Showing posts with label Domestic Spying. Show all posts
Showing posts with label Domestic Spying. Show all posts

29 September 2011

Rag Radio : Suspense Novelist David Lindsey on the Private Intelligence Industry

Suspense novelist David Lindsey during broadcast of Rag Radio, Friday, Sept. 23, 2011, at the studios of KOOP 91.7-FM in Austin. Photo by Tracey Schulz / Rag Radio / The Rag Blog.

Suspense novelist David Lindsey on Rag Radio
with Thorne Dreyer. Listen to it here:


Novelist David Lindsey discussed his writing -- and the booming private intelligence industry, which is the subject of his latest work -- with Thorne Dreyer on Rag Radio, Friday, September 23, 2011.

Lindsey is an Austin-based author who has written 14 novels in the mystery, thriller, and suspense genres. He is a native Texan who was born in Starr County, near the Mexican border, and grew up in West Texas, in the oil fields and ranches of the Colorado River valley, north of San Angelo.

His first book, A Cold Mind, published in 1982, was the first of five novels featuring Houston homicide detective Stuart Haydon. Lindsey, who was active in a human rights organization that monitored political assassinations in Guatemala, set his fifth Haydon novel, Body of Truth (1992), in that Central American country. Body of Truth won Germany's Bochumer Krimi Archiv award for the best suspense novel of the year.

Mercy, released in 1990, was also set in Houston and featured a female Hispanic detective, Carmen Palma. The book was a New York Times bestseller, and was made into a motion picture starring Ellen Barkin. Mercy was a pioneer in the suspense sub-genre featuring serial killers, and Lindsey is one of the first to have dealt with the issue of criminal profiling in his work. Lindsey has also set his fiction in the international world of criminal intelligence and assassinations, and some of his more recent work has been set in Austin and Central Texas.

In 2007, David Lindsey, started researching the astonishing rise of government outsourcing of national intelligence. Privatized spying has become a multi-billion dollar industry and private contractors now command 70 percent of the national intelligence budget. According to Lindsey:
By outsourcing our national intelligence responsibilities to private, for-profit enterprises, the government has fundamentally altered the structure and behavior of the business of spying.
A two-year investigation on this subject by The Washington Post resulted in a blockbuster series called "Top Secret America." The Post said:
The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it, or exactly how many agencies do the same work.
The private intelligence industry is the setting for David Lindsey’s latest novel, Pacific Heights. Written under the pseudonym Paul Harper, it is the first novel in the Marten Fane story cycle, a serial novel set in the hidden world of private sector intelligence contractors.

Rag Radio -- hosted and produced by Rag Blog editor Thorne Dreyer -- is broadcast every Friday from 2-3 p.m. (CDT) on KOOP 91.7-FM in Austin, and streamed live on the web. KOOP is a cooperatively-run community radio station in Austin.

Rag Radio, which has been aired since September 2009, features hour-long in-depth interviews and discussion about issues of progressive politics, culture, and history. After broadcast, all episodes are posted as podcasts and can be downloaded at the Internet Archive. Tracey Schulz is the show's engineer and co-producer.

Rag Radio is also rebroadcast on Sundays at 10 a.m. (Eastern) on WFTE, 90.3-FM in Mt. Cobb, PA, and 105.7-FM in Scranton, PA. Rag Radio is produced in the KOOP studios, in association with The Rag Blog, a progressive internet newsmagazine, and the New Journalism Project, a Texas 501(c)(3) nonprofit corporation.

The running time for this interview, with music and underwriting announcements removed, is 53:56.

Pacific Heights, written by David Lindsey under the pseudonym Paul Harper, is the first novel in the Marten Fane story cycle, a serial novel set in the hidden world of private sector intelligence contractors.

The Rag Blog

[+/-] Read More...

01 February 2011

Jim Turpin : Is the United States a 'Banana Republic'?

Image from polisci.wisc.edu.

Lookout, O. Henry!
How did the United States
become a 'banana republic'?


