Showing posts with label PROMIS software. Show all posts
Showing posts with label PROMIS software. Show all posts

Wednesday, February 19, 2014

Real Purpose of NSA Programs: Targeting Dissent


These programs were never about terrorism: they’re about economic spying, social control, and diplomatic manipulation. They’re about power.
 -Edward Snowden
When Supreme Court Justice Antonin Scalia briefly let the mask slip during recent comments to University of Hawaii law students it was a rare moment of openness as to reveal the pathology of the leadership class here in The Homeland.  During an exchange over a World War II era case involving Japanese Americans who were rounded up and placed in internment camps such as the infamous Manzanar Scalia stated that  “…you are kidding yourself if you think the same thing will not happen again” and "In times of war, the laws fall silent." Times of war such as the permanent war on terror that is now in its thirteenth year running and still picking up steam as the oppressive apparatus of the state power of Leviathan has been exposed thanks to the sacrifices of former government contractor turned NSA whistleblower Edward Snowden.
The ongoing flow of revelations provided by the documents that Snowden appropriated as a public service to an America that has ever since the 'day when everything changed' on September 11, 2001 has been bludgeoned by fear into a state of meek acceptance and submission to their own enslavement continue to emerge. What is starting to come out now is even worse than just the massive unconstitutional warrantless surveillance, data-mining and mass storage of all of the communications and financial information of millions of law-abiding citizens that has been a constant nuisance to the Obama administration. Now we get the real stuff, first there was the trolling of porn sites for incriminating data, the obvious involvement in economic trickery and industrial espionage, blackmail of political officials and now thanks to Polk Award winner Glenn Greenwald - targeting political dissent.
In a story that broke yesterday by Greenwald and Ryan Gallagheron First Look Media's new online magazine The Intercept entitled “Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters” it was revealed that the NSA and its foreign partners went after supporters of Wikileaks as well as other activist groups. The greatest enemy of the secret state is transparency and the relentless manner in which the U.S. government and its lackeys have gone after first Julian Assange, Edward Snowden and Glenn Greenwald is an indication of just how much it fears the truth about the real intent of the surveillance programs ever getting out. The list of those who have run afoul of the secret state is long and the vengeance has been severe.
Some targets of note with the exception of the aforementioned three are the free lance journalist Danny Casolaro who was investigating high crimes involving government officials when his body was found in a West Virginia hotel room in 1991 in a blood filled bathtub. It could be speculated that he was on to something big involving the surveillance state, particularly the CIA and NSA as well as foreign intelligence services as his research included matters associated with the now forgotten PROMIS software, a powerful and advanced precursor to today's NSA surveillance and data-mining programs. He could have been the first casualty in the war on journalism and it was the era before the internet so it was much easier to simply 'shut down' a dangerous line of inquiry by eliminating a 'nuisance' than it is in 2014. Then there was Rolling Stone journalist Michael Hastings whose reporting brought down General Stanley McChrystal formerly of JSOC and had amassed a large list of enemies. His mysterious and fiery death in an automobile 'accident' has been relegated to the memory hole just months afterwards, it is of note that according to some reports that he was also onto something big and was allegedly in contact with Wikileaks lawyers shortly before his new Mercedes was engulfed in a ball of fire.
But l digress...
Greenwald's expose is a damning indictment of just how out of control that the rogue elements of the deep state have become in their relentless drive to forever lock down their power and the targeting of dissenters is the most critical component of their long term strategy. I excerpt from the piece:
The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.
 One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs.
 A third document, from July 2011, contains a summary of an internal discussion in which officials from two NSA offices – including the agency’s general counsel and an arm of its Threat Operations Center – considered designating WikiLeaks as “a ‘malicious foreign actor’ for the purpose of targeting.” Such a designation would have allowed the group to be targeted with extensive electronic surveillance – without the need to exclude U.S. persons from the surveillance searches.
 In 2008, not long after WikiLeaks was formed, the U.S. Army prepared a report that identified the organization as an enemy, and plotted how it could be destroyed. The new documents provide a window into how the U.S. and British governments appear to have shared the view that WikiLeaks represented a serious threat, and reveal the controversial measures they were willing to take to combat it.
