Tuesday, December 24, 2002

Foreign Intelligence Surveillance Act (FISA)

Secret U.S. court OKs electronic spying (By Declan McCullagh, Staff Writer, CNET News.com, November 18, 2002) WASHINGTON--A secretive federal court on Monday granted police broad authority to monitor Internet use, record keystrokes and employ other surveillance methods against terror and espionage suspects...

Perspective: Say hello to Big Brother (By Declan McCullagh, Staff Writer, CNET News.com, November 18, 2002) ... Like it or not, the proposed Department of Homeland Security firmly establishes Washington's central role in computer and network security....

Appeals court OKs fax intercepts (By Declan McCullagh, Staff Writer, CNET News.com, October 14, 2002) FBI agents were not overzealous when conducting electronic surveillance against members of anti-government group the Montana Freemen, a federal appeals court has ruled.

In what appears to be the first decision dealing with fax interception, a three-judge panel from the Ninth Circuit Court of Appeals said on Friday that police did not violate federal wiretap laws when spying on the group, whose key members were convicted in 1998 of bank fraud.

Legal experts said the 3-0 ruling, a considerable victory for the government, reaffirms police abilities to seek court approval to snare e-mail--with little worries about running afoul of federal law. ...

US Code, Chapter 36, provided by Cornell Law school CHAPTER 36 - FOREIGN INTELLIGENCE SURVEILLANCE

[US Court Ruling] http://www.cadc.uscourts.gov/common/newsroom/02-001.pdf Said to be: The 56-page ruling removes procedural barriers for federal agents conducting surveillance under the 1978 Foreign Intelligence Surveillance Act (FISA). The law, enacted as part of post-Watergate reforms, permits sweeping electronic surveillance, telephone eavesdropping and surreptitious searches of residences and offices. Earlier ruling http://www.washingtonpost.com/wp-srv/onpolitics/transcripts/fisa_opinion.pdf said to be: The lower court's decision, written in May, went so far as to say that changes to the Justice Department's procedures were necessary "to protect the privacy of Americans in these highly intrusive surveillances and searches."

Thursday, February 14, 2002

Is Syria (or Iran) next?

As pointed out in the background material, the neocon's (Neo Conservatives) staffing the defense department have a grand scheme, a master plan if you will, that's been nurtured over the last 15 years. The scheme goes, first you change the regime in Iraq, giving it a moderate democracy, then you do the same in Syria, then in Iran, and then the whole of the Middle East will turn in Western favor. Further, that America must strike now because we're the sole superpower and we can dominate the world.

You can almost hear the mad cackling in the background. Unfortunately these people got elected (well, GW Bush stole the election, but that's a different story entirely) and are "in charge".

[April 16, 2003; Washington Times] Hawks recycle arguments for Iraq war against Syria (washtimes.com/world/20030416-64307592.htm) The talk over war with Syria increasingly resembles a spring rerun of the debate over war with Iraq, with virtually the same cast of characters and plot. .... Neoconservative Richard Perle, a leading hawk in the Iraq debate, yesterday called for Congress to pass a "Syrian Liberation Act" modeled on the 1998 law that made regime change in Baghdad official U.S. policy. ... "The War Party has blood in its nostrils and is headed for Damascus," said conservative columnist Patrick J. Buchanan, a fierce critic of the Iraq war who accused American hawks of putting Israel's security needs above U.S. interests in the region. "This is the neocons' hour of power, and they do not intend to lose this chance to remake the Middle East in their own image," Mr. Buchanan said. ... Syria's occupation of neighboring Lebanon, its reported chemical-weapons programs, its support for Hezbollah and other Palestinian terrorist groups targeting Israel, and Mr. Assad's rapprochement with Baghdad in recent years have all been criticized by neoconservatives. ... The case has been strengthened, U.S. officials say, by clear signs Syria provided aid and comfort to Saddam's regime in recent days, despite siding with the United States in the 1991 Gulf war against Iraq and despite Syria's decision to vote for U.N. Resolution 1441 in November, demanding Iraq disarm or face the consequences.

The article refers to a think tank, The Middle East Forum (meforum.org/), which has focused on Syria.

DARPA's Information Awareness Office, The Total Information Awareness System; Or, Big Brother in-carnate

IAO Mission:  The DARPA Information Awareness Office (IAO) will imagine, develop, apply, integrate, demonstrate and transition information technologies, components and prototype, closed-loop, information systems that will counter asymmetric threats by achieving total information awareness useful for preemption; national security warning; and national security decision making.

IAO Vision:  The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy networks that are difficult to identify and define.  IAO plans to develop technology that will allow understanding of the intent of these networks, their plans, and potentially define opportunities for disrupting or eliminating the threats.  To effectively and efficiently carry this out, we must promote sharing, collaborating and reasoning to convert nebulous data to knowledge and actionable options.

This is at once a nightmare directly from the worst conspiracy theories, U.S. Government policy, and a top secret research project. It is clear the projects sponsored by this office have been ongoing for a long time as many of the projects listed are described as continuation of prior projects. Everything is presented as if it's non-finished research, that has not been turned into operational systems or devices. But, at the same time, reading between the lines, it indicates some forms of these capabilities already exist.

It's important to remember that, while they say over and over this is meant to find "foreign terroists" it's merely a matter of choice to apply this to anybody. Today the target is "foreign terrorists" but suppose that tomorrow the target becomes "Mexican Americans" because so many of them are here illegally. Remember what happened to Japanese Americans during world war II (when many were detained in the American version of Concentration Camps).

All the information on this page was captured from the IAO website on November 15, 2002.