By Jim Turpin / The Rag Blog / February 1, 2011
ba•nan•a re•pub•lic (noun) A small country that is economically dependent on a single export commodity or on outside help, and is typically governed by a dictator or the armed forces.
“Banana republic” was first used by author William Sydney Porter (“O. Henry”) in Cabbages and Kings (1904) while residing in Honduras after hiding out for allegedly embezzling funds from the First National Bank of Austin in 1894.
“This is America, not a banana republic.” -- Vincent Bugliosi
Well... I hate to break it to the esteemed lawyer above, but the United States is a banana republic and here’s why:
  • Unmitigated torture and detention of U.S. citizens & foreign nationals
  • Extrajudicial assassinations of U.S. citizenry by strong man in charge
  • Unlimited spying on citizenry & seizure of property
  • Control of majority of economic resources by wealthy elites
  • Massive indebtedness to foreign powers and funding war

Unmitigated torture and detention of US citizens & foreign nationals:


As part of the “War on Terror," the Obama administration continues the draconian national security “policies” of George W. Bush. These include indefinite detention at CIA “black sites” and at Guantanamo, “evidence” produced through torture, post acquittal “detention power," and military commissions or tribunals with severely limited “due process." This list barely touches the full complement of tools used by our government to flout the rule of law.

Key among these is the use of torture and detention for both U.S. citizens and foreign nationals. The abuses at Guantanamo and other “black sites” are well known: water boarding, sleep deprivation, stress positions, humiliation, and degradation. But what is not as well known is that this has happened to U.S. citizens and the “evidence” produced is admissible in military commissions.

In 2006, the Congress passed the Military Commissions Act (MCA)
which allows
procedures deviating from the traditional rules of the Uniform Code of Military Justice (UCMJ). Among other shortcomings, the MCA rejects the right to a speedy trial, allows a trial to continue in the absence of the accused, delegates the procedure for appointing military judges to the discretion of the Secretary of Defense, allows for the introduction of coerced evidence at hearings, permits the introduction of hearsay and evidence obtained without a warrant, and denies the accused full access to exculpatory evidence.
Canadian Omar Khadr was 15 years old when picked up and accused by the U.S. government of planting roadside bombs and killing a U.S. soldier with a grenade in Afghanistan in 2002.
Defense lawyers want the military judge, Army Col. Patrick Parrish, to exclude any confessions Khadr made to U.S. interrogators following his capture, wounded and near dead, on grounds of either coercion or torture. Prosecutors seek to use statements Khadr made to his captors at age 15 and 16 at his upcoming trial...

Critics cast his trial as the first of a so-called "child soldier" in modern Western history. They argue that Khadr should have been given special treatment, including rehabilitation, and not shipped from Afghanistan to the prison camps where he was held for year as an alleged teen terrorist among adult "enemy combatants."
He still remains untried after nine years at Guantanamo and will likely never be tried or released.

U.S. citizen Jose Padilla was arrested in 2002 for providing “material support to terrorism” and for training in the use of radiologic weapons in the Afghanistan-Pakistan region in 2001 and early 2002. He was then deemed an “enemy combatant” and held in a military brig in South Carolina without notice to family or attorney. Padilla was held for five years and alleges torture including sensory and sleep deprivation, stress positions, and the administration of the hallucinogenic drugs LSD and PCP. Padilla was convicted in 2007 and is serving a 17-year sentence.


Extrajudicial assassinations of U.S. citizenry by strong man in charge

Though this program existed long before the Obama administration, the ordered assassinations of U.S. citizens by the executive branch due to an “unspecified threat” seems beyond the pale for most Americans and citizens of the world.

The ACLU recently stated:
It is alarming to hear that the Obama administration is asserting that the president can authorize the assassination of Americans abroad, even if they are far from any battlefield and may have never taken up arms against the U.S., but have only been deemed to constitute an unspecified "threat."

