. This fusion center particularly specializes in intelligence related to cross-border issues and gang activity.
Two additional fusion centers are not certified by the federal government: An Orange County Intelligence Assessment Center (OCIAC) was organized in 2007 and assumed the duties of a former Terrorism Early Warning Group (TEWG). A Port of Long Beach Fusion Center opened in February 2009.
"Project G" is a fusion center data-mining initiative that includes high-speed license plate scanners, allows link analysis of terrorist associations and relationships between individuals, locations, vehicles and movement patterns that might otherwise go undetected.
The first pilot program for Terrorism Liaison Officers (TLOs) began in California in 2002 and linked local law enforcement officers to the state's Office of Homeland Security and the fusion center. By 2010, hundreds of law enforcement officers, firefighters and emergency medical personnel had been trained to be TLOs.
A California Office of Homeland Security was created in February 2003 but merged with the Governor's Office of Emergency Services (OES) in 2009 to become the California Emergency Management Agency (CAL-EMA).
The homeland security sector of CAL-EMA includes a planning, research and emergency preparedness division; an office of infrastructure protection; and an information analysis, watch and warning division. To assist in critical infrastructure protection, DHS Protective Security Advisor districts have been established in Sacramento, San Francisco, Los Angeles and San Diego. Federal Protective Service (FPS) Region 9 headquarters is also located in San Francisco. Coast Guard District 11, one of four districts in the Pacific, is headquartered in Alameda.
The California Department of Justice is the statewide law enforcement agency and includes divisions of public rights, criminal law, law enforcement and justice information services.
The California Highway Patrol provides security and protective services to elected state officials, state government employees and state facilities, as well as law enforcement assistance to local governments and allied agencies when situations exceed the limits of local resources. The four FBI field offices in California -- in Los Angeles, Sacramento, San Diego and San Francisco -- operate resident agencies and satellite offices in Lancaster, Long Beach, the Los Angeles Airport, Palm Springs, Riverside, Santa Ana, Santa Maria, Ventura, Victorville, West Covina, Bakersfield, Chico, Fairfield, Fresno, Modesto, Redding, South Lake Tahoe, Stockton, Imperial County, North County (Carlsbad), Concord, Hayward, Monterey Bay, Oakland, Palo Alto, San Jose, San Rafael and Santa Rosa. The Coast Guard National Strike Force Pacific Strike Team is located in Novato. The Coast Guard's Pacific Tactical Law Enforcement Team (TACLET), a special operations unit that is part of the Deployable Operations Group, is located in San Diego.
On Jan. 1, 2009, the Governor's Office of Emergency Services and the California Office of Homeland Security merged to become the California Emergency Management Agency (CAL-EMA). CAL-EMA operates the California State Warning Center (CSWC) for emergency management.
The California Highway Patrol also operates the Emergency Notification and Tactical Alert Center (ENTAC) as a statewide emergency notification center, and a center for monitoring unusual events from disasters to antiwar protests. The Office of Infrastructure Protection (OIP) of CAL-EMA is responsible for the state's effort to identify, prioritize and protect critical infrastructure and key resources (CI/KR). A restricted Web site allows public and private-sector agencies to receive intelligence bulletins and security and safety information. DHS Protective Security Advisor districts have been established in Sacramento, San Francisco, Los Angeles and San Diego.
Top Secret America Looks At The Dark Side Of The War On Terror
Ever wonder how we went from carefree flying to mandatory groping at airport gates in less than ten years? Or how the Joint Special Operations Command grew from an unknown hostage rescue team into the crew that killed Bin Laden?
PBS Frontline is airing, Top Secret America, a documentary that explores how the government manipulated the public and expanded its powers all in the name of homeland security. This documentary and its accompanying book is the work of Washington Post reporters Dana Priest and William M. Arkin who spent two years investigating these secret government operations.
The video clip you are about to view had millions of views. On my original You Tube Channel here in New Zealand it had over 200,000 views.
We all have a tipping point. When President Bush Signed PD 51 in May of 2007 this was when I ordered my plane ticket to exit America and never go back. Basically this is an illegal corporate take-over of the country.
Why made me want to leave the country?
This PD 51 was tied directly into the Military Commissions Act of 2006. What is that? It's an act that is almost 1000 pages and there is something buried in the text.
What is that?
The text says that if you are upside down on a home loan, in other words, you owe more money than the house is worth, you cannot exit or immigrate or leave the country. So in 2006 in order to exit the country, we sold our home in California paying off a 560,000 dollar Mortgage.
The house when up for sale in April of 2006. Closed Escrow with a qualified buyer with 20% down......on June 30, 2006.
It is interesting to note that the new owner could not make his payments a year later and lost the house.
A home loan on a 97,000 home with interest over 30 years at 9.75% pays ack something like 252,000 dollars to the bank so you can see why the system is about to collapse.
Again, here is the video that made me buy my ticket to leave the country.
There are 72 Threat Fusion Centers. 50 state based and 22 urban centers set up during the Bush presidency in cooperation between the Department of Homeland Security and the Department of Justice.
They collect information from all 16 US intelligence agencies, the CIA, FBI, the military, state and local police agencies and privately owned corporations and organizations like the ADL and SPLC which some say should be registered as agents of a foreign power Israel.
A lot of their information comes from contractors. So just how many contractors does DHS employ? Senator McCaskill said DHS doesn’t even know how many contractors there are working for them.
Some estimate at one time there was as many as 200,000. If you understand bureaucracies and contractors, you will realize that these people need to justify their paychecks by finding terrorists. And that probably already includes you because you are on the Internet and have opinions.
The See Something Say Something program has expanded the source and unreliability of informants to include anyone in certain occupations that brings them into contact with the public.
