EMERGENCY, COG, and QUANTUM COMPUTERS
Throughout this article in its entirety, first and foremost remember these words by Dr. Edwin Vieira, Jr., taken from his book, “Constitutional Homeland Security: Part One: The Nation In Arms”. On page 12 he states:
“…the doctrine of ‘emergency powers’ runs afoul of America’s Constitution… Anyone who bothers to read the Constitution will see that it:
Delegates to the General Government as a whole – or to Congress, the President, or the Supreme Court separately – no ‘emergency powers’ under that rubric;
Delegates neither powers that only an ‘emergency’ can call into existence, nor powers that may be exercised only in an ‘emergency’;
Delegates no power even to declare that an ‘emergency’ exists; and, perhaps most decisively of all,
Does not even employ the word ‘emergency’, let alone define it as a legal principle relevant to any part of ‘the supreme Law of the Land’.”
That one passage from Dr. Vieira’s book goes to the most central hope for undoing the tremendous damages to America done in the name of the so-called “War on Terror”. All Oath Keepers should bear in mind that power-mad politicians on both sides of the aisle have always sought to increase illegitimate government power by crying “Emergency!” Yes, there can be “emergencies”. But No, the General government in Washington D.C. (WDC) does not gain some magical new power to attack our Bill of Rights just because an emergency occurs. If – for example – in a hypothetical situation in which unscrupulous politicians and government officials wished to involve America in an otherwise neutral war somewhere, or if they wished to exercise more control over the behavior of society, or if they wished to install a military-police state under martial law in America, or if they wished to take America fully into a one-world government via the United Nations, their first choice of excuses would be to cry “national emergency”. Peak events of Twentieth Century America show this clearly.
The notion that some emergency of some kind somehow suddenly suspends the Constitutional way of setting policy in a branch, department, or agency of the General government in Washington D.C. (WDC) is used to justify a violation of Constitutional law by those foresworn to uphold the law of the land.
As the Constitution is the nation’s founding legal document, all law must meet Constitutional standards to exist as “law”. Dr. Vieira points out the obvious but often overlooked reality: The concept “Emergency” cannot exist lawfully at the General (Federal) level. Tenth Amendment: If it’s not granted or enumerated, it is reserved to the States or to the People, with the People being the source of authority and legitimacy, granting an individualized portion of each citizen’s personal sovereignty to animate the offices of the General government. If an “emergency” exists, it is to the States affected locally by the emergency to handle, and their structures must also be in accord with their respective State Constitutions. It’s to the States.
So we remember: The ruse called “Emergency”, and especially the usurpation called “Emergency Powers”, is an act of treason against the American People as soon as it touches any part of the main body of the Constitution or any part of the Bill of Rights. That of course is happening now, right here in the present moment in America. The General government in WDC is operating under the guise of “emergency powers”. Example:
NATIONAL SECURITY PRESIDENTIAL DIRECTIVE/NSPD 51
HOMELAND SECURITY PRESIDENTIAL DIRECTIVE/HSPD-20
Subject: National Continuity Policy
(1) This directive establishes a comprehensive national policy on the continuity of Federal Government structures and operations and a single National Continuity Coordinator responsible for coordinating the development and implementation of Federal continuity policies. This policy establishes “National Essential Functions,” prescribes continuity requirements for all executive departments and agencies, and provides guidance for State, local, territorial, and tribal governments, and private sector organizations in order to ensure a comprehensive and integrated national continuity program that will enhance the credibility of our national security posture and enable a more rapid and effective response to and recovery from a national emergency.
In June, 2013, almost every American (and most other people of the world) took pause in daily routines to register the shock of learning that one’s every communication has been being collected by impersonal and indifferent machines called computers. As anyone might have let that register more deeply into one’s awareness, one likely found oneself reflecting about to whom one may have sent an email or made a phone call. Imagine one’s instant fear – “Oh my! What if *they* listened to that call, or read that email!”
Some say – “When spying is done without warrants, concern is warranted.” The only thing warranted in all this warrantless spying on the American people is concern. The fact that the NSA is doing this to the American people is remarkable. Regarding such activity being conducted outside the U.S. A., I’m not sure of course, but I imagine that the average Brit or Spaniard or Italian or German or anyone in any other country might also resent this kind of global snooping. Let us remember, this spying by NSA is a world-wide human info trap.