This is the most recent consequence of a troublingly overbroad interpretation of Congress's 2001 Authorization for the Use of Military Force. This sweeping interpretation envisions a war that knows no borders or definable time limits and targets an enemy that the government has refused to define in public. This policy is particularly troubling since it targets U.S. citizens, who retain their constitutional right to due process even when abroad.
Glenn Greenwald in Salon also noted that
I actually can't believe that there is even a "debate" over whether an American President -- without a shred of due process or oversight -- has the power to compile hit lists of American citizens whom he orders the CIA to kill far away from any battlefield. The notion that the President has such an unconstrained, unchecked power is such a blatant distortion of everything our political system is supposed to be -- such a pure embodiment of the very definition of tyrannical power -- that, no matter how many times I see it, it's still hard for me to believe there are people willing to expressly defend it.
The citizen in question is Anwar al-Awlaki, a U.S. citizen born in New Mexico in 1971 and a Muslim cleric accused of orchestrating terror attacks from Yemen. In December 2010 a federal judge dismissed a challenge to the Obama administration's targeted-killing program, meaning the U.S. can continue to go after a Yemeni-American cleric whom it blames for terrorist plots.

The case, brought by the father of cleric Anwar al-Awlaki, raised difficult questions about the breadth of U.S. executive power, but U.S. District Judge John Bates said he couldn't answer them as the father lacked legal standing to bring the case. The "serious issues regarding the merits of the alleged authorization of the targeted killing of a U.S. citizen overseas must await another day or another (non-judicial) forum."

Rep. Dennis Kucinich (D-OH) tried in August of 2010 to pass a bill that prohibits extrajudicial assassinations, but failed to get enough votes. The Congressman stated: “The U.S. government cannot act as judge, jury, and executioner."


Unlimited spying on citizenry and seizure of property

As a response to Richard Nixon’s propensity to spy on political and activist groups which blatantly violated the Fourth Amendment (unreasonable search and seizure), the Carter administration passed the Foreign Intelligence Surveillance Act (FISA) in 1978. The act was created to provide judicial and Congressional oversight of the government's covert surveillance activities of foreign entities and individuals in the United States, while maintaining the secrecy needed to protect national security.

It allowed surveillance, without court order, within the United States for up to one year unless the "surveillance will acquire the contents of any communication to which a United States person is a party." If a United States person is involved, judicial authorization was required within 72 hours after surveillance begins.

In the period 1979-2006 a total of 22,990 applications for warrants were made to the Court of which 22,985 were approved (sometimes with modifications; or with the splitting up, or combining together, of warrants for legal purposes), and only five were definitively rejected.

This means that only .02% of submitted governmental FISA requests were denied by the court.

Even with this governmental “rubber stamp” to spy on U.S. citizens, the Bush administration and its’ national security measures went beyond the confines of FISA authorization and allowed the National Security Administration (NSA) to track the international phone calls and e-mails of hundreds and possibly thousands of Americans without use of the court. The FISA Amendment Act of 2008 was passed (and fully supported by then Senator Obama) and as the ACLU pointed out,
...the law meant to “update” FISA instead gutted the original law by eviscerating the role of the judicial oversight in government surveillance. The law also gave sweeping immunity to the telecommunications companies that aided the Bush administration’s unconstitutional warrantless wiretapping program by handing over access to our communications without a warrant.
With the recent release of Wikileaks documents, seizure of property is now also the rule when U.S. citizens return from traveling abroad. Salon magazine recently discussed this very issue and the legal ramifications:
For those who regularly write and read about civil liberties abuses, it's sometimes easy to lose perspective of just how extreme and outrageous certain erosions are. One becomes inured to them, and even severe incursions start to seem ordinary.

Such was the case, at least for me, with Homeland Security's practice of detaining American citizens upon their re-entry into the country, and as part of that detention, literally seizing their electronic products -- laptops, cellphones, Blackberries and the like -- copying and storing the data, and keeping that property for months on end, sometimes never returning it.

Worse, all of this is done not only without a warrant, probable cause or any oversight, but even without reasonable suspicion that the person is involved in any crime. It's completely standard-less, arbitrary, and unconstrained. There's no law authorizing this power nor any judicial or Congressional body overseeing or regulating what DHS is doing.

Control of majority of economic resources by wealthy elites

Wealth inequality and plutocracy may now be at the highest point in U. S. history. Corporations are making huge profits and the recent passage of the tax bill in December heavily favors the top earning elite. With best ever fourth-quarter 2010 corporate profits from Apple ($.4.31 billion), Intel ($3.4 billion), along with many others including the financial institutions bailed out by tax payers including JP Morgan who
reported a 48 percent increase in profits over 2009 and a 47 percent increase for the fourth quarter of 2010 over the same period the previous year. JP Morgan netted a profit for the year of $17.4 billion, a figure equivalent to the gross domestic product of Bolivia
The plutocrats of this country are not just doing well, they are exceeding levels not seen since the wealth gap that was created right before the Great Depression.

