Tag Archives: wikileaks

Tonight on AxXiom For Liberty- Constitutional Scholar Michael Badnarik and Red Dirt Reporter Andrew Griffin Friday Dec 2 6-8pm CST

Kaye Beach

Dec. 2, 2011

**SHOW NOTES-Item and links discussed on the show such as Oklahoma Smart Meters, Acatel Lucent, WikiLeaks Spy Files are added at the bottom of this post.

Listen to AxXiom For Liberty Live on Rule of Law Radio every Friday, 6-8pm CST.

Tonight Howard and I  have two very special guests lined up for you;

First Michal Badnarik,  Constitutional Scholar and the author of Good to be King, a beginner’s guide to the Constitution and the Bill of RightsHe is going to tell us about Operation Domino Effect, an effort to infuse state capitols of this nation with the US Constitution.  I am proud to say that Oklahoma is domino #1!

Michael Badnarik’s Constitution Class at the OK State Capitol Jan 14, 2012

When I was in Pennsylvania for a conference in 2010 I had the opportunity to meet and talk with Michael.  The first thing I asked him about was the  heart attack he suffered in 2009.  He shouldn’t have made it through but he did.  Michael will share with us what he took away from that experience and I think you will find his take very interesting.  Michael Badnarik has been a Software Engineer, a Radio Talk Show Host, a Skydiving Instructor and worked on the Stealth Bomber project with secret clearance.  He was the upstart who won the  Libertarian Party nomination for US President in 2004.   We are going to learn more about Michael Badnarik tonight and find out where he has chosen to direct his considerable energies these days and why.

Go to ConstitutionPreservation.org to find out more about Micheal Badnarik and how he is “Lighting the fires of Liberty, one heart at a time” all across America!

Next up  is Andrew Griffin, our very Red Dirt Reporter.  Andrew has been putting out some powerful articles that have gained him nationwide attention.

Of particular interest to us is the recent story about the Oklahoma City Bombing Investigation Committee’s website being listed as “misc extremists” in a set of Fusion Center resource documents.   Andrew is going to give us the scoop!

You find this article and many more at RedDirtReport.com

My good friend Devin Winter,(a person I consider to be the secret weapon for liberty activists due to his passion for video and film making skills) put together a video covering Andrew Griffins shocking story about government intimidation via our favorite un-American institution-Fusion Centers.

This is actually the second video Devin has done covering Andrew’s work.  The first was taken from Andrew’s insightful article covering the news that Louis Freeh would be handling the Penn State child sex abuse investigation.

Here is the article by Andrew Griffin;

Fusion Center documents label OKC Bombing investigators as terrorists

And here is the video covering the story by Devin Winter;

We want to hear from you!

AxXiom For Liberty Call In Number 512-646-1984

___________________________________________________

OKLAHOMA SMART METERS

Howard and I gave some attention to this topic on our October 21, 2011 show.

Citing concerns with the health effects, privacy, safety and accuracy, some residents are telling their utility company NO!  They do not want the new meters installed and they say they are being told that unless they comply, they will lose service.

Here is the audio for that show;

A4L_2011-10-21_64k.mp3

“Smart” meters are electronic devices that track and record a customer’s electric use.   Smart meters collects detailed information on energy use at individual buildings and has two-way communications with the utility.

COMPLAINTS

I received a call from a gentlemen last week who told me how he was pressured by an OG&E meter reader to install a smart meter on his house.  This man has a notice on his current analog meter stating that he does not want a smart meter installed and he has sent in a certified letter stating the same to OG&E.  The OG&E employee at first refused to give his name or to call his supervisor as requested by the homeowner but finally relented and the smart meter was not installed on the man’s home.

If you have a complaint about your smart meter in Oklahoma.  You can file a complaint with the Corporation Commission at  www.occeweb.com  Click on “Complaints”  “Public Utilities” and fill out the form.

One lady in central Oklahoma submitted her concerns to the Corporation Commission and asked about relocating the meter on her house.  She shared the response with us.