Two quick things to take away from the excerpt is that the rogue agency as well as the U.S. military is not only speaking of designating WikiLeaks as a "malicious foreign actor" which would make it subject to the anti-terror (anti-dissent) secret system of laws jammed down Americans' throats after 9/11 but that it is also going after those who are even supportive of the organization - including domestic targets. This is the key component of the entire piece in my personal opinion in that all of that data-mining that will take up residence at the massive NSA Utah facility and other locations for vague future purposes has now become a little clearer. The data will be perused for going after 'enemies of the state' and the oppression will not be limited to dissenters and sympathizers but also to all of their known acquaintances, family members, friends and other associates past and present so as to intimidate, bully, threaten and extort in order to build a case against the targets.
NSA whistleblower William Binney perfectly sums it up in a recent interview with Rob Kall of the progressive website OpEd News available here:
R.K.: Anything that we haven't covered yet?  We have got to wrap this up.  Anything that we haven't covered that's really important that you would like the listeners to know about?
W.B.: Just that my major concern isn't with NSA having access to this data or having this data, it's the use of it and once they get it and store it, being used by law enforcement and our law enforcement is spreading that around the world to other law enforcement and so it's corrupting not just our democracy, we're becoming a police state because of this but it's also corrupting the countries around the world so it's really endangering the democratic process and the court systems that we have established.  That is really destroying our society.  We may not know it yet but eventually it'll get to all of us.
R.K.: Bad news.  So you told me that you're going to spend the rest of your life on this. 
W.B.: Yes.  Until my government basically starts to do the right thing, and that means become a constitutionally based operating government.
R.K.: Do you see any ideological or party differences in the way this is being handled?
W.B.: Actually no.  I think they're all basically the same.  They've been, I mean for example you know Bush would refer to have acquired the terrorists, captured them, put them in to torture them to get information; whereas Obama would kill them with a drone.  So it's the same principle, I mean they're just doing whatever they want, there are no limits to what they want to do.  Especially the latest NDAA that talks about giving the president the power to declare anybody, any US Citizen even in this country a terrorist and have the military pick them up, take them off the street, incarcerate them indefinitely, and give them no due process. 
That to me is executing something very similar to what the Nazis did in 1933, Special Order 48, that did exactly the same thing.  And that's how they got rid of all of their opposition.  All the communists and anybody else that opposed them.  But I mean they sent them to the concentration camps.  So far we have not been sending them to the concentration camps but they'll do things like send the FBI after you or maybe attempt to put you in jail like they tried to do with a number of us. 
So they're not as radical yet but the problem is that when you give people that kind of power or they hold that kind of power, sooner or later, they're going to use it. One way or another. 
R.K.: You know it seems to me that the same applies to technology.  If the technology is available or if it can be developed they're going to develop it and they're going to use it.  
The elimination of political opponents and crushing of dissent is essential for authoritarian regimes, it is notable that it was Justice Scalia, a Ronald Reagan appointee who brought up the internment camps in American's future for it was another former Reagan official, Lt. Colonel Oliver North whose REX 84 program was similarly targeting political dissidents and using the aforementioned PROMIS software to do so. I excerpt from a 1990s WIRED magazine piece "The Inslaw Octopus" by Richard Fricker:
 Lt. Col. Oliver North also may have been using the program. According to several intelligence community sources, PROMIS was in use at a 6,100-square-foot command center built on the sixth floor of the Justice Department. According to both a contractor who helped design the center and information disclosed during the Iran-Contra hearings, Oliver North had a similar, but smaller, White House operations room that was connected by computer link to the DOJ's command center.
 Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States as part of a domestic emergency preparedness program, commissioned under Reagan's Federal Emergency Management Agency (FEMA), according to sources and published reports. Using PROMIS, sources point out, North could have drawn up lists of anyone ever arrested for a political protest, for example, or anyone who had ever refused to pay their taxes. Compared to PROMIS, Richard Nixon's enemies list or Sen. Joe McCarthy's blacklist look downright crude. This operation was so sensitive that when Rep. Jack Brooks asked North about it during the Iran-Contra hearings, the hearing was immediately suspended pending an executive (secret) conference. When the hearings were reconvened, the issue of North's FEMA dealings was dropped.
The greatest yet to be asked question about the ongoing surveillance programs, given the comments by Scalia is not how much has yet to be revealed but when did it all begin in the first place? 