What's on this page:

Resources

  • After the big flap, the IAO office a) changed their logo to be less secret-society-like, and b) expunged some things from the site such as the BIO's of the lead people. Richard M. Smith [computerbytesman.com/] captured the missing pages out of the Google cache, and saved them on a web site. I have captured his pages into a PDF file here.
  • NY Times
  • March 10, 2003 [nytimes.com/2003/03/11/business/11PRIV.html] Software Pioneer Quits Board of Groove Mitchell D. Kapor,.., has resigned from the board of Groove Networks after learning that the company's software was being used by the Pentagon as part of its development of a domestic surveillance system. ... a person close to Mr. Kapor said that he was uncomfortable with the fact that Groove Networks' desktop collaboration software was a crucial component of the antiterrorist surveillance software being tested at the Defense Advanced Research Project Agency's Information Awareness Office ... The project has generated controversy since it was started early last year by Admiral Poindexter,..,whose felony conviction as part of the Iran-contra scandal was reversed because of a Congressional grant of immunity. ... The project has been trying to build a prototype computer system that would permit the scanning of hundreds or thousands of databases to look for information patterns that might alert the authorities to the activities of potential terrorists. ... "Mitch cares very much about the social impact of technology," said Shari Steele, executive director of the Electronic Frontier Foundation.. "It's the reason he founded E.F.F.," she said. ... On Feb. 11, House and Senate negotiators agreed that the Total Information Awareness project could not be used against Americans. Congress also agreed to restrict additional research on the program without extensive consultation with Congress. ... President Bush can keep the research alive by certifying to Congress that a halt "would endanger the national security of the United States."
  • Groove Networks home page [groove.net/] And, sure enough, there's a soldier in uniform on the front, sitting in front of a laptop computer, talking through a cell phone. Software features include
  • Collaboration, "Shared Spaces", joint file editing, messaging.
  • The laws & agreements detailed in the article are listed at the EPIC information page (above).
  • Washington Post
  • C|NET News
  • Reuters article, March 4, 2003 [news.com.com/2100-1028-991058.html?tag=fd_top] U.S., software maker craft Arabic tool The article details the difficulty in understanding Arabic writings ("The grammar of Arabic makes it difficult to distinguish words because of the way that word spellings change for conjugation and pronouns"). Basis Technology is the company in question, and their software can deal with understanding Arabic writing given all these linguistic difficulties. While not directly stated, this technology fits exactly in the various automatic language translation projects (Babylon, EARS and TIDES) listed below.
  • Basis Technology [basistech.com/] They have "Language Analysis" software for many languages (Japanese, Chinese, Korean, German and Arabic) and the Arabic version is said to have been created "in response to the needs of the U.S. Intelligence Community".
  • The Register:
  • Salon.COM
  • January 29, 2003 Total Information Awareness: Down, but not out [salon.com/tech/feature/2003/01/29/tia_privacy/] Congress may have put the brakes on the most ambitious government surveillance program ever. But for citizens worried about their privacy, TIA still means trouble.
  • Terrorism Information Awareness (TIA) [darpa.mil/iao/TIASystems.htm]: This is the initial morphing of the project as mentioned in the previous item.

Projects

This DARPA research project has a very wide and in-depth scope of massive proportions. Overall the effect is to create something akin to a "search engine" and to apply it to the whole "information space" available around the planet. The information space space covered by the project is not just what's on the Internet, but business transactions, biometric identification (via face-recognition) of people walking through public spaces, automatic speech recognition and language translation of captured telecommunications traffic, searching for "potential terrorists" and preventing "potential attacks", and more. In other words, they are working to create the technology and means to monitor pretty much everything happening around the planet, and to sift through the mass quantities of data looking for patterns indicating threats. The purpose is to identify possible threats, and have a better ability to choose from a variety of response options.

Map of the projects, links to project home pages, and goal statements quoted from their pages:

ProgramTheir mission statement and goalsMy translation
Total Information Awareness (TIA) SystemThe goal of the Total Information Awareness (TIA) program is to revolutionize the ability of the United States to detect, classify and identify foreign terrorists – and decipher their plans – and thereby enable the U.S. to take timely action to successfully preempt and defeat terrorist acts.  To that end, the TIA program objective is to create a counter-terrorism information system that: (1) increases information coverage by an order of magnitude, and affords easy future scaling; (2) provides focused warnings within an hour after a triggering event occurs or an evidence threshold is passed; (3) can automatically queue analysts based on partial pattern matches and has patterns that cover 90% of all previously known foreign terrorist attacks; and, (4) supports collaboration, analytical reasoning and information sharing so that analysts can hypothesize, test and propose theories and mitigating strategies about possible futures, so decision-makers can effectively evaluate the impact of current or future policies and prospective courses of action.Automatically sift through the "information space" looking for patterns of interesting activity. It is expected to notice these patterns of interesting activity within an hour. This could be anything happening within the "information space", or in other words, anything happening around the world. For example, a pattern to look for could be bank activity in certain bank accounts, coupled with telephone calls to certain phone numbers, purchases of airline tickets, and purchases of certain chemicals; a pattern indicating a possible attack on an airliner by sneaking aboard a canister of nerve gas, releasing it in mid-flight killing all aboard, leaving a derelict rogue airplane flying uncontrolled until it runs out of fuel and crashes somewhere random.

The phrase "automatically queue analysts" suggests that the computer systems will be constantly scanning, and when something is detected it will send a notice to Military Intelligence Analysts. The military analysts would have a "job queue" and when each analyst finishes one task, another task could be waiting in their queue.

This is no doubt similar to "call center" systems, of the type used for customer service centers in large corporations that field large quantities of customer requests. In such a system, when you call the customer service phone number, your call is placed in a queue and your call is answered by the first available customer service agent.

BabylonThe goal of the Babylon program is to develop rapid, two-way, natural language speech translation interfaces and platforms for the warfighter for use in field environments for force protection, refugee processing, and medical triage. Babylon will focus on overcoming the many technical and engineering challenges limiting current multilingual translation technology to enable future full-domain, unconstrained dialog translation in multiple environments.This appears to be the same as the pocket translator devices widely used by international travellers. The unit pictured has the typical high-impact-resistant design of military devices. The page mentions "The Babylon program will focus on low-population, high-terrorist-risk languages that will not be supported by any commercial enterprise.  Mandarin and Arabic were selected based on immediate and intermediate needs." acknowledging that this kind of device exists for "popular languages" (for example, Japanese/English) but not the unpopular ones.

Imagine the typical "Grunt" going into a foreign country. How will they communicate? This is it.

What's interesting is to contrast this with the EARS program before. The need is the same, instant information translation between a variety of languages, it is only the application that's different.

