Are you a domestic terrorist?

Joe Bowman | TheFifthColumn

Washington, D.C. (TFC) – By the early 1970s, as the Watergate scandal was unfolding in the headlines, trust in government disappeared as quickly as support for the Vietnam War had. When reports pertaining to a covert program known as COINTELPRO started to surface within the press, some members of Congress realized they had dropped the ball and had been too trusting for far too long. COINTELPRO was an FBI program designed to infiltrate, neutralize, and undermine civil rights, anti-war and political dissident groups, and it authorized intelligence agencies to collect information on the personal and political activities of U.S citizens through secret surveillance techniques, including warrant-less wiretaps.

In 1975, a United States Senate Committee was formed to study government operations with respect to intelligence activities (commonly known as the “Church Committee”), for its Chairman Senator Frank Church (D-ID) convened to investigate the lawlessness of the CIA’s and FBI’s intelligence gathering techniques. In its 14th report, the Church committee documented more than five hundred thousand intelligence files containing information on American citizens and domestic organizations obtained through illegal wiretapping, interception of private email, and infiltration of groups by informants.

The report provided evidence that showed that every administration from F.D.R. to Nixon had authorized wiretaps that provided the White House with political or personal information unrelated to national security. Some of the targets included journalists, Supreme Court Justice William Douglas, Senators, Congressional staff members, law firms, lobbyists, and members of the public who were critical of White House policy.

The Church Committee reported that as far back as 1946, the FBI used wiretaps and bugs to collect intelligence against citizens and foreigners, without a warrant. Finding the invasiveness of these techniques to be a clear violation of the 4th Amendment protection against unreasonable search and seizure, the Church committee advised implementation of strict controls on their use. The N.S.A. must not have received the memo.

Six years after his resignation, President Nixon famously told reporter David Frost, “When the President does it; it means it’s not illegal.” 40 years and 7 Presidents later, the corruption of the Nixon Administration is a memory that many Americans hoped would recede into the abyss of history. Nixon’s legacy of political treachery, his lack of ethical integrity, his failure to adhere to the Constitution, and his rejection of natural rights, have been resurrected like Christ almighty. George W. Bush reached well beyond the limits of his authority and launched a full on assault of the rights and liberties guaranteed by the Constitution. President Obama has continued with this assault. Meet the new boss, same as the old boss.

https://i1.wp.com/thefifthcolumnnews.com/wp-content/uploads/2015/04/Bin_Laden_wanted_deceased.png?resize=536%2C758

Over the last decade nearly every Constitutional right has been strangled and pick-pocketed. The Separation of powers that subjects each branch to the checks and balances of the others has been rejected entirely and replaced by an above the law mentality that allows the president to authorize torture of prisoners despite international treaties and federal laws prohibiting torture under all circumstances.

The National Defense Authorization Act (NDAA) is a United States federal law specifying the budget and expenditures of the United States Department of Defense. Each year’s act also includes other provisions. The U.S. Congress oversees the defense budget primarily through two yearly bills: The National Defense Authorization Act, and defense appropriations bills. The Authorization Bill determines the agencies responsible for defense, establishes funding levels, and sets the policies under which money will be spent. National Defense Authorization Act for Fiscal Year 2012, Pub.L. 112–8, contains several controversial sections, the chief being §§ 1021-1022, which affirm provisions authorizing the indefinite military detention of civilians, including U.S. citizens, without habeas corpus or due process, contained in the Authorization for Use of Military Force. Repeating the mistakes of WWII, when we detained 120,000 Japanese-Americans for race alone, this law authorizes the indefinite military detention of any person suspected of an affiliation with terrorist groups. This law applies to American citizens in America, non-citizens in America, and American citizens abroad. It doesn’t matter. No charge. No trial. No day in court.

The government has redefined what a “terrorist” is. It’s not someone convicted of blowing up buildings anymore. It’s everyone. According to multiple documents from the FBI, Department of Homeland Security, and other agencies, its people who are “reverent of individual liberty,” “suspicious of centralized authority,” and “anti-federalists.” It’s people who carry cash instead of credit. It’s people who are against fracking. It’s Constitutionalists, Ron Paul supporters, Democrats, Republicans, tea partiers and occupiers. Essentially, it’s everyone.

The NDAA violates the following inherent rights codified by the Constitution: 1st amendment/free speech, 2nd amendment-right to bear arms, 4th amendment- secure in persons and papers, 5th amendment- due process, 6th amendment- speedy trial , and 8th amendment- cruel and unusual punishment.