In 1928, the top 0.01% of U.S. families averaged 892 times more income than families in the bottom 90%. By contrast, in 2006 the top 0.01 percent averaged 976 more income than America’s bottom 90 percent.

Inversely with wealth increasing, tax rates have plummeted for the rich. Taxpayers making more than $1 million in 1944 paid 65% of their total income in taxes. In 2005, those making $1 million faced a top marginal rate of 35% or 23% of their income in federal taxes.

Let’s not forget that the Obama administration, with a majority in both the House and Senate, caved to the Republican party in December 2010 by continuing the ruinous Bush tax cuts for the wealthy. He helped ramrod a tax cut for the uber-rich that added $900 billion to the over $14 trillion U.S. national debt. This was not well received by some Democrats, but passed anyway and was hailed as bipartisan cooperation.

Congratulations. Each man, woman and child in the U.S now owes around $45,000 to eliminate the national debt. Go ahead and add that to your mortgage, credit card, and college debt which exceeds annual disposal income by 122.5%. In other words, you are enslaved permanently to massive debt.

But who has done well in the last 15 years? Well, if you are a CEO, your pay has increased +298.2%, while production workers have had a +4.3% increase and federal workers have had their pay fall by -9.3%. But don’t worry, corporations have had a +106.7% profit increase since 1990. Go figure.


Massive indebtedness to foreign powers and funding war

You don’t have to be a math genius to figure out that huge tax cuts along with a massive increase in spending causes a huge national deficit and federal debt. The majority of U.S. debt is held by foreign countries via U.S. Treasury bonds. These bonds are held primarily by Asian countries (China, $907 billion, and Japan, $877 billion) but also by other foreign powers including the United Kingdom ($477 billion) and oil exporting countries ($214 billion).

This has caused concern that these controlling foreign entities may have not only economic but also political control of the United States policies with vast control of our national debt.

So where are your tax dollars going? 54% of federal tax dollars go to military spending (36% to current military operations to the tune of $965 billion and 18% or $484 billion for past military spending including vet benefits and interest on national debt borrowing). The government typically “cooks the books” and underestimates military spending by including trust funds (i.e. Social Security) and the expenses of past military spending as not distinguished from non-military spending.

It seems that one major export we have for the world is endless war. To date, the total cost of the Iraq and Afghanistan wars is $1.26 trillion. This obscene amount has been approved over and over again, by both Democrats and Republicans since 2001, including the $33 billion war supplemental in August 2010. This war is bought and paid for by both parties.

Nobel economic laureate Joseph E. Stiglitz predicted that by the time the U.S. leaves these two conflicts we will have spent over $3 trillion and we may well exceed this amount when factoring in the national debt, the current economic crisis and the rising cost of oil.

So the question remains… are we now the mythical “banana republic” Anchuria that O. Henry created in Cabbages and Kings?
At that time we had a treaty with about every foreign country except Belgium and that banana republic, Anchuria...
It seems to me we don’t even rate with Anchuria... or Belgium for that matter.

[Jim Turpin is a native Austinite and member of CodePink Austin. He also volunteers for the GI coffeehouse Under the Hood Café at Ft. Hood in Killeen, Texas.]

The Rag Blog

[+/-] Read More...

12 April 2010

To Catch a Spy : The Story of George the Snitch

Dennis the Menace from The Comics Curmudgeon.

To catch a spy II:
A short history of one snitch


By Richard Lee / The Rag Blog / April 12, 2010

[The Rag Blog published an article by Lisa Fithian about acknowledged FBI informant Brandon Darby, on March 22, 2010. Lisa's piece received thousands of hits, and was reposted all over the Internet. And for Richard, it brought to mind another story from another time. For links to Rag Blog material about Brandon Darby and the infiltration of community groups by law enforcement agencies, see below.]