Sunday, January 5, 2014

A Monolithic and Ruthless Conspiracy: Main Core and PROMIS


“Over the last two weeks I have encountered just such an apocalyptic situation, where I and the Department of Justice have been asked to be part of something that is fundamentally wrong.”

(Excerpt from Deputy Attorney General James Comey’s draft letter of resignation to President Bush, dated March 16, 2004, which Comey did not in the end send.)

"Nothing was your own except the few cubic centimetres inside your skull"

(George Orwell: 1984)


I: Main Core and PROMIS

Suppose that the United States Government, or more likely an unaccountable privatized intelligence colossus empowered by the reaction to the 9/11 attacks and fueled by the rampant cronyism of a system long ago gone rotten had a surveillance tool capable of peering into the most private aspects of American lives on a whim. Now suppose that the new growth industry of a previously unthinkable futuristic police state was already in place, fully operational and has been online and has actively been being utilized for domestic spying for years before those two airplanes slammed into the World Trade Center. The 'terrorist' attacks were used as the justification for every unconstitutional reigning in of civil liberties ever since that heinous September morning seven years ago when the reset button was hit on two and a quarter centuries of American history and we all stepped forth into the brave new world of perpetual war, fear, suspicion and vengeance into a parallel reality in a place that would come to be known as The Homeland. What if this surveillance industrial complex was in possession of a database that was so large and so powerful that not only could it instantly process and retrieve the most minute or intimate aspects of a citizen’s lives but was also able to utilize extremely sophisticated artificial intelligence capabilities to actually predict likely patterns of future behavior.

Such a huge database would be able to use cutting edge technology funded with taxpayer dollars and awarded to unaccountable private corporations largely through ‘business as usual’ no bid contracts to create the most invasive tool of oppression this country has ever seen. This database would rely on software that was capable of performing social network analysis based on block modeling technology to monitor all forms of electronic communications, all internet searches, all debit and credit card transactions, all travel arrangements, all library records, all bank activity and all telephone records. It would then be able to use the data to not only find links between persons who already know and interact with each other but to categorize each individual into a particular group that possess similar behavioral and purchasing habits. These groups could then be further divided into subgroups and further analyzed in order to determine under some loosely defined and largely unknown guidelines whether they could potentially represent a threat. While all of this may sound like some sort of futuristic dystopian nightmare straight out of Philip K. Dick’s Minority Report and "Precrime" it is very real and it goes by the name of Main Core. For example, if you are selling a bicycle and run an advertisement in your local newspaper and you happen to receive a call from a Muhammad who is interested in your bicycle and Muhammad happens to have certain friends who have relationships with an organization that is determined by some unknown criteria to be a potential terrorist organization then the call that you received from Muhammad would then in all likelihood place you in the database and subject to an increased level of scrutiny at best and at worst in jeopardy of being picked up and held indefinitely without any sort of judical review.

This techoology is being used today absent any form of legitimate oversight, with a Constitution that has been eviscerated by the Bush-Cheney-Rove Axis of Evil, a vast gulag network of top secret prisons and 'detention facilities' and the decidedly anti-American new phenomenon of state sanctioned torture. Throw in an overworked, systematically dumbed-down populace that has been propagandized by the corrupt institution that is the corporate media machine with it's clever use of fear and loathing and scientific development of advanced mind control techniques who despite the infinite wisdom of our forefathers would gladly sacrifice their liberty for the any sort of temporary safety (no matter that it is fleeting) and there exists today in 'The Homeland' a perfect petri dish for an authoritarian fascist society.

