military

The technical details of executions by hanging

From Daniel Engber’s “How Do Hangings Work?” (Slate: 7 November 2006):

The last major innovation in hanging occurred toward the end of the 19th century, when executioners first developed a systematic way to calculate the drop. Once these “drop tables” were published, a hangman knew that he’d need 7 feet for a slight, 120-pound criminal, but only about 4 feet for a 200-pounder.

In the United States, only Washington and New Hampshire still perform hangings. These jurisdictions follow now-defunct U.S. Army regulations for the punishment. The military rules demand 30 feet of hemp rope that has been boiled, stretched, and dried. The bottom of the rope should be greased or waxed to make sure that the knot of the noose doesn’t get snagged, and the whole system should be tested with a sandbag dummy before the actual hanging takes place.

The Army even has its own drop table. According to its guidelines, the last man to hang in America—220-pound Billy Bailey—would have required 5 feet of loose rope. …

The Army drop table turned out to be inadequate for Mitchell Rupe, a Washington inmate who was supposed to hang in 1994. On death row, Rupe refused all exercise and ate junk food nonstop. By the time of his execution he’d reached 409 pounds, well above the table’s maximum listed weight. According to Army regulations, anyone heavier than 220 pounds would get a 5-foot drop. The Washington authorities made an exception and cut Rupe’s planned drop to 3.5 feet. Rupe appealed his case, and a federal judge ruled that the risk of decapitation was still too high. Rupe died in a prison hospital this past February.

The technical details of executions by hanging Read More »

A summary of Galbraith’s The Affluent Society

From a summary of John Kenneth Galbraith’s The Affluent Society (Abridge Me: 1 June 2010):

The Concept of the Conventional Wisdom

The paradigms on which society’s perception of reality are based are highly conservative. People invest heavily in these ideas, and so are heavily resistant to changing them. They are only finally overturned by new ideas when new events occur which make the conventional wisdom appear so absurd as to be impalpable. Then the conventional wisdom quietly dies with its most staunch proponents, to be replaced with a new conventional wisdom. …

Economic Security

… Economics professors argue that the threat of unemployment is necessary to maintain incentives to high productivity, and simultaneously that established professors require life tenure in order to do their best work. …

The Paramount Position of Production

… Another irrationality persists (more in America than elsewhere?): the prestigious usefulness of private-sector output, compared to the burdensome annoyance of public expenditure. Somehow public expenditure can never quite be viewed as a productive and enriching element of national output; it is forever something to be avoided, at best a necessary encumbrance. Cars are important, roads are not. An expansion in telephone services improves the general well-being, cuts in postal services are a necessary economy. Vacuum cleaners to ensure clean houses boast our standard of living, street cleaners are an unfortunate expense. Thus we end up with clean houses and filthy streets. …

[W]e have wants at the margin only so far as they are synthesised. We do not manufacture wants for goods we do not produce. …

The Dependence Effect

… Modern consumer demand, at the margin, does not originate from within the individual, but is a consequence of production. It has two origins:

  1. Emulation: the desire to keep abreast of, or ahead of one’s peer group — demand originating from this motivation is created indirectly by production. Every effort to increase production to satiate want brings with it a general raising of the level of consumption, which itself increases want.
  2. Advertising: the direct influence of advertising and salesmanship create new wants which the consumer did not previously possess. Any student of business has by now come to view marketing as fundamental a business activity as production. Any want that can be significantly moulded by advertising cannot possibly have been strongly felt in the absence of that advertising — advertising is powerless to persuade a man that he is or is not hungry.

Inflation

… In 1942 a grateful and very anxious citizenry rewarded its soldiers, sailors, and airmen with a substantial increase in pay. In the teeming city of Honolulu, in prompt response to this advance in wage income, the prostitutes raised the prices of their services. This was at a time when, if anything, increased volume was causing a reduction in their average unit costs. However, in this instance the high military authorities, deeply angered by what they deemed improper, immoral, and indecent profiteering, ordered a return to the previous scale. …

The Theory of Social Balance

The final problem of the affluent society is the balance of goods it produces. Private goods: TVs, cars, cigarettes, drugs and alcohol are overproduced; public goods: education, healthcare, police services, park provision, mass transport and refuse disposal are underproduced. The consequences are extremely severe for the wellbeing of society. The balance between private and public consumption will be referred to as ‘the social balance’. The main reason for this imbalance is relatively straightforward. The forces we have identified which increase consumer demand as production rises (advertising and emulation) act almost entirely on the private sector. …

It is arguable that emulation acts on public services to an extent: a new school in one district may encourage neighbouring districts to ‘keep up’, but the effect is relatively miniscule.

Thus, private demand is artificially inflated and public demand is not, and the voter-consumer decides how to split his income between the two at the ballot box: inevitably public expenditure is grossly underrepresented. …

A summary of Galbraith’s The Affluent Society Read More »

David Foster Wallace on the impossibility of being informed & the seduction of dogma

From David Foster Wallace’s “Introduction” (The Best American Essays 2007):

Here is an overt premise. There is just no way that 2004’s reelection could have taken place—not to mention extraordinary renditions, legalized torture, FISA-flouting, or the
passage of the Military Commissions Act—if we had been paying attention and handling information in a competent grown-up way. ‘We’ meaning as a polity and culture. The premise does not entail specific blame—or rather the problems here are too entangled and systemic for good old-fashioned finger-pointing. It is, for one example, simplistic and wrong to blame the for-profit media for somehow failing to make clear to us the moral and practical hazards of trashing the Geneva Conventions. The for-profit media is highly attuned to what we want and the amount of detail we’ll sit still for. And a ninety-second news piece on the question of whether and how the Geneva Conventions ought to apply in an era of asymmetrical warfare is not going to explain anything; the relevant questions are too numerous and complicated, too fraught with contexts in everything from civil law and military history to ethics and game theory. One could spend a hard month just learning the history of the Conventions’ translation into actual codes of conduct for the U.S. military … and that’s not counting the dramatic changes in those codes since 2002, or the question of just what new practices violate (or don’t) just which Geneva provisions, and according to whom. Or let’s not even mention the amount of research, background, cross- checking, corroboration, and rhetorical parsing required to understand the cataclysm of Iraq, the collapse of congressional oversight, the ideology of neoconservatism, the legal status of presidential signing statements, the political marriage of evangelical Protestantism and corporatist laissez-faire … There’s no way. You’d simply drown. We all would. It’s amazing to me that no one much talks about this—about the fact that whatever our founders and framers thought of as a literate, informed citizenry can no longer exist, at least not without a whole new modern degree of subcontracting and dependence packed into what we mean by ‘informed.’8

8 Hence, by the way, the seduction of partisan dogma. You can drown in dogmatism now, too— radio, Internet, cable, commercial and scholarly print— but this kind of drowning is more like sweet release. Whether hard right or new left or whatever, the seduc- tion and mentality are the same. You don’t have to feel confused or inundated or ignorant. You don’t even have to think, for you already Know, and whatever you choose to learn confirms what you Know. This dog- matic lockstep is not the kind of inevitable dependence I’m talking about—or rather it’s only the most extreme and frightened form of that dependence.

David Foster Wallace on the impossibility of being informed & the seduction of dogma Read More »

Could Green Dam lead to the largest botnet in history?

Green_Damn_site_blocked.jpg

From Rob Cottingham’s “From blocking to botnet: Censorship isn’t the only problem with China’s new Internet blocking software” (Social Signal: 10 June 2009):

Any blocking software needs to update itself from time to time: at the very least to freshen its database of forbidden content, and more than likely to fix bugs, add features and improve performance. (Most anti-virus software does this.)

If all the software does is to refresh the list of banned sites, that limits the potential for abuse. But if the software is loading new executable code onto the computer, suddenly there’s the potential for something a lot bigger.

Say you’re a high-ranking official in the Chinese military. And let’s say you have some responsibility for the state’s capacity to wage so-called cyber warfare: digital assaults on an enemy’s technological infrastructure.

It strikes you: there’s a single backdoor into more that 40 million Chinese computers, capable of installing… well, nearly anything you want.

What if you used that backdoor, not just to update blocking software, but to create something else?

Say, the biggest botnet in history?

Still, a botnet 40 million strong (plus the installed base already in place in Chinese schools and other institutions) at the beck and call of the military is potentially a formidable weapon. Even if the Chinese government has no intention today of using Green Dam for anything other than blocking pornography, the temptation to repurpose it for military purposes may prove to be overwhelming.