These include garbage collectors, cable TV installers and repairmen, carpet cleaners, dentists, doctors, truck drivers, cab drivers, clergymen, teachers, nurses and anyone with a phone who can call one of many hotlines. Callers can be motivated by an argument, a dispute over a bill or angered by a divorce. Millions of people are spying on us. And I guarantee one of them does not like you.
Some people just do not care what others say about them. One woman even wrote a book entitled ‘What You Think Of Me Is None Of My Business.’
The problem with that attitude is that the DHS wants to require security clearances to work in certain occupations. As that list of occupations grows, the possibility of losing a job increases exponentially. An intended consequence of your inability to find work without the approval of DHS will be the stifling of dissent.
The information DHS collects on you includes the opinions of your garbage collector who might not like you based upon what your neighbor puts in your trash after you left for work in the morning. Or what a local minister says he thinks he heard you or someone with a similar name say at a wedding or a funeral.
The Commonwealth of Pennsylvania had a contract with an Israeli intelligence firm linked to the Mossad that listed environmentalists worried about pollution in a local lake as potential terrorists. At the time I first reported this, I said the Israelis were worried that people active enough to get dressed and go across town to demonstrate over a threat against their health would also be the first or possibly the second ones to hit the streets after the dollar collapses and everything they have is taken from them by the banks.
Once you are listed as a potential threat to the community there does not seem to be any way to remove you from the list. Please note that you do not have to do anything or to threaten anyone to get on a list of potential terrorists. All you have to do is to become active in an organization that someone somewhere feels threatened by.
This includes those private partners, the military and Israel. Obviously, anti-war activists will threaten the jobs of people selling weapons. But people worried about water and air pollution could also be considered as threats to corporations fracking (hydraulic fracturing) for oil as this process causes earthquakes and releases carcinogens into the drinking water. But you do not have to join any groups as the federal government has access to every one of your emails and phone calls.
This includes other people in your house. And do not forget human error. As Mike Adams said, no IQ is too low to work for the TSA.
The following organizations have been listed as potential threats.
Both pro- and anti-abortion activists have been considered threats. It seems only those who have no opinions on abortion are safe.
Environmentalist, Tea Party and Second Amendment activists are suspect. Of course you would expect anti-war people on any list with input from the military but they also included those in the anti-death penalty movement. The most well known case for abuse was the inclusion of all Ron Paul supporters and Libertarians. But the list also includes all Third party members which covers the Reform, Labor, Socialist, Constitutional and American parties.
The lists have been expanded to include conspiracy theorists and critics of the government. Now we are talking about a large mass of potential terrorists. House Speaker John Boehner recently said that nobody likes the Congress. I would tell him why if I had access. The FBI has said that any supporter of the gold standard or has more than a two week supply of food is a potential terrorist. I know for a fact that every Chinese businessman in the world would rather have gold than dollars. Does that mean DHS has to include every Chinese restaurant on its list of terrorist suspects?
In Virginia plans for a mega fusion center run by the US Joint Special Operations Command came to light. JSOC was headed at one time by four-star General Stanley McChrystal and was accused of being used as an assassination bureau by Dick Cheney. This mega fusion center was to use Internet data mining to select potential targets.
The Tennessee Fusion Center received the “Fusion Center of the Year” award from Janet Napolitano, head of DHS. This is the fusion center that went door to door demanding to know how much food people had stored. There are 7 fusion centers in California. I have a link to the addresses of all 72 threat fusion center in the references below.
Of course fusion centers have another function. They are supposed to prevent you from doing anything once you have been identified as a threat. I will have to deal with what plans they have for Enemies of the State in the future.
I do want to comment on one possible abuse by quoting from a fictional piece I wrote about a conversation between Naomi Wolf and the American President-elect in 2016.
“Our new program to remove obstructionists was a real money maker for our campaign. All of the corporations lined up to donate money to us in exchange for promising to take certain specified people off the streets. What we plan to do is give a Notice Of Separation to about 10,000 people in our first trial run of the program.
A Notice Of Separation does not take away your right to vote because we are in a one party state now so voting is useless anyway. What it does is to separate you from the Bill of Rights. You will be forbidden to participate in politics, protests or even discussions thereof. Nor will you be allowed to associate in political groups. Oh. Our donors insist that is to include consumer rights activities as well. Any violation of the Notice Of Separation will result in a one year confinement. No need for a trial. A second violation will have permanent consequences. Any questions or comments, Naomi?”
Do you doubt that this is possible given the changes in America since 1980?
US sees Israel, tight Mideast ally, as spy threat By ADAM GOLDMAN and MATT APUZZO AP 7/28/12
WASHINGTON (AP) -- The CIA station chief opened the locked box containing the sensitive equipment he used from his home in Tel Aviv, Israel, to communicate with CIA headquarters in Virginia, only to find that someone had tampered with it. He sent word to his superiors about the break-in.
The incident, described by three former senior U.S. intelligence officials, might have been dismissed as just another cloak-and-dagger incident in the world of international espionage, except that the same thing had happened to the previous station chief in Israel.
It was a not-so-subtle reminder that, even in a country friendly to the United States, the CIA was itself being watched.
In a separate episode, according to another two former U.S. officials, a CIA officer in Israel came home to find the food in the refrigerator had been rearranged. In all the cases, the U.S. government believes Israel's security services were responsible.
Such meddling underscores what is widely known but rarely discussed outside intelligence circles: Despite inarguable ties between the U.S. and its closest ally in the Middle East and despite statements from U.S. politicians trumpeting the friendship, U.S. national security officials consider Israel to be, at times, a frustrating ally and a genuine counterintelligence threat.
In addition to what the former U.S. officials described as intrusions in homes in the past decade, Israel has been implicated in U.S. criminal espionage cases and disciplinary proceedings against CIA officers and blamed in the presumed death of an important spy in Syria for the CIA during the administration of President George W. Bush.
