Tag Archives: ICE

Tonight on AxXiom For Liberty Live! Dan Feidt, Homeland Security Investigations & Chris Long on the Oklahoma Tea Party

Tonight on Axxiom For Liberty with Kaye Beach and Howard Houchen 6-8 PM CST

We have two great guests lined up for you tonight!

Listen Live Online at Logos Radio Network

Dan Feidt

First up is Dan Feidt to tell us about the Homeland Security Investigations Special Response Team

Dan has the scoop on Fusion Centers, The Military Industrial Complex, anything intel, info ops or top secret government documents.

He is also a boots on the ground activist and citizen reporter and can tell you just how to deal with surly legislators, corrupt officials and the government spies that think that every gathering of citizens is an angry mob on the verge of an uprising.

Check out the article he wrote on HSI at his website HongPong.com

Chris Long

Then we have a very special guest- Chris Long.  Chris is currently Attending University of Oklahoma where he is working on his Master of Arts in Broadcast and Electronic Media.  His current film is Crying out Loud: Messages from the Heartland.  This film is centered on the Tea Party movement. What began as a project for a 5 minute film has evolved into a 2 year study for Chris who has made the project into his Thesis.

We will find out what Chris has learned about this movement in Oklahoma, the people involved in the Tea Party and how this movement fits into the larger populist influence, both left and right, that has shaped politics in the state of Oklahoma since its beginnings.

We welcome your calls!

Call in number  512-646-1984


The FBI is Aggressively Building Biometric Database, International in Scope

fbi ngi

Kaye Beach

Dec. 26, 2011

FBI’s Next Generation Identification (NGI)

According to the FBI it is official FBI policy to collect “as much biometric data as possible within information technology systems” and to “work aggressively to build biometric databases that are comprehensive and international in scope.” link

“We need to recognize the change that is occurring in society, Society is taking away the privilege of anonymity.”  – Morris Hymes, Head of the ID Assurance Directorate at the Defense Department.

With the FBI’s continuance of their Next Generation Identification project, the United States is rushing headlong into Mr. Hymes’ vision.

“Anonymity is a shield from the tyranny of the majority … It thus exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation–and their ideas from suppression–at the hand of an intolerant society.”

McIntyre v. Ohio Elections Comm’n, 514 U.S.334 (http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=514&invol=334), 357 (1995)

Biometrics is enables mass surveillance systems to become unbearably intimate.

“As we learn to link biometrics to biographic, geospatial, social networks and other forms of data, we can develop patterns of activities for both individuals and organizations resulting in tactical and strategic situational awareness and intelligence advantage.”

Biometric Enabled Intelligence- The New Frontier in Biometrics by Kimberly Del Greco, 2009 Biometrics Consortium Conference.

Mrs. Del Greco initiated two high profile, multi-million dollar development efforts: “Next Generation Identification” (NGI), which will expand biometric and criminal history capabilities; and “Biometric Interoperability”, which will ensure information sharing between the FBI’s Integrated Automated Fingerprint Identification System (IAFIS) and other key biometric-based systems within the Federal Government and international partners. more

FBI Next Generation ID overview ppt

Facts about NGI

-In 2008 Lockheed Martin won a 1 billion dollar contract for the NGI.


-NGI will be fully operational in 2014

-This database is international in scope.  Biometrics collected by government officials from is already done so using international standards for the purpose of international sharing.

-The FBI will share data with more than 18,000 local, state, federal, and international agencies. link

-State DMV databases are one of the desired sources of biometrics for the FBI.

FBI Facial Recognition Initiatives

-The database is NOT being built from the biometrics of just criminals or legitimate suspects.  The NGI consolidates two existing databases of biometric information (one from the FBI and one from the Dept. Of Homeland Security) both of which were designed to be independent of each other and not interoperable. The FBI database, IAFIS, being merged with NGI, contains biometric data obtained from civil sources such as attorney bar applications, federal and state employees, and from people who work with children or the elderly so perfectly innocent if not model citizens also are included in the mix.   link


-The FBI intends to supplement the biometric data is already has access to with biometric data from “seized systems” and “open sources”.  That means pictures that are on the internet or ones collected by existing CCTV surveillance cameras.

