Top Secret America

Moderators: Elvis, DrVolin, Jeff

(repost for new page top...)

Postby JackRiddler » Tue May 25, 2021 1:49 pm

READ THIS AT YOUR OWN RISK

'The largest undercover force the world has ever known is the one created by the Pentagon over the past decade. Some 60,000 people now belong to this secret army, many working under masked identities and in low profile, all part of a broad program called "signature reduction." The force, more than ten times the size of the clandestine elements of the CIA, carries out domestic and foreign assignments, both in military uniforms and under civilian cover, in real life and online, sometimes hiding in private businesses and consultancies, some of them household name companies.'


Exclusive: Inside the Military's Secret Undercover Army
BY WILLIAM M. ARKIN ON 5/17/21 AT 5:30 AM EDT
https://www.newsweek.com/exclusive-insi ... my-1591881


The unprecedented shift has placed an ever greater number of soldiers, civilians, and contractors working under false identities, partly as a natural result in the growth of secret special forces but also as an intentional response to the challenges of traveling and operating in an increasingly transparent world. The explosion of Pentagon cyber warfare, moreover, has led to thousands of spies who carry out their day-to-day work in various made-up personas, the very type of nefarious operations the United States decries when Russian and Chinese spies do the same.

Newsweek's exclusive report on this secret world is the result of a [*cough limited hangout, doubtless but...] two-year investigation involving the examination of over 600 resumes and 1,000 job postings, dozens of Freedom of Information Act requests, and scores of interviews with participants and defense decision-makers. What emerges is a window into not just a little-known sector of the American military, but also a completely unregulated practice. No one knows the program's total size, and the explosion of signature reduction has never been examined for its impact on military policies and culture. Congress has never held a hearing on the subject. And yet the military developing this gigantic clandestine force challenges U.S. laws, the Geneva Conventions, the code of military conduct and basic accountability.

The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force—doing everything from creating false documentation and paying the bills (and taxes) of individuals operating under assumed names, to manufacturing disguises and other devices to thwart detection and identification, to building invisible devices to photograph and listen in on activity in the most remote corners of the Middle East and Africa.


Special operations forces constitute over half the entire signature reduction force, the shadow warriors who pursue terrorists in war zones from Pakistan to West Africa but also increasingly work in unacknowledged hot spots, including behind enemy lines in places like North Korea and Iran. Military intelligence specialists—collectors, counter-intelligence agents, even linguists—make up the second largest element: thousands deployed at any one time with some degree of "cover" to protect their true identities.

The newest [hardly, but...] and fastest growing group is the clandestine army that never leaves their keyboards. These are the cutting-edge cyber fighters and intelligence collectors who assume false personas online, employing "nonattribution" and "misattribution" techniques to hide the who and the where of their online presence while they search for high-value targets and collect what is called "publicly accessible information"—or even engage in campaigns to influence and manipulate social media. Hundreds work in and for the NSA, but over the past five years, every military intelligence and special operations unit has developed some kind of "web" operations cell that both collects intelligence and tends to the operational security of its very activities.

In the electronic era, a major task of signature reduction is keeping all of the organizations and people, even the automobiles and aircraft involved in the clandestine operations, masked. This protective effort entails everything from scrubbing the Internet of telltale signs of true identities to planting false information to protect missions and people. As standard unforgettable identification and biometrics have become worldwide norms, the signature reduction industry also works to figure out ways of spoofing and defeating everything from fingerprinting and facial recognition at border crossings, to ensuring that undercover operatives can enter and operate in the United States, manipulating official records to ensure that false identities match up.

NEWSWEEK SUBSCRIPTION OFFERS >
Just as biometrics and "Real ID" are the enemies of clandestine work, so too is the "digital exhaust" of online life. One major concern of counter-terrorism work in the ISIS age is that military families are also vulnerable—another reason, participants say, to operate under false identities. The abundance of online information about individuals (together with some spectacular foreign hacks) has enabled foreign intelligence services to better unmask fake identities of American spies. Signature reduction is thus at the center of not only counter-terrorism but is part of the Pentagon's shift towards great power competition with Russia and China—competition, influence, and disruption "below the level of armed conflict," or what the military calls warfare in the "Gray Zone," a space "in the peace-conflict continuum."

One recently retired senior officer responsible for overseeing signature reduction and super-secret "special access programs" that shield them from scrutiny and compromise says that no one is fully aware of the extent of the program, nor has much consideration been given to the implications for the military institution. "Everything from the status of the Geneva Conventions—were a soldier operating under false identity to be captured by an enemy—to Congressional oversight is problematic," he says. He worries that the desire to become more invisible to the enemy not just obscures what the United States is doing around the world but also makes it more difficult to bring conflicts to a close. "Most people haven't even heard of the term signature reduction let alone what it creates," he says. The officer spoke on condition of anonymity because he is discussing highly classified matters.