It is though a very sophisticated form of fascism unlike more outwardly obvious regimes that we have known in the past. Author Bertram Gross published a book back in 1980 that was entitled Friendly Fascism, Jim Garrison once said that "fascism would come to America in the name of national security", and author Kevin Phillips in his 1983 book Post-Conservative America warned of the potential of an "apple pie authoritarianism" and a coming society in which: "the Star Spangled Benner would wave with greater frequency and over many more parades; increased surveillance would crack down on urban outbreaks and extreme political dissidents". This very accurately describes post 9/11 America where any semblance of reason has been abandoned for cheap flag-waving pimped off as patriotism, criticism of authority has made into potential treason by the highly paid shills for neoconservative doctrine, sloganeering and demagoguery have replaced discourse, critical thinking is becoming extinct and just as George Orwell so accurately predicted Big Brother is now watching over us, protecting us and ensuring that we understand that war is peace, freedom is slavery and ignorance is strength.

But I digress...

Main Core has received attention in two recent articles, one a piece by investigative journalist Christopher Ketcham entitled The Last Roundup (which also looks at Continuity of Government programs but more on that in a little while) and Tim Shorrock entitled Exposing Bush’s Historic Abuse of Power. Both articles tie Main Core to the now legendary PROMIS software, an extremely advanced program designed to aid federal prosecutors in case management tracking. PROMIS could pull and put together a wide range of data from disparate sources into a single record. The PROMIS software was created by INSLAW Inc., a company owned by a former NSA intelligence officer named William Hamilton. PROMIS was to have been licensed to the U.S. government in the early 1980’s before the technology boom became widespread but was then stolen by the seamy officials in Ronald Reagan’s Justice Department. The software was modified for espionage purposes to include a ‘back door’ that could be used for spying on those that it was sold to and in a detail that should be especially relevant with the economic crisis that threatens to crash the global financial system, the software could also be used to track in real time (in order to manipulate?) stock market transactions, once can certainly speculate as to how such a tool could have contributed to an economic catastrophe as we are now facing if it were used for such a thing. It is important to keep in mind the period when PROMIS was stolen in the early 1980's and the fact that the techology boom was still years in the future which should give one an idea to just how far advanced and therefore how important that it was to those who would use it in order to promote a sinister agenda.

Mr. Shorock's piece goes into the relationship between PROMIS and Main Core in some detail:

According to William Hamilton, a former NSA intelligence officer who left the agency in the 1970s, that description sounded a lot like Main Core, which he first heard about in detail in 1992. Hamilton, who is the president of Inslaw Inc., a computer services firm with many clients in government and the private sector, says there are strong indications that the Bush administration's domestic surveillance operations use Main Core.

Hamilton's company Inslaw is widely respected in the law enforcement community for creating a program called the Prosecutors' Management Information System, or PROMIS. It keeps track of criminal investigations through a powerful search engine that can quickly access all stored data components of a case, from the name of the initial investigators to the telephone numbers of key suspects. PROMIS, also widely used in the insurance industry, can also sort through other databases fast, with results showing up almost instantly. "It operates just like Google," Hamilton told me in an interview in his Washington office in May.

Since the late 1980s, Inslaw has been involved in a legal dispute over its claim that Justice Department officials in the Reagan administration appropriated the PROMIS software. Hamilton claims that Reagan officials gave PROMIS to the NSA and the CIA, which then adapted the software -- and its outstanding ability to search other databases -- to manage intelligence operations and track financial transactions. Over the years, Hamilton has employed prominent lawyers to pursue the case, including Elliot Richardson, the former attorney general and secretary of defense who died in 1999, and C. Boyden Gray, the former White House counsel to President George H.W. Bush. The dispute has never been settled. But based on the long-running case, Hamilton says he believes U.S. intelligence uses PROMIS as the primary software for searching the Main Core database.

Hamilton was first told about the connection between PROMIS and Main Core in the spring of 1992 by a U.S. intelligence official, and again in 1995 by a former NSA official. In July 2001, Hamilton says, he discussed his case with retired Adm. Dan Murphy, a former military advisor to Elliot Richardson who later served under President George H.W. Bush as deputy director of the CIA. Murphy, who died shortly after his meeting with Hamilton, did not specifically mention Main Core. But he informed Hamilton that the NSA's use of PROMIS involved something "so seriously wrong that money alone cannot cure the problem," Hamilton told me. He added, "I believe in retrospect that Murphy was alluding to Main Core." Hamilton also provided copies of letters that Richardson and Gray sent to U.S. intelligence officials and the Justice Department on Inslaw's behalf alleging that the NSA and the CIA had appropriated PROMIS for intelligence use.