Bio-SurveillanceThe goal of the Bio-Surveillance program is to develop the necessary information technologies and resulting prototype capable of detecting the covert release of a biological pathogen automatically, and significantly earlier than traditional approaches.  The key to mitigating a biological attack is early detection.  Given the availability of appropriate medications, as many as half the expected casualties could be prevented if an attack is detected only a few days earlier than it would have otherwise been identified.   For contagious biological agents, early detection is also clearly paramount.  The Bio-Surveillance program will dramatically increase DoD's ability to detect a clandestine biological warfare attack in time to respond effectively and so avoid potentially thousands of casualties.As it says, they desire devices which can automatically detect biological attacks. Many biological agents are odorless, tasteless, etc, and given the long incubation period could cause widespread infection before being detected. If we recall the anthrax incidents in the Fall of 2001, the initial days were full of confusion over the nature of the incident, where the anthrax came from, and so forth.

The detection period shown in the picture is over a period of days. With current devices it is 4-8 days requred, and they desire decreasing the period to 1-3 days.

CommunicatorThe specific goal of the Communicator program is to develop and demonstrate “dialogue interaction” technology that enables warfighters to talk with computers, such that information will be accessible on the battlefield or in command centers without ever having to touch a keyboard. The Communicator Platform will be wireless and mobile, and will function in a networked environment. Software enabling dialogue interaction will automatically focus on the context of a dialogue to improve performance, and the system will be capable of automatically adapting to new topics so conversation is natural and efficient.This is to make interaction with battlefield computer devices more fluid. You can imagine the chaos in most battlefield situations, and how computer keyboards would be difficult to use. You want something to talk to, just like they have in the movies.
Effective, Affordable, Reusable Speech-to-Text (EARS)The Effective Affordable Reusable Speech-To-Text (EARS) program is developing speech-to-text (automatic transcription) technology whose output is substantially richer and much more accurate than currently possible. This will make it possible for machines to do a much better job of detecting, extracting, summarizing, and translating important information. It will also enable humans to understand what was said by reading transcripts instead of listening to audio signals.The picture associated with this shows a communication tower, radio signals, going to "Rich Transcription", and becoming a transcript. This is tieing speech-to-text conversion (speech recognition technology, and conversion to written language) to automated language translation. The source of the speech being recognized, and then translated, is likely any telecommunication means (broadcast radio & TV, satellite phones, cellular phones, landlines, etc).

The capability would exist to, for example, tap into a radio broadcast, and regardless of what the language being spoken, to convert the spoken speech to written text, and then translate that written text into whatever language the military analyst speaks (presumably English).

Also see TIDES below and Babylon above.

Evidence Extraction and Link Discovery (EELD)The goal of the Evidence Extraction and Link Discovery (EELD) program is development of technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources.  EELD is developing detection capabilities to extract relevant data and relationships about people, organizations, and activities from message traffic and open source data.  It will link items relating potential terrorist groups or scenarios, and learn patterns of different groups or scenarios to identify new organizations or emerging threats.Consider again the "information space" concept. The system proposed here is able to suck in vast quantities of data. What they want to look for is threads of data scattered around the cloud of all available information.

Think about the data leading to the people leading the September 11, 2001 attacks. They bought one-way airplane tickets using cash, an event which could stand out on its own because most people buy round-trip tickets using credit cards. This might be innocent, but when 5 people on the same flight all buy one-way airplane tickets using cash you begin to wonder. Then if you notice that on three other flights there are five people on each flight buying one-way airplane tickets using cash, it raises the interest of this activity. The next step, you look at who these people are, and any prior knowledge of them, and you might find some of them know each other, some have been enrolled in flight training schools, have stayed at the same hotels at the same times as others, etc. By this time of tieing these pieces of data together, the potential threat level should be pretty high.

FutureMapThe DARPA FutureMAP (Futures Markets Applied to Prediction) program is a follow-up to a current DARPA SBIR, Electronic Market-Based Decision Support (SB012-012).  FutureMAP will concentrate on market-based techniques for avoiding surprise and predicting future events. Strategic decisions depend upon the accurate assessment of the likelihood of future events.  This analysis often requires independent contributions by experts in a wide variety of fields, with the resulting difficulty of combining the various opinions into one assessment.  Market-based techniques provide a tool for producing these assessments.

There is potential for application of market-based methods to analyses of interest to the DoD.  These may include analysis of political stability in regions of the world, prediction of the timing and impact on national security of emerging technologies, analysis of the outcomes of advanced technology programs, or other future events of interest to the DoD.  In addition, the rapid reaction of markets to knowledge held by only a few participants may provide an early warning system to avoid surprise.

The picture shows the throwing of darts at a dartboard, and indeed predicting the future is tricky. But, the pattern of darts indicates something interesting:
  • "General Poll" and "Poll of Experts" is way off target.
  • "Analysis Reports" are better, but still wide of the mark.
  • "Delphi Methods" even better.
  • The "Market Method" is implied to be highly accurate.
GenisysProgram Genisys is a FY02 new-start program. The Genisys program’s goal is to produce technology enabling ultra-large, all-source information repositories.  To predict, track, and preempt terrorist attacks, the U.S. requires a full-coverage database containing all information relevant to identifying: potential foreign terrorists and their possible supporters; their activities; prospective targets; and, their operational plans.  Current database technology is clearly insufficient to address this need.This is the information storage and retrieval system. It includes distributed databases spread around the world, support for complex queries, and more.
GenoaProject Genoa, in the process of concluding, provides the structured argumentation, decision-making and corporate memory to rapidly deal with and adjust to dynamic crisis management.Computer aided decision making, by having the computer store and reference and link vast quantities of information. "Corporate Memory" is to store all information and actions taken by an organization, and make those avilable in later times so that the organization can learn and grow from what happened in the past.
Genoa IIGenoa II is a FY02 new-start program.  It will focus on developing information technology needed by teams of intelligence analysts and operations and policy personnel in attempting to anticipate and preempt terrorist threats to US interests.  Genoa II’s goal is to make such teams faster, smarter, and more joint in their day-to-day operations.  Genoa II will apply automation to team processes so that more information will be exploited, more hypotheses created and examined, more models built and populated with evidence, and in the larger sense, more crises dealt with simultaneously. Bigger and better than Genoa.