Military operators hollowing out vehicle rear
Military operators hollowing out the rear of an SUV from Syria to install the power and cabling to turn the seemingly normal vehicle into a close-in intercept platform, able to eavesdrop on cell phone and walkie-talkie signals. (Photo provided to William M. Arkin)
W. M. ARKIN
The secret life of Jonathan Darby

Every morning at 10:00 a.m., Jonathan Darby embarks on his weekly rounds of mail call. Darby is not his real name, but it is also not the fake name on his Missouri driver's license that he uses to conduct his work. And the government car he drives, one of a fleet of over 200,000 federal vehicles owned by the General Services Administration, is also not registered in his real or his fake name, and nor are his magnetically attached Maryland state license plates really for his car, nor are they traceable back to him or his organization. Where Darby works and the locations he visits are also classified.

Darby's retired from the Army, and he asks that neither his real nor his cover name be used. He served for 20 years in counterintelligence, including two African assignments where he operated in low profile in Ethiopia and Sudan, masquerading as an expat businessman. Now he works for a Maryland-based signature reduction contractor that he asked Newsweek not to identify.

As Darby makes his rounds to some 40 or so post offices and storefront mailbox stores in the DC Metropolitan area, he picks up a trunk full of letters and packages, mailing a similar number from rural addresses. Back at the office, he sorts through the take, delivering bills to the finance people and processing dozens of personal and business letters mailed from scores of overseas locations. But his main task is logging and forwarding the signature reduction "mechanisms" as they are called, passports and State driver's licenses for people who don't exist, and other papers—bills, tax documents, organization membership cards—that form the foundation of fake identities.

To register and double-check the authenticity of his daily take, Darby logs into two databases, one the Travel and Identity Document database, the intelligence community's repository of examples of 300,000 genuine, counterfeit and altered foreign passports and visas; and the other the Cover Acquisition Management System, a super-secret register of false identities where the "mechanisms" used by clandestine operators are logged. For false identities traveling overseas, Darby and his colleagues also have to alter databases of U.S. immigration and customs to ensure that those performing illicit activities can return to the United States unmolested.

For identity verification, Darby's unit works with secret offices at Homeland Security and the State Department as well as almost all 50 states in enrolling authentic "mechanisms" under false names. A rare picture into this world came in April 2013 when an enterprising reporter at Northwest Public Broadcasting did a story suggesting the scale of this secret program. His report revealed that the state of Washington alone had provided hundreds of valid state driver licenses in fictitious names to the federal government. The existence of the "confidential driver license program," as it was called, was unknown even to the governor.

Before the Internet, Darby says—before a local cop or a border guard was connected to central databases in real time—all an operative needed to be "undercover" was an ID with a genuine photo. These days, however, especially for those operating under deep cover, the so-called "legend" behind an identity has to match more than just a made-up name. Darby calls it "due diligence": the creation of this trail of fake existence. Fake birthplaces and home addresses have to be carefully researched, fake email lives and social media accounts have to be created. And those existences need to have corresponding "friends." Almost every individual unit that operates clandestinely—special operations, intelligence collections, or cyber—has a signature reduction section, mostly operated by small contractors, conducting due diligence. There they adhere to what Darby calls the six principles of signature reduction: credibility, compatibility, realism, supportability, verity and compliance.

Compliance is a big one, Darby says, especially because of the world that 9/11 created, where checkpoints are common and nefarious activity is more closely scrutinized. To keep someone covert for real, and to do so for any period of time, requires a time consuming dance that not only has to tend to someone's operational identity but also maintain their real life back home. As Darby explains it, this includes clandestine bill paying but also working with banks and credit card security departments to look the other way as they search for identity fraud or money laundering. And then, signature reduction technicians need to ensure that real credit scores are maintained—and even real taxes and Social Security payments are kept up to date—so that people can go back to their dormant lives when their signature reduction assignments cease.

Darby's unit, originally called the Operational Planning and Travel Intelligence Center, is responsible for overseeing much of this (and to do so it operates the Pentagon's largest military finance office), but documentation—as important as it is—is only one piece of the puzzle. Other organizations are responsible for designing and manufacturing the custom disguises and "biometric defeat" elements to facilitate travel. Darby says this is where all the Special Access Programs are. SAPs, the most secret category of government information, protect the methods used—and the clandestine capabilities that exist—to manipulate foreign systems to get around seemingly foolproof safeguards including fingerprinting and facial recognition.

spycraft listening device embedded in shoe
Tracking device being implanted in the heel of a shoe. In the background is the base of a lamp, also with an implanted listening device. (Photo provided to William M. Arkin)
W.M. ARKIN
'Signature reduction' is a term of art

Numerous signature reduction SAPs, programs with names like Hurricane Fan, Island Hopper and Peanut Chocolate, are administered by a shadowy world of secret organizations that service the clandestine army—the Defense Programs Support Activity, Joint Field Support Center, Army Field Support Center, Personnel Resources Development Office, Office of Military Support, Project Cardinals, and the Special Program Office.

Befitting how secret this world is, there is no unclassified definition of signature reduction. The Defense Intelligence Agency—which operates the Defense Clandestine Service and the Defense Cover Office—says that signature reduction is a term of art, one that "individuals might use to ... describe operational security (OPSEC) measures for a variety of activities and operations." In response to Newsweek queries that point out that dozens of people have used the term to refer to this world, DIA suggests that perhaps the Pentagon can help. But the responsible person there, identified as a DOD spokesperson, says only that "as it relates to HUMINT operations"—meaning human intelligence— signature reduction "is not an official term" and that it is used to describe "measures taken to protect operations."