Hamilton says James B. Comey's congressional testimony in May 2007, in which he described a hospitalized John Ashcroft's dramatic standoff with senior Bush officials Alberto Gonzales and Andrew Card, was another illuminating moment. "It was then that we [at Inslaw] started hearing again about the Main Core derivative of PROMIS for spying on Americans," he told me.

Through a former senior Justice Department official with more than 25 years of government experience, Salon has learned of a high-level former national security official who reportedly has firsthand knowledge of the U.S. government's use of Main Core. The official worked as a senior intelligence analyst for a large domestic law enforcement agency inside the Bush White House. He would not agree to an interview. But according to the former Justice Department official, the former intelligence analyst told her that while stationed at the White House after the 9/11 attacks, one day he accidentally walked into a restricted room and came across a computer system that was logged on to what he recognized to be the Main Core database. When she mentioned the specific name of the top-secret system during their conversation, she recalled, "he turned white as a sheet."

An article in Radar magazine in May, citing three unnamed former government officials, reported that "8 million Americans are now listed in Main Core as potentially suspect" and, in the event of a national emergency, "could be subject to everything from heightened surveillance and tracking to direct questioning and even detention."


The INSLAW/PROMIS story reached deep into the darkest bowels of an increasingly secretive and malevolent National Security State that had manifested itself in the Reagan administration, the arms for hostages ‘October Surprise’ deal that sank Jimmy Carter's bid for re-election leading to the Reagan-Bush hostile takeover of America, Iran-Contra, BCCI, media manipulation (see Robert Parry’s excellent special report for Consortium News entitled Iran Contra’s ‘lost chapter’), Oliver North’s swashbuckling adventures with C.O.G., drugs for guns and subversion of Congress all were components of Reagan’s government, a government that he hypocritically railed against for its intrusiveness and yet presided over while the shadow government that would rise again with the Supreme Court installation of George W. Bush as president with many of the key operatives of Reagan and George H.W. Bush’s dark shops of oppression being given key positions in this brazenly lawless administration that has brought America to the brink of fascism.

Ketcham's The Last Roundup is particulary of interest in that he examines the now infamous 2004 visit of Bush administration officials Alberto Gonzalez and Andrew Card to the hospital room of Attorney General John Ashcroft who had been stricken with pancreaitis after acting A.G. James Comey refused to sign off on the reauthorization of what was an illegal surveillance program related to Continuity of Government. The story is fascinating in that it not only illustrated the length to which the Bush-Cheney junta would go to in order to keep their dirty little programs in place but also for the high speed chase through the streets of Washington and the race up the hospital stairs that Comey engaged in to beat Gonzalez and Card to the sedated Ashcroft to take advantage of a sick man, when John Ashcroft actually comes out looking like a heroic figure it becomes very apparent of just how grossly un-American that this flagrantly criminal administration truly is. James Comey went on to give testimony to Congress over the hospital room showdown and more details are available from blogger Glenn Greenwald in his piece entitled What illegal "things" was the government doing in 2001-2004? and in Barton Gellman's new book Angler and exerpts were recently published in the Washington Post which part one and part two can be read for more information on the back story behind the surveillance reauthorization. Murray Waas also has done a story on whether former Attorney General Gonzalez created a set of falsified notes to provide a cover story for what occurred while trying to bully Comey and Ashcroft into signing off on the obviously illegal surveillance program.
Excerpts from Ketcham's story are chilling:


According to a senior government official who served with high-level security clearances in five administrations, "There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived 'enemies of the state' almost instantaneously." He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Of course, federal law is somewhat vague as to what might constitute a "national emergency." Executive orders issued over the past three decades define it as a "natural disaster, military attack, [or] technological or other emergency," while Department of Defense documents include eventualities like "riots, acts of violence, insurrections, unlawful obstructions or assemblages, [and] disorder prejudicial to public law and order." According to one news report, even "national opposition to U.S. military invasion abroad" could be a trigger.