The picture shows multiple levels of information query systems and decision trees. That is, if you have a highly complex problem, how do you interpret everything and come up with an answer. For example, say you have a derelict airplane flying across the U.S., not responding to radio calls, just flying. Say, at the same time, there are international tensions. Is the airplane flying without response a simple accident, or is it related to the international tensions? Is it an innocent act, or an attack? To work this out, you might have to refer to dozens of pieces of data scattered all around, and analyze many possible interpretations of every piece of raw data.

Human ID at a Distance (HumanID)The goal of the Human Identification at a Distance (HumanID) program is to develop automated biometric identification technologies to detect, recognize and identify humans at great distances.  These technologies will provide critical early warning support for force protection and homeland defense against terrorist, criminal, and other human-based threats, and will prevent or decrease the success rate of such attacks against DoD operational facilities and installations.  Methods for fusing biometric technologies into advanced human identification systems will be developed to enable faster, more accurate and unconstrained identification of humans at significant standoff distances.They mention "Face Recognition", "Gait Recognition" and "Iris Recognition", and the ability to do this at a distance. The distance is initially 25-150 feet, with a target of 500 foot range by 2004. They also desire a system that can operate 24/7 (all day long, every day).

Identification is going to be based on the persons face, how they walk, and their eyes. Presumably when someone wants to sneak through an area known to be monitored, they would disguise themselves, but it would be very hard to disguise how they walk, or their eyes.

Translingual Information Detection, Extraction and Summarization (TIDES)The Translingual Information Detection, Extraction and Summarization (TIDES) program is developing advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages.Two other projects (Babylon and EARS) are involved with language translation. Obviously there are lots of languages in the world, and to understand others you have to understand their language. For the whole system to work, and automatically recognize threats, the system needs to automatically recognize threats in any language.
Wargaming the Asymmetric Environment (WAE)The goal of the Wargaming the Asymmetric Environment (WAE) program is the development and demonstration of predictive technology to better anticipate and act against terrorists.  WAE is a revolutionary approach to identify predictive indicators of attacks by and the behavior of specific terrorists by examining their behavior in the broader context of their political, cultural and ideological environment.This is the use of mathematical techniques, Wargaming Theory, to predict attacks. The picture mentions "Pre-attack behavior" and "post attack behavior", indicating that a group about to stage an attack will follow some pattern of activities that might tip off someone of the impending attack (if they knew what to look for).

Admiral Poindexter

Yes, this is the same Admiral Poindexter who was National Security Adviser to President Reagan, and was convicted for lieing to Congress over the Iran/Contra affair. The convictions were later overturned on a technicality.

Decoding the Terminology

Information Space: This is a mathematically related term referring to the vast amount of information. Contemplate having kerjillions of pieces of information ("hundreds of millions of documents"), some of which are related to one another, and the information you desire may be snippets of data scattered around. It's easy to see this information as a "cloud" of information, it is connected in multidimensionally complex ways, and it is the sum total of this information which is the "information space".

Queue: A queue is the same thing as a "waiting line", such as you experience when buying tickets at a movie theater. When "waiting in line" you are "in a queue".

"Leave-behind prototypes": Not entirely clear is this phrase. It appears that the prototype implementations created by the research organizations will be "left behind" so that the contracting agencies can continue to use the technology. For example "...as well as develop a series of increasingly powerful leave-behind prototypes that both provide immediate value to the Intelligence Community and stimulate feedback to guide follow-on research".

Data model: When designing a computer system part of what you design is the information which the computer system processes. Computer designs always "abstract" or "model" the processed information, because computers cannot directly process the real world. The phrase "data model" refers to the abstract form information takes when inside a computer.

Friday, January 25, 2002

Pipelineistan: Or, it's the Oil Stupid

This two-part article from the Asia Times shows just how the activities going on in the Middle East is just about the Oil. Not the Oil in the Gulf of Arabia, but instead the Oil in the Caspian Basin. This Oil is underneath countries carved from the former Soviet Union, and have been the subject of an intense series of gaming in the years since the collapse of that country.

[January 25, 2002; Asia Times; http://atimes.com/c-asia/DA25Ag01.html] Pipelineistan, Part 1: The rules of the game ... A quick look at the map is all it takes. It's no coincidence that the map of terror in the Middle East and Central Asia is practically interchangeable with the map of oil. There's Infinite Justice, Enduring Freedom - and Everlasting Profits to be made: not only by the American industrial-military complex, but especially by American and European oil giants.

... Pipelineistan is the golden future: a paradise of opportunity in the form of US$5 trillion of oil and gas in the Caspian basin and the former Soviet republics of Central Asia. In Washington's global petrostrategy, this is supposed to be the end of America's oil dependence on the Organization of Petroleum Exporting Countries (OPEC).

... The Caspian states hold at least 200 billion barrels of oil, and Central Asia has 6.6 trillion cubic meters of natural gas just begging to be exploited. Uzbekistan and Turkmenistan are two major producers: Turkmenistan is nothing less than a "gas republic". Apart from oil and gas there's copper, coal, tungsten, zinc, iron, uranium, gold.

The only export routes, for the moment, are through Russia. So most of the game consists of building alternative pipelines to Turkey and Western Europe, and to the east toward the Asian markets. India will be a key player. India, Iran, Russia and Israel are all planning to supply oil and gas to South and Southeast Asia through India.

... It's enlightening to note that all countries or regions which happen to be an impediment to Pipelineistan routes towards the West have been subjected either to a direct interference or to all-out war: Chechnya, Georgia, Kurdistan, Yugoslavia and Macedonia. To the east, the key problems are the Uighurs of China's far-western Xinjiang and, until recently, Afghanistan.

The stakes in the Oil game are big. First, the way of life we enjoy could not happen if it were not for Oil. The cheaper that Oil, the better, in economic terms. Well, unless you're the supplier of said Oil (e.g. OPEC).