The CIA considers Israel its No. 1 counterintelligence threat in the agency's Near East Division, the group that oversees spying across the Middle East, according to current and former officials. Counterintelligence is the art of protecting national secrets from spies. This means the CIA believes that U.S. national secrets are safer from other Middle Eastern governments than from Israel.
Israel employs highly sophisticated, professional spy services that rival American agencies in technical capability and recruiting human sources. Unlike Iran or Syria, for example, Israel as a steadfast U.S. ally enjoys access to the highest levels of the U.S. government in military and intelligence circles.
The officials spoke on condition of anonymity because they weren't authorized to talk publicly about the sensitive intelligence and diplomatic issues between the two countries.
The counterintelligence worries continue even as the U.S. relationship with Israel features close cooperation on intelligence programs that reportedly included the Stuxnet computer virus that attacked computers in Iran's main nuclear enrichment facilities. While the alliance is central to the U.S. approach in the Middle East, there is room for intense disagreement, especially in the diplomatic turmoil over Iran's nuclear ambitions.
"It's a complicated relationship," said Joseph Wippl, a former senior CIA clandestine officer and head of the agency's office of congressional affairs. "They have their interests. We have our interests. For the U.S., it's a balancing act."
The way Washington characterizes its relationship with Israel is also important to the way the U.S. is regarded by the rest of the world, particularly Muslim countries.
U.S. political praise has reached a crescendo ahead of Republican presidential candidate Mitt Romney's scheduled meeting Sunday with Israeli Prime Minister Benjamin Netanyahu in Jerusalem. Their relationship spans decades, since their brief overlap in the 1970s at the Boston Consulting Group. Both worked as advisers for the firm early in their careers before Romney co-founded his own private-equity firm. Romney said in a speech this past week that Israel was "one of our fondest friends," and he criticized Obama for what he called the administration's "shabby treatment" of the Jewish state.
"The people of Israel deserve better than what they've received from the leader of the free world," Romney said in a plain appeal to U.S. Jewish and pro-Israel evangelical voters.
Obama, who last year was overheard appearing to endorse criticism of Netanyahu from then-French President Nicolas Sarkozy, has defended his work with Israel. "We've gotten a lot of business done with Israel over the last three years," Obama said this year. "I think the prime minister - and certainly the defense minister - would acknowledge that we've never had closer military and intelligence cooperation."
An Israeli spokesman in Washington, Lior Weintraub, said his country has close ties with the U.S. A text message Saturday from the office of Israeli Prime Minister Benjamin Netanyahu called the report "false."
"Israel's intelligence and security agencies maintain close, broad and continuous cooperation with their U.S. counterparts," Weintraub said. "They are our partners in confronting many mutual challenges. Any suggestion otherwise is baseless and contrary to the spirit and practice of the security cooperation between our two countries."
The CIA declined comment.
The tension exists on both sides.
The National Security Agency historically has kept tabs on Israel. The U.S., for instance, does not want to be caught off guard if Israel launches a surprise attack that could plunge the region into war and jeopardize oil supplies, putting American soldiers at risk.
Matthew Aid, the author of "The Secret Sentry," about the NSA, said the U.S. started spying on Israel even before the state was created in 1948. Aid said the U.S. had a station on Cyprus dedicated to spying on Israel until 1974. Today, teams of Hebrew linguists are stationed at Fort Meade, Md., at the NSA, listening to intercepts of Israeli communications, he said.
CIA policy generally forbids its officers in Tel Aviv from recruiting Israeli government sources, officials said. To do so would require approval from senior CIA leaders, two former senior officials said. During the Bush administration, the approval had to come from the White House.
Israel is not America's closest ally, at least when it comes to whom Washington trusts with the most sensitive national security information. That distinction belongs to a group of nations known informally as the "Five Eyes." Under that umbrella, the United States, Britain, Australia, Canada and New Zealand agree to share intelligence and not to spy on one another. Often, U.S. intelligence officers work directly alongside counterparts from these countries to handle highly classified information not shared with anyone else.
Israel is part of a second-tier relationship known by another informal name, "Friends on Friends." It comes from the phrase "Friends don't spy on friends," and the arrangement dates back decades. But Israel's foreign intelligence service, the Mossad, and its FBI equivalent, the Shin Bet, both considered among the best in the world, have been suspected of recruiting U.S. officials and trying to steal American secrets.
Around 2004 or 2005, the CIA fired two female officers for having unreported contact with Israelis. One of the women acknowledged during a polygraph exam that she had been in a relationship with an Israeli who worked in the Foreign Ministry, a former U.S. official said. The CIA learned the Israeli introduced the woman to his "uncle." That person worked for Shin Bet.
Jonathan Pollard, who worked for the Navy as a civilian intelligence analyst, was convicted of spying for Israel in 1987 when the Friends on Friends agreement was in effect. He was sentenced to life in prison. The Israelis for years have tried to win his release. In January 2011, Netanyahu asked Obama to free Pollard and acknowledged that Israel's actions in the case were "wrong and wholly unacceptable."
Ronald Olive, a former senior supervisor with the Naval Criminal Investigative Service who investigated Pollard, said that after the arrest, the U.S. formed a task force to determine what government records Pollard had taken. Olive said Israel turned over so few that it represented "a speck in the sand."
In the wake of Pollard, the Israelis promised not to operate intelligence agents on U.S. soil.
A former Army mechanical engineer, Ben-Ami Kadish, pleaded guilty in 2008 to passing classified secrets to the Israelis during the 1980s. His case officer was the same one who handled Pollard. Kadish let the Israelis photograph documents about nuclear weapons, a modified version of an F-15 fighter jet and the U.S. Patriot missile air defense system. Kadish, who was 85 years old when he was arrested, avoided prison and was ordered to pay a $50,000 fine. He told the judge that, "I thought I was helping the state of Israel without harming the United States."
In 2006, a former Defense Department analyst was sentenced to more than 12 years in prison for giving classified information to an Israeli diplomat and two pro-Israel lobbyists.