Let's imagine a harrowing scenario: coordinated bombings in several American cities culminating in a major blast—say, a suitcase nuke—in New York City. Thousands of civilians are dead. Commerce is paralyzed. A state of emergency is declared by the president. Continuity of Governance plans that were developed during the Cold War and aggressively revised since 9/11 go into effect. Surviving government officials are shuttled to protected underground complexes carved into the hills of Maryland, Virginia, and Pennsylvania. Power shifts to a "parallel government" that consists of scores of secretly preselected officials. (As far back as the 1980s, Donald Rumsfeld, then CEO of a pharmaceutical company, and Dick Cheney, then a congressman from Wyoming, were slated to step into key positions during a declared emergency.) The executive branch is the sole and absolute seat of authority, with Congress and the judiciary relegated to advisory roles at best. The country becomes, within a matter of hours, a police state.

And -

Under law, during a national emergency, FEMA and its parent organization, the Department of Homeland Security, would be empowered to seize private and public property, all forms of transport, and all food supplies. The agency could dispatch military commanders to run state and local governments, and it could order the arrest of citizens without a warrant, holding them without trial for as long as the acting government deems necessary. From the comfortable perspective of peaceful times, such behavior by the government may seem far-fetched. But it was not so very long ago that FDR ordered 120,000 Japanese Americans—everyone from infants to the elderly—be held in detention camps for the duration of World War II. This is widely regarded as a shameful moment in U.S. history, a lesson learned. But a long trail of federal documents indicates that the possibility of large-scale detention has never quite been abandoned by federal authorities. Around the time of the 1968 race riots, for instance, a paper drawn up at the U.S. Army War College detailed plans for rounding up millions of "militants" and "American negroes," who were to be held at "assembly centers or relocation camps." In the late 1980s, the Austin American-Statesman and other publications reported the existence of 10 detention camp sites on military facilities nationwide, where hundreds of thousands of people could be held in the event of domestic political upheaval. More such facilities were commissioned in 2006, when Kellogg Brown & Root—then a subsidiary of Halliburton—was handed a $385 million contract to establish "temporary detention and processing capabilities" for the Department of Homeland Security. The contract is short on details, stating only that the facilities would be used for "an emergency influx of immigrants, or to support the rapid development of new programs." Just what those "new programs" might be is not specified.

In the days after our hypothetical terror attack, events might play out like this: With the population gripped by fear and anger, authorities undertake unprecedented actions in the name of public safety. Officials at the Department of Homeland Security begin actively scrutinizing people who—for a tremendously broad set of reasons—have been flagged in Main Core as potential domestic threats. Some of these individuals might receive a letter or a phone call, others a request to register with local authorities. Still others might hear a knock on the door and find police or armed soldiers outside. In some instances, the authorities might just ask a few questions. Other suspects might be arrested and escorted to federal holding facilities, where they could be detained without counsel until the state of emergency is no longer in effect.

Martial law is a very serious possibility with it having now been established that the executive branch can exercise dictatorial powers during a "catastrophic emergency" (as put forth in the Bush administration's NSPD-51) which is defined as "any incident, regardless of location, that results in extraordinary levels of mass casualties, damage, or disruption severely affecting the U.S. population, infrastructure, environment, economy or government functions". With events unfolding as they currently are it is especially troubling to note that the "economy" is one of the criteria that would trigger the declaration of martial law, the current economic crisis along with the lack of will to do what it takes to make corrections rather than bailing out and essentially giving amnesty to the Wall Street looters who are responsible for it only guarantees that the collapse when it does come will be much more devastating. A recent article in The Army Times reveals that as of October troop deployments will include 'Homeland' duty under the command of NORTHCOM. Assignments will allow for an increased public visibility (translation: getting Americans used to seeing troops on the streets) and will have a stated purpose as follows: "They may be called upon to help with civil unrest and crowd control or to deal with potentially horrific scenarios such as massive poisoning and chaos in response to a chemical, biological, radiological, nuclear or high-yield explosive, or CBRNE, attack." If action by the military (and the unaccountable mercenaries from privatized 'security' firms like Blackwater) is decided to be merited by the unitary executive and a state of martial law declared then exectly what exactly is going to happen to those "8 million" names that Ketcham writes of as "potentially suspect" who are in the Main Core database?