Thank you for your e-mailed correspondence regarding Oklahoma Gas and Electric Company (OG&E).
I have reviewed your concerns regarding Oklahoma Gas and Electric Company (OG&E) and I understand your objection to the implementation of the Smart Meter Program.
However, there are no provisions that allow a consumer to opt out of the use of a smart meter. (Emphasis added) Additionally, if a meter is moved for the convenience of a consumer, in accordance with the rules of the Commission, the consumer will bear that cost.However, as a courtesy, I have forwarded this matter to the Company for review. You may be contacted by a representative of the Company to further discuss your concerns.
I hope that this matter can be resolved to your satisfaction.

Respectfully,

K. Dobbins

Kimberly Dobbins, Manager
Oklahoma Corporation Commission
Consumer Services Division
Public Utility Complaints

People are being told that Oklahoma’s Smart Meter/Grid system is substantially different from other states and avoids some of the more pressing concerns present with other systems.  I have seen no evidence that this is true but will be following up on these claims.

__________________________________________
OG&E  has selected Acatel-Lucent to build its communication system for the smart grid.
OG&E, Alcatel-Lucent, Osmose and ABB] OG&E selects communications, field inventory and DMS partners for smart grid
Alcatel-Lucent will work with OG&E’s WAN team to build a multi-tiered IP/MPLS communications network across the utility’s 30,000 square mile service territory. The network will include a 6.0 gigahertz, point-to-point microwave backbone system, plus a 3.65 gigahertz point-to-multipoint layer. The WAN will transport two-way data traffic from smart devices on the power delivery distribution system to enable real-time automation and advanced metering.

http://www.freezepage.com/1322596800SOCPXHYKEH

Alcatel Lucent, in its promotional materials explains the purpose and abilities of smart meters;

Smart Metering for Energy Utilities will allow operators to educate and financially incent consumers to be more aware of their energy usage. Ultimately, it could allow a limited level of control over non-critical load, thereby increasing the reliability of supply and asset utilization efficiency.
•Access and Backhaul Networking:
•Allows bi-directional communication —ultimately enabling the utility to not only measure consumption, but also to actively influence or control it.
•Meter Data Management:
•The meter data management system manages the collection of metering data and organizes it: by customer, customer type, geography, retailer or any other relevant criteria.
•Tariff Management:
•Allows providers to charge flexibly for electricity service—structuring tariffs in ways that ultimately change energy consumption.
•Asset Management:
•The asset management system allows operators to keep track of their many assets and the interconnections of those assets to form smart metering network.

http://www.freezepage.com/1322596028QJRVHSCZLA

Alcatel Lucent  (the same guys implementing Oklahoma’s Smart meter/grid communications system) has a very interesting document turn up in WikiLeaks’ newly released “Spyfiles”


 Alcatel-Lucent Unified Lawful Interception Suite

1357 ULIS adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement agency monitoring facilities.

http://wikileaks.org/spyfiles/files/0/81_ALCATEL-LUCENT-1357-ULIS2008.pdf

WikiLeaks: The Spy Files

Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries

It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality.

Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry.

http://wikileaks.org/the-spyfiles.html

 

WikiLeaks Begins Info Dump ‘The Spyfiles’

Dec 1, 2011

WikiLeaks: The Spy Files

Mass interception of entire populations is not only a reality, it is a secret new industry spanning 25 countries

It sounds like something out of Hollywood, but as of today, mass interception systems, built by Western intelligence contractors, including for ’political opponents’ are a reality. Today WikiLeaks began releasing a database of hundreds of documents from as many as 160 intelligence contractors in the mass surveillance industry.  Working with Bugged Planet and Privacy International, as well as media organizations form six countries – ARD in Germany, The Bureau of Investigative Journalism in the UK, The Hindu in India, L’Espresso in Italy, OWNI in France and the Washington Post in the U.S. Wikileaks is shining a light on this secret industry that has boomed since September 11, 2001 and is worth billions of dollars per year. WikiLeaks has released 287 documents today, but the Spy Files project is ongoing and further information will be released this week and into next year.

More

http://wikileaks.org/the-spyfiles.html

______________________________________

News

Assange: ‘iPhone, Blackberry, Gmail users – you’re all screwed’

Inside the shadow world of commercialised spook spyware

 

Wikileaks’ Spy Files paints damning picture of tech surveillance

_______________________________________

Kaye Beach

Dec 1, 2011

Wikileak Spyfile find #1

Alcatel-Lucent Unified  Lawful Interception Suite (These are the guys implementing Oklahoma’s Smart meter/grid communications system) 1357 ULIS adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement agency monitoring facilities.