Another senior former intelligence official, someone who ran an entire agency and asks not to be named because he is not authorized to speak about clandestine operations, says that signature reduction exists in a "twilight" between covert and undercover. The former, defined in law, is subject to presidential approval and officially belongs to the CIA's National Clandestine Service. The latter connotes strictly law enforcement efforts undertaken by people with a badge. And then there is the Witness Protection Program, administered by the U.S. Marshals Service of the Justice Department, which tends to the fake identities and lives of people who have been resettled in exchange for their cooperation with prosecutors and intelligence agencies.

The military doesn't conduct covert operations, the senior former official says, and military personnel don't fight undercover. That is, except when they do, either because individuals are assigned—"sheep dipped"—to the CIA, or because certain military organizations, particularly those of the Joint Special Operations Command, operate like the CIA, often alongside them in covert status, where people who depend on each other for their lives don't know each other's real names. Then there are an increasing number of government investigators—military, FBI, homeland security and even state officials—who are not undercover per se but who avail themselves of signature reduction status like fake IDs and fake license plates when they work domestically, particularly when they are engaged in extreme vetting of American citizens of Arab, South Asian, and increasingly African background, who have applied for security clearances.

'Get Smart'?

In May 2013, in an almost comical incident more reminiscent of "Get Smart" than skilled spying, Moscow ordered a U.S. embassy "third secretary" by the name of Ryan Fogle to leave the country, releasing photos of Fogle wearing an ill-fitting blond wig and carrying an odd collection of seemingly amateurish paraphernalia—four pairs of sunglasses, a street map, a compass, a flashlight, a Swiss Army knife and a cell phone—so old, one article said, it looked like it had "been on this earth for at least a decade."

Ryan Fogle spy wig
Sophisticated spycraft or "Get Smart"? On May 14, 2013, a computer screen in Moscow displays a photo published by the Russian state RT website, which shows some of the confiscated belongings of Ryan C. Fogle, the third secretary of the political section of Washington's embassy in Moscow, being displayed at the Federal Security Service after his arrest.
AFP/GETTY IMAGES

The international news media had a field day, many retired CIA people decrying the decline of tradecraft, most of the commentary opining how we'd moved on from the old world of wigs and fake rocks, a reference to Great Britain admitting just a year earlier that indeed it was the owner of a fake rock and its hidden communications device, another discovery of Russian intelligence in Moscow.

Six years later, another espionage case hit the news, this time when a jury sent former American military intelligence officer Kevin Patrick Mallory to 20 years in prison for conspiring to sell secrets to China. There was nothing particularly unique about the Mallory case, the prosecution making its own show of presenting the jury with a collection of wigs and fake mustaches looking like Halloween costumes, the whole thing seemingly another funny episode of clumsy disguise.

And yet, says Brenda Connolly (not her real name), one would be naïve to laugh too hard, for both cases provide a peek into the new tricks of the trade and the extreme secrecy that hides them. Connolly started her engineering career at the Directorate of Science and Technology at the CIA and now works for a small defense contractor that produces the gizmos—think "Q" in the James Bond movies, she says—for signature reduction operations.

That "ancient" Nokia phone carried by Ryan Fogle, she says, was nothing of the sort, the innocuous outsides concealing what she calls a "covert communications" device inside. Similarly, entered in evidence in Mallory case was a Samsung phone given to him by Chinese intelligence that was so sophisticated that even when the FBI cloned it electronically, they could not find a hidden partition used to store secrets and one that Mallory ultimately had to reveal to them.

Lost in the spy-vs-spy theater of both cases were other clues of modern signature reduction, Connolly says. Fogle also carried an RFID shield, a radio frequency identification blocking pouch intended to prevent electronic tracking. And Mallory had vials of fake blood provided by China; Connolly would not reveal what it would be used for.

Like many people in this world, Connolly is a connoisseur and curator. She can talk for hours about the broadcasts that used to go out from the Soviet Union—but also were transmitted from Warrenton, Virginia—female voices reciting random numbers and passages from books that agents around the world would pick up on their shortwave radios and match to prearranged codes.

But then Internet cafes and online backdoors became the clandestine channels of choice for covert communications, largely replacing shortwave—until the surveillance technologies (especially in autocratic countries) caught up and intelligence agencies acquired an ability not only to detect and intercept internet activity but also to intercept every keystroke of activity on a remote keyboard. That ushered in today's world of covert communications or COVCOMM, as insiders call it. These are very special encryption devices seen in the Fogle and Mallory cases, but also dozens of different "burst mode" transmitters and receivers secreted in everyday objects like fake rocks. All an agent or operator needs to activate communications with these COVCOMMs in some cases is to simply walk by a target receiver (a building or fake rock) and the clandestine messages are encrypted and transmitted back to special watch centers.

covert communications devices fake bricks afghanistan
Covert communication (COVCOMM) device. Fake brick implanted with battery-powered listening device, used in "close in" reconnaissance work in Afghanistan. Photo provided to William M. Arkin.
W.M. ARKIN

"And who do you think implants those devices?" Connolly asks rhetorically. "Military guys, special ops guys working to support even more secretive operations." Connolly talks about heated fabrics that make soldiers invisible to thermal detection, electric motorcycles that can silently operate in the roughest terrain, even how tens of feet of wires are sown into "native" clothing, the South Asian shalwar kameez, the soldiers themselves then becoming walking receivers, able to intercept nearby low-power radios and even cell phone signals.

