John
Cont'd... 9-11: America's Reichstag Fire
Fri Sep 15, 2006 11:58

 
Moreover, the search for Osama protects the real architects of the 9-11 attacks. There is mounting evidence of complicity and coverup at the highest levels of the State, Military and intelligence apparatus.

The continued arrest of alleged 9-11 accomplices and suspects has nothing to do with "national security". It creates the illusion that Arabs and Muslims are behind the terror plots, while shunting the conduct of a real criminal investigation into the 9-11 attacks. And what were dealing with is the criminalization of the upper echelons of State.
--------------------------------------------------
Airline Insanity Merely A Beta Test For Police State System

Draconian surveillance, identification, behavior modification measures being implemented right outside YOUR door.
Paul Joseph Watson/August 25 2006

Escalating security measures, body scans, lie detector tests and behavior analysis now being forced upon unwitting human livestock passing through airports are the first stage of an agenda to create a two tier caste system whereby only government authorized citizens will be able to travel and everyone will be subject to intense airport style harassment on city streets.

Recent incidents that caused delays and diversions on airliners - including the latest example where a flight was turned back due to a group of men using mobile phones - underscore the unmitigated hysteria created by the politically timed release of the alleged foiled plot announcement two weeks ago.

On August 14th a British Airways flight bound for New York was diverted back to Heathrow Airport because a mobile phone rang at the rear of the plane and its owner was not to be found.

Days later, United Airlines 923, bound for Washington from London had to be escorted to Boston by two F-15 fighter jets after a patently mentally ill woman began urinating on the floor and manically talking about having visited Pakistan and making vague references to bombs. Original reports that she had possessed a handwritten note alluding to Al-Qaeda were later dismissed.

Today all 12 suspects who were detained after Northwest Airlines flight 42, bound for Mumbai, had to be diverted , were freed. Passengers grew suspicious when the men began using mobile phones and cheering. On the face of it this is absurd - why would potential hijackers who would in the normal course of events be prepared to face fierce resistance from passengers want to make themselves conspicuous before any hijack attempt was made?

Perhaps the most ridiculous example of fear run amok occurred when passengers on a flight returning from Malaga Spain complained about two Asian men who they thought were potential suicide hijackers. The evidence? They were Asian! To the astonishment of the students they were marched off the plane at gun point before it took off.

Just when we thought airline security was starting to become rational again five years after September 11, one carefully timed PR scam has reversed all that and travelers are again treated worse than cattle as they are shoved around airports, treated as criminals and barked at by poorly trained screeners on little Hitler power trips.

The agenda is clearly to maintain a state of alert and pani...il such a time that reverting back to 'normal' and 'reasoned' security measures is forgotten - the new normal becomes the insane and displaying any traits of disobedience to authority figures is taken as a sign of terrorism. Lie detector tests, voice stress analysis technology, advanced screening which produces naked images of passengers along with brain scanner and perspiration tension analysis systems are all being implemented as the notion of innocent until proven guilty is jettisoned without recourse.

The airports are merely a beta test for the exact same measures to be rolled out in major cities, where regular checkpoint officials inspect internal passports and consumers are body scanned to enter a supermarket or any kind of public event as spy drones swoop overhead to catalogue movement and alert authorities to any suspicious body language (remember Poindexter's gait analysis?).

The key to achieving all this on the part of the Neo-Fascists is to carry out more staged terror attacks on soft targets like sports stadiums, schools and large shopping malls. In terms of police state propaganda, these attacks would be more effective than a 9/11 style event because the implications would reach down into the roots of everyday life.

After more soft target terror attacks on buses and trains, citizens will be forced to bio metric scan and show ID just to enter the transport station. Resistors who refuse to take a national ID card and eventually an implanted ID chip will be punished by their exclusion from a trusted travelers program that denotes how well a citizen has behaved and compares that score to the criteria of how and when they can travel. Nationwide toll roads snaking across the US and Britain that use RFID signals at toll booths and instant kill switches in private vehicles will see this nightmare extend its tentacles into the personal vehicle of every citizen.