Could Green Dam lead to the largest botnet in history? Read More »

Al Qaeda’s use of social networking sites

From Brian Prince’s “How Terrorism Touches the ‘Cloud’ at RSA” (eWeek: 23 April 2009):

When it comes to the war on terrorism, not all battles, intelligence gathering and recruitment happen in the street. Some of it occurs in the more elusive world of the Internet, where supporters of terrorist networks build social networking sites to recruit and spread their message.  
Enter Jeff Bardin of Treadstone 71, a former code breaker, Arabic translator and U.S. military officer who has been keeping track of vBulletin-powered sites run by supporters of al Qaeda. There are between 15 and 20 main sites, he said, which are used by terrorist groups for everything from recruitment to the distribution of violent videos of beheadings.

… “One social networking site has over 200,000 participants. …

The videos on the sites are produced online by a company called “As-Sahab Media” (As-Sahab means “the cloud” in English). Once shot, the videos make their way from hideouts to the rest of the world via a system of couriers. Some of them contain images of violence; others exhortations from terrorist leaders. Also on the sites are tools such as versions of “Mujahideen Secrets,” which is used for encryption.

“It’s a pretty solid tool; it’s not so much that the tool is so much different from the new PGP-type [tool], but the fact is they built it from scratch, which shows a very mature software development lifecycle,” he said.

Al Qaeda’s use of social networking sites Read More »

David Foster Wallace on leadership

From David Foster Wallace’s “The Weasel, Twelve Monkeys And The Shrub: Seven Days In The Life Of The Late, Great John McCain” (Rolling Stone: 13 April 2000):

The weird thing is that the word “leader” itself is cliché and boring, but when you come across somebody who actually is a real leader, that person isn’t cliché or boring at all; in fact he’s sort of the opposite of cliché and boring.

Obviously, a real leader isn’t just somebody who has ideas you agree with, nor is it just somebody you happen to think is a good guy. A real leader is somebody who, because of his own particular power and charisma and example, is able to inspire people, with “inspire” being used here in a serious and non-cliché way. A real leader can somehow get us to do certain things that deep down we think are good and want to be able to do but usually can’t get ourselves to do on our own. It’s a mysterious quality, hard to define, but we always know it when we see it, even as kids. You can probably remember seeing it in certain really great coaches, or teachers, or some extremely cool older kid you “looked up to” (interesting phrase) and wanted to be just like. Some of us remember seeing the quality as kids in a minister or rabbi, or a Scoutmaster, or a parent, or a friend’s parent, or a supervisor in a summer job. And yes, all these are “authority figures,” but it’s a special kind of authority. If you’ve ever spent time in the military, you know how incredibly easy it is to tell which of your superiors are real leaders and which aren’t, and how little rank has to do with it. A leader’s real “authority” is a power you voluntarily give him, and you grant him this authority not with resentment or resignation but happily; it feels right. Deep down, you almost always like how a real leader makes you feel, the way you find yourself working harder and pushing yourself and thinking in ways you couldn’t ever get to on your own.

Lincoln was, by all available evidence, a real leader, and Churchill, and Gandhi, and King. Teddy and Franklin Roosevelt, and de Gaulle, and certainly Marshall and maybe Eisenhower. (Of course Hitler was a real leader too, a very powerful one, so you have to watch out; all it is is a weird kind of power.)

Now you have to pay close attention to something that’s going to seem real obvious. There is a difference between a great leader and a great salesman. Because a salesman’s ultimate, overriding motivation is his own self-interest. If you buy what he’s selling, the salesman profits. So even though the salesman may have a very powerful, charismatic, admirable personality, and might even persuade you that buying really is in your interest (and it really might be) — still, a little part of you always knows that what the salesman’s ultimately after is something for himself. And this awareness is painful … although admittedly it’s a tiny pain, more like a twinge, and often unconscious. But if you’re subjected to enough great salesmen and salespitches and marketing concepts for long enough — like from your earliest Saturday-morning cartoons, let’s say — it is only a matter of time before you start believing deep down that everything is sales and marketing, and that whenever somebody seems like they care about you or about some noble idea or cause, that person is a salesman and really ultimately doesn’t give a shit about you or some cause but really just wants something for himself.

Yes, this is simplistic. All politicians sell, always have. FDR and JFK and MLK and Gandhi were great salesmen. But that’s not all they were. People could smell it. That weird little extra something. It had to do with “character” (which, yes, is also a cliché — suck it up).

David Foster Wallace on leadership Read More »

Socioeconomic analysis of MySpace & Facebook

From danah boyd’s “Viewing American class divisions through Facebook and MySpace” (danah boyd: 24 June 2007):

When MySpace launched in 2003, it was primarily used by 20/30-somethings (just like Friendster before it). The bands began populating the site by early 2004 and throughout 2004, the average age slowly declined. It wasn’t until late 2004 that teens really started appearing en masse on MySpace and 2005 was the year that MySpace became the “in thing” for teens.

Facebook launched in 2004 as a Harvard-only site. It slowly expanded to welcome people with .edu accounts from a variety of different universities. In mid-2005, Facebook opened its doors to high school students, but it wasn’t that easy to get an account because you needed to be invited. As a result, those who were in college tended to invite those high school students that they liked. Facebook was strongly framed as the “cool” thing that college students did.

In addition to the college framing, the press coverage of MySpace as dangerous and sketchy alienated “good” kids. Facebook seemed to provide an ideal alternative. Parents weren’t nearly as terrified of Facebook because it seemed “safe” thanks to the network-driven structure.

She argues that class divisions in the United States have more to do with lifestyle and social stratification than with income. In other words, all of my anti-capitalist college friends who work in cafes and read Engels are not working class just because they make $14K a year and have no benefits. Class divisions in the United States have more to do with social networks (the real ones, not FB/MS), social capital, cultural capital, and attitudes than income. Not surprisingly, other demographics typically discussed in class terms are also a part of this lifestyle division. Social networks are strongly connected to geography, race, and religion; these are also huge factors in lifestyle divisions and thus “class.”

The goodie two shoes, jocks, athletes, or other “good” kids are now going to Facebook. These kids tend to come from families who emphasize education and going to college. They are part of what we’d call hegemonic society. They are primarily white, but not exclusively. They are in honors classes, looking forward to the prom, and live in a world dictated by after school activities.

MySpace is still home for Latino/Hispanic teens, immigrant teens, “burnouts,” “alternative kids,” “art fags,” punks, emos, goths, gangstas, queer kids, and other kids who didn’t play into the dominant high school popularity paradigm. These are kids whose parents didn’t go to college, who are expected to get a job when they finish high school. These are the teens who plan to go into the military immediately after schools. Teens who are really into music or in a band are also on MySpace. MySpace has most of the kids who are socially ostracized at school because they are geeks, freaks, or queers.

In order to demarcate these two groups, let’s call the first group of teens “hegemonic teens” and the second group “subaltern teens.”

Most teens who exclusively use Facebook are familiar with and have an opinion about MySpace. These teens are very aware of MySpace and they often have a negative opinion about it. They see it as gaudy, immature, and “so middle school.” They prefer the “clean” look of Facebook, noting that it is more mature and that MySpace is “so lame.” What hegemonic teens call gaudy can also be labeled as “glitzy” or “bling” or “fly” (or what my generation would call “phat”) by subaltern teens. Terms like “bling” come out of hip-hop culture where showy, sparkly, brash visual displays are acceptable and valued. The look and feel of MySpace resonates far better with subaltern communities than it does with the upwardly mobile hegemonic teens. … That “clean” or “modern” look of Facebook is akin to West Elm or Pottery Barn or any poshy Scandinavian design house (that I admit I’m drawn to) while the more flashy look of MySpace resembles the Las Vegas imagery that attracts millions every year. I suspect that lifestyles have aesthetic values and that these are being reproduced on MySpace and Facebook.

I should note here that aesthetics do divide MySpace users. The look and feel that is acceptable amongst average Latino users is quite different from what you see the subculturally-identified outcasts using. Amongst the emo teens, there’s a push for simple black/white/grey backgrounds and simplistic layouts. While I’m using the term “subaltern teens” to lump together non-hegemonic teens, the lifestyle divisions amongst the subalterns are quite visible on MySpace through the aesthetic choices of the backgrounds. The aesthetics issue is also one of the forces that drives some longer-term users away from MySpace.

Teens from poorer backgrounds who are on MySpace are less likely to know people who go to universities. They are more likely to know people who are older than them, but most of their older friends, cousins, and co-workers are on MySpace. It’s the cool working class thing and it’s the dominant SNS at community colleges. These teens are more likely to be interested in activities like shows and clubs and they find out about them through MySpace. The subaltern teens who are better identified as “outsiders” in a hegemonic community tend to be very aware of Facebook. Their choice to use MySpace instead of Facebook is a rejection of the hegemonic values (and a lack of desire to hang out with the preps and jocks even online).