More about Alcatel Lucent’s Smart Metering for Energy Utilities
•Access and Backhaul Networking:
•Allows bi-directional communication —ultimately enabling the utility to not only measure consumption, but also to actively influence or control it.
•Meter Data Management:
•The meter data management system manages the collection of metering data and organizes it: by customer, customer type, geography, retailer or any other relevant criteria.
•Tariff Management:
•Allows providers to charge flexibly for electricity service—structuring tariffs in ways that ultimately change energy consumption.
•Asset Management:
•The asset management system allows operators to keep track of their many assets and the interconnections of those assets to form smart metering network.

http://www.freezepage.com/1322596028QJRVHSCZLA

_______________________________________________

Wikileaks Sheds Light on Plans for a North American Union

Kaye Beach

April 4, 2011

This 2005 cable originating from the Ottowa Embassy with the subject line;

“PLACING A NEW NORTH AMERICAN INITIATIVE IN ITS ECONOMIC POLICY CONTEXT”, focuses on the delicacies of marketing this repugnant plan to “North Americans” To gain the support of Canadian policymaker, an “incremental”  and “pragmatic” approach to a “new North American Initiative” is touted.

An incremental and pragmatic package of tasks for a new North American Initiative (NAI) will likely gain  the most support among Canadian policymakers.  Our research leads us to conclude that such a package should tackle both “security” and “prosperity” goals.

Security and prosperity goals

From Wikipedia;

The Security and Prosperity Partnership of North America (SPP) was a region-level dialogue with the stated purpose of providing greater cooperation on security and economic issues.[1] The Partnership was founded in Waco, Texas on March 23, 2005 by Paul Martin, Prime Minister of Canada, Vicente Fox, President of Mexico, and George W. Bush, President of the United States.[1] It was the second of such regional-level agreements involving the United States of America following the 1997 Partnership for Prosperity and Security in the Caribbean (PPS).

The cable says that this approach fits with the assessment of Canadian economists who have assessed the options for continental integration” also noting that said Canadian economists, in principle support more ambitious integration goals, like a customs union/single market and/or single currency”

This fits the recommendations of Canadian economists who have assessed the options for continental integration.  While in principle many of them support more ambitious integration goals, like a customs union/single market and/or single currency,[. . .]

An incremental approach, apparently “helps pave the way” to integrating the two nations until such time as “North Americans” choose to pursue such a goal.

most believe the incremental approach is most appropriate at this time, and all agree that it helps pave the way to these goals if and when North Americans choose to pursue them.

Read the entire cable here

I wonder which North Americans they are referring to.  I don’t recall the issue ever being presented to the “North Americans” that constitute the voting public of the sovereign United States of America or Canadians for that matter.

Top secret: Banff security meeting attracted U.S., Mexico officials

September 21, 2006

 A North American security meeting was secretly held in Banff last week, attracting high-profile officials from the United States, Mexico and Canada.

CBCNews Canada


Quietly, Quietly, Building the North American Union

Judicial Watch

On August 10, 2007, Judicial Watch filed a lawsuit against the Department of Commerce and Secretary of Commerce Carlos Gutierrez for denying Judicial Watch access to the North American Competitiveness Council (NACC) meetings and records. Judicial Watch’s lawsuit alleges that the NACC, a key component of the SPP, is subject to the Federal Advisory Committee Act, a federal open meetings law. (Learn more about the litigation.)

Follow the links below to read the recently released documents and to learn more about the Security and Prosperity Partnership of North America.

http://www.judicialwatch.org/SPP

The cable goes on to discuss integration issues related to the border, labor, regulation, also discussing a customs and currency union between the nations before launching into a dissertation on “NORTH AMERICAN INTEGRATION:  WHAT WE KNOW”.