Despite the Pollard case and others, Olive said he believes the two countries need to maintain close ties "but do we still have to be vigilant? Absolutely. The Israelis are good at what they do."
During the Bush administration, the CIA ranked some of the world's intelligence agencies in order of their willingness to help in the U.S.-led fight against terrorism. One former U.S. intelligence official who saw the completed list said Israel, which hadn't been directly targeted in attacks by al-Qaida, fell below Libya, which recently had agreed to abandon its nuclear weapons program.
The espionage incidents have done little to slow the billions of dollars in money and weapons from the United States to Israel. Since Pollard's arrest, Israel has received more than $60 billion in U.S. aid, mostly in the form of military assistance, according to the Congressional Research Service. The U.S. has supplied Israel with Patriot missiles, helped pay for an anti-missile defense program and provided sensitive radar equipment to track Iranian missile threats.
Just on Friday, Obama said he was releasing an additional $70 million in military aid, a previously announced move that appeared timed to upstage Romney's trip, and he spoke of America's "unshakable commitment to Israel." The money will go to help Israel expand production of a short-range rocket defense system.
Some CIA officials still bristle over the disappearance of a Syrian scientist who during the Bush administration was the CIA's only spy inside Syria's military program to develop chemical and biological weapons. The scientist was providing the agency with extraordinary information about pathogens used in the program, former U.S. officials said about the previously unknown intelligence operation.
At the time, there was pressure to share information about weapons of mass destruction, and the CIA provided its intelligence to Israel. A former official with direct knowledge of the case said details about Syria's program were published in the media. Although the CIA never formally concluded that Israel was responsible, CIA officials complained to Israel about their belief that Israelis were leaking the information to pressure Syria to abandon the program. The Syrians pieced together who had access to the sensitive information and eventually identified the scientist as a traitor.
Before he disappeared and was presumed killed, the scientist told his CIA handler that Syrian Military Intelligence was focusing on him.
For the record...none of these are my customers GH!
25 Cutting Edge Firms Funded By The CIA
Walter Hickey Business Insider 8/11/12
It's no secret the Central Intelligence Agency has an investment firm that funds startups that could have a big impact for the Agency.
If there is a company out there doing intelligence research, it's likely that In-Q-Tel, the CIA's personal investor, either looked them up or made a check out to them.
It's all to ensure that the Agency remains on the forefront of tech. Not long ago, In-Q-Tel invested heavily in a company called Keyhole. Never heard of them? Maybe you know their work, a little project eventually known as Google Earth.
So, want to know what's next for technology? Keep an eye on these 25 companies.
3VR is a video surveillance company that is changing the game
The company 3VR Incdevelops software enabling organizations to mine data from video.
In-Q-Tel first invested in the company in 2005. 3VR works with leading banks, governments, law enforcement and retailers at the moment.
They also own CrimeDex, which is basically the place where loss prevention and law enforcement professionals hang out online.
Adaptx creates digital pens that speed up field data collection.
Of course the CIA invested in this company. They make pens with gadgets hidden in them.
Adaptx first received In-Q-Tel funding in 2008. They design special digital pens that expedite data entry. For instance, handwritten markup on maps would be automatically integrated into the CIA's system. Field journal notes can be automatically backed up digitally. That data can be sent over a cellphone connection.
This is on of many gadget companies the CIA has bought into.
Basis Technology synthesizes the foreign chatter
The CIA is obviously extremely interested in what is going on in the rest of the world.
They are one of the largest employers of talented linguists, but that gets very expensive. So it's no surprised they're interested in Basis Technology, which provides software for text analytics in over twenty languages.
They work primarily in applied natural language processing, deriving meaning from the ways people actually use language. In-Q-Tel has been invested in the firm since 2004.
Biomatrica works with preserving biological materials
Biometric identification is an important way to confirm the identity of an individual. For clandestine services, confirming identities is crucial.
Biomatrica works on ways to make DNA, RNA, and proteins have a longer shelf life. Short and long-term storage of this information is important for the CIA.
Cloudera helps organizations do large-scale data storage
The CIA has massive databases of information. Controlling and sustaining these digital archives is just as important for the CIA as it is for technology companies.
Cloudera Enterprises is one of the most cost-effective ways for companies to securely carry out large-scale data analysis and storage.
The group specializes in helping groups use Google, Facebook, and Yahoo! software. In-Q-Tel has been invested in Cloudera since 2010.
DSSP makes safe rockets that are controlled by electricity
Rocket engines are simple: ignite explosives, direct exhaust, liftoff. That's what happens.
But there are still some issues with that. A rocket can't be un-ignited. Lighting explosives on fire remains dangerous.
Digital Solid State Propulsion has vastly improved the control of highly energetic combustion using electrical power. Their technology is use in several sectors of missile defense and rocketry, and the CIA is very interested in the results.
But still, GainSpan is a very cool company with an even cooler product. They focus on connecting devices to the internet with ultra-low power WiFi. The company sees use for their devices in healthcare, smart energy, automation, and, yes, monitoring.
GATR technologies makes inflatable satellite antennae
With an unknown number of field agents in a likewise unknown number of countries, it makes sense that the CIA might want a quick, discreet way to get a satellite connection where there isn't one in an easily deployable manner.
GATR Technologies develops and manufactures inflatable satellite communications terminals. They say that they're perfect for the first wave of deployments to a country to get something ready on the go and for remote locations,
The Ember corporation makes low-power wireless products
The CIA's portfolio is heavily weighted on companies that improve electric efficiency.
Ember Corporation focuses on developing networking systems that simplify wirelessly networking low-power products. They're focused on smart energy, remote monitoring, and remote control uses of their tech.
This product is really cool. Looxcie has invented a wearable camerathat can hold up to 10 hours of video and can stream it as well. It goes for under $200.