Class divisions in military use

A month ago, the military banned MySpace but not Facebook. This was a very interesting move because the division in the military reflects the division in high schools. Soldiers are on MySpace; officers are on Facebook. Facebook is extremely popular in the military, but it’s not the SNS of choice for 18-year old soldiers, a group that is primarily from poorer, less educated communities. They are using MySpace. The officers, many of whom have already received college training, are using Facebook. The military ban appears to replicate the class divisions that exist throughout the military. …

MySpace is the primary way that young soldiers communicate with their peers. When I first started tracking soldiers’ MySpace profiles, I had to take a long deep breath. Many of them were extremely pro-war, pro-guns, anti-Arab, anti-Muslim, pro-killing, and xenophobic as hell. Over the last year, I’ve watched more and more profiles emerge from soldiers who aren’t quite sure what they are doing in Iraq. I don’t have the data to confirm whether or not a significant shift has occurred but it was one of those observations that just made me think. And then the ban happened. I can’t help but wonder if part of the goal is to cut off communication between current soldiers and the group that the military hopes to recruit.

Thoughts and meta thoughts

People often ask me if I’m worried about teens today. The answer is yes, but it’s not because of social network sites. With the hegemonic teens, I’m very worried about the stress that they’re under, the lack of mobility and healthy opportunities for play and socialization, and the hyper-scheduling and surveillance. I’m worried about their unrealistic expectations for becoming rich and famous, their lack of work ethic after being pampered for so long, and the lack of opportunities that many of them have to even be economically stable let alone better off than their parents. I’m worried about how locking teens indoors coupled with a fast food/junk food advertising machine has resulted in a decrease in health levels across the board which will just get messy as they are increasingly unable to afford health insurance. When it comes to ostracized teens, I’m worried about the reasons why society has ostracized them and how they will react to ongoing criticism from hegemonic peers. I cringe every time I hear of another Columbine, another Virgina Tech, another site of horror when an outcast teen lashes back at the hegemonic values of society.

I worry about the lack of opportunities available to poor teens from uneducated backgrounds. I’m worried about how Wal-Mart Nation has destroyed many of the opportunities for meaningful working class labor as these youth enter the workforce. I’m worried about what a prolonged war will mean for them. I’m worried about how they’ve been told that to succeed, they must be a famous musician or sports player. I’m worried about how gangs provide the only meaningful sense of community that many of these teens will ever know.

Given the state of what I see in all sorts of neighborhoods, I’m amazed at how well teens are coping and I think that technology has a lot to do with that. Teens are using social network sites to build community and connect with their peers. They are creating publics for socialization. And through it, they are showcasing all of the good, bad, and ugly of today’s teen life.

In the 70s, Paul Willis analyzed British working class youth and he wrote a book called Learning to Labor: How Working Class Kids Get Working Class Jobs. He argued that working class teens will reject hegemonic values because it’s the only way to continue to be a part of the community that they live in. In other words, if you don’t know that you will succeed if you make a run at jumping class, don’t bother – you’ll lose all of your friends and community in the process. His analysis has such strong resonance in American society today. I just wish I knew how to fix it.

Socioeconomic analysis of MySpace & Facebook Read More »

US government makes unsafe RFID-laden passports even less safe through business practices

From Bill Gertz’s “Outsourced passports netting govt. profits, risking national security” (The Washington Times: 26 March 2008):

The United States has outsourced the manufacturing of its electronic passports to overseas companies — including one in Thailand that was victimized by Chinese espionage — raising concerns that cost savings are being put ahead of national security, an investigation by The Washington Times has found.

The Government Printing Office’s decision to export the work has proved lucrative, allowing the agency to book more than $100 million in recent profits by charging the State Department more money for blank passports than it actually costs to make them, according to interviews with federal officials and documents obtained by The Times.

The profits have raised questions both inside the agency and in Congress because the law that created GPO as the federal government’s official printer explicitly requires the agency to break even by charging only enough to recover its costs.

Lawmakers said they were alarmed by The Times’ findings and plan to investigate why U.S. companies weren’t used to produce the state-of-the-art passports, one of the crown jewels of American border security.

Officials at GPO, the Homeland Security Department and the State Department played down such concerns, saying they are confident that regular audits and other protections already in place will keep terrorists and foreign spies from stealing or copying the sensitive components to make fake passports.

“Aside from the fact that we have fully vetted and qualified vendors, we also note that the materials are moved via a secure transportation means, including armored vehicles,” GPO spokesman Gary Somerset said.

But GPO Inspector General J. Anthony Ogden, the agency’s internal watchdog, doesn’t share that confidence. He warned in an internal Oct. 12 report that there are “significant deficiencies with the manufacturing of blank passports, security of components, and the internal controls for the process.”

The inspector general’s report said GPO claimed it could not improve its security because of “monetary constraints.” But the inspector general recently told congressional investigators he was unaware that the agency had booked tens of millions of dollars in profits through passport sales that could have been used to improve security, congressional aides told The Times.

GPO is an agency little-known to most Americans, created by Congress almost two centuries ago as a virtual monopoly to print nearly all of the government’s documents … Since 1926, it also has been charged with the job of printing the passports used by Americans to enter and leave the country.

Each new e-passport contains a small computer chip inside the back cover that contains the passport number along with the photo and other personal data of the holder. The data is secured and is transmitted through a tiny wire antenna when it is scanned electronically at border entry points and compared to the actual traveler carrying it.

According to interviews and documents, GPO managers rejected limiting the contracts to U.S.-made computer chip makers and instead sought suppliers from several countries, including Israel, Germany and the Netherlands.

After the computer chips are inserted into the back cover of the passports in Europe, the blank covers are shipped to a factory in Ayutthaya, Thailand, north of Bangkok, to be fitted with a wire Radio Frequency Identification, or RFID, antenna. The blank passports eventually are transported to Washington for final binding, according to the documents and interviews.

The stop in Thailand raises its own security concerns. The Southeast Asian country has battled social instability and terror threats. Anti-government groups backed by Islamists, including al Qaeda, have carried out attacks in southern Thailand and the Thai military took over in a coup in September 2006.

The Netherlands-based company that assembles the U.S. e-passport covers in Thailand, Smartrac Technology Ltd., warned in its latest annual report that, in a worst-case scenario, social unrest in Thailand could lead to a halt in production.

Smartrac divulged in an October 2007 court filing in The Hague that China had stolen its patented technology for e-passport chips, raising additional questions about the security of America’s e-passports.

Transport concerns

A 2005 document obtained by The Times states that GPO was using unsecure FedEx courier services to send blank passports to State Department offices until security concerns were raised and forced GPO to use an armored car company. Even then, the agency proposed using a foreign armored car vendor before State Department diplomatic security officials objected.

Questionable profits

The State Department is now charging Americans $100 or more for new e-passports produced by the GPO, depending on how quickly they are needed. That’s up from a cost of around just $60 in 1998.

Internal agency documents obtained by The Times show each blank passport costs GPO an average of just $7.97 to manufacture and that GPO then charges the State Department about $14.80 for each, a margin of more than 85 percent, the documents show.

The accounting allowed GPO to make gross profits of more than $90 million from Oct. 1, 2006, through Sept. 30, 2007, on the production of e-passports. The four subsequent months produced an additional $54 million in gross profits.

The agency set aside more than $40 million of those profits to help build a secure backup passport production facility in the South, still leaving a net profit of about $100 million in the last 16 months.

GPO plans to produce 28 million blank passports this year up from about 9 million five years ago.

US government makes unsafe RFID-laden passports even less safe through business practices Read More »

A one-way ticket to crazyville

Tanguma's The Children of the World Dream of P...
Image by rsgranne via Flickr
Tanguma's The Children of the World Dream of P...
Image by rsgranne via Flickr
Tanguma's The Children of the World Dream of P...
Image by rsgranne via Flickr

From Dave Alan’s “Interview with Alex Christopher” (Leading Edge Research Group: 1 June 1996):

Legend: DA [Dave Alan, Host] AC: [Alex Christopher] C: [Caller]

(Note: according to former British Intelligence agent Dr. John Coleman, the London-based Wicca Mason lodges are one-third of the overall global conspiracy. The other two thirds are the Black Nobility banking families who claim direct descent from the early Roman emperors, and also the Maltese Jesuits or the Jesuit – Knights of Malta network. All three networks each have 13 representatives within the Bilderberg organization, which is a cover for the Bavarian Illuminati, suggestive that Bavaria itself has orchestrated a “marriage of convenience” between these three formerly competitive global control groups. – Branton)

AC: All right. The information, primarily, that is in “Pandora’s Box” covers how the major corporations, railroad and banking concerns in this country were set up through a ‘trust’ that was originally known as the Virginia Company… The deal was that everything would remain under English control, or subservient to it, and that brings us right up to today, because we are still looking at everything falling under that ‘trust’ system going back to the Crown of England. It is mind boggling to think that everyone in this country has been led to believe that the people in the United States had won independence from England, when in fact they never did.