Fake hands, fake faces

Wigs. Covert communications devices. Fake rocks. In our world of electronic everything, where everything becomes a matter of record, where you can't enter a parking garage without the license plate being recorded, where you can't check in for a flight or a hotel without a government issued ID, where you can't use a credit card without the location being captured, how can biometrics can be defeated? How can someone get past fingerprint readers?

In 99 out of 100 cases, the answer is: there is no need to. Most signature reduction soldiers travel under real names, exchanging operational identities only once on the ground where they operate. Or they infiltrate across borders in places like Pakistan and Yemen, conducting the most dangerous missions. These signature reduction missions are the most highly sensitive and involve "close in" intelligence collection or the use of miniaturized enemy tracking devices, each existing in their own special access programs—missions that are so sensitive they have to be personally approved by the Secretary of Defense.

For the one percent, though, for those who have to make it through passport control under false identities, there are various biometrics defeat systems, some physical and some electronic. One such program was alluded to in a little noticed document dump published by Wikileaks in early 2017 and called "Vault 7": over 8,000 classified CIA tools used in the covert world of electronic spying and hacking. It is called ExpressLane, where U.S. intelligence has embedded malware into foreign biometrics and watchlist systems, allowing American cyber spies to steal foreign data.

An IT wizard working for Wikileaks in Berlin says the code with ExpressLane suggests that the United States can manipulate these databases. "Imagine for a moment that someone is going through passport control," he says, hesitant to use his real name because of fear of indictment in the United States. "NSA or the CIA is tasked to corrupt—change—the data on the day the covert asset goes through. And then switch it back. It's not impossible."

silicon hand fake fingerprints spycraft
A manufactured silicon hand sleeve, used to evade fingerprinting and to create fake identities for clandestine travelers. (Photo provided to William M. Arkin)
W. M. ARKIN

Another source pointed to a small rural North Carolina company in the signature reduction industry, mostly in the clandestine collection and communications field. In the workshop and training facility where they teach operators how to fabricate secret listening devices into everyday objects, they are at the cutting edge, or so their promotional materials say, a repository for molding and casting, special painting, and sophisticated aging techniques.

mask for undercover agent spy craft
Behind the mask: The signature reduction mold for an aging mask, used to completely alter the appearance of an operative. (Photo provided to William M. Arkin)
W. M. ARKIN

This quiet company can transform any object, including a person, as they do in Hollywood, a "silicon face appliance" sculpted to perfectly alter someone's looks. They can age, change gender, and "increase body mass," as one classified contract says. And they can change fingerprints using a silicon sleeve that so snugly fits over a real hand it can't be detected, embedding altered fingerprints and even impregnated with the oils found in real skin. Asked whether the appliance is effective, one source, who has gone through the training, laughs. "If I tell you, I'll have to kill you."

spy craft agent silicon mask military
Not his face: Special operations undercover operative wearing signature reduction aging mask to match false identification. (Photo provided to William M. Arkin)
W.M. ARKIN

In real life, identity theft (mostly by criminals' intent on profit) remains an epidemic that affects everyone, but for those in the intelligence and counter-terrorism worlds, the enemy is also actively engaged in efforts to compromise personal information. In 2015, the Islamic State posted the names, photos and addresses of over 1,300 U.S. military personnel, instructing supporters to target and kill the identified individuals. The FBI said that the release was followed by suspected Russian hackers who masqueraded as members of ISIS and threatened military families through Facebook. "We know everything about you, your husband and your children," one menacing message said.

Counterintelligence and OPSEC officials began a large-scale effort to inform those affected but also to warn military personnel and their families to better protect their personal information on social media. The next year, ISIS released 8,318 target names: the largest-ever release until it was topped by 8,785 names in 2017.

It was revealed that military personnel sharing location information in their fitness devices were apparently revealing the locations of sensitive operations merely by jogging and sharing their data. "The rapid development of new and innovative information technologies enhances the quality of our lives but also poses potential challenges to operational security and force protection," U.S. Central Command said in a statement at the time to the Washington Post.

Then came the DNA scare, when Adm. John Richardson, then chief of naval operations, warned military personnel and their families to stop using at-home ancestry DNA test kits. "Be careful who you send your DNA to," Richardson said, warning that scientific advancements would be able to exploit the information, creating more and more targeted biological weapons in the future. And indeed in 2019, the Pentagon officially advised military personnel to steer clear of popular DNA services. "Exposing sensitive genetic information to outside parties poses personal and operational risks to Service members," said the memo, first reported by Yahoo news.