This is the story of George, not his whole story, just the part I know about.

San Diego, 1972. Nixon is coming here. We have been planning his welcome since Chicago four years ago. Not heavy planning at first, but as time passed we worked on the Republican Convention ’72 with increasing intensity, and as we left Washington after the huge MAYDAY demo in May of ’71 we said our goodbyes to our tribes with the phrase, “See ya next year in San Diego.”

The San Diego Convention Coalition in the spring of that year was made up of dozens of groups from across the country. Our affinity group arrived in March to help organize. In that time, one of the strongest groups that planned to attend was Vietnam Veterans Against the War (VVAW.)

Two of us from our little affinity group were veterans. I had participated in some VVAW actions back in Boston, and we began to attend meetings of the San Diego chapter. Our thinking at the time was that, counting vets and their families, VVAW would bring about 50,000 demonstrators.

We met in public, open meetings once a week, and each week we would have two or three more vets than the last week.

One week a new guy came. His name was George. He was a vet; he had been in the Army for about a year, before he took the honorable way out with a Bad Conduct Discharge. My partner and I thought he might be the kinda guy we could relate to, and decided to get to know him better.

That VVAW meeting was the first time he had ever been to an anti-war gathering. George had no politics, neither left nor right, Republican or Democrat, he said he was against the war, but knew very little about it. He took notes, we stole them from him, and those notes consisted of little more than names, most misspelled.

We talked it over with some of the others in the chapter and decided that George needed a closer look. A week after the meeting, we invited George to go to out for a couple of beers. Instead, we drove to an isolated part of a park and started asking George some sharp questions. He didn’t put up much resistance, and after a couple minutes he ‘fessed up and began to tell us his story.

George was not only a vet, he was an ex-con, he had done nearly two years on a heroin conviction and was still on parole. Recently he'd been caught with a dirty spike by the SDPD. Instead of violating him, the SD pigs turned him over to the FBI. The feds told George they could make his bust go away if he would do a little something for them. VVAW was that something. And that was how George came to show up at the weekly meeting.

We spent an hour or so debriefing George. He told us that after the last meeting he went two blocks up the street where his handler was waiting in a car. They drove around while the feebee asked him questions; the Man was pissed that he had lost his notes (the ones we had stolen) and he couldn’t remember names. FBI man showed him pictures and when he recognized one, they wanted to know what the pictured vet had said.

I felt sorry for George. He was a loser, he had never won anything in his life and he never expected to. He hadn’t really hurt us at all, it was a public meeting of 20 or so people, we talked mostly about where we were going to camp the brothers and how we were going to feed them. But then again we couldn’t let him hang around, maybe to plant a wire, maybe to later tell lies at some trial. So, we told him it was over and not to come back. I wanted to give him a hug when we parted, but refrained.

The next week we reported what had happened to the membership. As we finished, the door opened and there was George again. He had given it some thought and seen that we were the right side to be on, and asked to be let back in. We put it to a vote, and it was surprisingly close, but he lost his bid. I knew his handler had put him up to it. George left and I never saw him again.

George didn’t become a snitch because of his politics, he had none. He didn’t do it for money, they didn’t pay him. George was only a junkie, a poor one, and he didn’t want to go back to the joint.

It leaves me with the question. What about Brandon Darby? Was it politics? Was it money? Was he jammed up? Blackmailed? Was he simply used, like poor George, or is he really just a snitch from that layer of scum that lies just above the scabs?

Also see:
  • To catch a spy by OneLove (now revealed to be Richard Lee) / The Rag Blog / January 11, 2009
And, Rag Blog articles about Brandon Darby and the Texas 2:For more background on the history of informants in Texas, read The Spies of Texas by Thorne Dreyer / The Texas Observer / Nov. 17, 2006.

The Rag Blog

[+/-] Read More...

02 February 2010

Spying on Americans : Reagan and the PROMIS Conspiracy


It's a national tradition:
Spying on Americans

  • Part II: Reagan administration acquires PROMIS software
By James Retherford and Sherman DeBrosse / The Rag Blog / February 2, 2010

[This is the second installment in a series about the U.S. government's extensive and inglorious history of spying on its own people.]