According to the United States Energy Information Administration, in 2001 America imported an average of 9.1 million barrels per day - over 60 percent of its crude oil needs. In 2020, the country is projected to require almost 26 million barrels per day in imports. So, it is projected that in 20 years the U.S. is going to triple its use of Oil? Say what?

This is the same U.S. that is running out of domestic Oil reserves. The same U.S. that is already using 25% of the worlds resources, while having only 5% of the worlds population. Asinine.

And, this underscores why the war is about the Oil.

[January 26, 2002 ; Asia Times; http://www.atimes.com/c-asia/DA26Ag01.html] Pipelineistan, Part 2: The games nations play

He goes on to detail the different board pieces being played in this game by the various countries.

A series of pipelines are being built, or planned. The various countries are jostling one another. For example Russia has strong influence because of their historical control of the region. But the U.S. has invaded Afghanistan taking a strong position there, and has (since the article) invaded Iraq and is now threatening Iran. By overturning a swath of countries from Iraq to Afghanistan, the U.S. position will be all the stronger.

The key is, how to get the Oil out of the region without passing through a hostile country. Afghanistan used to be hostile, but look what happened to them. Pakistan used to be, and still is, hostile, except we seem to have bribed them into agreement. Iran is hostile, but we're threatening them and may well invade them as well. Iraq was hostile, and the geurilla fighters definitely still are hostile. Russia isn't exactly friendly, despite our cozy relationship with them. Ditto the situation with China, since some of the maneuvering is to "surround" China with countries friendly to the U.S.

Wednesday, October 10, 2001

The Bush Family: Conspiracy theories abound

Overview of Prescott Bush's contact with Adolf Hitler before and during World War II. (http://burningbush.twentythree.us/ and http://burningbush.twentythree.us/1.htm) To summarize, here are the salient points:

  • George Herbert Walker, E. Roland Harriman (brother of W. Averell Harriman) and other Wall Street Financiers of the 1920's created a bank (The Union Banking Corporation) to act as a front organization for the Fritz Thyssen operations in Germany.
  • Thyssen was a major financier of Adolf Hitler's rise to power.
  • Prescott Bush married George Herbert Walker's daughter, Dorothy, and was placed as a vice president of W.A.Harriman & Co., became a partner in the firm that later becme Brown Brothers Harriman, and became a director and stockholder in the Union Banking Corporation.
  • The Union Banking Corporation was used to funnel donations from America to fund Hitlers rise to power.
  • Prescott Bush went on to become a Senator from Connecticut, is the father of George Herbert Walker Bush, and grandfather of both George Walker Bush and Jeb Bush.

"The Best enemies Money Can Buy" (http://www.fromthewilderness.com/free/ww3/10_09_01_carlyle.html and best-enemies.html) This article covers the history of the Bush family, and how succeeding generations were both in high political power, and were involved with funding people who rose to power in other countries and then those countries became enemies of the United States:

  • Prescott Bush's involvement in funding Adolf Hitler's rise to power.
  • "After becoming President in January 1989, Prescott Bush's son, George Herbert Walker Bush - father of our current President - authorized a series of programs that not only armed Iraqi dictator Saddam Hussein but also provided him with technology that assisted in his development of chemical weapons like Sarin gas, and biological weapons" .. which became the justification, via the Weapons of Mass Destruction claim, of the second war against Iraq.
  • George Herbert Walker Bush is a stake-holder in the Carlyle Group, the nations 11th largest defense contractor. Besides the stink of crony capitalism, the Bin Laden family is also a stake holder in this company. "Since the WTC attacks the Wall Street Journal has reported (Sept. 28, 2001) that, "George H.W. Bush, the father of President Bush, works for the bin Laden family business in Saudi Arabia through the Carlyle Group, an international consulting firm." The senior Bush had met with the bin Laden family at least twice in the last three years - 1998 and 2000 -- as a representative of Carlyle, seeking to expand business dealings with one of the wealthiest Saudi families, which some experts argue, has never fully severed its ties with black sheep Osama in spite of current reports in a mainstream press that is afraid of offending the current administration."

On Oct. 26, 2001, the bin Laden family severed their ties with the Carlyle Group (http://www.fromthewilderness.com/free/ww3/10_26_01_binladensbail.html).

The Best Enemies Money Can Buy

The Best Enemies Money Can Buy

From Hitler To Saddam Hussein to Osama bin Laden - Insider Connections and the Bush Family's Partnership with Killers of Americans

Brown Brothers, Harriman - BNL- and the Carlyle Group

By

Michael C. Ruppert

[© Copyright 2001. All Rights Reserved, Michael C. Ruppert and From The Wilderness Publications, www.copvcia.com. May be reprinted or distributed for non-profit purposes only.]

FTW, Oct. 9, 2001 - Since the Sept. 11 attacks on the World Trade Center and the Pentagon, major media powerhouses and the increasingly influential alternative media alike have begun to focus attention on Bush family connections and a long history of arming and financing America's attackers in the months and years prior to the outbreak of war. Recent stories in the Wall Street Journal (Sept. 27 & 28, 2001), ABC News (Oct. 1, 2001), as well as a host of reports from so-called alternative news sources have begun to focus attention on the Bush family's profit-making role in creating and arming our enemies.

The following is a more comprehensive look at the documented history of these relationships that will also open some new avenues of inquiry for the press, Congress and the American people.

In a world now filled with biowarfare agents, backpack nuclear devices, and chemical weapons like Sarin gas -- where there are people in many countries with reasons to oppose the United States -- the Bush Administration is following predictable strategies in a way that redefines the concept of brinksmanship. Human survival may depend upon the will and the ability of both the Congress and the press to focus on these relationships and to take appropriate action. Moreover - and I am not the first to say this - if a national security priority is to seize the financial assets of those who support terrorists, then perhaps we should start right here at home.