The NDAA doesn’t discriminate according to race, solely by species. If you are human, the US government can imprison you, torture you, and ultimately murder you without any proof of guilt or judicial oversight.

Not only are police militarizing, and looking at non-police as enemies, now the Pentagon is suddenly turning its eyes stateside and looking at people who exercise their Constitutional right to protest as enemy combatants, too. Martin Luther King, Jr., Malcolm X, and many others were treated this way by the FBI; but, during the 70s that sort of thing came under Congress’ approbation. Now, it seems, the Pentagon is vying for the right of abuse the FBI once had, but with the ability to attack with much greater severity. It’s as though police want to be a military force and the armed forces want to be police forces. Is this what things have come to? People gathering to unify themselves in protest is seen by the government as terrorism? It’s completely backwards and their mind control dialectics inflame what it is they’re trying to abate. It lets them legitimize their own actions in accord against forces that stand to change their consolidation of power and the matrix it draws from. They in effect are the creators of terror, by definition, and are abusing the mind to mine their powers of greed.

Being passionate enough to say something out loud, in today’s world, makes us terrorists. What happened to individuality, the right to free speech and free thinking? What happened to creating a world full of people who have the ability to use their own cognitive thinking skills to choose where they stand based on factors not controlled by someone else’s definition of understanding? The government causes mass hysteria over fears that have existed for centuries, only now with exploitative media coverage and the design of the blame and shame game. We have all become victims of scrutiny based upon our individual ability to create a movement of passionate opinion and individual thought.

There is a legitimate fear factor here, but in its own design these fears have become the driving force behind the shaping of our nation. Stop letting fear and manipulation by government entities, their opinions and propaganda seduce you into becoming a mindless, controlled individual with no desire or ability to possess an idea of differentiation between a real terrorist and a person who is practicing their individual right to be passionate about something.

Terrorism is based on the idea that the persons, organizations or entities involved will do whatever it takes including harming others and using extreme force to follow through with the realization of their objective. Protest is based on the ability to peacefully yet firmly voice opinions and share information in a manner which occupies a time and space for the purpose of public awareness. Exercising a guaranteed right that is the basis of the first stated amendment to the original written legal structure of our entire society is now being referred to as terrorism by men and women sworn to protect and defend this very principle? These bastard thugs have no compunction whatsoever about seeking billions of dollars to invade other nations and overthrow governments that do not share our belief in social freedom. They order young people to their deaths and to scar their psyches permanently by killing innocent civilians in the Middle East, whom have never known the freedoms we supposedly possess. Yet, it is now revealed that all of those speeches about protecting our rights and freedoms and spreading our ideals to foster a better and liberated world is all nonsense.

If our own citizens demonstrate their rights; they are insurgents. We the people need to tear down these walls of oppression. The claims of terrorism threats put forth by the Military Industrial Complex are what justify the massive budget for the Pentagon. This is where all the money is going. This is why we have so much debt. Whenever someone cries about the “illegals.” Whenever someone denigrates recipients of welfare. Whenever someone says we need to slash “entitlements.” Remember where and to whom all the money is actually flowing. They aren’t here to protect us. They aren’t here to defend our freedom. They are here to suck up as much money as they can while stifling what rights we still have.

From the government’s point of view, a terrorist is anyone who is critical or voices contrary views, ie, someone who likes any of the following: Linux, Bitcoin, Libertarianism, home-schooling, living off-grid, storing large amounts of food, being too loud about the national debt, complaining about never-ending war or being anti-war, trying to avoid taxes, being overly religious, pointing out criminal action by politicians or government figures, and I could go on for quite some time.

We have a massive government infrastructure specifically designed to justify its existence via vigorous, cannibalistic growth. Meanwhile, the number of U.S. deaths due to terrorist attacks is marginal compared to even the most improbable causes of death. A concerted effort has been afoot for some time to merge local police with federal authorities to respond to the implementation of citizen spy “snitch” programs. This has been best illustrated by the role of threat fusion centers, which are integrating data from public and private sources alike — even universities. Suppose that the United States Government, or more likely an unaccountable privatized intelligence colossus empowered by the reaction to the 9/11 attacks and fueled by the rampant cronyism of a system long ago gone rotten had a surveillance tool capable of peering into the most private aspects of American lives on a whim. Now suppose that the new growth industry of a previously unthinkable futuristic police state was already in place, fully operational and had been online and actively being utilized for domestic spying for years before those two airplanes slammed into the World Trade Center.