"We're still in the infancy of our transparent world," says the retired senior officer, cautioning against imagining that there is some "identity gap" similar to the "bomber gap" of the Cold War. "We're winning this war, including on the cyber side, even if secrecy about what we are doing makes the media portrayal of the Russians again look like they are ten feet tall."

He admits that processing big data in the future will likely further impinge on everyone's clandestine operations, but he says the benefits to society, even narrowly in just making terrorist activity and travel that much more difficult, outweigh the difficulties created for military operational security. The officer calls the secrecy legitimate but says that the Defense Department leadership has dropped the ball in recognizing the big picture. The military services should be asking more questions about the ethics, propriety and even legality of soldiers being turned into spies and assassins, and what this means for the future.

Still, the world of signature reduction keeps growing: evidence, says the retired officer, that modern life is not as transparent as most of us think.

Defense Programs Support Activity: Signature Reduction
The Defense Programs Support Activity, also known as the Operational Planning and Travel Intelligence Center, one of the epicenters for signature reduction administration. (photo provided to William M. Arkin)
W.M. ARKIN


...Found via...
https://www.youtube.com/watch?v=hccGlayZpxQ

They bring up the most obvious implications and problems, but it's not funny damn it.

About all I can say is that the people in this apparatus at least are not, as most of them would have been in many times past, sacking walled cities and murdering everyone inside. Yet.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Top Secret America

Postby Karmamatterz » Tue May 25, 2021 2:11 pm

(The latter is something all of us posting here share, so don't be condescending or insult our intelligence by purporting to school us.)


You could consider lightening up a bit that Jack. Sheesh, do you have any sense of humor? Were we supposed to be laughing or in shock by the "Alert: Big Story" thread you locked? The ONLY reason this is even worth commenting on is BECAUSE it's a limited hangout. Not everyone who visits the board will realize that. You do realize many people who post here regularly still read and listen to mainstream media and believe most everything of what they hear and read, right? That you don't mention that is worth mentioning it myself. The entire Corona virus thread is the most blatant example. How about Muh Russia Russia Russia! ?

The entire Top Secret America project could have portions of it that are suspect. Many would agree that the Pentagon allow most information published by the media related to top secret or anything classified. Or they don't necessarily allow it, but don't go after most "journalists" who get lucky. Information they REALLY don't want released they run to a federal courthouse for immediate injunction. So Top Secret America (TSA) comes out and did the Feds raid Wapo or throw Dana Priest in jail? No, she goes on discussing drone strikes and secret bases and programs, not venturing off into to the conspiracy weeds of controlled demolition.

My intent wasn't to school anyone, but simply give some background to the author who is likely a paid schill or "media player" for military intelligence. I'll save my condescending attitude for the Rona thread.
User avatar
Karmamatterz
 
Posts: 828
Joined: Sun Aug 19, 2012 10:58 pm
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Wed May 26, 2021 12:03 pm

I would skip the discussion of limited hangout, and go right to macro-view analysis. Whether or not the journalist thinks they are providing a public service or not is inconsequential. The information in the article has been deemed adequate for mass consumption. This we know for sure, so we begin there.

My first impression is that the article, intentionally by the author or not, has a target audience, and I'm not it. It seems more in line with the hybrid tactics of modern warfare. The information then is really aimed at the employees of competing intelligence, or "central information" agencies.

From here, the signature reduction industry looks like a natural extension or branch of the total industrialization of mass produced information, filling a commercial need. Maybe taking a view of the industrialized production of mass information as beginning with the punch-card computer, through the hi speed Internet, into the industrialized mass consumer of the new century.

So we're coming back to the number stations, like in the article, but at a much faster pace, and before our momentum slows, we're back at decoding fire signals from mountain top watch towers with the Polybius grid. And I get the feeling that what hasn't changed is "pretty much everything," and what has changed is just how we do business.

I think the fake people with fake lives back home, produced by industrial slight of hand tech magic is kind of a comment on mass culture in general, from the obvious sounding similarity to the mass media star system, to the basic everyday world of the industrial mass consumer. We might consider that for signature reduction to work, there must be an Internet full of mass consumers to hide in that look identical to the fakes, to make them appear plausable.

I won't get into my argument about the difference between a body of dead information, and a living body of knowledge. That intelligence in the mass culture sense is just a fancy way of saying "important information," and humint is consumer information. The question of intelligence is best discussed elsewhere.

But the most basic thrust of the article is in competing for your time, and mine. What will you think about this afternoon, what will occupy your mindspace. This morning, two written articles were competing for my attention. This one, and one about Bulgarian religious folk tales. Like the one where the bee is god's spy, finding out what the devil is up to. The devil hears the buzz, and realizes there is a spy hanging around. He thinks, "I'll give that spy something to take back," and says "hey bee, go tell god that I said he should eat shit!"

The bee is visibly upset when he delivers the message to god. But the god says, "what are you worried about, bee? Your shit is my honey."

But of course, the rose gives the bees honey. Clovers, too.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby Grizzly » Wed May 26, 2021 12:20 pm

*Rolls eyes* Emoji.. :roll:

Not at anyone in particular, just that you guys have documented the empires crimes for decades, how the fuck can ANYONE here pretend to be surprised to find 'gambling going on in here'!? *Yes, Casablanca
“The more we do to you, the less you seem to believe we are doing it.”