---

Adolph Hitler

Meticulous research, including U.S. government records from the era, along with contemporaneous news stories from the New York Times and other papers is presented in the 1992 book entitled, "George Bush, The Unauthorized Biography" by Webster G. Tarpley & Anton Chaitkin, Published by The Executive Intelligence Review and located at http://www.tarpley.net/bushb.htm. The following is sourced entirely from Chapter II of this essential work. [Note: Although FTW does not always agree with conclusions reached by the Executive Intelligence Review, or its founder Lyndon La Rouche, we have never found a single flaw in any of their factual research. History is history, no matter who presents it. And this history is essential to understanding our era.]

George W. Bush's grandfather, Prescott Bush, was the Managing Director of the investment bank Brown Brothers, Harriman from the 1920s through the 1940s. It was Brown Brothers, in conjunction with Averell Harriman, the Rockefeller family, Standard Oil, the DuPonts, the Morgans and the Fords who served as the principal funding arm in helping to finance Adolph Hitler's rise to power starting in 1923. This included direct funding for the SS and SA channeled through a variety of German firms. Prescott Bush, through associations with the Hamburg-Amerika Steamship line, Nazi banker Fritz Thyssen (pronounced Tee-sen), Standard Oil of Germany, The German Steel Trust (founded by Dillon Read founder, Clarence Dillon), and I.G. Farben, used the Union Bank Corporation to funnel vast quantities of money to the Nazis and to manage their American interests. The profits from those investments came back to Bush allies on Wall Street. Thyssen is universally regarded as having been Hitler's private banker and ultimate owner of the Union Bank Corporation.

Early support for Hitler came from Prescott Bush through the Hamburg-Amerika Steamship line -- also funded by Brown Bothers -- that funneled large sums of money and weapons to Hitler's storm troopers in the 1920s.

According to Tarpley and Chaitkin, "In May 1933, just after the Hitler regime was consolidated, an agreement was reached in Berlin for the coordination of all Nazi commerce with the U.S.A. The Harriman International Company... was to head a syndicate of 150 firms and individuals, to conduct all exports from Hitler Germany to the United States."

Furthermore, a 1942 U.S. government investigative report that surfaced during 1945 Senate hearings found that the Union Bank, with Prescott Bush on the board, was an "interlocking concern" with the German Steel Trust that had produced:

  • 50.8% of Nazi Germany's pig iron
  • 41.4% of Nazi Germany's universal plate
  • 36% of Nazi Germany's heavy plate
  • 38.5% of Nazi Germany's galvanized sheet
  • 45.5% of Nazi Germany's pipes and tubes
  • 22.1% of Nazi Germany's wire
  • 35% of Nazi Germany's explosives

The business relationships established by Bush in 1923 continued even after the war started until they became so offensive and overt as to warrant seizure by the U.S. government under the Trading with the Enemy Act in 1942.

In 1942, "Under the Trading with the Enemy Act, the government took over Union Banking Corporation, in which Bush was a director. The U.S. Alien Property Custodian seized Union Banking Corp.'s stock shares...

"... all of which shares are held for the benefit of... members of the Thyssen family, [and] is property of nationals... of a designated enemy country."

"On October 28, the government issued orders seizing two Nazi front organizations run by the Bush-Harriman bank: the Holland-American Trading Corporation and the Seamless Steel Equipment Corporation."

"Nazi interests in the Silesian-American Corporation, long managed by Prescott Bush and his father in law George Herbert Walker, were seized under the Trading with the Enemy Act on Nov. 17, 1942..." These seizures of Bush businesses were reported in a number of American papers including The New York Times and The Wall Street Journal.

Prescott Bush went on to become an influential Republican Senator from Connecticut who went on to be a regular golfing partner of President Dwight Eisenhower. His attorneys were the lawyers John Foster and Allen Dulles, the later became the CIA Director under Eisenhower.

Saddam Hussein

After becoming President in January 1989, Prescott Bush's son, George Herbert Walker Bush - father of our current President - authorized a series of programs that not only armed Iraqi dictator Saddam Hussein but also provided him with technology that assisted in his development of chemical weapons like Sarin gas, and biological weapons, which he still possesses. Apologists for Bush (the elder) say that, after the Iran-Iraq War of the 1980s left the region unstable, he was just trying to establish a new balance of power. Not so. Bush directives and policies, including relationships with the Bank of Credit and Commerce International (BCCI), and the Banca Nazionale del Lavoro (BNL) were directly and deliberately responsible for creating the army the U.S. fought in 1991.

A story by Russ W. Baker, in the March/April issue the Colombia Journalism Review (CJR), provided the most compelling overview of Iraqgate that I have seen.

"ABC News Nightline opened last June 9 with words to make the heart stop ÔIt is becoming increasingly clear,' said a grave Ted Koppel, Ôthat George Bush, operating largely behind the scenes throughout the 1980s, initiated and supported much of the financing, intelligence, and military help that built Saddam's Iraq into the aggressive power that the United States ultimately had to destroy...

"Why, then, have some of our top papers provided so little coverage?" Baker poignantly asks.

" The result: readers who neither grasp nor care about the facts behind facile imagery like The Butcher of Baghdad and Operation Desert Storm. In particular, readers who do not follow the story of the Banca Nazionale del Lavoro, which apparently served as a paymaster for Saddam's arms buildup, and thus became a player in the largest bank-fraud case in U.S. history.

"Complex, challenging, mind-boggling stories (from Iran-Contra to the S&L crisis to BCCI) increasingly define our times: yet we don't appear to be getting any better at telling them...

"Much of what Saddam received from the West was not arms per se, but so-called dual-use technology -- ultra sophisticated computers, armored ambulances, helicopters, chemicals, and the like, with potential civilian uses as well as military applications. We've learned that a vast network of companies, based in the U.S. and abroad, eagerly fed the Iraqi war machine right up until August 1990, when Saddam invaded Kuwait.

"And we've learned that the obscure Atlanta Branch of Italy's largest bank, Banca Nazionale del Lavoro, relying partly on U.S. taxpayer-guaranteed loans, funneled $5 billion to Iraq from 1985 to 1989. Some government-backed loans were supposed to be for agricultural purposes, but were used to facilitate the purchase of stronger stuff than wheat. Federal Reserve and Agriculture department memos warned of suspected abuses by Iraq, which apparently took advantage of the loans to free up funds for munitions. U.S. taxpayers have been left holding the bag for what looks like $2 billion in defaulted loans to Iraq.