That Main Core and PROMIS are linked raises some extremely provocative questions in regards to intent on the subversion of the Constitution and the overthrow of the legitimate government by a shadow government using the Continuity of Government infrastructure. Ketcham also references a massive 1993 piece for Wired Magazine entitled The INSLAW Octopus that none other than the infamous rogue operative Lt. Col. Oliver North was using PROMIS for illegal surveillance purposes:


Lt. Col. Oliver North also may have been using the program. According to several intelligence community sources, PROMIS was in use at a 6,100-square-foot command center built on the sixth floor of the Justice Department. According to both a contractor who helped design the center and information disclosed during the Iran-Contra hearings, Oliver North had a similar, but smaller, White House operations room that was connected by computer link to the DOJ's command center.

Using the computers in his command center, North tracked dissidents and potential troublemakers within the United States as part of a domestic emergency preparedness program, commissioned under Reagan's Federal Emergency Management Agency (FEMA), according to sources and published reports. Using PROMIS, sources point out, North could have drawn up lists of anyone ever arrested for a political protest, for example, or anyone who had ever refused to pay their taxes. Compared to PROMIS, Richard Nixon's enemies list or Sen. Joe McCarthy's blacklist look downright crude. This operation was so sensitive that when Rep. Jack Brooks asked North about it during the Iran-Contra hearings, the hearing was immediately suspended pending an executive (secret) conference. When the hearings were reconvened, the issue of North's FEMA dealings was dropped.


North’s involvement with Continuity of Government programs including REX 84 has long been known and while Col. North no longer is active in such programs (at least not to the knowledge of anyone) a larger part of the C.O.G./shadow government infrastructure continued to breed in darkness and secrecy and on that most glorious day for American fascism, 9/11/2001 went live under the guidance of one of its most ardent and longtime architects, Vice President Richard B. Cheney.

The secrets of Main Core, PROMIS and other variations of the monstrous tools of an out of control shadow government are the veritable crown jewels of the police state and every effort has and will continue to be vigorously employed to stifle any investigations through the official channels. Is there really any doubt that these surveillance systems aren't being used for raw political purposes and for blackmail? How much serious opposition has the Bush-Cheney-Rove Axis of Evil met in their systematic dismantling of the Constitution over the past eight years? In the ongoing exploitation of the 'terrorist' attacks of 9/11 that have been used to justify each and every incursion on American civil liberties and thugs like Dick Cheney and David Addington acting as the muscle for the shadow government (as is evident in the stories linked to above) the footfalls of those little cat feet grow louder and louder.

Now if PROMIS was being used by Colonel North as a part of Rex 84 back in the 1980's when the Continuity of Government plans were being tweaked, FEMA being set up for the eventual incorporation into the Department of Homeland Security and financial transactions as well as communications already being monitored what does that say about the current state in which we all find ourselves in? Every new police state measure has been implemented largely after being conceived in secrecy under the premise of 'national security' and NSPD-51 has allowed for the executive branch to issue a declaration of martial law under which the roundup of dissidents for detention (or worse) will be conducted. And this has all been non-reviewable by Congress, a supposedly (at least according to the Constitution) a co-equal branch of government. When a Congressman named Peter DeFazio was last year denied access to the NSPD-51/C.O.G. plans by the Bush administration it was yet another example of what has been a disturbing pattern. The Main Core list of potential 'enemies of the state', the assignment of troops to NORTHCOM, the ongoing frantic efforts of the neocons to launch a war with Iran, the threat of the Cheney cabal being further exposed, the deteriorating economy and the growing public anger at government along with a loss of faith in public institutions all add up to something very dark that is about to come to fruition after decades of planning.

None of this is about terrorism at all, it never has been. It is all about the implementation of a fascist style dictatorship in America.

Editor's Note: This article was written under a pseudonym in 2008 as an installment of a four part series and is being republished as a critical part of the ongoing narrative on unconstitutional NSA spying and the failure of elected officials to do their duty to provide oversight.