You can read it all here

Here is a Canadian perspective on the cable written April 29, 2011

Wikileaks cable confirms North American Initiative (union) – Single market, currency, border plans

Also, see this White House press release dated Feb. 4, 2011 which highlights efforts between the US and Canada with heavy emphasis on “security” and “prosperity”

Secrecy is efficient           

Reading the White House press release, Declaration by President Obama and Prime Minister Harper of Canada – Beyond the Border, the ever present modifier “efficiency” is naturally part of this security and prosperity promotional effort, stated “to increase efficiency and effectiveness for both security and trade.”

Efficiency seems poised to become the catch all alter for sacrificing everything that the American people historically have held dear.

“The truly efficient organization is based on the techniques and technologies of surveillance and manipulation.” –Frank W. Ewell, Totalitarian Nightmares (an excerpt from his 1991 book The Evolution of the Future

Think about it.  Democratic processes are cumbersome especially when governments are crossing tradition boundaries rapidly and virtually as in e-Government initiatives.

This thesis paper, written in 2008 by David Adam Anderson, addresses, among other important aspect of e-government policies;. . .potential Constitutional conflicts of a transformative approach to E-government, and the wisdom of re-conceptualizing citizens as “customers.”

David A Anderson notes that,  A second element to government reorganization on the web is the combination of these virtual agencies into a single, centralized web portal.  And that, visions of government reorganization often focus on breaking down the strict lines of jurisdictional demarcation to mirror the fluid nature of the Internet.

He points out that, such jurisdictional boundaries, however, are neither arbitrary nor a mere expedience necessitated by a now-outmoded form of government administration. Rather they follow from philosophical attitudes enshrined in the Constitution that mean to limit the potential threats to freedom posed by an overly centralized form of government.

Read more of this excellent paper;

EFFICIENCY VERSUS DEMOCRACY:POLICY TRENDS AND ASSESSMENT OF STATE E-GOVERNMENT

Whenever you have an efficient government you have a dictatorship.

Harry S Truman, Lecture at Columbia University, 28 Apr. 1959
33rd president of US (1884 – 1972

Mind Your Tweets: The CIA Social Networking Surveillance System

From Wikileaks

Jump to: navigation, search

October 24, 2009

By Tom Burghardt (Global Research)[1]
That social networking sites and applications such as Facebook, Twitter and their competitors can facilitate communication and information sharing amongst diverse groups and individuals is by now a cliché.

It should come as no surprise then, that the secret state and the capitalist grifters whom they serve, have zeroed-in on the explosive growth of these technologies. One can be certain however, securocrats aren’t tweeting their restaurant preferences or finalizing plans for after work drinks.

No, researchers on both sides of the Atlantic are busy as proverbial bees building a “total information” surveillance system, one that will, so they hope, provide police and security agencies with what they euphemistically call “actionable intelligence.”

Build the Perfect Panopticon, Win Fabulous Prizes!

In this context, the whistleblowing web site Wikileaks published a remarkable document October 4 by the INDECT Consortium, the Intelligence Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environment.

Hardly a catchy acronym, but simply put INDECT is working to put a human face on the billions of emails, text messages, tweets and blog posts that transit cyberspace every day; perhaps your face.

According to Wikileaks, INDECT’s “Work package 4” is designed “to comb web blogs, chat sites, news reports, and social-networking sites in order to build up automatic dossiers on individuals, organizations and their relationships.” Ponder that phrase again: “automatic dossiers.”

This isn’t the first time that European academics have applied their “knowledge skill sets” to keep the public “safe”–from a meaningful exercise of free speech and the right to assemble, that is.

Last year The Guardian reported that Bath University researchers’ Cityware project covertly tracked “tens of thousands of Britons” through the installation of Bluetooth scanners that capture “radio signals transmitted from devices such as mobile phones, laptops and digital cameras, and using the data to follow unwitting targets without their permission.”

One privacy advocate, Simon Davies, the director of Privacy International, told The Guardian: “This technology could well become the CCTV of the mobile industry. It would not take much adjustment to make this system a ubiquitous surveillance infrastructure over which we have no control.”

Which of course, is precisely the point.

As researchers scramble for a windfall of cash from governments eager to fund these dubious projects, European police and security agencies aren’t far behind their FBI and NSA colleagues in the spy game.

The online privacy advocates, Quintessenz, published a series of leaked documents in 2008 that described the network monitoring and data mining suites designed by Nokia Siemens, Ericsson and Verint.