"... In fact, we now know that in February 1990, then Attorney General Dick Thornburgh [appointed by George H.W. Bush] blocked U.S. investigators from traveling to Rome and Istanbul to pursue the case...

"... As New York Times columnist William Safire argued last December 7, ÔIraqgate is uniquely horrendous: a scandal about the Systematic abuse of power by misguided leaders of three democratic nations [The U.S., Britain, and Italy] to secretly finance the arms buildup of a dictator."

While Democrat Henry Gonzales, Chairman of the House Banking Committee during the period, stood as the lone voice from the wilderness in raising alarms about Bush's obvious corruption, the rest of the Congress sheepishly ignored all the signs demanding immediate action. Gonzales' voice reportedly fell silent after his empty car was machine-gunned in a Washington suburb in what passed for a drive-by shooting.

The CJR continues: "Meanwhile, The Village Voice published a major investigation by free-lancer Murray Waas in its December 18, 1990 issue... "That American troops could be killed or maimed because of a covert decision to arm Iraq,' Waas wrote, "is the most serious consequence of a U.S. foreign policy formulated and executed in secret, without the advice and consent of the American public..."

The L.A. Times, on Feb 23, 1992, dug deep enough to find secret National Security Decision Directives by the Bush Administration in 1989 ordering closer ties with Baghdad and paving the way for $1 billion in new aid. The Times' series, co-authored with Waas, emphasized that, "buried deep in a 1991 Washington Press piece - that Secretary of State James Baker, after meeting with Iraqi foreign minister Tariq Aziz in October 1989, intervened personally to support U.S. government loans guarantees to Iraq."

Baker's CJR report also noted, "On October 3, the [Wall Street] Journal reported [BNL official Christopher] Drogoul's assertion that the director general of Iraq's Ministry of Industry and Military Production had told him, ÔWe are all in this together. The intelligence service of the U.S. government works very closely with the intelligence service of the Iraqi government.' Three weeks later, the Journal reported that [Henry] Gonzales Ôproduced a phone-book-sized packet of documents' showing the involvement of U.S. exporting firms... The documents mentioned one... which designed parts for Iraq's howitzers and was financed through BNL..."

In the wake of highly suspicious anthrax outbreaks in Florida, just miles from where several of the WTC suicides pilots trained, we add one final note. In his 1998 book "Bringing the War Home" author William Thomas writes, " Under that same [weapons transfer] program, 19 containers of Anthrax bacteria were supplied to Iraq in 1988 by the American Type Culture Collection company, located near Fort Detrick, MD, the site of the US Army's high security germ warfare labs."

The Carlyle Group, the Bushes and bin Laden

The warnings about the Carlyle Group, the nation's 11th largest defense contractor, and the Bushes came long before the World Trade Center attacks. The Carlyle Group is a closely held corporation, exempt, for that reason, from reporting its affairs to the Securities and Exchange Commission. Little is known of what it actually does except that it buys and sells defense contractors. As of October 4, 2001, it has removed its corporate web site from the World Wide Web making further investigation through that channel impossible. Its Directors include Frank Carlucci, former Reagan Secretary of Defense; James Baker, former Bush Secretary of State; and Richard Darman, a former White House aide to Ronald Reagan and Republican Party operative.

On March 3, 2001, just weeks after George W Bush's inauguration, the conservative Washington lobbying group Judicial Watch issued a press release. It said:

"(Washington, D.C.) Judicial Watch, the public interest law firm that investigates and prosecutes government abuse and corruption, called on former President George Herbert Walker Bush to resign immediately from the Carlyle Group, a private investment firm, while his son President George W. Bush is in office. Today's New York Times reported that the elder Bush is an "ambassador" for the $12 billion private investment firm and last year traveled to the Middle East on its behalf. The former president also helped the firm in South Korea.

"The New York Times reported that as compensation, the elder Bush is allowed to buy a stake in the Carlyle Group's investments, which include ownership in at least 164 companies throughout the world (thereby by giving the current president an indirect benefit). James Baker, the former Secretary of State who served as President George W. Bush's point man in Florida's election dispute, is a partner in the firm. The firm also gave George W. Bush help in the early 1990's when it placed him on one of its subsidiary's board of directors.

"This is simply inappropriate. Former President Bush should immediately resign from the Carlyle Group because it is an obvious conflict of interest. Any foreign government or foreign investor trying to curry favor with the current Bush Administration is sure to throw business to the Carlyle Group. And with the former President Bush promoting the firm's investments abroad, foreign nationals could understandably confuse the Carlyle Group's interests with the interests of the United States government," stated Larry Klayman, Judicial Watch Chairman and General Counsel.

"Questions are now bound to be raised if the recent Bush Administration change in policy towards Iraq has the fingerprints of the Carlyle Group, which is trying to gain investments from other Arab countries who [sic] would presumably benefit from the new policy," stated Judicial Watch President Tom Fitton.

Judicial Watch noted that "even the Clinton Administration called on the Rodham brothers to stop their business dealings in [The former Soviet Republic of] Georgia because those dealings started to destabilize that country."

Since the WTC attacks the Wall Street Journal has reported (Sept. 28, 2001) that, "George H.W. Bush, the father of President Bush, works for the bin Laden family business in Saudi Arabia through the Carlyle Group, an international consulting firm." The senior Bush had met with the bin Laden family at least twice in the last three years - 1998 and 2000 -- as a representative of Carlyle, seeking to expand business dealings with one of the wealthiest Saudi families, which some experts argue, has never fully severed its ties with black sheep Osama in spite of current reports in a mainstream press that is afraid of offending the current administration.

The Nation, on March 27, 2000 - in a story co-authored by David Corn and Paul Lashmar - wrote, "In January former President George Bush and former British Prime Minister John Major paid a social call on Saudi Arabian Crown Prince Abdullah..." This story confirms at least one meeting between the elder Bush and Saudi leaders, including the bin Ladens. That the bin Ladens attended this meeting was confirmed in a subsequent September 27, 2001 Wall Street Journal (WSJ) story. The January 2000 meeting with the bin Ladens was also later confirmed by Bush (the elder's) Chief of Staff Jean Becker, only after the WSJ presented her with a thank you note sent by Bush to the bin Ladens after that meeting.