The NSA has been doing this for a long time, for the most part in secrecy. We may recall the national outrage when ECHELON surfaced years ago, and we lamented that the Bush 43 administration enabled the NSA to monitor our communications and that the companies which worked with the Bush administration to spy on Americans’ communications received government pardons. Here is a bit of the chronology surrounding the ECHELON scandal – remember Russ Tice? Quoting him:
“As a Signals Intelligence (SIGINT) officer it is continually drilled into us that the very first law chiseled in the SIGINT equivalent of the Ten Commandments (USSID-18) is that Thou shall not spy on American persons without a court order from FISA. This law is continually drilled into each NSA intelligence officer throughout his or her career. The very people that lead the National Security Agency have violated this holy edict of SIGINT.”
From Wikipedia we read: On December 23, 2005, the Austin American-Statesman reported Tice’s allegations that spying on Americans may involve a massive computer system known as ECHELON, which is able to search and filter hundreds of thousands of phone calls and e-mails in a matter of seconds.
Please note that the NSA’s ECHELON program was scanning emails and phone calls for key words which would red-flag each message for further analysis. A further statement from Russ Tice in June 2013: On June 19, 2013, Tice claimed while being interviewed that the NSA had spied on Barack Obama himself while he was still a senator, along with monitoring federal judges, ranking military officials, and other members of congress, saying he himself had seen and held papers ordering such actions. He went on to say, “This thing is incredible what NSA has done. They’ve basically turned themselves – in my opinion – into a rogue agency that has J. Edgar Hoover capabilities on a monstrous scale on steroids.”[
Still, in 2005 and 2006, the public in general – the group mind of the nation – was not cognizant of anything other than a few fleeting, bland and breezy news articles which were quickly buried under a sports story or Hollywood star news flash. Rush Limbaugh and Bill O’Reilly even condemned Russ Tice for exposing NSA criminality, as if to expose wrong-doing was wrong. I suppose they had bought the Govlish line about some emergency and some “War on Terror”, yes?
But now, suddenly, because Mr. Snowden allegedly provided two newspapers with the actual paperwork which proves our deepest fears, everyone knows the NSA has been dragging in all of our communications and storing them for future reference. The NSA is screaming that they were not “reading” our mails or “listening” to our conversations on the phone – oh no; they are just “collecting” them for future reference. The NSA sees nothing wrong, immoral, or illegal about collecting your and my communications without asking permission or without getting a warrant based on probable cause. The NSA has no problem with keeping that kind of criminality ‘secret’ from “we, the victims”. My question on that count is if the NSA will knowingly violate my Fourth Amendment right to be secure in my individual life as an American citizen, why should I believe them about anything else they may proclaim? The NSA is publicly denying that they are reading our communications, yet we’ve got the proof that they were doing that as far back in time as 2005, eight years ago.
Before General Alexander was at the helm, another General was running things at NSA. His name is Michael Hayden. From NSA he went on to become head of CIA, preceding General Petreus, who resigned in disgrace the day after President Obama’s second election. Hayden was caught on film at the Press Club trying to tell a group of journalists that the phrase “probable cause” was not in the Fourth Amendment. See for yourself –
This time, thanks to the way Snowden did his handiwork, it’s all over the news and can’t be stuffed back into the bag.
The NSA wants to be able to “data-mine” every American’s phone calls and emails and lots of other personal stuff such as medical records, military service records, consumer records, credit ratings, book purchases, ATM withdrawals and banking records, criminal records, financial portfolios, groups or organizations to which one makes donations or contributions, vacation destinations, education records, employment records, air, ship, or train transportation records – in a word, everything about us. The NSA wants to data-mine all that for up to five years back into the past. In other words, what you said on the phone five years ago would be minable by NSA today. Like, as in, everything you have said online or on the phone for the past five years. Especially, who your friends are, or, as they put it, to whom one might turn, or run to, if one needed help.
To read that for yourself, go here –
They are doing this on each and every one of us. All the time. And not only did they not ask our permission, they tried to keep it secret from us. National Security, and all that jazz. Now they’re trying to sell the American people on the sham story that it’s somehow “legal”.
It is unlawful for the General government to surveil American citizens without a warrant issued upon probable cause. The “legal” framework, including whichever Executive Orders or National Emergency Orders or Presidential Decision Directives or whichever other concoction “legal teams” working for the General government come up with, is null and void on its face as soon as it tampers with one of the Bill of Rights Amendments. The reason? It contradicts and violates a higher law, the great law from which all subsequent laws must derive their legitimacy – the U.S. Constitution.
This impersonal spying has got a lot of folks upset, with good reason. It is rude, offensive, and very un-American. Worse, it is un-necessary and is part of a concocted fraud, a man-made “myth”. The fraudulent myth is the alleged “War on Terror”.