It's about as obvious as a Bluetooth earpiece and it makes a lot of sense that the CIA would be interested in this kind of hardware. Looxcie has apps and the ability to stream live, which could be a boon for reconnaissance missions.
MiserWare makes intelligent power management software
Computing requires a lot of electricity. That can get taxing, especially for large organizations with growing electricity bills or groups operating in areas on the electric fringe.
Basically, the CIA.
MiserWare has developed software that makes a computer use less power. While there are many, many groups working on this problem on the hardware side — increasing the efficiency of circuits and such — MiserWare is focused on software, which is rather novel.
If that interests you, the software is free for personal use at this point.
Oculis Labs tackles the hacking liability that really matters
One of the most common ways to lose control of password protections isn't a hack or a virus, it's just someone looking over your shoulder and reading private data.
Oculis Labs manufactures products that protect from "over-the-shoulder" eavesdroppers. The project secures a computer screen in the space between the monitor and the user, fuzzing the screen to any onlookers.
One of their products, Chameleon, tracks user eye movement and encrypts words that are not being read by the user.
OpenSpan makes businesses more productive using analytics
The CIA is very similar to a corporation in the sense that they, too want to work as efficiently as possible.
That could inform the investment in OpenSpan, which makes software that enables organizations to see exactly what employees are doing on their computer: what programs they're using, what progress they're making, etc.
OpenSpan then uses automation tools to streamline workflow.
Palantir makes software that integrates data together from a wide array of resources and databases.
It's one of the best programs at coordinating the vast databases accumulated by the U.S. intelligence apparatus. It assembles comprehensive dossierson objects of interest, collated from the sprawling databases of intelligence agencies.
Perceptive Pixel makes advanced multi-touch displays, like the one on CNN
You know CNN's large, interactive touch screen that premiered during the 2008 election? The one Wolf Blitzer is obsessed with?
That was brought to you by Perceptive Pixel, which makes screens like that for media, energy companies, intelligence groups, defense, and medical imaging.
The software allows users to manipulate huge data sets with intuitive interface technologies.
Although it is in the early stages, Recorded Futureis extremely ambitious as a company. The goal is to use information pulled from the 24/7 media flow to extract time-related information. The idea is to organize the media into a temporal experience, giving the user an accurate sense of relationships over time.
The point? Use the web as a predictive mechanism. Use the chatter online as a forecasting tool.
Seventh Sense is developing health monitoring products that interface with human skin
Running health diagnostic exams takes time and personnel. Seventh Senseis designing a new generation of products that integrate directly with the human body to monitor the health situation on the inside.
Seventh Sense sees their products being used in the clinic, at home, or on the move. That last one probably piques the CIA's interest the most.
Sonitus Medical makes a hearing system that transmits sound imperceptibly through the mouth
This product has "spy gear" written all over it.
Sonitus Medical Inc. has developed the SoundBite hearing system which plays off the principle of bone conduction to transmit audial messages. A nearly invisible in-the-mouth hearing and communication platform is non invasive and connects directly to the inner ear, allowing the user to hear transmitted messages through their skull.
This could mean that agents can drop bulky and obvious ear pieces when needing to keep in contact with home command.
Walleye makes handheld devices that can see into and through solid objects
When it comes to spy gear in the popular imagination, x-ray vision is up there among the Aston Martin and the Walther PPK as de rigourgear for any respectable secret agent.
While it's not exactly to that point yet, Walleye Technologies has developed handheld portable imaging systems that can see into and through solid objects. The imaging system generates high-quality pictures and the company is excited for the possibility of taking the consumer and security imaging markets by storm.
Most people who rely on print and TV news probably have never heard of fusion centers.
There are as many as 72 of these facilities. 50 state-based and 22 urban centers were set up during the Bush presidency in cooperation between the DHS and the Department of Justice (DOJ).
Fusion centers contain large data warehouses that collect information from all 16 US intelligence agencies, including the CIA, FBI, NSA, the military, state and local police agencies, as well as privately owned corporations and organizations.
That information includes the cell phone data and emails of every American citizen.
According to Electronic Frontier Foundation (EFF), the DHS described its fusion centers as “one of the centerpieces of [its] counterterrorism strategy” and its database was supposed to be a central repository of known or “appropriately suspected” terrorists.
In theory, local law enforcement officers, in conjunction with DHS officials, conduct surveillance and write up a report known as a Homeland Intelligence Report (HIR) for the DHS to review.
If credible, the DHS would then spread the information to the larger intelligence community.
The Senate report, however, found that the fusion centers failed to uncover a single terrorist threat and only gathered information that is used for ordinary criminal investigations that local law enforcement agencies are well-capable of doing.
Even DHS officials told the panel the fusion centers produce “predominantly useless information” and “a bunch of crap.”
Five centers the Senate studied spent their federal terrorism grant money on “hidden ‘shirt button’ cameras,” cell phone tracking systems and other surveillance tools.
They also spent taxpayer money on things like “dozens of flat-screen TVs” and SUVs, sometimes claiming that Chevrolet Tahoes were intended to help “respond to chemical, biological, radiological, nuclear, and explosive (CBRNE) incidents.”
A DHS intelligence officer filed a draft report about a U.S. citizen who appeared at a Muslim organization to deliver a day-long motivational talk and a lecture on positive parenting.
An intelligence officer decided to report on two men who were fishing at the US-Mexican border. A reviewer commented, “I…think that this should never have been nominated for production, nor passed through three reviews.”
A report was submitted on a motorcycle group for passing out leaflets informing members of their legal rights. A reviewer commented, “The advice given to the groups’ members is protected by the First Amendment.”
A DHS analyst at a Wisconsin fusion center prepared a report about protesters on both sides of the abortion debate, despite the fact that no violence was expected.