James Baker visited the bin Ladens in 1998 and 1999 with Carlyle CEO Frank Carlucci.

The WSJ story went on to note, "A Carlyle executive said that the bin Laden family committed $2 million through a London investment arm in 1995 in Carlyle Partners II Fund, which raised $1.3 billion overall. The fund has purchased several aerospace companies among 29 deals. So far, the family has received $1.3 million back in completed investments and should ultimately realize a 40% annualized rate of return, the Carlyle executive said.

"But a foreign financier with ties to the bin Laden family says the family's overall investment with Carlyle is considerably larger..."

In other words, Osama bin Laden's attacks on the WTC and Pentagon, with the resulting massive increase in the U.S. defense budget have just made his family a great big pile of money.

More Bush connections appear in relation to the bin Ladens. The WSJ story also notes that, "During the past several years, the [bin Laden] family's close ties to the Saudi royal family prompted executives and staff from closely held New York publisher Forbes, Inc. to make two trips to the family headquarters, according to Forbes Chairman Caspar Weinberger, a former U.S. Secretary of Defense in the Reagan administration. ÔWe would call on them to get their view of the country and what would be of interest to investors.'"

President G.H.W. Bush pardoned Weinberger for his criminal conduct in the Iran-Contra scandal in 1989.

Our current President, George W. Bush has also had -- at minimum -- indirect dealings with Carlyle and the bin Ladens. In 1976 his firm Arbusto Energy was funded with $50,000 from Texas investment banker James R. Bath who was also the U.S. investment counselor for the bin Laden family. In his watershed 1992 book, "The Mafia, The CIA and George Bush," award winning Texas investigative journalist Pete Brewton dug deeply into Bath's background, revealing connections with the CIA and major fraudulent activities connected with the Savings & Loan scandal that took $500 billion out of the pockets of American taxpayers. A long-time friend of George W. Bush, Bath was connected to a number of covert financing operations in the Iran-Contra scandal, which also linked to bin Laden friend Adnan Khashoggi. One of the richest men in the world, Khashoggi was the arms merchant at the center of the whole Iran-Contra scandal. Khashoggi, whose connections to the bin Ladens is more than superficial, got his first business break by acting as middle-man for a large truck purchase by Osama bin Laden's older brother, Salem.

Another key player in the Bush Administration, Deputy Secretary of Defense Richard Armitage, left his post as an Assistant Secretary of Defense in the Reagan Administration after a series of scandals connected to CIA operatives Ed Wilson, Ted Shackley, Richard Secord and Tom Clines placed him at the brink of criminal indictment and jail. Shackley and Secord are veterans of Vietnam operations and have long been linked to opium/heroin smuggling. The Armitage scandals all focused on the illegal provision of weapons and war materiel to potential or actual enemies of the U.S. and to the Contras in Central America.

Armitage, a former Navy SEAL, who reportedly enjoyed combat missions and killing during covert operations in Laos during the Vietnam War, has never been far from the Bush family's side. Throughout his career, both in and out of government, he has been perpetually connected to CIA drug smuggling operations. Secretary of State Colin Powell, in a 1995 Washington Post story, called Armitage, "my white son." In 1990, then President Bush dispatched Armitage to Russia to aid in its "transition" to capitalism. Armitage's Russian work for Bush has been frequently connected to the explosion of drug trafficking under the Russian Mafias, which became virtual rulers of the nation afterwards. In the early 1990s Armitage had extensive involvement in Albania at the same time that the Albanian ally, Kosovo Liberation Army was coming to power and consolidating its grip, according to The Christian Science Monitor, on 70% of the heroin entering western Europe. [See FTW Vol. II, No 2 - April 24, 1999]

Armitage and Carlucci are both Board Members of the influential Washington think tank, the Middle East Policy Council.

The connections continue with Vice President Dick Cheney. Amongst the multitude of oil pipeline construction running through the new war zone is one project - according to a Sept. 19, 2001 Wall Street Journal story - a joint venture in which the bin Laden family joined with the construction firm H.C. Price. A researcher named "Phoenix," writing for the Internet news site Rumor Mills News Agency located at www.rumormillnews.com, reported that Price subsequently changed its name to Bredero Shaw, Inc. and is now owned by a subsidiary of the Halliburton Corporation, Dresser Industries. It was Dresser industries that gave George H.W. Bush his first post war job in 1948. A check of the relevant corporate web sites has confirmed this.

Vice President Dick Cheney, who served as Secretary of Defense during Desert Storm, directing the campaign against Saddam Hussein, was Halliburton's CEO until last year's election.

And, according to a 2000 story from Harper's Magazine, in 1990 our current President, through a position as a corporate director of Caterair, owned by the Carlyle Group - at a time when the bin Laden's were invested in Carlyle - had additional connections to the bin Laden family. In addition, on March 1, 1995, when George W. Bush was Texas governor and a senior Trustee of the university, the University of Texas Endowment voted to place $10 million in investments with the Carlyle Group. As to how much of that money went to the bin Ladens we can only guess. But we do know that there is a long tradition in the Bush family of giving money to those who kill Americans.

Now, as the people of America are beginning to awaken to what is really being unleashed upon them, as a few brave souls are asking who's going to get all the money the Bush Administration is "borrowing" from government coffers and who's going to pay for it - the above history is more than ominous.

Considering that during the 1980s, under the pretext of fighting a Sandinista regime in Nicaragua that never once launched an attack on the U.S., these same people oversaw an explosion in U.S. cocaine consumption that went from 80 metric tons in 1979 to 600 metric tons in 1989 - considering that the CIA trained and equipped death squads that tortured and murdered hundreds of thousands of people from Guatemala to Panama - considering that these same people have brutalized Iraq, leaving portions of it radioactively contaminated by depleted uranium for the next 4 billion years and causing a fivefold increase in the number of childhood leukemia cases amidst a starving population, one can only wonder what they will produce for the world now given the context of the World Trade Center attacks.