We cannot truthfully say that America is involved in a “War on Terror” when our President gives arms and ordnance to al Qaeda in Egypt and Libya and is now arming and supporting al Qaeda in Syria. We are either at war with al Qaeda (allegedly the most organized and powerful terrorist group on earth) or we are not at war with al Qaeda. If we are at war with al Qaeda, then the President of the United States is guilty of international war crimes and treason – for arming known terrorist organizations. But since the Congress, whose job it is to check and balance the operations of the Executive Branch, sees no reason to indict the President on treason charges for arming the world’s most deadly terrorist organization, then we are forced to admit that there is not really a “War on Terror”. Therefore, any infringement of, incursion into, or denial of any part of the Bill of Rights, is a violation wanting justice; and furthermore, any curtailment of American liberty in the name of the alleged “War on Terror” is criminal.
So the Bill of Rights has been violated by the government and its corporate lackeys, and the government now feels justified in snooping into every American’s life in a most personal way. The NSA’s Unlawful Surveillance of every American’s private life is a centerpiece in this collage. That is one thing. Here is another thing:
James Bamford  is the author who brought to light the now-infamous “Northwoods Document”. He is also a favorite author, having written the definitive tome on the NSA – Body Of Secrets – and the more-recent “The Shadow Factory”. Bamford is also the guy who fingered the NSA’s massive Data Center in Utah, which is another centerpiece in this collage. Now James Bamford has a new article published over at WIRED. It will not offend if you take pause here and go to WIRED’s site and read Mr. Bamford’s masterpiece.
>>>embedded link: http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/
I’ll get you started with these few lines from the beginning of the piece:
Quoting – Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.
This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.
Alexander runs the nation’s cyberwar efforts, an empire he has built over the past eight years by insisting that the US’s inherent vulnerability to digital attacks requires him to amass more and more authority over the data zipping around the globe. In his telling, the threat is so mind-bogglingly huge that the nation has little option but to eventually put the entire civilian Internet under his protection, requiring tweets and emails to pass through his filters, and putting the kill switch under the government’s forefinger. “What we see is an increasing level of activity on the networks,” he said at a recent security conference in Canada. “I am concerned that this is going to break a threshold where the private sector can no longer handle it and the government is going to have to step in.”
End Quoting. The four-star General who runs the US Cyber Command thinks that the benevolent government “is going to have to step in”. This is one of the guys who is in charge of collecting up all of your and my phone calls and emails and Internet postings and all the other stuff which is now being fused into bulk data troves to be stored in Utah for future data mining.
Please read that powerful article at WIRED, <here>
>>>embedded link for above- http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/
So let’s add General Alexander’s Central Security Service and the US Cyber Command as two more centerpieces of this collage. That gives us so far the NSA, the Data Center in Utah, the CSS, and the US Cyber Command. Together in our collage those imply the existence of a fifth centerpiece for this collage. That would be –
>>>embedded link COG-
COG is “Continuity of Government”. COG would have a unique application for all four of the foregoing centerpieces. The first time, to my knowledge, that COG surfaced to the attention of the American public was during the U.S. Senate hearings on the Iran-Contra-Mena scandal in the 1980s. In those hearings Texas Representative Jack Brooks queried Colonel Oliver North as to his relationship with Continuity of Government. The shadowy secret powers shut that question down quite smartly, then and there. Watch:
>>>insert Brooks vid
Brooks was on to something big. Here is a clue as to just how big COG can be –
[Emphasis in original]
A new article by investigative reporter Christopher Ketcham reveals, a governmental unit operating in secret and with no oversight whatsoever is gathering massive amounts of data on every American and running artificial intelligence software to predict each American’s behavior, including “what the target will do, where the target will go, who it will turn to for help”.
The same governmental unit is responsible for suspending the Constitution and implementing martial law in the event that anything is deemed by the White House in its sole discretion to constitute a threat to the United States. (this is formally known as implementing “Continuity of Government” plans). [Background here.]
As Ketcham’s article makes clear, these same folks and their predecessors have been busy dreaming up plans to imprison countless “trouble-making” Americans without trial in case of any real or imagined emergency. What kind of Americans? Ketcham describes it this way:
“Dissidents and activists of various stripes, political and tax protestors, lawyers and professors, publishers and journalists, gun owners, illegal aliens, foreign nationals, and a great many other harmless, average people.”