The Nokia Siemens Intelligence Platform dubbed “intelligence in a box,” integrate tasks generally done by separate security teams and pools the data from sources such as telephone or mobile calls, email and internet activity, bank transactions, insurance records and the like. Call it data mining on steroids.

Ironically enough however, Siemens, the giant German electronics firm was caught up in a global bribery scandal that cost the company some $1.6 billion in fines. Last year, The New York Times described “a web of secret bank accounts and shadowy consultants,” and a culture of “entrenched corruption … at a sprawling, sophisticated corporation that externally embraced the nostrums of a transparent global marketplace built on legitimate transactions.”

According to the Times, “at Siemens, bribery was just a line item.” Which just goes to show, powering the secret state means never having to say you’re sorry!

Social Network Spying, a Growth Industry Fueled by Capitalist Grifters

The trend by security agencies and their corporate partners to spy on their citizens has accelerated greatly in the West since the 9/11 terrorist attacks.

This multi-billion industry in general, has been a boon for the largest American and European defense corporations. Among the top ten companies listed by Washington Technology in their annual ranking of the “Top 100” prime government contractors, all ten–from Lockheed Martin to Booz Allen Hamilton–earned a combined total of $68 billion in 2008 from defense and related homeland security work for the secret state.

And like Siemens, all ten corporations figure prominently on the Project on Government Oversight’s Federal Contractor Misconduct Database (FCMD), which tracks “contract fraud, environmental, ethics, and labor violations.” Talk about a rigged game!

Designing everything from nuclear missile components to eavesdropping equipment for various government agencies in the United States and abroad, including some of the most repressive regimes on the planet, these firms have moved into manufacturing the hardware and related computer software for social networking surveillance in a big way.

Wired revealed in April that the FBI is routinely monitoring cell phone calls and internet activity during criminal and counterterrorism investigations. The publication posted a series of internal documents that described the Wi-Fi and computer hacking capabilities of the Bureau’s Cryptographic and Electronic Analysis Unit (CEAU).

New Scientist reported back in 2006 that the National Security Agency “is funding research into the mass harvesting of the information that people post about themselves on social networks.”

And just this week in an exclusive report published by the British high-tech publication, The Register, it was revealed that “the government has outsourced parts of its biggest ever mass surveillance project to the disaster-prone IT services giant formerly known as EDS.”

That work is being conducted under the auspices of the Government Communications Headquarters (GCHQ), the British state’s equivalent of America’s National Security Agency.

Investigative journalist Chris Williams disclosed that the American computer giant HP, which purchased EDS for some $13.9 billion last year, is “designing and installing the massive computing resources that will be needed to analyse details of who contacts whom, when where and how.”

Work at GCHQ in Cheltenham is being carried out under “a secret project called Mastering the Internet.” In May, a Home Office document surfaced that “ostensibly sought views on whether ISPs should be forced to gather terabytes of data from their networks on the government’s behalf.”

The Register reported earlier this year that telecommunications behemoth Detica and U.S. defense giant Lockheed Martin were providing GCHQ with data mining software “which searches bulk data, such as communications records, for patterns … to identify suspects.” (For further details see: Antifascist Calling, “Spying in the UK: GCHQ Awards Lockheed Martin £200m Contract, Promises to ‘Master the Internet’,” May 7, 2009)

It seems however, that INDECT researchers like their GCHQ/NSA kissin’ cousins in Britain and the United States, are burrowing ever-deeper into the nuts-and-bolts of electronic social networking and may be on the verge of an Orwellian surveillance “breakthrough.”

As New Scientist sagely predicted, the secret state most certainly plans to “harness advances in internet technology–specifically the forthcoming ‘semantic web’ championed by the web standards organisation W3C–to combine data from social networking websites with details such as banking, retail and property records, allowing the NSA to build extensive, all-embracing personal profiles of individuals.”

Profiling Internet Dissent

Pretty alarming, but the devil as they say is in the details and INDECT’s release of their “Work package 4” file makes for a very interesting read. And with a title, “XML Data Corpus: Report on methodology for collection, cleaning and unified representation of large textual data from various sources: news reports, weblogs, chat,” rest assured one must plow through much in the way of geeky gibberish and tech-speak to get to the heartless heart of the matter.