― Joseph mengele
User avatar
Grizzly
 
Posts: 4908
Joined: Wed Oct 26, 2011 4:15 pm
Blog: View Blog (0)

Re: Top Secret America

Postby JackRiddler » Wed May 26, 2021 7:11 pm

Karmamatterz » Tue May 25, 2021 1:11 pm wrote:You could consider lightening up a bit that Jack. Sheesh, do you have any sense of humor?


Either that or you're not as funny as you imagine.

dada wrote:I would skip the discussion of limited hangout, and go right to macro-view analysis. Whether or not the journalist thinks they are providing a public service or not is inconsequential. The information in the article has been deemed adequate for mass consumption. This we know for sure, so we begin there.

My first impression is that the article, intentionally by the author or not, has a target audience, and I'm not it. It seems more in line with the hybrid tactics of modern warfare. The information then is really aimed at the employees of competing intelligence, or "central information" agencies.


Good set up for where to begin generally, I think.

I expect the willingness to make these admissions is aimed mainly at an American general audience. Operations this size can hardly be hidden forever, so the strategy is to normalize them. The Family Jewels and Church Committee revelations were a shock and caused outrage because they had been secret and actively covered up. Instead, with this they just roll that shit out before any hostile revelations do it for them. That seems to me a plausible reason (in addition to the one you mention: to fuck around with "enemy" agencies), though of course Arkin should report what he gets. Just how the hell can admission of this scale of misappropriated money and a general, highly criminal fraud on everyone (which, by the way, would be an admission of wasted money and a general, highly criminal fraud on everyone even if not a word of it was true) be converted into the kind of outrage that cuts off their federal money spigots? Teaching helplessness is the part aimed at us.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Wed May 26, 2021 7:18 pm

Different angle, the article has the effect of recruitment campaigning. Again, whether or not the journalist is aware of it is inconsequential. Look at the infrastructure available to the cyber-soldier-tech officer, today. Cool tools, go invisible. Work in the batcave, designing the latest toys for old uncle sam, jr. Do you have what it takes, kid? Lots of opportunities in a wide variety of bureaus, some you've never even heard of.

So I guess it's for the ones who are just coming up. Old hacker brain trust well has run dry. Need to appeal to the kids where they lurk nowadays. Social media, message boards, I don't know. Like that Teen Vogue. There's your market.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Wed May 26, 2021 9:19 pm

I guess the James Bond reference in the article works better, but everybody loves Batman.

Join the cyber-navy invisi-bureau. So secret it doesn't even have a three letter agency identifier. Batman? He works for us.

Could go with a stark industries reference, too. Say, "it's like working for tony stark," the kids will know what you mean. Spaceage tech for protecting the USA from the entire multiverse.

Calling dr. strange and scarlet witch, Captain America needs your help. James Bond still delivers the superspy mystique, though.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Wed May 26, 2021 11:32 pm

Jack: Teaching helplessness is the part aimed at us.

dada: Us as mainly a general American audience, or us as people like me and you?

Because I can see if it is aimed at people like me and you in that way. But a general American audience, that is something different, I think. General American audience reads articles on spycraft like a human interest story. Funny, like real humint. What the consumer finds interesting. But it's just flotsam kicked up by surfing, catches the attention, maybe raises an eyebrow.

And maybe for every consumer in the general American audience who is horrified at seeing how the sausage is made, there is another that is reassured that our cyber warriors are at the cutting edge of master control.

So for people like me and you, who already know how the sausage is made, it normalizes it. Serves as reminder that there is nothing we can do to stop it, just like there's nothing we can do to stop the mass production.

Like defund the police is an outrage to some and a no-brainer to others. But defund the octopus, you must be kidding. Ink is very expensive.

So the main takeaway for people like you and me, though, might be that we cannot stop the octopus from spawning and respawning, all around the revolving door. Our only avenue is into the master control program, itself. Not "spreading subversive memes," anything sufficiently subversive to get attention can be neutralized one way or another. What we need is a more subtle, transgressive approach.

Getting into their heads, I'm saying. And would you look at this, here in the panopticon network, we have a direct line, right to them. Line is always open.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Thu May 27, 2021 12:37 am

"One major concern of counter-terrorism work in the ISIS age"

The isis age. Like the terrorist cold war. An endless winter.

You know, in the eighties GIJoe fights with the Cobra terrorist organization. Maybe he still does, I have no idea. Cobra isn't religious, or racial supremacist. But they are definitely Cobra supremacist. And they are domestic and foreign, in the cities and farmtowns, everywhere, all over the world.

Scary. Could almost imagine it happening. The question would be, how much is it engineered? Like, is cobra commander really ex-dod, or is this some pentagon plan he's running.

But really, in the near future, the terrorist will be defined by their thought. Not thoughts of committing violence, there will be no need for violence. Terrorist thinkers will challenge mass culture, and mass production. That is all they need to do to be criminals.