The majority of what I outlined is already being implemented at major transport and police hubs in the US and Britain. When the technology to automate these measures is more widely used, its cost will drop and in turn spread like wildfire outside of the major cities and into local communities - unless we scream bloody murder and stop it before it makes it out of the airport terminal and onto our street corners.
------------------------------------------------
Agents scrutinize all in name of surveillance
The Government dramatically increased its monitoring of U.S. citizens after Sept. 11, in ways that even some Bush allies now question.
Josh Meyer/LA Times | September 11 2006

WASHINGTON - As Americans consider whether they are more safe or less five years after the Sept. 11 attacks, one thing is certain: They are being monitored by their own government in ways unforeseen before 19 terrorists flew planes into the World Trade Center and the Pentagon.

Within minutes of the strikes, U.S. law-enforcement and intelligence-gathering authorities mobilized to find the culprits and prevent another attack. They ramped up the tapping of Americans' phone calls and voice mails. They watched Internet traffic and e-mails as never before. They tailed greater numbers of people and into places previously deemed off-limits, such as mosques.

They clandestinely accessed bank and credit card transactions and school records. They monitored travel. And they broke into homes without notice, looking for signs of terrorist activity and copying entire file cabinets and computer hard drives.

Authorities even tried to get inside peoples' heads, using supercomputers and "predictive" software to analyze enormous amounts of personal data about them and their friends and associates in an effort to foretell who might become a terrorist, and when.

In the five years since the attacks, the scope and breadth of domestic surveillance has steadily increased, according to interviews with dozens of current and former U.S. officials and privacy experts.

Some of these programs have been debated and approved by the courts and Congress - the traditional checks against unjustified intrusions on Americans' right to privacy under the Fourth Amendment.

But others have not, and some of them are operating without the knowledge or approval of judicial and legislative overseers, officials and experts say.

Two such classified programs have been disclosed by the media, over the objections of the Bush administration. One involves the National Security Agency's warrantless wiretapping of suspicious phone calls and e-mails into and out of the United States. The other is an effort by the Treasury Department and the CIA to monitor international bank transfers.

Beyond top secret:

Privacy experts believe that some of the activity is so secret that none but a small circle of top Bush administration officials and operational support personnel know about it - even though Congressional leaders are legally required to be notified.

"The White House simply refuses to be straight with us about what they're up to," said Sen. Ron Wyden, D-Ore., who says he has pressed unsuccessfully for answers as a member of the Senate's Select Committee on Intelligence, which entitles him to classified briefings on the subject.

In response, administration officials say that they have the authority to conduct whatever surveillance is under way, in part due to the special war powers granted to President Bush by the Congress a week after the Sept. 11 attacks. What Bush, and his controllers are really saying is that they are the law. Outside of the Presidency, there is no law.

In a speech Thursday, Bush lobbied Congress for updated and expanded surveillance powers, saying they are needed to keep pace with a stealthy and technologically savvy enemy.

Meanwhile, the domestic surveillance effort continues within virtually every U.S. counter-terrorism, law-enforcement and intelligence agency.

The programs comprise actual surveillance of Americans' activities and communications, and "dataveillance," the practice of mining the vast amounts of personal data compiled on Americans.

On both fronts, the NSA is leading the effort from its headquarters in Fort Meade, Md., just outside Washington, D.C.

Robert Deitz, general counsel for the NSA, told Congress last week that the NSA's primary mission since Sept. 11 has been to develop ways of eavesdropping on Al-Qaeda and other terrorist organizations that have used cutting-edge technologies to stay one step ahead of their pursuers.

The NSA has improved its ability to monitor the entire spectrum of communications, including fiber-optic and wireless transmissions, instant messages, BlackBerry e-mails and voice conversations sent over the Internet, say officials and experts.

They add that the intelligence community may not be breaking any laws because these kinds of communication might not be covered under loosely worded federal laws that don't account for advances in technology.

Several congressional officials and privacy experts said they believe the NSA also tracks the movement of "persons of interest" by the electronic signals emitted by their cell phones and the global positioning navigation system in the vehicles they drive.

Letter to search:

On the ground, the FBI has led the way on the low-tech surveillance front, using little-known powers given to it under the USA Patriot Act and other post-Sept. 11 policies.

Before Sept. 11, virtually all FBI surveillance was authorized by court-approved warrants and subpoenas issued through federal grand juries, which have some measure of oversight by citizen jurors and judges.