AC: The capstone, or the dedication stone, for the Denver airport has a Masonic symbol on it. A whole group of us went out to the airport to see some friends off and see this capstone, which also has a time capsule imbedded inside it. It sits at the south eastern side of the terminal which, by the way, is called “The Great Hall”, which is what Masons refer to as their meeting hall. And, on this thing it mentions “the New World Airport Commission”. …

AC: It has a Masonic symbol on it, and it also has very unusual geometric designs. It depicts an arm rising up out of it that curves at a 45 degree angle. It also has a thing that looks like a keypad on it. This capstone structure is made of carved granite and stainless steel, and it is very fancy.. This little keypad area at the end of the arm has an out-of-place unfinished wooden block sitting on it. The gentleman that was with me on the first trip out to the airport has since died. They say he committed suicide, but everything else tells me that this is not possible. No one can double-tie a catheter behind his own neck and strangle himself. I just don’t think that is possible. But, his name was Phil Schneider, and he started blowing the whistle on all this stuff going on in the underground bases that he had helped build for years and years. He worked on the underground bases at Area 51 and Dulce, New Mexico, as well as several other places. Schneider told me that this keypad-looking area looked like a form of techno-geometry that is “alien-oriented”, and that it had something to do with a “directional system”, whatever that meant, that functioned as a homing beacon to bring ships right into the “Great Hall”.

(Note: … Remember even through the Bilderbergers consist of a “marriage of convenience” between Londonese Wicca Masons, Basilian Black Nobility and Roman Maltese Jesuits… the supreme controllers of the Bildeberger cult itself are the secret black Gnostic cults of Bavaria whose ‘Cult of the Serpent’ — or Illuminati — can be traced back to Egypt and ultimately to Babylon itself. These Rockefeller-Nazi projects reportedly continued through at least 1975 during which period many thousands more “underground Nazis” were brought into America from Europe and also, if we are to believe some reports, from the secret German “New Berlin” base under the mountains of Neu Schwabenland, Antarctica that was established during World War II via Nazi-occupied South Africa. Is Neu Schwabenland the REAL power behind the joint Bavarian-Alien New World Order Agenda? …)

AC: … It took myself and two other people over eight months to figure out all the symbology that is embodied in these murals. It turned out that some of these are ‘trigger’ pictures, containing symbology designed to trigger altered personalities of people that have been groomed in MKULTRA type programs for specific tasks that they have been trained to do in terms of something connected with Satanic rituals and mind control. I had one woman that called me out of the blue one night, and she was really disturbed about some information. She told me many different things that later turned out to be known MKULTRA triggers. Also, almost every aspect of these murals contains symbols relating back to secret societies. When you get the overall view of what they are talking about in these things, it is very very scary. It goes back to the Bio-diversity Treaty, getting rid of specific races of people, taking over the world and mind control.

AC: Well, the gentleman that I was dealing with, Phil Schneider, said that during the last year of construction they were connecting the underground airport system to the deep underground base. He told me that there was at least an eight-level deep underground base there, and that there was a 4.5 square mile underground city and an 88.5 square-mile base underneath the airport.

DA: You were telling me that there are huge concrete corridors with sprinklers all along the ceiling. What are these sprinkler heads doing in a concrete bunker, pray tell? (Presumably concrete will not ‘burn’ if there is a potential fire, so is it possible that something other than ‘water’ is meant to be expelled from these sprinklers which are located “all along” the ceiling? – Branton)

AC: I think a lot of the people saw things that disturbed them so much that they would not talk about it. I know several people who worked on the project that managed to find their way down into the depths, probably close to the deep underground base, and saw things that scared them so badly they won’t talk about it. I interviewed a few of the former employees on these construction crews that worked out there on these buildings that ended up buried, and they are afraid to talk. They say that everybody is real nervous about it, and they decided to tell some of the secrets that they knew, but they don’t want anybody to know who they are. So, I can tell you that it is a very unusual and spooky type of place, and if you are a sensitive person you get nauseated as soon as you enter the perimeter of the airport. Especially when you go down underground. You become very nauseated a nervous. There is also so much electromagnetic flux in the area that if you get out on the open ground around the airport, you will ‘buzz’.

AC: If Phil is right, and all this hooks up to the deep underground base that he was offered the plans to build back in 1979, and that what this other man TOLD me in private [is] that there is a lot of human SLAVE LABOR in these deep underground bases being used by these aliens, and that a lot of this slave labor is children. HE SAID that when the children reach the point that they are unable to work any more, they are slaughtered on the spot and consumed.

DA: Consumed by who?

AC: Aliens. Again, this is not from me, but from a man that gave his life to get this information out. He worked down there for close to 20 years, and he knew everything that was going on.

DA: Hmmm. Who do these aliens eat?

AC: They specifically like young human children, that haven’t been contaminated like adults. Well, there is a gentleman out giving a lot of information from a source he gets it from, and he says that there is an incredible number of children snatched in this country.

DA: Over 200,000 each year.

AC: And that these children are the main entree for dinner.

AC: Yes. From some information that has been put out by a group or team that also works in these underground bases that is trying to get information out to people that love this country, THERE IS A WAR THAT IS GOING ON UNDER OUT FEET, AND ABOVE OUR HEADS, that the public doesn’t know anything about, and its between these ALIEN forces and the HUMANS that are trying to fight them.

DA: What other types have you seen?

AC: The ones that I have seen are the big-eyed Greys and the Reptilians.

DA: What do these Reptilians look like?

AC: There are three different types.

AC: … Anyway, they were both totally flipped out. I finally got them calmed down enough to let me go home. I went home and went to bed. The next thing I know, I woke up and there is this ‘thing’ standing over my bed. He had wrap-around yellow eyes with snake pupils, and pointed ears and a grin that wrapped around his head. He had a silvery suit on, and this scared the living daylights out of me. I threw the covers over my head and started screaming….I mean, here is this thing with a Cheshire-cat grin and these funky glowing eyes…this is too much. I have seen that kind of being on more than one occasion.

DA: What else can you say about it?

AC: Well, he had a hooked nose and he was [humanoid] looking, other than the eyes, and had kind of grayish skin. Later on in 1991, I was working in a building in a large city, and I had taken a break about 6:00, and the next thing I knew it was 10:30 at night, and I thought I had taken a short break. I started remembering that I was taken aboard a ship, through four floors of an office building, and through a roof. There on the ship is were I encountered ‘GERMANS’ AND ‘AMERICANS’ WORKING TOGETHER, and also the GREY ALIENS, and then we were taken to some other kind of facility and there I saw the REPTILIANS again … the one’s I call the “baby Godzilla’s”, that have the short teeth and yellow slanted eyes, and who look like a VELOCI-RAPTOR, kind of.

DA: So, why would these people pick on you?

AC: Well, I found one common denominator in the abduction, and it keeps on being repeated over and over again. I deal with lots of people who have been abducted, and the one common denominator seems to be the blood line, and its the blood line that goes back to ancient Indian or Native American blood lines.

AC: Well, at that facility I saw the almond-eyed Greys, but the thing that sticks in my mind are the beings that look like reptiles, or the veloci-raptors. They are the cruelest beings you could ever imagine, and they even smell hideous. There were a couple of very unusual areas down there where I was taken which looked like cold storage lockers, where these things were in hibernation tubes, and that is about all I remember, other than seeing some black helicopters and little round-wing disk type aircraft

In the book “Cosmic Conflict”, the author talks about the ancient city that was uncovered by the Germans before World War II, and tells about their effort to revive some frozen humans they found in this underground city, and that the true humans couldn’t be revived, but the ones that could be revived were in fact reptilians in disguise, and the reptilians have the capability to do shape-shifting and create a [laser] holographic image so when you look at them you see a human, but under that there is no human there. … Allegedly the reptilians re-animated and killed the Soviet scientists and through some type of psychic osmosis drained their minds and assimilated their memories and features through a molecular shape-shifting type process. … The alien ‘impostors’ then called for backup and more scientists came out and were ‘replaced’, and these eventually returned to Russia and began to infiltrate the Communist government.

AC: These people that have done all this research and are part of the underground government are telling that the humans on this planet have been at war with these reptilian aliens for thousands of years. At one point, things got so hot on the planet, like it is now, aliens took on this holographic image and infiltrated the human race in order to take it over and undermine it, just like this New World Order is doing right now. They’re saying that the same thing happened to civilization on Earth before, and that the humans before actually had the capability for interplanetary travel, and that it was so bad here with the reptilians that they had to leave… What they are also saying is that these beings that are human-looking that are visiting our planet, at this time, trying to inform people what is going on, and guide them, are actually OUR ANCESTORS THAT ESCAPED FROM EARTH before, when it was under reptilian domination.