So the real cobra commander will present a new, non-terrorist cobra. Anti-mass, I guess. Also not an organization anymore. Only the state of mind.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Thu May 27, 2021 1:38 am

"here in the panopticon network, we have a direct line, right to them. Line is always open."

I'm looking at it realistically. Figure the panopticon network is down here. Most on the inside use the defense networks, law enforcement networks, like behind a two way mirror, they can see us, we can't see them. Some grace us with their presence, mostly lower level functionaries, earning their patches. But anything worth making the rounds gets sucked up and passed around. Mostly stupid videos, dumb memes. I don't know, what's up on reddit. Everything, anything worth seeing, will make it up through the two way mirror, for inspection.

So we have a potential silent audience, behind the troll farm we call our Intenet home away from home. We can't see where the info goes once it hits the two way mirror, and as well they won't deign to stoop down and engage with us, except through the butt end of the chain of command. It isn't end of line, though, potentially there is no end of the line up there, just information shared, reproducing in every database.

Soon it will be the new cobra commander, reproducing in every database.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby JackRiddler » Thu May 27, 2021 7:59 am

dada » Wed May 26, 2021 10:32 pm wrote:Jack: Teaching helplessness is the part aimed at us.

dada: Us as mainly a general American audience, or us as people like me and you?


More the latter. Sure hit me that way for some hours, since I saw them admitting these things I try to demonstrate to others, and doing it in a way that gives these others-in-denial the new out of normalization. (Analogously we have now reached the point where more people than ever can go from "Thinking CIA killed Kennedy is evidence of your iredeemable sickness and insanity" to "Ok, CIA killed Kennedy, so what?")

It can play a similar function for all actors within the system who might imagine they can achieve oversight or legislate a reduction or defunding of this complex.

For the general audience, it's normalization, inoculation, having select spokespersons of the spook complex be first to talk about and spin this thing that anyway already is or is going to be widely known. Presumably, with intentional diversions from the worst details. The general audience is already alienated and indifferent to this realm, this acts as reinforcement to keep it that way.

Of the other functions we've mentioned: Presumably, this serves as an internal communiction to the whole complex and lays down talking points for insiders. Plus the other angles you've mentioned: intimidating "enemies" (who already know) and recruitment propaganda.

The recruitment part is really sick, since whom is this going to attract? Here's something like a boring corporate job with benefits, wherein you are on the keyboard all day and there is no risk to you, and you get to violate all these laws and live a double life and assume the mental pleasure of being Bond or Batman, but without having to actually live up to an impossible standard or suffer any consequences or loss. Real spook functions but cosplay-ified to make it totally safe. A pitch aimed at those who most combine sociopathy with nerdiness and alienation. Also, an invitation to the entry level for those who want to join the hidden class that gets to violate (or imagine they are violating) the Total Surveillance and Biometric ID and Access Passport regime being built for everyone else.

Remember last year how the equivalent of the Pentagon Papers for the Afghanistan war were released, showing how the policymakers and command knew always the war was going to go on forever and produce massive destruction, and none of this activity would ever achieve the supposed aims? Maybe you don't, maybe I don't, since that was its effect: released, confessed, defused, forgotten.

Still, here they are, open admission, among other things, that the Pentagon is running a million sockpuppets or however many more than that, with whole online lives and endless fake documentation generated to make them seem real.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

Re: Top Secret America

Postby Grizzly » Thu May 27, 2021 9:25 am

https://www.reddit.com/r/conspiracy/comments/nm6jp6/are_you_a_conspiracy_truther_then_youre_probably/
Are you a conspiracy truther? Then you're probably on a terrorist watchlist


Are you a conspiracy truther? Then you're probably on a terrorist watchlist

Rawles \[an 18-year veteran in law enforcement\] notes that **regardless of training session topics**, **the courses** \[Homeland Security courses (DHS and FEMA) for our local law enforcement\] **shift to** **domestic terrorist warnings** in the **community**. That is not abnormal, but the wide scope of what our government describes as having the most potential to be domestic terrorists is highly alarming.

Rawles writes that the following are characteristics that qualifies a person as a potential domestic terrorist:

>\- Expressions of libertarian philosophies (statements, bumper stickers)
>
>\- Second Amendment-oriented views (NRA or gun club membership, holding a CCW permit)
>
>\- **Survivalist literature** (fictional books such as "Patriots" and "One Second After" are mentioned by name)
>
>\- **Self-sufficiency** (stockpiling food, ammo, hand tools, medical supplies)
>
>\- **Fear of economic collapse** (buying gold and barter items)
>
>\- Religious views concerning the book of Revelation (apocalypse, anti-Christ)
>
>\- **Expressed fears of Big Brother or big government**
>
>\- Homeschooling
>
>\- Declarations of Constitutional rights and civil liberties
>
>\- **Belief in a New World Order conspiracy**

People engaged in the above activities or mind-set may be considered "extremists" or "militia groups" that exist in our communities and are "hiding in plain sight, ready to attack."