-The NGI currently contains palmprints, scars, marks, tattoos, voices, irises, and facial measurements but designed to collect even more types of biometrics, such as DNA, in the future.  (Can you imagine being stopped for a traffic violation and on the spot having a DNA sample taken, tested and used to pull up volumes of information about you?  Well, they can. )

-The FBI’s Next Generation ID violates the 1974 Privacy Act provisions which require that federal agencies maintain the records accurately and sets limitation on how and with whom the records can be shared.  The FBI claims that it is exempt from these provisions.

-The FBI has already deployed handheld biometric collection devices to police officers to help build the NGI database.

 And a mobile tool – the Biometric Identification (B-iD) Tools Program – will allow FBI agents to capture and access database photos, fingerprints, iris prints and other biographical data in the field.http://animetrics.com/the-fbis-next-generation-identification-program-helping-law-enforcement-track-and-share-suspect-information-across-state-lines/

March 21, 2011

FBI center takes on $1 billion ID project

Under the system, state and local police officers also will eventually use hand-held devices to scan suspects’ fingerprints and send the images electronically to the FBI center.

“It’s a quick scan to let police officers know if they should let the person go, or take him into custody,” Morris said.


Secure Communities, a Department of Homeland Security (DHS) Immigration and Customs Enforcement (ICE) program collects the biometrics of any person any time that a criminal background check is done.  The purpose, we are told, is to identify those immigrants that are in the U.S. illegally.   That information goes into the  the FBI’s NGI database.  Secure Communities serves the greater goal of the FBI to collect the biometric and personal data of as many individuals as possible in order to populate their growing Next Generation ID database.

“The FBI describes S-Comm as “the first of a number of biometric interoperability systems” that merge into NGI.3 The FOIA documents show that the FBI, and not DHS, was the first federal agency to call for mandatory implementation of S-Comm. The documents further reveal the FBI’s fear that any opt-out for SComm might lead states to rightfully question their participation in NGI.”

“. . .newly disclosed documents expose the FBI’s goal to accumulate a large biometric database that far exceeds its current fingerprint collection, extending to the collection and retention of iris scans and digital photographs to support automated facial recognition scans in real-time.1 NGI aims to impose an automated process linking state and local databases with a federal government biometric data warehouse.”

Read more about Secure Communites and Next Generation ID

States were told they could ‘opt-out’ of the Department of Homeland Security’s Secure Communities but in reality states were only allowed to “opt-out” of receiving information back from federal agencies.  They are still required to send the information collected on individual to the federal government.   The states are being forced to funnel this personal information to DHS and the FBI to be used for purposes entirely out of the scope of Secure Communities.

States can’t opt out of Secure Communities program

The Obama administration has told governors the fingerprint-sharing program that targets criminals in the country illegally does not need their approval to operate in their states.

In Aug. of 2010 the state of Minnesota asserted that the personal and biometric data collected by the state was the property and responsibility of the state and that it was not to be used by the federal government for purposes not expressly permitted by the submitting law enforcement agencies.  The Department of Homeland Security in response to Congressional Questions for the Record that states have no choice about how personal biometric data was used or shared once they shared that data with the federal government.

If it is not somehow perfectly obvious how threatening NGI is to ordinary, law abiding individuals, everyone that has an encounter with law enforcement (as well as those who don’t!) and have their biometric data is collected (not necessarily just those who are arrested) will be included in this grand database which will enable the creation of incredibly detailed dossiers on the population and at a distance tracking and monitoring of individuals not accused or suspected of any crime.  We can expect increasing numbers of  encounters, such as on the street or traffic stops with police using handheld biometric devices for the purpose of feeding the federal government’s insatiable appetite for more and more personal information.

Oklahoma Public Health Emergency Documents

TITLE 63 Chapter 24 Section 683.2 Emergency Management

Oklahoma Emergency Management Act of 2003

findings and Declarations

Title 63ch 24Section 683.2 Emergency Management

Question Submitted by: State Director Albert Ashwood, Oklahoma Department of Emergency Management

2007 OK AG 11 Decided: 04/23/2007

Oklahoma Attorney General Opinions

1. Does the Governor or any local jurisdictional body have the authority to order a mandatory evacuation during emergencies and/or natural disasters?

QuestionState Director Albert Ashwood, Oklahoma Department of Emergency Management 2007




2007 Oklahoma Pandemic Influenza Management Plan Preparedness

2007 OK State Pandemic Plan


Law Statute Public Health Powers

Quarantine, Isolation, vaccination, treatment, Law enforcement, appeal, property, liability

New 2008.