The ‘terrorist’ attacks were used as the justification for every unconstitutional reigning in of civil liberties ever since that heinous September morning, when the reset button was hit on two and a quarter centuries of American history and we all stepped forth into the brave new world of perpetual war, fear, suspicion and vengeance into a parallel reality in a place that would come to be known as The Homeland.

What if this surveillance industrial complex was in possession of a database that was so large and so powerful that not only could it instantly process and retrieve the most minute or intimate aspects of a citizen’s life, but was also able to utilize extremely sophisticated artificial intelligence capabilities to actually predict likely patterns of future behavior?

Such a huge database would be able to use cutting edge technology funded with taxpayer dollars and awarded to unaccountable private corporations largely through ‘business as usual’ no bid contracts to create the most invasive tool of oppression this country has ever seen. This database would rely on software that was capable of performing social network analysis based on block modeling technology to monitor all forms of electronic communications, all internet searches, all debit and credit card transactions, all travel arrangements, all library records, all bank activity and all telephone records. It would then be able to use the data to not only find links between persons who already know and interact with each other, but to categorize each individual into a particular group that possess similar behavioral and purchasing habits. These groups could then be further divided into subgroups and further analyzed in order to determine under some loosely defined and largely unknown guidelines whether they could potentially represent a threat. This data base exists and goes by the name of MAIN CORE.

Main Core has received attention in two 2008 articles; a piece by investigative journalist Christopher Ketcham entitled The Last Roundup, which also looks at Continuity of Government, and Tim Shorrock entitled Exposing Bush’s Historic Abuse of Power. Both articles tie Main Core to the now legendary PROMIS software, an extremely advanced program designed to aid federal prosecutors in case management tracking. PROMIS could pull and put together a wide range of data from disparate sources into a single record. The PROMIS software was created by INSLAW Inc., a company owned by a former NSA intelligence officer named William Hamilton.

Mr. Shorock’s piece goes into the relationship between PROMIS and Main Core in some detail:

According to William Hamilton, a former NSA intelligence officer who left the agency, who is the president of Inslaw Inc., a computer services firm with many clients in government and the private sector, says there are strong indications that the National Security Administration’s domestic surveillance operations use Main Core. Hamilton’s company Inslaw is widely respected in the law enforcement community for creating a program called the Prosecutors’ Management Information System, or PROMIS. It keeps track of criminal investigations through a powerful search engine that can quickly access all stored data components of a case, from the name of the initial investigators to the telephone numbers of key suspects. PROMIS, also widely used in the insurance industry, can also sort through other databases fast, with results showing up almost instantly. It operates just like Google.

Excerpts from Ketcham’s story are chilling:

According to a senior government official who served with high-level security clearances in five administrations, “There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention. Since the late 1980s, Inslaw has been involved in a legal dispute over its claim that Justice Department officials in the Reagan administration appropriated the PROMIS software. Hamilton claims that Reagan officials gave PROMIS to the NSA and the CIA, which then adapted the software — and its outstanding ability to search other databases.

Let’s imagine a harrowing scenario: coordinated bombings in several American cities culminating in a major blast—say, a suitcase nuke—in New York City. Thousands of civilians are dead. Commerce is paralyzed. A state of emergency is declared by the president. Continuity of Governance plans that were developed during the Cold War and aggressively revised since 9/11 go into effect. Surviving government officials are shuttled to protected underground complexes carved into the hills of Maryland, Virginia, and Pennsylvania. Power shifts to a “parallel government” that consists of scores of secretly pre-selected officials. The executive branch is the sole and absolute seat of authority, with Congress and the judiciary relegated to advisory roles at best. The country becomes, within a matter of hours, a police state. Under law, during a national emergency, FEMA and its parent organization, the Department of Homeland Security, would be empowered to seize private and public property, all forms of transport, and all food supplies. The agency could dispatch military commanders to run state and local governments, and it could order the arrest of citizens without a warrant, holding them without trial for as long as the acting government deems necessary.

A long trail of federal documents indicates that the possibility of large-scale detention has never quite been abandoned by federal authorities. In the late 1980s, the Austin American-Statesman and other publications reported the existence of 10 detention camp sites on military facilities nationwide, where hundreds of thousands of people could be held in the event of domestic political upheaval. Additional facilities were commissioned in 2006, when Kellogg Brown & Root—then a subsidiary of Halliburton—was handed a $385 million contract to establish “temporary detention and processing capabilities” for the Department of Homeland Security. The contract is short on details, stating only that the facilities would be used for “an emergency influx of immigrants, or to support the rapid development of new programs.”