INDECT itself is a rather interesting amalgamation of spooks, cops and academics.

According to their web site, INDECT partners include: the University of Science and Technology, AGH, Poland; Gdansk University of Technology; InnoTech DATA GmbH & Co., Germany; IP Grenoble (Ensimag), France; MSWiA, the General Headquarters of Police, attached to the Ministry of the Interior, Poland; Moviquity, Spain; Products and Systems of Information Technology, PSI, Germany; the Police Service of Northern Ireland, PSNI, United Kingdom (hardly slouches when it comes to stitching-up Republicans and other leftist agitators!); Poznan University of Technology; Universidad Carlos III de Madrid; Technical University of Sofia, Bulgaria; University of Wuppertal, Germany; University of York, Great Britain; Technical University of Ostrava, Czech Republic; Technical University of Kosice, Slovakia; X-Art Pro Division G.m.b.H, Austria; and finally, the Fachhochschule Technikum, also in Austria.

I don’t know about you, but I find it rather ironic that the European Union, ostensible guardians of democracy and human rights, have turned for assistance in their surveillance projects to police and spy outfits from the former Soviet bloc, who after all know a thing or two when it comes to monitoring their citizens.

Read More;

http://wikileaks.org/wiki/Mind_Your_Tweets:_The_CIA_Social_Networking_Surveillance_System

WHO Knew

This will make the 3rd time I have tried to save an upload an article about this doc.  Lost the file completely every time.

So, I am giving the PDF here and in brief, this doc is a discussion paper by WHO about vaccines and flu pandemic.  It was held shortly before we discovered the possible pandemic of H1N1 or Swine Flu and apparently before the news of Baxter sending out live H5N1 Bird flu to app. 19 counties.  That virus was mixed in with a more common variety of flu which also happens to be the best recipe for creating a lethal pandemic flu.  H5N1 is being watched so closely for exactly this reason.  It is not now able to be passed easily from person to person but viruses are crafty, adaptable critters.  When the inevitable happens-someone who sleeps with their ducks enough to catch the bird flu also has a more garden variety at the same time, these two bugs will get together and swap genetic material that will allow H5N1 to have the ability to be spread from person to person easily.  This is the only thing holding the birdie flu up at the moment.  Baxter mixing the two viruses and sending this material out far and wide is astonishing.

See page 12 the footnotes about Baxter’s daring feats working with live fully virulent, H5N1 essentially without a net.  Bio-safety lab 3 is pushing it with this bug, WHO found this noteworthy but they seemed more in awe than annoyed about it.

Pages 12-13 deal with adjuvants, WHO pooh-poo’s the reports of squalene being dangerous and go on to say that many “proprietary” adjuvants are being created that mimic squalene but little is known about those-trade secrets you understand.  Also, WHO says in the event of pandemic adjuvents will be a must due to the need to stretch the vaccinations as far as possible.  Adjuvents stimulate immune response and allow for less vaccine to be used.  See earlier post for in depth info about adjuvants.

Then see the section on Biotech and public perception page 15, seems that scaring the hell out of those bioengineering naysayers will get them lined up to get a shot no matter what is has in it.  Hmmmmmm

Export controls are also annoying the WHO.  What to do, what to do???

Read it and see what you think-

link to Wikileaks

http://tinyurl.com/l9refn

Limited distribution report on pandemic vaccines was prepared for the WHO in early 2009, shortly before the emergence of swine flu. It details tough problems that most of the world’s governments face in acquiring adequate supplies of pandemic flu vaccines, as well as the problems caused by the patent claims of huge corporations.

Possibly because of the frank presentation and potential controversy, the WHO designated the paper “Limited Distribution”, meaning it has only been available to select government officials in paper form. This scanned version makes the paper available electronically and to the general public for the first time.

This is an intergovernmental organization document with no “primary country” of origin. India has been selected as the WHO Regional Office that published the paper is based there.

The full scanned PDF may be downloaded from the “download” link.

A text version (suitable for copy and paste) appears at the end of this page.

Wikileaks-Washington Joint Analytical Center Seattle private intelligence outsourcing 2006-2008

July 26, 2009
Summary

This confidential 1525 page scanned file (61Mb, PDF) is notable for its comprehensive insight into the revolving door world of public-private intelligence in the United States and attempts by the Washington State Patrol to privatize its “criminal intelligence” function.