310:521-7-1. Examination
The Commissioner may issue an order for the examination of any individual upon the suspicion or confirmation that said individual has a communicable disease. Such examination may include a clinical examination, a specific diagnostic test or tests, or a specific laboratory test or tests. The purpose of such examination(s) and/or test(s) is to determine the presence of the suspected infectious organism or the presence of indicators of the suspected infectious organism, and to determine the contagious state of the individual to the extent possible.
[Source: Added at 25 Ok Reg 1148, eff 5-25-08]

The Commissioner may issue an order for the treatment of any individual suspected or confirmed to have a communicable disease. The Commissioner may also order the treatment of any individual or individuals exposed to certain infectious agents. Such treatment plans will be according to procedures developed within the Department.
[Source: Added at 25 Ok Reg 1148, eff 5-25-08]


CHE referenceTitle 310 Ch521

Request for Proposal

Award Name Hospital Preparedness Program Cooperative Agreement
Award Year August 9, 2008 – August 8, 2009
CFDA Number 93.889
CFDA Name National Bioterrorism Hospital Preparedness Program
Federal Awarding Agency U.S. Department of Health and Human Services (HHS)

OSDHReqComm Evac Fatality


Oklahoma SCHOOLS Influenza Vaccination Template

September 13, 2009, 2:45 AM ET

2009 H1N1 Influenza School Template



okla2007 0606-SNS Plan-1

After 9/11 the Oklahoma Legislature established the Joint Homeland Security Legislative Task Force.  Members included:

  • Dr. Ken Levitt (Chair)
  • Senator Glenn Coffee
  • Senator Billy Mickle
  • Senator Jim Reynolds
  • Senator Dick Wilkerson
  • Professor Sujeet Shenoi
  • Representative Bill Paulk
  • Representative Dale Wells
  • Representative John Nance
  • Representative Dan Webb

In the months following 9/11, the federal government began the task of reorganizing in an attempt to better protect the homeland.  Congress passed the Homeland Security Act of 2002[1], which created the U.S. Department of Homeland Security (DHS), a cabinet level Department within the President’s administration.  Former Pennsylvania Governor Tom Ridge was sworn in as the first Secretary of DHS on January 24, 2003.  The creation of DHS led to the most significant transformation of the United States government in more than half a century.  More than 22 agencies were moved under the DHS umbrella, including FEMA, the U.S. Fire Administration, the U.S. Secret Service, Immigration and Customs Enforcement (ICE) and the U.S. Coast Guard.

The need existed to create a similar office in Oklahoma to develop, coordinate and implement homeland security efforts.  In July 2002 the Oklahoma Homeland Security Director assembled an administrative staff to focus on homeland security issues


Oklahoma Emergency Operations Plan 2007

2007 State EOP

State of Oklahoma Office of Homeland Security 2004 ANNUAL REPORT

OK20045th draft annual report


Central Oklahoma
Urban Area Security Initiative (UASI)
Tuesday, May 12, 2009



JUNE 2009 UASI Report



Oklahoma City Urban Area Security Initiative FY 2009 Budget Narrative JULY 2009

Medical/Public Health

The Medical and Public Health budget request was formulated through a collective effort of the principals involved with medical and public preparedness activities in Central Oklahoma. The individuals all met at the Oklahoma City/County Department for an afternoon to look at current needs requirements, and other funding sources.
There were three main areas for focused funding requests: Hospitals, EMS, and public health.



Sept. 2009 Urban Area Security Initiative UASI Meeting


[1] Homeland Security Act of 2002 6 U.S.C. § § 101 et seq.