AC: I went to South Florida a couple of weeks ago and interviewed a man who had done research for 30 years, and oddly enough, he tapped into some of the same information I had, in that our government has had round-winged, saucer-type technology, high mach speed aircraft since the 1920’s, and that in 1952 they had over 500 of these aircraft hidden in secret bases. Now, if they had that in 1952, considering that military technology grows by 44 years for every year that goes by, what do you imagine they have now, 44 years later, after technology has advanced the equivalent of 1,936 years?

AC: He claims to be one of the ones who jumped overboard off the Eldridge when it went into hyperspace during the Philadelphia Experiment. He actually traveled forward in time, and asked the people that he encountered there what happened in his future. At that time, he was given the information about the New World Order and that Denver was the location for the NWO Western Sector, and that Atlanta was supposed to be the control center for the Eastern Sector. Can it be that the fact that the Olympics is supposed to be in Atlanta is part of a scenario?

A one-way ticket to crazyville Read More »

Denver International Airport, home to alien reptilians enslaving children in deep dungeons

From Jared Jacang Maher’s “DIA Conspiracies Take Off” (Denver Westword News: 30 August 2007):

Chris from Indianapolis has heard that the tunnels below DIA [Denver International Airport] were constructed as a kind of Noah’s Ark so that five million people could escape the coming earth change; shaken and earnest, he asks how someone might go about getting on the list.

Today, dozens of websites are devoted to the “Denver Airport Conspiracy,” and theorists have even nicknamed the place “Area 52.” Wikipedia presents DIA as a primary example of New World Order symbolism, above the entry about the eyeball/pyramid insignia on the one-dollar bill. And over the past two years, DIA has been the subject of books, articles, documentaries, radio interviews and countless YouTube and forum board postings, all attempting to unlock its mysteries. While the most extreme claim maintains that a massive underground facility exists below the airport where an alien race of reptilian humanoids feeds on missing children while awaiting the date of government-sponsored rapture, all of the assorted theories share a common thread: The key to decoding the truth about DIA and the sinister forces that control our reality is contained within the two Tanguma murals, “In Peace and Harmony With Nature” and “The Children of the World Dream of Peace.”

And not all these theorists are Unabomber-like crackpots uploading their hallucinations from basement lairs. Former BBC media personality David Icke, for example, has written twenty books in his quest to prove that the world is controlled by an elite group of reptilian aliens known as the Babylonian Brotherhood, whose ranks include George W. Bush, Queen Elizabeth II, the Jews and Kris Kristofferson. In various writings, lectures and interviews, he has long argued that DIA is one of many home bases for the otherworldly creatures, a fact revealed in the lizard/alien-faced military figure shown in Tanguma’s murals.

“Denver is scheduled to be the Western headquarters of the US New World Order during martial law take over,” Icke wrote in his 1999 book, The Biggest Secret. “Other contacts who have been underground at the Denver Airport claim that there are large numbers of human slaves, many of them children, working there under the control of the reptilians.”

On the other end of the conspiracy spectrum is anti-vaccination activist Dr. Len Horowitz, who believes that global viruses such as AIDS, Ebola, West Nile, tuberculosis and SARS are actually population-control plots engineered by the government. The former dentist from Florida does not speak about 2012 or reptiles — in fact, he sees Icke’s Jewish alien lizards as a Masonic plot to divert observers from the true earthly enemies: remnants of the Third Reich. He even used the mural’s sword-wielding military figure as the front cover of his 2001 book, Death in the Air.

“The Nazi alien symbolizes the Nazi-fascist links between contemporary population controllers and the military-medical-petrochemical-pharmaceutical cartel largely accountable for Hitler’s rise to power,” Horowitz explained in a 2003 interview with BookWire.

Although conspiracy theories vary widely, they all share three commonalities. “One is the belief that nothing happens by accident,” [Syracuse University professor Michael Barkun, author of the 2006 book A Culture of Conspiracy] points out. “Another is that everything is connected. And a third is that nothing is as it seems.” [Emphasis added]

[Alex] Christopher is a 65-year-old grandmother living in Alabama.

Christopher, on the other hand, was open to hearing anything. A man called her and said he had found an elevator at DIA that led to a corridor that led all the way down into a military base that also contained alien-operated concentration camps. She detailed this theory in her next book, Pandora’s Box II…

And the scale of DIA reflected this desire: It was to be the largest, most modern airport in the world. But almost as soon as ground was broken in 1989, problems cropped up. The massive public-works project was encumbered by design changes, difficult airline negotiations, allegations of cronyism in the contracting process, rumors of mismanagement and real troubles with the $700 million (and eventually abandoned) automated baggage system. Peña’s successor, Wellington Webb, was forced to push back the 1993 opening date three times. By the time DIA finally opened in February 1995, the original $1.5 billion cost had grown to $5.2 billion. Three months after that opening, the Congressional Subcommittee on Aviation held a special hearing on DIA in which one member said the Denver airport represented the “worst in government inefficiency, political behind-the-scenes deal-making, and financial mismanagement.” …

And what looked like a gamble in 1995 seems to have paid off for Denver. Today, DIA is considered one of the world’s most efficient, spacious and technologically advanced airports. It is the fifth-busiest in the nation and tenth-busiest in the world, serving some 50 million passengers in 2006.

Denver International Airport, home to alien reptilians enslaving children in deep dungeons Read More »

The NSA and threats to privacy

From James Bamford’s “Big Brother Is Listening” (The Atlantic: April 2006):

This legislation, the 1978 Foreign Intelligence Surveillance Act, established the FISA court—made up of eleven judges handpicked by the chief justice of the United States—as a secret part of the federal judiciary. The court’s job is to decide whether to grant warrants requested by the NSA or the FBI to monitor communications of American citizens and legal residents. The law allows the government up to three days after it starts eavesdropping to ask for a warrant; every violation of FISA carries a penalty of up to five years in prison. Between May 18, 1979, when the court opened for business, until the end of 2004, it granted 18,742 NSA and FBI applications; it turned down only four outright.

Such facts worry Jonathan Turley, a George Washington University law professor who worked for the NSA as an intern while in law school in the 1980s. The FISA “courtroom,” hidden away on the top floor of the Justice Department building (because even its location is supposed to be secret), is actually a heavily protected, windowless, bug-proof installation known as a Sensitive Compartmented Information Facility, or SCIF.

It is true that the court has been getting tougher. From 1979 through 2000, it modified only two out of 13,087 warrant requests. But from the start of the Bush administration, in 2001, the number of modifications increased to 179 out of 5,645 requests. Most of those—173—involved what the court terms “substantive modifications.”

Contrary to popular perception, the NSA does not engage in “wiretapping”; it collects signals intelligence, or “sigint.” In contrast to the image we have from movies and television of an FBI agent placing a listening device on a target’s phone line, the NSA intercepts entire streams of electronic communications containing millions of telephone calls and e-mails. It runs the intercepts through very powerful computers that screen them for particular names, telephone numbers, Internet addresses, and trigger words or phrases. Any communications containing flagged information are forwarded by the computer for further analysis.

Names and information on the watch lists are shared with the FBI, the CIA, the Department of Homeland Security, and foreign intelligence services. Once a person’s name is in the files, even if nothing incriminating ever turns up, it will likely remain there forever. There is no way to request removal, because there is no way to confirm that a name is on the list.

In December of 1997, in a small factory outside the southern French city of Toulouse, a salesman got caught in the NSA’s electronic web. Agents working for the NSA’s British partner, the Government Communications Headquarters, learned of a letter of credit, valued at more than $1.1 million, issued by Iran’s defense ministry to the French company Microturbo. According to NSA documents, both the NSA and the GCHQ concluded that Iran was attempting to secretly buy from Microturbo an engine for the embargoed C-802 anti-ship missile. Faxes zapping back and forth between Toulouse and Tehran were intercepted by the GCHQ, which sent them on not just to the NSA but also to the Canadian and Australian sigint agencies, as well as to Britain’s MI6. The NSA then sent the reports on the salesman making the Iranian deal to a number of CIA stations around the world, including those in Paris and Bonn, and to the U.S. Commerce Department and the Customs Service. Probably several hundred people in at least four countries were reading the company’s communications.