A Texas fusion center released an intelligence bulletin that described a purported conspiracy between Muslim civil rights organizations, lobbying groups, the anti-war movement, a former U.S. Congresswoman, the U.S. Treasury Department and hip hop bands to spread Sharia law in the U.S.
The same month, but on the other side of the political spectrum, a Missouri Fusion Center released a report on “the modern militia movement” that claimed militia members are “usually supporters” of third-party presidential candidates like Ron Paul and Bob Barr.
In March 2008 the Virginia Fusion Center issued a terrorism threat assessment that described the state’s universities and colleges as “nodes for radicalization” and characterized the “diversity” surrounding a Virginia military base and the state’s “historically black” colleges as possible threats.
Like so many post-9/11 surveillance laws passed under the vague guise of “national security,” these fusion centers violate the civil liberties of ordinary Americans that should be guaranteed by the Bill of Rights and other laws.
An entire section of the Senate report is dedicated to Privacy Act violations and the collection of information completely unrelated to any criminal or terrorist activity in the HIRs.
The Senate report and the activity of fusion centers makes it clear that these facilities are designed to spy on American citizens, invading their privacy while doing nothing to stop terrorism.
With all the talk in the Presidential campaigns about frivolous spending, perhaps these worthless facilities should be addressed, instead of Medicare or Social Security.
This may sound like a conspiracy theory, but it is reality.
In fact, the one episode of “Conspiracy Theory” done by former navy SEAL and Governor Jesse Ventura that dealt with these fusion centers was refused to be aired by TruTV.
In that episode he interviews a young woman from Missouri who was put on the terrorism watch list by her local fusion center for supporting Ron Paul in the Republican primary election. (See “banned” video to the left).
This is yet more evidence that America is turning from a democracy or constitutional republic into a corporate fascist state.
Gregory Patin writes for the Examiner where this article first appeared. Patlin earned a B.A. in political science from U.W. – Madison and a M.S. in management from Colorado Technical University. He is currently a freelance writer residing in Madison, WI who considers himself politically independent.
Privatized Corporations Loot Government Funds with Police State Contraptions By Shepard Ambellas theintelhub.com October 13, 2012
Globalist Schemes Could Run Hand-in-Hand with with Grant Programs
To understand how the globalists are stealing from the American people, one must get into the mind of the globalist.
The very concept of power and greed is bred into the globalist. Legacy’s carried out for generations makes it merely second nature for the globalist to want to lie, cheat, and steal as some of their families have been for hundreds if not thousands of years.
The globalist has an oligarchical mindset. After all we are all just “useless eaters” as former Secretary of State Henry Kissinger and others would say.
One way the globalists can profiteer is to loot governments (such as the corporation of the United States) of their fiat currency, while lining the pockets of their private corporations with monies extracted from the corporation of the United States (Washington DC).
There are many ways that this is being achieved by the globalist crime syndicated worldwide, this problem is not limited to the United States.
A good example is the Chertoff Group, headed up by former the former head of the Department of Homeland Security, (DHS) Michael Chertoff.
The Chertoff group, through what has become known as the Christmas Day Bomber Incident, (staged false flag) was able to make body scanners a norm in most airports nationwide.
Once this was achieved they could easily loot government funds through DHS approved grants to install invasive cancerous body scanners nationwide.
The Chertoff Group (owned by Michael Chertoff) looks like it will be one of the next big profiteers of the decade when it comes to the cyber war, whether real or staged.
A Bloomberg article points out how the FCC is demanding private corporations beef up their cyber security;
Internet-service providers should adopt an industrywide standard to help keep hackers from taking over customers’ computers, Federal Communications Commission Chairman Julius Genachowski said.
Providers of high-speed Internet service, such as Comcast Corp. and AT&T Inc., should create a voluntary code of conduct to help protect against so-called botnets that secretly infect computers, Genachowski said in a speech today in Washington.
He urged providers to take steps to thwart schemes that hijack Internet traffic and direct consumers to fraudulent websites.
“Cyber attacks pose a critical threat to our economic future and national security,” Genachowski said. “If you shut down the Internet, you’d shut down our economy.”
Thus concluding that there is now a push from government agencies to increase cyber security on a private level, setting the stage for an actual event (most likely staged) to take place.
Some claim we are the most vulnerable nation on earth to a cyber attack.
The US government will spend more than $10 billion a year on cyber security by 2015, in a worldwide market nearing $140 billion a year.
This allows the criminal cartel to once again dip into the taxpayer pockets, looting the entire nation for all it’s worth and using OUR money to install more police state features throughout this once great country.
Recently, Logan Townships (PENN.) new armored “SERT” truck was unveiled at a board of supervisors meeting.
The truck was purchased with DHS (federal) funding (grants) which is set to allow them to blanket most police departments across the US.
The new armored police truck called the BearCat can stop 50 cal. machine gun fir, and comes with detection capabilities for gas, chemical, radiological, and biological weaponry or deployment of such.
Localities claim that their towns are unreachable within a reasonable timeframe by other police departments that maintain such equipment, typically in larger cities. This once again is setting precedence that most departments will require such vehicles.
Another article points out just how much these vehicles cost the American people.
The Temple Terrace City Council recently voted to spend about $250,000 in community investment tax dollars on an armored rescue vehicle for the police department’s SWAT team unit.
The city plans to buy a BearCat model vehicle manufactured by Lenco Industries of Pittsfield, Mass. The heavily equipped carrier will allow police to rapidly deploy members of its SWAT team, which now includes medics, into dangerous situations.
“We need something reliable,” City Manager Kim Leinbach told Mayor Joe Affronti and council members at their Sept. 18 meeting.
Leinbach introduced the proposal on behalf of the police department. Police Chief Ken Albano, Deputy Chief Bernie Seeley and police commanders also made presentations to the board in support of buying a new vehicle with modern technology.