Oklahoma Public Health and Medical Response System Overview (UPDATED)

Dept. of Corrections Pandemic Flu Plan

Typically, a large number of people would be
directed to these sites to obtain whatever treatments are
made available. In Oklahoma, a parallel distribution system
for sheltered-in populations, known as SIPS, will also be
deployed. The SIPS strategy focuses on populations that
are unable to go to a MIPS site to obtain needed supplies in
the event of a disaster. These populations include nursing
home residents and hospitalized patients. The inclusion of
the DOC in the SIPS strategy was a logical fit because the
inmates must remain incarcerated and needed supplies
must be obtained by facility representatives and taken
back to correctional facilities for distribution and administration



OK MOU Dep Army

1_MOAs_K-P=Garrison_or_Instl_Level_Nonfederal_Activities_M_Sill_Provides_Spt_MC07 Strategic National Stockpile 11Feb09

Oklahoma Emergency Operations Plan 2007

2007 State EOP


2009       EMSystems Clients participate in nation-wide emergency hospital exercise
MILWAUKEE – An unprecedented number of EMSystems statewide clients successfully participated in a nation-wide National Hospital Available Beds for Emergencies and Disasters (or HAvBED) exercise. EMSystems’ clients who participated in this large-scale reporting exercise included Michigan, Idaho, Arkansas, Arizona, Kentucky, Oklahoma, and Louisiana. In accordance with the U.S. Department of Health and Human Services (HHS), Office of the Assistant Secretary for Preparedness and Response (ASPR) / Hospital Preparedness Program (HPP) Grant Guidance, this exercise required Hospital Available Beds for Emergencies and Disaster (HAvBED) reports to be submitted to the Department of Health and Human Services / Secretary Operations Center (SOC) within a 4 hour time period.

EMSystems Clients participate in nation 2009




The sensing system, as illustrated in Figure 4, can be targeted
to the products and applications required for bio-threat detection and diagnosis, ranging from Point-of-Intercept to Point-of-Care (Figure 5) surveillance and diagnostic sensor systems. The critical closed-cycle sensing system has been proof-of-concept demonstrated using a glucose sensing system model. (Figure 6). This model is being further developed into an integrated system for in vivo(in vivo: In the living organism, as opposed to in vitro (in the laboratory). glucose monitoring (Figure 7) through incorporation of VeriChip’s signal transduction and RFID communication
technologies (US Patent 7,125,382; “Embedded Bio-Sensor System”). Our experience with the glucose sensing system program, in combination with our systems for the application of our CARA high-throughput screening platform, has established the development workflow that will be applied to this bio-threat development program.

VeriChip Imbedded Virus-Sensor-White-Paper



H1N1 Recommendation to President Obama

H1N1 Recommendations President PCAST_H1N1_Report

PUBLIC LAW 109–417—DEC. 19, 2006


Joint Review of National Disaster Medical System (NDMS),Consolidated Report of RecommendationsJoint Review of National Disaster Medical System (NDMS),Consolidated Report of Recommendationsmitre-ndms

The National Response Framework (NRF) presents the guiding principles that enable all response partners to prepare for and provide a unified national response to disasters and emergencies – from the smallest incident to the largest catastrophe. The Framework defines the key principles, roles, and structures that organize the way we respond as a Nation. It describes how communities, tribes, States, the Federal Government, and private-sector and nongovernmental partners apply these principles for a coordinated, effective national response. The National Response Framework is always in effect, and elements can be implemented at any level at any time.


North American Plan for Avian Flu


Wikileaks-Washington Joint Analytical Center Seattle private intelligence outsourcing 2006-2008

July 26, 2009

This confidential 1525 page scanned file (61Mb, PDF) is notable for its comprehensive insight into the revolving door world of public-private intelligence in the United States and attempts by the Washington State Patrol to privatize its “criminal intelligence” function.

The document details a tendering process for private sector deployment of intelligence functions inside the Washington Joint Analytical Center (WAJAC) on behalf of the Washington State Patrol (WSP).

It includes pricing, proposals, contracts, background checks, courses, certificates, and resumes of past intelligence work by tender applicant personnel—including detainee interrogation and deployments throughout the world.

The WAJAC is an intelligence “fusion” center used for data-sharing by a number of law enforcement-military groups. Elsewhere, these centers, have been secretly promoted by the US Army as a method to evade posse comitatus restrictions.

The Washington Joint Analytical Center is housed at the Seattle Field Office of the Federal Bureau of Investigation (FBI). WAJAC builds on existing intelligence efforts by local, regional, and federal agencies by organizing and disseminating threat information and other intelligence efforts to law enforcement agencies, first responders, and key decision makers throughout the state, allowing real-time, accurate, wo-way flow of intelligence information. WAJAC participating agencies including the FBI; U.S. Immigration and Customs Enforcement; the Washington National Guard; the Washington State Patrol; and several local law enforcement agencies.