The document details a tendering process for private sector deployment of intelligence functions inside the Washington Joint Analytical Center (WAJAC) on behalf of the Washington State Patrol (WSP).

It includes pricing, proposals, contracts, background checks, courses, certificates, and resumes of past intelligence work by tender applicant personnel—including detainee interrogation and deployments throughout the world.

The WAJAC is an intelligence “fusion” center used for data-sharing by a number of law enforcement-military groups. Elsewhere, these centers, have been secretly promoted by the US Army as a method to evade posse comitatus restrictions.

The Washington Joint Analytical Center is housed at the Seattle Field Office of the Federal Bureau of Investigation (FBI). WAJAC builds on existing intelligence efforts by local, regional, and federal agencies by organizing and disseminating threat information and other intelligence efforts to law enforcement agencies, first responders, and key decision makers throughout the state, allowing real-time, accurate, wo-way flow of intelligence information. WAJAC participating agencies including the FBI; U.S. Immigration and Customs Enforcement; the Washington National Guard; the Washington State Patrol; and several local law enforcement agencies.
http://wikileaks.org/wiki/Washington_Joint_Analytical_Center_Seattle_private_intelligence_outsourcing,_1525_pages,_2006-2008

Wikileaks-US Army Concept of Operations for Police Intel Ops

Spying on anti-war protestors: US Army Concept of Operations for Police Intelligence Operations,

Download leaked DOC. http://wikileaks.org/wiki/Spying_on_anti-war_protestors:_US_Army_Concept_of_Operations_for_Police_Intelligence_Operations%2C_4_Mar_2009

4 Mar 2009 May5, 2009
Summary

The document presents a 60 page For Official Use Only intelligence manual from the US Army’s Military Police School. Among other matters, the document reveals that the US Army is using structuring tricks to work around intelligence oversight rules that would normally prevent domestic spying and hoarding of data on anti-war protesters (bolding by WikiLeaks):

A CONUS [CONtinental UNited States] based PIO [military Police Intelligence Operations] network that is integrated with local, county, regional, state and federal, law enforcement entities will ensure a federated approach to enable a unified effort for defense support to civil authorities…[including] data exchange…[and the] production of [travel] blacklists…
An [intelligence] fusion cell located within the garrison staff provides a unique service that can address the complexities of the threat to a military community and installation and be an asset to the garrison and local civilian community. It has the ability to work closely with multiple local, federal, and DoD agencies. It does not have constraints that are emplaced on MI [Military Intelligence] activities within the US, because it operates under the auspice and oversight of the police discipline and standards. At the garrison level, the fusion cell is static (non‐deploying) which provides a level of continuity that allows for in‐depth institutional knowledge of threat, physical and social environs, as well as long‐term relationships with local and federal law enforcement agencies. A garrison fusion cell can also be a flexible analytical cell that can grow to form focused, ad hoc, threat‐specific cells to address, prevent or react to a specific hazard.
Vignette: A Stryker Brigade Combat Team (SBCT) was preparing to move equipment to a port of embarkation (POE) for deployment. The shipment required the movement of 300 vehicles across eight law enforcement jurisdictions. Based on previous threat fusion expertise, the garrison’s force protection (FP) fusion cell was uniquely qualified to be the lead intelligence producer to support the movement. The fusion cell coordinated police information, intelligence and civilian security with over 22 local, federal, and DoD agencies. The fusion cell produced in‐depth analysis of the threat to the SBCT equipment and advised the SBCT and garrison commanders on protection. The coordinated effort gave law enforcement agencies the knowledge to identify and prevent disruptive actions by violent protesters. The operation was considered by Corps leadership to be a watershed event for in‐depth involvement of a garrison‐based FP fusion cell in support of unit deployments. Moreover, the Corps headquarters integrated the fusion cell into other operations where the G2 is constrained by intelligence oversight rules, or there is a need for police information / intelligence assessments and analysis. A fusion cell is valuable when separate data streams, information sources, or other disparate information from multiple organizations must be combined and analyzed in a coherent process to present a common operational picture for a decision maker.