We've looked before at **suspicious activity reports (SAR database)** and **fusion centers that keep info on supposedly "suspicious" people**, **keeping watchlists that can be accessed by local law enforcement and other government agencies**. Domestic surveillance seems out of control and ACLU's Policy Counsel on National Security, Immigration and Privacy, Mike German, has said as much: "*The most disturbing thing we've uncovered is the scope of domestic intelligence activities taking place today.* ***Domestic spying is now being done by a host of federal agencies (FBI, DOD, DHS, DNI) as well as state and local law enforcement and even private companies***. Too often this spying targets political activity and religious practices. We've documented intelligence activities targeting or obstructing First Amendment-protected activity in 33 states and DC."

[Source](https://www.csoonline.com/article/22289 ... if---.html)



If you want to learn more about how just about every government agency is watching you, even the US military, [click here](https://www.reddit.com/r/Gangstalking/c ... _northcom/).

Here is more information about [fusion centers](https://www.reddit.com/r/conspiracy/com ... s_the_fbi/), [community policing](https://www.reddit.com/r/Gangstalking/c ... ed_by_the/), and the [terrorist watchlist(s)](https://preview.redd.it/q8uvg39hatt61.j ... 37394d0d4e).


Fuck their treasonous army and commandar center and the Tyranny that compels them... They can download MY application, their on My WATCH LIST.
“The more we do to you, the less you seem to believe we are doing it.”

― Joseph mengele
User avatar
Grizzly
 
Posts: 4908
Joined: Wed Oct 26, 2011 4:15 pm
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Thu May 27, 2021 11:56 am

Jack: Remember last year how the equivalent of the Pentagon Papers for the Afghanistan war were released, showing how the policymakers and command knew always the war was going to go on forever and produce massive destruction, and none of this activity would ever achieve the supposed aims? Maybe you don't, maybe I don't, since that was its effect: released, confessed, defused, forgotten.

dada: So this kind of information release strategy is something that I think maybe could be better addressed by keeping to the macro-view. The information works like shock, stunning the reader dizzy, with the little cartoon birds around the head and everything. Like we're trying to keep the ship on course, but there are all these shockingly cold whirlpools, trying to pull us in and down.

If we keep to the macro-view and don't freeze up from the shock, maybe we could see the usefulness of the idea of the computer age as one of a movement into industrial mass production of information. Now early shocking information can be seen as horrifying to the public, but also horrifying to the burgeoning "information" complex, that anyone could be so sloppy, spoiling it for the rest of them.

The shock tactic kick into high gear, when? I'm thinking maybe the abu ghraib torture porn was a watershed moment for the industry.

Maybe there's nothing more to be said to make the point. Or maybe there is, but just thinking about it chills the spine, numbs the brains.

Also, I've noticed the type of information release like the one you mention above is used in other cultures as well. Like Japan, they were in Iraq as part of the "peace keeping force." According to their equivalent of our central information complex. Afterwards, they admit they weren't really peace keeping, cue retired generals in documentaries. Then they get right back to "peace keeping."

edited to add: Forgot to mention, thinking that the article can easily serve both functions of recruitment propaganda, and being aimed at the competition at the same time. Recruit the competition, also known as the art of turning spies. I'd meant to put that at the top of the post, but got caught up in the shock spiral. Had to throw the ship for a loop to get out.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Re: Top Secret America

Postby dada » Thu May 27, 2021 1:04 pm

So really it's like we're looking at two different types of information release, one released "before," to defuse the impact, and one released "after," which is the basic shock tactic, maximum impact. Echoes of Rove.

The first is not only to defuse imapact, though, but performs in the hybrid warfare arena. And so really, both can, provided the information is timed correctly. Then each dump of accurate information is a tactical matter, the active measures taken in the overall strategy of reflexive control.
Both his words and manner of speech seemed at first totally unfamiliar to me, and yet somehow they stirred memories - as an actor might be stirred by the forgotten lines of some role he had played far away and long ago.
User avatar
dada
 
Posts: 2600
Joined: Mon Dec 24, 2007 12:08 am
Blog: View Blog (0)

Antithesis: However, if the system was perfect...

Postby JackRiddler » Thu May 27, 2021 2:13 pm

They'd never release anything.

I'd contend that preemptive release is always partly forced by the certainty that it's coming out sooner or later regardless, and they want to get ahead of it. A 'limited hangout' is not simply a psyop. It's a psyop piggybacking on a necessity that, in their version of a perfect world, they would not have to contend with. Given that, preemptive release can be and is shaped also to perform (insofar as possible) all of the other functions we've discussed.

Our attitude should not be one of preemptive dismissal. If they're admitting to institutional mass crime and trying to spin it as good, don't look away in contempt. Use it and call it out for what it is. For this reversal of his sources' presumed purposes, I find Arkin's stories reliable.

.
We meet at the borders of our being, we dream something of each others reality. - Harvey of R.I.

To Justice my maker from on high did incline:
I am by virtue of its might divine,
The highest Wisdom and the first Love.

TopSecret WallSt. Iraq & more
User avatar
JackRiddler
 
Posts: 16007
Joined: Wed Jan 02, 2008 2:59 pm
Location: New York City
Blog: View Blog (0)

PreviousNext

Return to General Discussion

Who is online

Users browsing this forum: No registered users and 170 guests