This demonstrates the fact that there is not only a police state trend of enforcement or preparation for a possible coming event, but that privatized corporations are profiteering from the production of this type equipment designed for domestic employment on US citizens.
HPE.com reports that the High Point Police Department in Pennsylvania is also planning to purchase an armored vehicle costing over $250,000 from the same company LENCO;
The High Point Police Department Tactical Team will upgrade the equipment it uses when called upon to rescue a hostage or to respond to other high-risk operations.
Following recent City Council approval, the department will purchase a Lenco BearCat armored rescue/response vehicle from Lenco Armored Vehicles of Pittsfield, Mass. for $241,865.
The department will use federal forfeiture funds that were seized in connection with drug cases to pay for the vehicle.
Lenco is the nation’s leading supplier of Tactical Armored Response & Rescue vehicles for Police.
The Lenco BEAR and BearCat have a proven track record with hundreds of SWAT teams.
Lenco Armored Vehicles have defeated high power rifle fire in over two dozen incidences.
Down Range, the BearCat has defeated combat small arms fire, mortar frag, and even IED attacks. The Lenco BEAR & BearCat are proven to save lives and are the only SWAT vehicles Member Tested & Recommended by the NTOA.
In fact, there is even a website that helps police departments obtain grants for LENCO vehicles.
Lenco Armored Vehicles is the leading designer and manufacturer of armored police vehicles for Law Enforcement Agencies and State Police & Sheriff’s Department SWAT teams.
Lenco developed its core line of tactical armored vehicles in response to customer driven requirements for commercial alternatives to military surplus armored vehicles, up-armored Humvees and underperforming armored SUVs.
Our product line includes the BEAR and BearCat, with variants of each vehicle for MRAP and M-ATV applications, VIP protection, TEMS response & rescue, Bomb / EOD and Anti-Riot.
Lenco Armored Vehicles products available/eligible for grants: • S.W.A.T. Specialty Vehicles • Armored Police Vehicles • Armored Military Vehicles
Lenco Armored Vehicles products are generally applicable for: • Federal Grants grants including Department of Homeland Security grants as well as Project Safe Neighborhood
Free Grant Assistance includes: • Customized Grant search specific to your departments funding needs • 1:1 unlimited, personalized grant consulting from Senior Grant Consultants • Direct assistance for your department’s grant application • Unlimited reviews of your department’s entire grant application from our Grants Experts
What other grants are offered and what private corporations benefit from them? Just some food for thought.
Top 10 Most Dangerous U.S. Government Agencies Activist Post 1/7/13
We have chosen to highlight United States agencies; however, this top 10 list has global impact, as the U.S. has now proven to be the enforcement division of the overarching globalist agenda of centralized control.
One could argue that every government agency serves the purpose of stifling freedom and wasting taxpayer money. Yet, the 10 listed below go the extra mile for their sheer corruption, draconian regulations, and ultimate impact upon the largest number of citizens.
The main criteria for inclusion in the top 10 is the amount of money spent by the taxpayer according to official budget declarations, and then attaining the highest level of doing exactly the opposite of what they were supposedly created for.
Here is the countdown to the top 10 most dangerous U.S. government agencies to the freedom, prosperity and health of its citizens . . . .
#10 – Environmental Protection Agency (EPA) – annual budget $8.5 billion: Their record of ignoring environmental damage and the health effects on humans from major events such as 9/11, the Exxon and Gulf oil spills to the worst case, Fukushima, is unparalleled. Rather than investigate and warn of real dangers, they have gone after farmers for dubious claims of water contamination, while treating milk spills as they should have treated oil spills. Even worse, the EPA has concluded that there is no law preventing it from doing “research” on Americans. A recent lawsuit over the EPA’s work with airborne pollutants will put this claim to the test in Federal court. Their illegal human experiments could break the Nuremberg Code (source: The Washington Times).
#9 – Internal Revenue Service (IRS) – annual budget $13.3 billion: Cries of “End the Fed!” continue to get louder, while more people are beginning to wake up completely and couple this with “End the IRS!” In fact, the two were developed together 100 years ago making the private Fed and the government IRS fraternal twins in creating a system of indentured servitude through dollar devaluation and arbitrary tax collection, respectively. The Fed enslaves through stealth, while the IRS uses force to impose itself through ever-expanding regulations and the threat of fines and imprisonment. As the collection division, the IRS rakes in a staggering $2.3 trillion annually. Despite that massive amount, the IRS has a distinguished record of ignoring the shenanigans of major corporations and federal employees, while focusing harshly on the average private citizen and small businesses in particular. Thankfully, there is some momentum toward abolishing the IRS through FairTax legislation. Now would be a good time, as the IRS will be empowered even further when the healthcare overhaul takes effect.
#8 – Federal Emergency Management Agency (FEMA) – annual budget $13.5 billion: Despite massive funding to help people in dire need of assistance, FEMA has failed spectacularly in the cases of Katrina and Sandy, even hindering the ability of people to make it on their own, as gun confiscation was ordered against the population affected by Katrina. The mechanics of offering aid to legitimate victims of Sandy are still being debated by the U.S. government. Additionally, there is a disturbing amount of evidence that suggests FEMA would be instrumental in enslaving large populations following an economic collapse or civil unrest. FEMA centers are now open knowledge and if implemented will likely resemble the squalor and horror that refugees encountered when jammed into the New Orleans Superdome following Katrina.