Such events are central to the current debate involving the potential harm caused by the NSA’s warrantless domestic eavesdropping operation. Even though the salesman did nothing wrong, his name made its way into the computers and onto the watch lists of intelligence, customs, and other secret and law-enforcement organizations around the world. Maybe nothing will come of it. Maybe the next time he tries to enter the United States or Britain he will be denied, without explanation. Maybe he will be arrested. As the domestic eavesdropping program continues to grow, such uncertainties may plague innocent Americans whose names are being run through the supercomputers even though the NSA has not met the established legal standard for a search warrant. It is only when such citizens are turned down while applying for a job with the federal government—or refused when seeking a Small Business Administration loan, or turned back by British customs agents when flying to London on vacation, or even placed on a “no-fly” list—that they will realize that something is very wrong. But they will never learn why.

General Michael Hayden, director of the NSA from 1999 to 2005 and now principal deputy director of national intelligence, noted in 2002 that during the 1990s, e-communications “surpassed traditional communications. That is the same decade when mobile cell phones increased from 16 million to 741 million—an increase of nearly 50 times. That is the same decade when Internet users went from about 4 million to 361 million—an increase of over 90 times. Half as many land lines were laid in the last six years of the 1990s as in the whole previous history of the world. In that same decade of the 1990s, international telephone traffic went from 38 billion minutes to over 100 billion. This year, the world’s population will spend over 180 billion minutes on the phone in international calls alone.”

Intercepting communications carried by satellite is fairly simple for the NSA. The key conduits are the thirty Intelsat satellites that ring the Earth, 22,300 miles above the equator. Many communications from Europe, Africa, and the Middle East to the eastern half of the United States, for example, are first uplinked to an Intelsat satellite and then downlinked to AT&T’s ground station in Etam, West Virginia. From there, phone calls, e-mails, and other communications travel on to various parts of the country. To listen in on that rich stream of information, the NSA built a listening post fifty miles away, near Sugar Grove, West Virginia. Consisting of a group of very large parabolic dishes, hidden in a heavily forested valley and surrounded by tall hills, the post can easily intercept the millions of calls and messages flowing every hour into the Etam station. On the West Coast, high on the edge of a bluff overlooking the Okanogan River, near Brewster, Washington, is the major commercial downlink for communications to and from Asia and the Pacific. Consisting of forty parabolic dishes, it is reportedly the largest satellite antenna farm in the Western Hemisphere. A hundred miles to the south, collecting every whisper, is the NSA’s western listening post, hidden away on a 324,000-acre Army base in Yakima, Washington. The NSA posts collect the international traffic beamed down from the Intelsat satellites over the Atlantic and Pacific. But each also has a number of dishes that appear to be directed at domestic telecommunications satellites.

Until recently, most international telecommunications flowing into and out of the United States traveled by satellite. But faster, more reliable undersea fiber-optic cables have taken the lead, and the NSA has adapted. The agency taps into the cables that don’t reach our shores by using specially designed submarines, such as the USS Jimmy Carter, to attach a complex “bug” to the cable itself. This is difficult, however, and undersea taps are short-lived because the batteries last only a limited time. The fiber-optic transmission cables that enter the United States from Europe and Asia can be tapped more easily at the landing stations where they come ashore. With the acquiescence of the telecommunications companies, it is possible for the NSA to attach monitoring equipment inside the landing station and then run a buried encrypted fiber-optic “backhaul” line to NSA headquarters at Fort Meade, Maryland, where the river of data can be analyzed by supercomputers in near real time.

Tapping into the fiber-optic network that carries the nation’s Internet communications is even easier, as much of the information transits through just a few “switches” (similar to the satellite downlinks). Among the busiest are MAE East (Metropolitan Area Ethernet), in Vienna, Virginia, and MAE West, in San Jose, California, both owned by Verizon. By accessing the switch, the NSA can see who’s e-mailing with whom over the Internet cables and can copy entire messages. Last September, the Federal Communications Commission further opened the door for the agency. The 1994 Communications Assistance for Law Enforcement Act required telephone companies to rewire their networks to provide the government with secret access. The FCC has now extended the act to cover “any type of broadband Internet access service” and the new Internet phone services—and ordered company officials never to discuss any aspect of the program.

The National Security Agency was born in absolute secrecy. Unlike the CIA, which was created publicly by a congressional act, the NSA was brought to life by a top-secret memorandum signed by President Truman in 1952, consolidating the country’s various military sigint operations into a single agency. Even its name was secret, and only a few members of Congress were informed of its existence—and they received no information about some of its most important activities. Such secrecy has lent itself to abuse.

During the Vietnam War, for instance, the agency was heavily involved in spying on the domestic opposition to the government. Many of the Americans on the watch lists of that era were there solely for having protested against the war. … Even so much as writing about the NSA could land a person a place on a watch list.

For instance, during World War I, the government read and censored thousands of telegrams—the e-mail of the day—sent hourly by telegraph companies. Though the end of the war brought with it a reversion to the Radio Act of 1912, which guaranteed the secrecy of communications, the State and War Departments nevertheless joined together in May of 1919 to create America’s first civilian eavesdropping and code-breaking agency, nicknamed the Black Chamber. By arrangement, messengers visited the telegraph companies each morning and took bundles of hard-copy telegrams to the agency’s offices across town. These copies were returned before the close of business that day.

A similar tale followed the end of World War II. In August of 1945, President Truman ordered an end to censorship. That left the Signal Security Agency (the military successor to the Black Chamber, which was shut down in 1929) without its raw intelligence—the telegrams provided by the telegraph companies. The director of the SSA sought access to cable traffic through a secret arrangement with the heads of the three major telegraph companies. The companies agreed to turn all telegrams over to the SSA, under a plan code-named Operation Shamrock. It ran until the government’s domestic spying programs were publicly revealed, in the mid-1970s.

Frank Church, the Idaho Democrat who led the first probe into the National Security Agency, warned in 1975 that the agency’s capabilities

“could be turned around on the American people, and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it is done, is within the reach of the government to know. Such is the capacity of this technology.”

The NSA and threats to privacy Read More »

The Chinese Internet threat

From Shane Harris’ “China’s Cyber-Militia” (National Journal: 31 May 2008):

Computer hackers in China, including those working on behalf of the Chinese government and military, have penetrated deeply into the information systems of U.S. companies and government agencies, stolen proprietary information from American executives in advance of their business meetings in China, and, in a few cases, gained access to electric power plants in the United States, possibly triggering two recent and widespread blackouts in Florida and the Northeast, according to U.S. government officials and computer-security experts.

One prominent expert told National Journal he believes that China’s People’s Liberation Army played a role in the power outages. Tim Bennett, the former president of the Cyber Security Industry Alliance, a leading trade group, said that U.S. intelligence officials have told him that the PLA in 2003 gained access to a network that controlled electric power systems serving the northeastern United States. The intelligence officials said that forensic analysis had confirmed the source, Bennett said. “They said that, with confidence, it had been traced back to the PLA.” These officials believe that the intrusion may have precipitated the largest blackout in North American history, which occurred in August of that year. A 9,300-square-mile area, touching Michigan, Ohio, New York, and parts of Canada, lost power; an estimated 50 million people were affected.

Bennett, whose former trade association includes some of the nation’s largest computer-security companies and who has testified before Congress on the vulnerability of information networks, also said that a blackout in February, which affected 3 million customers in South Florida, was precipitated by a cyber-hacker. That outage cut off electricity along Florida’s east coast, from Daytona Beach to Monroe County, and affected eight power-generating stations.

A second information-security expert independently corroborated Bennett’s account of the Florida blackout. According to this individual, who cited sources with direct knowledge of the investigation, a Chinese PLA hacker attempting to map Florida Power & Light’s computer infrastructure apparently made a mistake.

The industry source, who conducts security research for government and corporate clients, said that hackers in China have devoted considerable time and resources to mapping the technology infrastructure of other U.S. companies. That assertion has been backed up by the current vice chairman of the Joint Chiefs of Staff, who said last year that Chinese sources are probing U.S. government and commercial networks.

“The Chinese operate both through government agencies, as we do, but they also operate through sponsoring other organizations that are engaging in this kind of international hacking, whether or not under specific direction. It’s a kind of cyber-militia.… It’s coming in volumes that are just staggering.”

In addition to disruptive attacks on networks, officials are worried about the Chinese using long-established computer-hacking techniques to steal sensitive information from government agencies and U.S. corporations.

Brenner, the U.S. counterintelligence chief, said he knows of “a large American company” whose strategic information was obtained by its Chinese counterparts in advance of a business negotiation. As Brenner recounted the story, “The delegation gets to China and realizes, ‘These guys on the other side of the table know every bottom line on every significant negotiating point.’ They had to have got this by hacking into [the company’s] systems.”