After Watergate and other revelations of illegal government intrusions led to Congress-mandated clamping down on intelligence operations in the mid-1970s, Ronald Reagan immediately set out to roll back the reforms. With former CIA director George H. W. Bush as his running mate, Reagan received considerable assistance from the intelligence community in the election of 1980. This may have included a secret trip to Paris -- as has been widely asserted -- to make a deal with Iranians guaranteeing that Jimmy Carter would not be able to retrieve the 42 American hostages before the November election, the so-called "October Surprise."

Reagan approved hiring the many private intelligence firms founded by former agents who had been ousted in the 1970s. He also brought psy-op people from the agency to the White House and State Department, using them in “public diplomacy programs” to mold public opinion. Vice President George H.W. Bush oversaw efforts to harass and spy on dissidents.

The coup de grace: the Reagan Justice Department “commandeered” (i.e., stole) a remarkable computer database program called Prosecutor's Management Information System or PROMIS which would serve as the basis for domestic and global surveillance operations for decades to come.

The story of PROMIS has become a Hollywood-style thriller replete with drugs and rock ‘n’ roll, rogue agents and alleged contract murderers, high-tech looting and international espionage, drug cartels, the Mafia, and the Yakuza, allegations of mass murder and massive cover-up, and near war with Japan... all fingers pointing to massive government corruption by Ronald Reagan’s coterie of friends in the Ed Meese Department of Justice.

This is compelling stuff for any legit investigative reporter, and indeed many — such as Joel Bleifuss, Barron’s, and Richard L. Fricker in the inaugural issue of Wired — have taken a shot at connecting the dots. But the scent of blood has also lured the conspiracy sleuths and rightwing demagogues ranging from Alex Jones to Lyndon LaRouche and the Moonies.

Here is what we make of the story.

Reagan rolled back reforms initiated after the Watergate break in.


The PROMIS... and more

Funded by grant money from the Law Enforcement Assistance Administration (LEAA), PROMIS software had been developed in the 1970s by the INSLAW Corporation, a small software development company owned by William and Nancy Hamilton, for integrating criminal justice records.

“But the real power of PROMIS,” Fricker writes in Wired,
“is that with a staggering 570,000 lines of computer code, PROMIS can integrate innumerable databases without requiring any reprogramming. In essence, PROMIS can turn blind data into information. And anyone in government will tell you that information, when wielded with finesse, begets power. Converted to use by intelligence agencies, as has been alleged in interviews by ex-CIA and Israeli Mossad agents, PROMIS can be a powerful tracking device capable of monitoring intelligence operations, agents and targets, instead of legal cases.”
As it was being pitched to the Justice Department, government officials quickly recognized that its capability potential was for more advanced than any data integration system previously developed. PROMIS could be programmed to do everything from tracking all kinds of financial transactions to mapping troop movements in all parts of the world to monitoring intelligence operations, agents, and targets. It could used to acquire and integrate data in various foreign languages. Through an artificial intelligence component codenamed “Brainstorm,” PROMIS extended personality profiling into the realm of predicting an individual’s thoughts and future actions.

The Justice Department first signed a $10 million contract to lease the software and then simply seized it and drove INSLAW into bankruptcy, trying to force liquidation to a rival firm, Hadron, inc., controlled by a key Reagan crony named Dr. Earl Brian.

Brian had already ridden the coattails of Reagan and Attorney General Ed Meese from the former California governor’s state cabinet to a number of lucrative business holdings, including United Press International and Financial News Network (FNN), and allegedly was a key player in the so-called October Surprise, in which Reagan operatives, including vice presidential candidate Bush, have been alleged to have met with Iranian diplomats in Paris and arranged a deal to short circuit Jimmy Carter’s hostage release negotiations until after the 1980 election.

Ignoring the licensing agreement, the DoJ soon passed PROMIS along to other government agencies, including the CIA, though the U.S. government consistently denied this. There followed a long battle through the courts in which INSLAW unsuccessfully tried to obtain redress for the government’s theft of its intellectual property. Those who still believe in the integrity of our judicial system should research the case. For a time INSLAW was represented by Elliott Richardson, who argued compellingly that the matter called for a special investigator.