In the days after our hypothetical terror attack, events might play out like this: With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.

That Main Core and PROMIS are linked raises some extremely provocative questions in regards to intent on the subversion of the Constitution and the overthrow of the legitimate government by a shadow government using the Continuity of Government infrastructure. Ketcham also references a massive 1993 piece for Wired Magazine entitled The INSLAW Octopus that none other than the infamous rogue operative Lt. Col. Oliver North was using PROMIS for illegal surveillance purposes:

Lt. Col. Oliver North also may have been using the program. According to several intelligence community sources, PROMIS was in use at a 6,100-square-foot command center built on the sixth floor of the Justice Department. According to both a contractor who helped design the center and information disclosed during the Iran-Contra hearings, Oliver North had a similar, but smaller, White House operations room that was connected by computer link to the DOJ’s command center. Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States as part of a domestic emergency preparedness program, commissioned under Reagan’s Federal Emergency Management Agency (FEMA), according to sources and published reports. Using PROMIS, sources point out, North could have drawn up lists of anyone ever arrested for a political protest, for example, or anyone who had ever refused to pay their taxes. Compared to PROMIS, Richard Nixon’s enemy list looks like a love letter scribbled on a napkin. This operation was so sensitive that when Rep. Jack Brooks asked North about it during the Iran-Contra hearings, the hearing was immediately suspended pending an executive (secret) conference. When the hearings were reconvened, the issue of North’s FEMA dealings was dropped. North’s involvement with Continuity of Government programs including REX 84 has long been known and while Col. North is no longer active in such programs (at least not to the knowledge of anyone) a larger part of the C.O.G./shadow government infrastructure continued to breed in darkness and secrecy and on that most glorious day for American fascism, 9/11/2001 went live under the guidance of one of its most ardent and longtime architects, former Vice President Richard B. Cheney.

The secrets of Main Core, PROMIS and other variations of the monstrous tools of an out of control shadow government are the veritable crown jewels of the police state. Now if PROMIS was being used by Colonel North as a part of Rex 84 back in the 1980s when the Continuity of Government plans were being tweaked, FEMA being set up for the eventual incorporation into the Department of Homeland Security, and financial transactions as well as communications were already being monitored, what does that say about the current state in which we all find ourselves in?

Every new police state measure has been implemented largely after being conceived in secrecy under the premise of ‘national security” allowed for the executive branch to issue a declaration of martial law under which the roundup of dissidents for detention (or worse) will be conducted. And this has all been non-reviewable by Congress, a supposedly (at least according to the Constitution) a co-equal branch of government. None of this is about terrorism at all, it never has been. It is all about the implementation of a fascist style dictatorship in America.

It is imperative that it be brought to light now that the police state and the illegal surveillance system must be dismantled and our intelligence system be put under honest and principled oversight. We have to accept personal responsibility for how much further this slide toward tyranny is going to take us; and that starts by getting informed, and informing others of the extent of the plan. It is the utmost duty of individuals to speak out against unsubstantiated fear mongering and the usurpation of power based upon exaggerated threats. These exaggerated threats are often designed to lead to a paranoid culture that can be easily swayed by manipulated emotions instead of critical thinking.

Furthermore, violence, coercion, and threats of consequences for non-cooperation with State dictates are the hallmarks of historical tyranny. Stop letting fear and manipulation by government entities, their opinions and propaganda seduce you into becoming a mindless, controlled, individual with no desire or ability to possess an idea of differentiation between a real terrorist and a person who is practicing their individual right to be passionate about something. This is an injustice placed upon you. Only the slave has a master that makes his choices for him. He willingly kowtows to the master. We have a moral guidance system for a reason. For example, watching an innocent person be tortured, or seeing animals being abused will naturally evoke anger in a morally sound individual. This anger is not to be mistaken for something that needs to be shut out, but something that should be channeled productively. Righteous indignation, a form of anger when one senses injustice— can be a major motivation to create positive change in the world and should not be condemned or suppressed. Every single injustice you see or think of is created by man. None of it is natural. If it is created by man, it can be gotten rid of by man. All it takes is enough willing people to stand up, recognize the injustice and work together to end it. Injustice must be ended immediately, not a gradual rendition that slowly eats it away but an instantaneous infiltration in to the belly of the beast. If society does not know of injustice the knowing should feel obliged to speak up and show them.

Comments

comments