Since then, however, the FBI has dramatically increased the use of "National Security Letters," which allow agents to obtain information on people they deem suspicious with little probable cause and without judicial approval. Unlike traditional search warrants, the "target" does not have to be notified.

FBI agents are also using what are known as "sneak-and-peek" warrants on a wider scale, entering hundreds of homes clandestinely to gather intelligence and copy computers and files, again without notification. In other words, they are breaking into your home without cause.

And they have conducted surveillance on antiwar, religious, civil rights and environmental groups, including Greenpeace and the American-Arab Anti-Discrimination Committee.

Treasury Department agents have directed searches of bank records and other financial information in more than 4,000 cases, usually without notifying the U.S.-based individuals, companies, charities and nonprofit organizations, interviews and documents show.

The U.S. military has a program known as "Threat and Local Observation Notice," or TALON, which compiles reports of suspicious activity in and around military installations.

Under TALON, military intelligence squads have monitored Americans at scores of events, including religious and antiwar protests, and filed suspicious action reports, according to records obtained by Sen. Patrick Leahy, D-Vt.

High-tech surveillance:

Many government officials and privacy experts say the most alarming expansion in domestic surveillance involves the use of computers and the Internet.

Because gadget-happy consumers are snapping up the latest high-technology devices and online services to make life easier, authorities and private data brokers now have easy access to a digitized footprint of their activities and interests. Phone records, political preferences and purchasing habits are now only mouse clicks away from government agents.

After Sept. 11, government agencies began combining information collected by private companies with their own storehouses of intelligence. Authorities then used "social networking" software to map relationships among large groups of people in America and overseas. And they used "predictive" software to determine terrorism risks associated with individuals based on their activities, purchases, personal quirks and habits.

In 2004, an investigation by the Government Accountability Office found 199 U.S. government uses of data mining, 54 of which used private-sector data, including credit-card records, Internet logs and other information, some of which was of questionable accuracy.

"This has to be largest intrusion on privacy that we have ever seen in the history of this country, undoubtedly," said James Dempsey, policy director for the nonpartisan Center for Democracy and Technology and a former Congressional staffer.

One former senior U.S. intelligence official familiar with even the most secret surveillance and data-mining programs defended them, saying that when combined, they form a nearly all-encompassing web that is critically important to the overall counter-terrorism effort.

He said the programs have been hugely successful in catching individual terrorists and in allowing authorities to home in on geographic "hot spots" and ways that terrorist cells communicate and operate.

"If you lose programs like these, you rip a huge hole out of the hide of protection we have put in place around the United States," the former official said. "They are tremendously important, in ways people cannot even imagine."

Angry lawmakers:

But even some supporters of such programs believe the administration's failure to disclose them to Congress and the courts could lead to a Constitutional showdown, and soon.

Rep. Peter Hoekstra, R-Mich., the chairman of the House Permanent Select Committee on Intelligence, wrote recently to President Bush that he had learned of "some alleged intelligence community activities about which our committee has not been briefed.

"If these allegations are true, they may represent a breach of responsibility by the administration, a violation of the law, and, just as importantly, a direct affront to me and the members of this committee who have so ardently supported efforts to collect information on our enemies," wrote Hoekstra, a staunch Bush ally.

"The U.S. Congress," Hoekstra added, "simply should not have to play Twenty Questions to get the information that it deserves under our Constitution."
------------------------------------------------
America Has Fallen to a Jacobin Coup
By Paul Craig Roberts

The most important casualties of September 11 are respect for truth and American liberty. Propaganda has replaced deliberation based on objective assessment of fact. The resurrection of the Star Chamber has made moot the legal protections of liberty.

The US invasion of Iraq was based on the deliberate suppression of fact. The invasion was not the result of mistaken intelligence. It was based on deliberately concocted "intelligence" designed to deceive the US Congress, the American public, and the United Nations.

In an interview with Barbara Walters on ABC News, General Colin Powell, who was Secretary of State at the time of the invasion, expressed dismay that he was the one who took the false informati
The 9/11 Truth Movement in Perspective Skeptics Society, Fri Sep 15 10:51

Main Page - Monday, 09/18/06

Message Board by American Patriot Friends Network [APFN]

APFN MESSAGEBOARD ARCHIVES

messageboard.gif (4314 bytes)