During a trip to Beijing in December 2007, spyware programs designed to clandestinely remove information from personal computers and other electronic equipment were discovered on devices used by Commerce Secretary Carlos Gutierrez and possibly other members of a U.S. trade delegation, according to a computer-security expert with firsthand knowledge of the spyware used. Gutierrez was in China with the Joint Commission on Commerce and Trade, a high-level delegation that includes the U.S. trade representative and that meets with Chinese officials to discuss such matters as intellectual-property rights, market access, and consumer product safety. According to the computer-security expert, the spyware programs were designed to open communications channels to an outside system, and to download the contents of the infected devices at regular intervals. The source said that the computer codes were identical to those found in the laptop computers and other devices of several senior executives of U.S. corporations who also had their electronics “slurped” while on business in China.

The Chinese make little distinction between hackers who work for the government and those who undertake cyber-adventures on its behalf. “There’s a huge pool of Chinese individuals, students, academics, unemployed, whatever it may be, who are, at minimum, not discouraged from trying this out,” said Rodger Baker, a senior China analyst for Stratfor, a private intelligence firm. So-called patriotic-hacker groups have launched attacks from inside China, usually aimed at people they think have offended the country or pose a threat to its strategic interests. At a minimum the Chinese government has done little to shut down these groups, which are typically composed of technologically skilled and highly nationalistic young men.

The military is not waiting for China, or any other nation or hacker group, to strike a lethal cyber-blow. In March, Air Force Gen. Kevin Chilton, the chief of U.S. Strategic Command, said that the Pentagon has its own cyberwar plans. “Our challenge is to define, shape, develop, deliver, and sustain a cyber-force second to none,” Chilton told the Senate Armed Services Committee. He asked appropriators for an “increased emphasis” on the Defense Department’s cyber-capabilities to help train personnel to “conduct network warfare.”

The Air Force is in the process of setting up a Cyberspace Command, headed by a two-star general and comprising about 160 individuals assigned to a handful of bases. As Wired noted in a recent profile, Cyberspace Command “is dedicated to the proposition that the next war will be fought in the electromagnetic spectrum and that computers are military weapons.” The Air Force has launched a TV ad campaign to drum up support for the new command, and to call attention to cyberwar. “You used to need an army to wage a war,” a narrator in the TV spot declares. “Now all you need is an Internet connection.”

The Chinese Internet threat Read More »

Modern piracy on the high seas

From Charles Glass’ “The New Piracy: Charles Glass on the High Seas” (London Review of Books: 18 December 2003):

Ninety-five per cent of the world’s cargo travels by sea. Without the merchant marine, the free market would collapse and take Wall Street’s dream of a global economy with it. Yet no one, apart from ship owners, their crews and insurers, appears to notice that pirates are assaulting ships at a rate unprecedented since the glorious days when pirates were ‘privateers’ protected by their national governments. The 18th and 19th-century sponsors of piracy included England, Holland, France, Spain and the United States. In comparison, the famed Barbary corsairs of North Africa were an irritant. Raiding rivals’ merchant vessels went out of fashion after the Napoleonic Wars, and piracy was outlawed in the 1856 Declaration of Paris (never signed by the US). Since the end of the Cold War, it has been making a comeback. Various estimates are given of its cost to international trade. The figure quoted most often is the Asia Foundation’s $16 billion per annum lost in cargo, ships and rising insurance premiums.

The International Maritime Bureau (IMB), which collects statistics on piracy for ship owners, reports that five years ago pirates attacked 106 ships. Last year they attacked 370. This year looks worse still.

In waters where piracy flourished in the past, the tradition embodied in figures such as Captain Kidd has persisted: off the Ganges delta in Bangladesh, in the Java and South China Seas, off the Horn of Africa and in the Caribbean. Three conditions appear necessary: a tradition of piracy; political instability; and rich targets – Spanish galleons for Drake, oil tankers for his descendants. A fourth helps to explain the ease with which it happens: ‘The maritime environment,’ Gunaratna said, ‘is the least policed in the world today.’

The IMB has not been able to persuade the international community or the more powerful maritime states to take serious action. The Bureau’s director, Captain Pottengal Mukundan, believes there is nothing crews can do to protect themselves. National maritime laws are not enforced beyond national boundaries – which is to say, over more than half the earth’s surface. Beyond territorial waters, there are no laws, no police and no jurisdiction. Many countries lack the will or the resources to police even their own waters. The IMB advises all ships against putting in anywhere near states like Somalia, for instance, where there is a near certainty of attack. … Piracy is a high-profit, low-risk activity.

The IMB urges crews to take more precautions, but owners can’t afford every recommended improvement: satellite-tracking devices, closed circuit cameras, electric fencing and security officers on every ship. Owners and trade unions discourage the arming of merchant ships in the belief that firearms will put crews’ lives at greater risk. Only the Russians and the Israelis are known to keep weapons aboard. Competition in the shipping business forces owners to minimise expenditure on crews as on everything else. A commission of inquiry into the 1989 Exxon Valdez spill that nearly destroyed the Alaskan coast reported that ‘tankers in the 1950s carried a crew of 40 to 42 to manage about 6.3 million gallons of oil . . . the Exxon Valdez carried a crew of 19 to transport 53 million gallons of oil.’ [Quoted in Dangerous Waters: Modern Piracy and Terror on the High Seas by John Burnett] With the automation of many shipboard tasks, vessels today carry even fewer seamen than they did when the Exxon Valdez ran aground. That means fewer eyes to monitor the horizon and the decks for intruders.

Air and land transport routes have come under tighter scrutiny since 11 September 2001, but improvements to maritime security are few. An oil tanker can carry a load that is far, far more explosive than any civil aircraft. And most piracy, including the seizure of oil tankers, takes place near countries with powerful Islamist movements – Indonesia, Malaysia, the Philippines, Yemen and Somalia. Lloyd’s List reported on 4 November that Indonesia is ‘the global black spot’ with 87 attacks in the first nine months of this year – ‘the number of attacks in the Malacca Straits leaped from 11 in 2002 to 24 this year.’ Indonesia, which consists of two thousand islands, is the world’s most populous Muslim country. It has experienced decades of repression by a kleptocratic military, communal violence and the degradation of a once vibrant economy. Radical Islamists have made it the focus of their activity and recruitment in Asia.

Modern piracy on the high seas Read More »

A coup in Equatorial Guinea for fun

From Laura Miller’s “Rent-a-coup” (Salon: 17 August 2006):

In March 2004, a group of men with a hired army of about 70 mercenary soldiers set out to topple the government of the tiny West African nation of Equatorial Guinea and install a new one. Ostensibly led by a political opposition leader but actually controlled by the white mercenary officers, this new regime would plunder the recently discovered oil wealth of Equatorial Guinea, enriching the coup’s architects by billions of dollars.

The Wonga Coup never came off, but not because of the kind of double-crossing anticipated in that early planning document. … One of the strangest aspects of the story is that the Wonga Coup nearly replicated an earlier failed attempt to take over Equatorial Guinea in 1973. And that coup had since been fictionalized in a bestselling book, popular with the mercenary crowd, by Frederick Forsyth, “The Dogs of War.” A case of life imitating art imitating life? The truth is even more bizarrely convoluted: Roberts has found evidence that Forsyth himself financed the 1973 coup. (And Forsyth has more or less admitted as much.)

The 2004 coup plotters made noises about installing a better leader, but their real motives were “wonga” — British slang for money — and something less tangible. “It’s fun,” said one observer. “Some of the guys did it for kicks, because life is boring.” …

Arrayed against rent-a-coup schemers like Mann is a breed that Roberts calls the “rag-and-bone intelligence dealer,” a kind of freelance spy who “darts about Africa with a laptop and satellite phone, lingering in hotel bars, picking up scraps of information where he can, selling them to willing buyers, whether corporate or government. The more sophisticated use electronic, online or other surveillance.”

A coup in Equatorial Guinea for fun Read More »

Why the US toppled Chile’s government

From Robert Sherrill’s “100 (Plus) Years of Regime Change” (The Texas Observer: 14 July 2006):

Kissinger, then secretary of state, was certain he detected the odor of communism in the election of Salvador Allende Gossens to the presidency of Chile. …

Chile was one of the most stable countries in South America, with a high literacy rate, a relatively large middle class, and a strong civil society. But millions of its people lived in desperate poverty, and Allende made no secret of his ambition to lift that class – and to do it by controlling some of the giant corporations operating in Chile but owned by yanquis.

Topping his hit list, besides consumer-product companies like PepsiCo Inc., were the world’s two largest copper mining companies, Kennecott Corp. and Anaconda Mining Co., and International Telephone and Telegraph Co., all owned by U.S. interests. Allende wanted the Chilean government to take them over. …

Kinzer’s account of these rebellious years ends with the death of Allende in La Moneda, the presidential palace and traditional seat of Chilean democracy. He had been president for 1,042 days. He refused an offer of free passage out of the country and committed suicide.