#7 - Department of Justice (DoJ) – annual budget $28 billion: This includes the Federal Bureau of Investigations (FBI) which has its own annual budget of $8 billion. The “Department of Justice” is perhaps the most Orwellian oxymoron of all government agencies. For decades they have pursued a failed War on Drugs that targets small-time users while ignoring the true drug criminals. In fact, they’ve even armed the drug gangs as revealed in the Fast and Furious scandal. We have a Justice Department more concerned with going after whistleblowers of crimes than the criminals themselves. The FBI deserves a whole section unto itself given their recent behavior. The only “terrorists” they’ve caught since 9-11 are the ones they have created with their own material support. Further, the FBI is increasingly using illegal surveillance tactics for peaceful activists like Occupy demonstrators and others. It has recently been revealed that the FBI was actually spying on Occupy protesters at the behest of banks, not the government, even refusing to tell Occupy leaders that there were assassination plots against them. Finally, it must be noted that no bankers have gone to jail from the immense fraud that led to the financial collapse of 2008 and beyond; no one significant has gone to jail for torture and other war crimes; and government corruption has been all but legalized.
#6 - Spy Agencies: The nation’s 17 spy agencies, including the CIA and the National Security Agency (NSA) – annual budget $55 billion? Many of the intelligence accounts are classified, so we can’t really know the true total, but we do know that the budget for spy agencies has doubled since 9/11. The NSA has grabbed the most attention as of late with plans to expand into their new $2 billion data mining center in Bluffdale, Utah set to launch in September of this year. Whistleblowers like William Binney have stated that the agency is already spying on its own citizens domestically. As the war on terror increases its scope through drone surveillance on American soil, the NSA’s budget will only increase, while increasing the danger posed to large sections of the U.S. Constitution. The CIA of course has long been implicated in using assassination rings to topple foreign governments and political opponents, while being at the center of the Guantanamo Bay and rendition torture apparatus. With the arrival of no-holds-barred legislation like NDAA 2013, the intelligence regime becomes more dangerous than ever.
#5 – Department of Education (ED) – annual budget $70 billion: The way that America has chosen to educate its youth is the beginning of the justifications for the abuses of every other federal agency. The Deliberate Dumbing Down of America, as Charlotte Iserbyt has called it, has resulted in a once independent, entrepreneurial nation becoming a collectivized horde of selfish, but not individualistic, youth. There is much less attention paid to vocational skills, and much more attention paid to training the next bunch of public officials or bureaucracy enforcers. Furthermore, the public school system is clearly engaging in prisoner training with the actions of children becoming criminalized at an ever-greater pace. With the recent CT school shooting, we can expect that this will now become part of the curriculum as justification for the surrounding police state will be taught as a logical consequence in the face of such random threats of terror.
#4 - Department of Homeland Security (DHS) annual budget $100 billion (3,000 page PDF): – Much like the Department of Defense, the activities of DHS are all-encompassing including the goon squad of the Transportation Security Administration (TSA), which has employed untrained, low IQ, and criminal elements including pedophiles to reach into the pants of men, women and children. The TSA is also responsible for introducing cancer to its employees and the public through its backscatter radiation naked imaging machines. And now they are set to hit the streets across America with their spin-off VIPR teams. DHS has set up the ultimate framework for tyranny, including secret lists, secret arrests, activist surveillance, biometric immigration measures, control of cyberspace, Orwellian telescreens and PSA’s that increasingly portray average citizens who are engaged in normal activities as worthy of suspicion and interrogation. They are sure to be on the front lines of any gun control and confiscation initiatives, as they clearly have been stockpiling their own ammunition in ever greater numbers.
#3 – U.S. Department of Agriculture (USDA) – annual budget $155 billion: If there is one agency that is administering the globalist directives of Agenda 21, it is the USDA. They have recently begun putting dubious embargoes on small farms, which is leading to economic and literal starvation of people and animals alike. Through their trickle down directives, farmers can even be charged in a different county after being cleared of wrongdoing in a previous case. This is the hallmark of bureaucratic tyranny. The USDA has been instrumental in clearing Dow Chemical’s GM soy, giving Monsanto’s GMO crops special ‘speed approval,’ and covering up pesticide damage to humans and bee populations. But in true absurdist bureaucratic style, the same organization that has consistently overlooked the health and economic threats to countless millions of people decided to fine a family $4 million dollars for selling bunny rabbits.
As for the CDC, or Center for Disease Creation as some natural medicine practitioners have coined the agency (budget $11 billion), they have encouraged vaccination to such an extent that some have questioned whether their mandated vaccine schedule is part of a compulsory sterilization program.
#1 – Department of Defense (DoD) – annual budget ??? – Officially $613 billionThis agency is in desperate need of returning to its more honest original name: The War Department. In addition to being the recipient of the highest percentage of the federal budget, the DoD’s Defense Advanced Research Projects Agency (DARPA) division almost deserves a category of its own. Many of DARPA’s projects fall into the money pit of “black budget” secret projects not even subjected to presidential and congressional oversight. With DARPA’s “mad science” reputation, it is no doubt one of the top recipients of the $50 billion annual black budget, making this one of the most dangerous federal agencies to both the economy of the U.S. and to world peace. Overall, the Department of Defense as the coordinator for anything that falls under “national security” is responsible for openly killing millions and eviscerating the Constitution … and there is no sign that they are letting up any time soon.
The Substance Abuse and Mental Health Services Administration (SAMHSA) – annual budget $3 billion: This agency falls under HHS, but the video below demonstrates a special level of corruption and worthlessness that is humorous, except for the fact that it represents a staggering level of taxpayer looting, despite the small size of the agency (537 people). It is a microcosm of what we only can imagine going on within the larger agencies, especially those with less oversight.
The government’s track record for permitting massive looting of the economy in collusion with the private banking sector; the upcoming collusion with the insurance industry and Big Pharma to change the landscape of healthcare; their collusion with private contractors to implement a prison-industrial complex; their unconstitutional war machine, and their history of secret human experiments makes government the single greatest terrestrial danger we face. In the 20th century alone, governments across the world outright murdered 290 million people, known as democide. How many more must have fallen to covert means and bureaucratic ineptitude? How many more will follow?
There is so much more that could have been mentioned about the dangers of the agencies listed above. Do you have other facts to document? How would you rank these agencies? Would you like to add an agency to the above list? Please do so in the comment section.