Do we want the same small group of folks who have the power to suspend the Constitution, implement martial law, and imprison normal citizens to also be gathering information on all Americans and running AI programs to be able to predict where American citizens will go for help and what they will do in case of an emergency? Don’t we want the government to — um, I don’t know — help us in case of an emergency?
Bear in mind that the Pentagon is also running an AI program to see how people will react to propaganda and to government-inflicted terror. The program is called Sentient World Simulation:
Continuing with excerpts from Washington’s Blog –
“The technology behaves like a robot, understanding and answering complex questions,” said a former Aquaint researcher. “Think of 2001: A Space Odyssey and the most memorable character, HAL 9000, having a conversation with David. We are essentially building this system. We are building HAL.”(…snip)
A supersmart search engine, capable of answering complex questions such as “What were the major issues in the last 10 presidential elections?” would be very useful for the public. But that same capability in the hands of an agency like the NSA—absolutely secret, often above the law, resistant to oversight, and with access to petabytes of private information about Americans—could be a privacy and civil liberties nightmare. “We must not forget that the ultimate goal is to transfer research results into operational use,” said Aquaint project leader John Prange, in charge of information exploitation for IARPA.
Once up and running, the database of old newspapers could quickly be expanded to include an inland sea of personal information scooped up by the agency’s warrantless data suction hoses. Unregulated, they could ask it to determine which Americans might likely pose a security risk—or have sympathies toward a particular cause, such as the antiwar movement, as was done during the 1960s and 1970s. The Aquaint robospy might then base its decision on the type of books a person purchased online, or chat room talk, or websites visited—or a similar combination of data. Such a system would have an enormous chilling effect on everyone’s everyday activities—what will the Aquaint computer think if I buy this book, or go to that website, or make this comment? Will I be suspected of being a terrorist or a spy or a subversive? (snip…)
Herald reporter Ryan Gallagher wrote that Raytheon had “secretly developed software capable of tracking people’s movements and predicting future behavior by mining data from social networking websites” like Facebook, Twitter, and Foursquare.
The software is called RIOT, or Rapid Information Overlay Technology.
Raytheon told the Herald it has not sold RIOT to any clients but admitted that, in 2010, it had shared the program’s software technology with the U.S. government as part of a “joint research and development effort … to help build a national security system capable of analyzing ‘trillions of entities’ from cyberspace.”
In April, RIOT was reportedly showcased at a U.S. government and industry national security conference for secretive, classified innovations, where it was listed under the category “big data – analytics, algorithms.”
Jay Stanley, senior policy analyst for the ACLU Speech, Privacy and Technology Project, argued … that among the many problems with government large-scale analytics of social network information “is the prospect that government agencies will blunderingly use these techniques to tag, target and watchlist people coughed up by programs such as RIOT, or to target them for further invasions of privacy based on incorrect inferences.”
“The chilling effects of such activities,” he concluded, “while perhaps gradual, would be tremendous.”
Ginger McCall, attorney and director of the Electronic Privacy Information Center’s Open Government program, told NBC in February, “This sort of software allows the government to surveil everyone.
“It scoops up a bunch of information about totally innocent people. There seems to be no legitimate reason to get this, other than that they can.”
End Quoted passages from Washington’s Blog. Emphasis in original. Read whole article at this link: http://www.washingtonsblog.com/2013/06/the-next-nsa-spying-shoe-to-drop-…
Sentient world: war games on the grandest scale
By Mark Baard, 23rd June 2007
Perhaps your real life is so rich you don’t have time for another.
Even so, the US Department of Defense (DOD) may already be creating a copy of you in an alternate reality to see how long you can go without food or water, or how you will respond to televised propaganda.
The DOD is developing a parallel to Planet Earth, with billions of individual “nodes” to reflect every man, woman, and child this side of the dividing line between reality and AR.
Called the Sentient World Simulation (SWS), it will be a “synthetic mirror of the real world with automated continuous calibration with respect to current real-world information”, according to a concept paper for the project.
“SWS provides an environment for testing Psychological Operations (PSYOP),” the paper reads, so that military leaders can “develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners”.
SWS also replicates financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers believe they can predict how individuals and mobs will respond to various stressors.
Misc Related Links
Devvy Kidd’s article on NSA (and Sibel’s interview with Tice)
Sibel Edmonds Boiling Frog Interview with Russ Tice
The download page: http://boilingfrogspost.com/wp-content/uploads/BF.0112.Tice_20130617.mp3
This is the page to use in Email blasts and articles, Sibel’s site:
The top secret rules that allow NSA to use US data without a warrant
Russ Tice: http://en.wikipedia.org/wiki/Russ_Tice