So Kissinger and Nixon and Rockefeller and their friends got what they wanted: a Chile run by Gen. Augusto Pinochet, who took office after the coup of September 11, 1973.

Why the US toppled Chile’s government Read More »

Why the US toppled Guatamala’s democratic government

From Robert Sherrill’s “100 (Plus) Years of Regime Change” (The Texas Observer: 14 July 2006):

At roughly the same time Secretary of State Dulles was destroying democracy in Iran, he was also busy destroying democracy in Central America, and once again it was on behalf of a renegade industry: United Fruit Co. …

“Few private companies have ever been as closely interwoven with the United States government as United Fruit was during the mid-1950s,” writes Kinzer. For decades, Dulles had been one of its principal legal counselors. (At one time Dulles negotiated an agreement with Guatemala that gave United Fruit a 99-year lease on a vast tract of land, tax free.) Dulles’ brother – Allen, the CIA Director – had also done legal work for the company and owned a big block of its stock. So did other top officials at State; one had previously been president of United Fruit. The head of our National Security Council was United Fruit’s former chairman of the board, and the president of the International Bank for Reconstruction and Development was a former board member.

These fine chaps and their numerous colleagues in our government were, not surprisingly, very upset when between 1944 and 1954, Guatemala entered what would be known as its “democratic spring,” denoting the presidencies of Juan José Arevalo and – after the first peaceful transfer of power in Guatemalan history – Jacobo Arbenz.

What those two did was nothing less than breathtaking. Under Arevalo, the National Assembly was persuaded to establish the first social security system, guarantee the rights of trade unions, fix a 48-hour workweek, and even slap a modest tax on the big landholders – meaning three American companies: a huge electric monopoly, a rail monopoly, and, of course, United Fruit, which controlled the other two.

Arbenz was even bolder. He persuaded the National Assembly to pass the Agrarian Reform Law, which gave the government the power to seize and redistribute uncultivated land on estates larger than 672 acres. United Fruit owned more than 550,000 acres, about one-fifth of the country’s arable land, but cultivated less than 15 percent – while many thousands of Guatemalans were starving for land. So in 1953, Arbenz’s government seized 234,000 uncultivated acres of United Fruit’s land, for which the government offered in compensation (one can imagine the vengeful hilarity this must have stirred in Arbenz’s circle) a paltry $1.185 million – the value United Fruit had declared each year for tax purposes. …

Arbenz was forced into exile and replaced by Col. Carlos Armas, who promptly canceled reforms and established a police state.

Why the US toppled Guatamala’s democratic government Read More »

Why the US toppled Iran’s government

From Robert Sherrill’s “100 (Plus) Years of Regime Change” (The Texas Observer: 14 July 2006):

In 1953 the brutal, venal shah of Iran, Mohammad Reza Pahlavi, was pushed into exile by Mohammad Mossadegh, the democratically elected prime minister. …

Iranians loved Mossadegh. He made clear that his two ambitions were to set up a lasting democracy and to strengthen nationalism – by which he meant get rid of the Anglo-Iranian Oil Co., which had been robbing Iran for half a century. Indeed, the British company had been earning each year as much as all the royalties it paid Iran over 50 years. Mossadegh intended to recapture those riches to rebuild Iran.

In a scheme to get rid of Mossadegh, the British enlisted Secretary of State [John Foster] Dulles; he in turn enlisted his brother, CIA Director Allen Dulles, and what ensued was a truly masterful piece of skullduggery. … The CIA plotters ousted Mossadegh and restored the shah to his Peacock Throne.

For Secretary of State Dulles and his old law clients – including Gulf Oil Corp., Standard Oil Co. of New Jersey, Texaco Inc., and Mobil Corp., who were subsequently allowed to take 40 percent of Iran’s oil supply – the shah’s return was a happy and very lucrative event.

Why the US toppled Iran’s government Read More »

The neutron bomb as the most moral weapon possible

From Charles Platt’s “The Profits of Fear” (August 2005):

Sam Cohen might have remained relatively unknown, troubled by ethical lapses in government and the military but unable to do anything about them, if he had not visited Seoul in 1951, during the Korean war. In the aftermath of bombing sorties he witnessed scenes of intolerable devastation. Civilians wandered like zombies through the ruins of a city in which all services had ceased. Children were drinking water from gutters that were being used as sewers. “I’d seen countless pictures of Hiroshima by then,” Cohen recalls, “and what I saw in Seoul was precious little different. . . . The question I asked of myself was something like: If we’re going to go on fighting these damned fool wars in the future, shelling and bombing cities to smithereens and wrecking the lives of their surviving inhabitants, might there be some kind of nuclear weapon that could avoid all this?”

Here was a singularly odd idea: To re-engineer the most inhumane and destructive weapon of all time, so that it would _reduce_ human suffering. Cohen’s unique achievement was to prove that this could in fact be done.

His first requirement was that wars should be fought as they had been historically, confining their damage to military combatants while towns and cities remained undamaged and their civilian inhabitants remained unscathed. …

Ideally he wanted to reduce blast damage to zero, to eliminate the wholesale demolition of civilian housing, services, and amenities that he had witnessed in Seoul. He saw a way to achieve this if a fusion reaction released almost all of its energy as radiation. Moreover, if this radiation consisted of neutrons, which carry no charge, it would not poison the environment with residual radioactivity.

The bomb would still kill people–but this was the purpose of all weapons. _If_ wars were liable to recur (which Cohen thought was probable), soldiers were going to use weapons of some kind against each other, and everyone would benefit if the weapons minimized pain and suffering while ending the conflict as rapidly as possible.

Cohen came up with a design for a warhead about one-tenth as powerful as the atomic bombs dropped on Japan. If it was detonated at 3,000 feet above ground level, its blast effects would be negligible while its neutron radiation would be powerful enough to cause death within a circle about one mile in diameter. This was the battlefield weapon that came to be known as the neutron bomb.

Such a weapon obviously would be more civilized than large-scale hydrogen bombs, and would also be more humane than conventional bombs, because it would create an all-or-nothing, live-or-die scenario in which no one would be wounded. A stream of neutrons cannot maim people. It will not burn their flesh, spill their blood, or break their bones. Those who receive a non-lethal dose will recover after a period of intense nausea and diarrhea, and Cohen estimated that their risk of subsequent cancer would be no greater than the risk we experience as a result of exposure to second-hand cigarette smoke. As for the rest, death would come relatively quickly, primarily from shock to the central nervous system. As he put it in his typically candid style, “I doubt whether the agony an irradiated soldier goes through in the process of dying is any worse than that produced by having your body charred to a crisp by napalm, your guts being ripped apart by shrapnel, your lungs blown in by concussion weapons, and all those other sweet things that happen when conventional weapons (which are preferred and anointed by our official policy) are used.”

After assessing every aspect and implication of his concept, he reached his modest conclusion: “The neutron bomb has to be the most moral weapon ever invented.”

The neutron bomb as the most moral weapon possible Read More »

America, the failed state

From Noam Chomsky’s “Why It’s Over For America” (The Independent: 30 May 2006):

… the fear, which cannot casually be put aside, that, as Gar Alperowitz puts it in America Beyond Capitalism, “the American ‘system’ as a whole is in real trouble – that it is heading in a direction that spells the end of its historic values [of] equality, liberty, and meaningful democracy.”

The “system” is coming to have some of the features of failed states, to adopt a currently fashionable notion that is conventionally applied to states regarded as potential threats to our security (like Iraq) or as needing our intervention to rescue the population from severe internal threats (like Haiti). Though the concept is recognized to be, according to the journal Foreign Affairs, “frustratingly imprecise,” some of the primary characteristics of failed states can be identified. One is their inability or unwillingness to protect their citizens from violence and perhaps even destruction. Another is their tendency to regard themselves as beyond the reach of domestic or international law, and hence free to carry out aggression and violence. And if they have democratic forms, they suffer from a serious “democratic deficit” that deprives their formal democratic institutions of real substance. …

Declarations of noble intent by systems of power are rarely complete fabrication, and the same is true in this case. Under some conditions, forms of democracy are indeed acceptable. Abroad, as the leading scholar-advocate of “democracy promotion” concludes, we find a “strong line of continuity”: democracy is acceptable if and only if it is consistent with strategic and economic interests (Thomas Carothers). In modified form, the doctrine holds at home as well. …

The persistence of the strong line of continuity to the present again reveals that the United States is very much like other powerful states. It pursues the strategic and economic interests of dominant sectors of the domestic population, to the accompaniment of rhetorical flourishes about its dedication to the highest values. That is practically a historical universal, and the reason why sensible people pay scant attention to declarations of noble intent by leaders, or accolades by their followers.

America, the failed state Read More »