The CIA was not the only place where illegal versions of PROMIS showed up. According to former Israeli spy Ari Ben-Menashe, the U.S. sold the program to Israel. Ben-Menashe claims that Mossad counterterrorism expert Rafael Eitan first thought of the idea of bugging PROMIS and then selling it to Israel’s enemies in order to snoop on their security and intelligence activities undetected; Israel’s “trapdoor” was reportedly designed by an Israeli American living in Chatsworth, CA.

In turn, the Israelis sold the software to a number of national intelligence services, including Jordan and Iraq, as well as financial institutions, most notably the notorious Bank of Credit and Commerce International (BCCI) which used PROMIS to track money flow on behalf of U.S. and British intelligence agencies before imploding into a spectacular bank failure in 1991. Though Degem, a software company owned by British media mogul (and secret Israeli agent) Robert Maxwell, PROMIS was sold to the Soviet Union and other Eastern Bloc countries.

The software also slipped into Dr. Brian’s hands, allegedly as a payoff towards favors owed for Brian’s help during the October Surprise. From there Brian engaged the services of rogue computer expert Michael
Riconoscuito to create a U.S. version with a secret backdoor allowing undetected U.S. intelligence agencies to eavesdrop on PROMIS users’ activities.

These modifications were done at a facility located on the Cabazon Indian reservation in Indio, CA, owned by Wackenhut, a Florida-based security company with FBI and CIA connections (and an alleged weapons fencing operation for Oliver North’s Iran-Contra dealings).

Wackenhut was founded by retired FBI and CIA executives and is often called the “FBI’s FBI.” Biological weapons and explosives were also developed at its Cabezon facility, located on tribal land officially administered by a self-professed former CIA operative, John Philip Nichols, who later would be convicted of murder solicitation in the death of a tribal official who allegedly had information linking Nichols to misappropriated money involving Wackenhut, illegal arms deals, gaming, and the mob.

Through Hadron, Brian sold the bugged PROMIS to Britain, Australia, South Korea, Japan, Iraq, and Canada. The illegal sale to Canada was discovered by accident when a Canadian government agency telephoned INSLAW requesting a French-language version of the software.

Perhaps the murkiest allegations about the distribution of the Trojan Horse-version of PROMIS came from Debra von Trapp, a technical expert who was hired by the Bush I administration and claims to have worked on a number of clandestine operations, including the bugging and installation of spyware in the White House as Bill Clinton prepared to move in. Von Trapp also claims to have been involved in a CIA project, staged out of a Xerox plant in Germany, to install spyware-enhanced PROMIS on hard drives being sold to Eastern Bloc intelligence agencies, including the KGB.

During the senior Bush’s term, von Trapp was a member of a team developing software to mine all sorts of information about people’s personal lives, allegedly run out of Oliver North’s office at the Department of Justice.

At the same time Riconoscuito was developing a spyware backdoor, another consultant, Barry Kumnick, whose father Frank was an Aryan Nation ideologue living next door to Randy Weaver at Ruby Ridge, ID, was creating an artificial intelligent component called Brainstorm which could allow technicians to predict an individual’s thinking and future action. Kumnick’s early work later morphed into the Total Information Awareness program under the second Bush. It is said that work on the program was stopped when Bush Senior was not reelected, but the work just as likely continued under the radar.

Investigative reporter Danny Casolaro's was "suicided" and his notes and tape recorder were missing.


Like any good spy story, the Islaw-PROMIS saga is marked by its trail of dead, disappeared, and discredited, with claims of as many as 50 murdered. The most remembered casualty was investigative reporter Danny Casolaro, whose naked body was found in a blood-filled bathtub in a Martinsburg, WV, hotel room with multiple slash wounds on his arms and wrists.

Missing was his ever-present briefcase, tape recorder, and notes and outline of his proposed book about the web of intrigue surrounding Iran-Contra, the savings and loan meltdown, BCCI, Contra-connected Wackenhut, Wackenhut-connected INSLAW, the INSLAW-connected October Surprise, and possibly including a secret group of well-connected work-for-hire former spooks running drugs for the Contras.

Casolaro called this high-level conspiracy “The Octopus” and had shown friends his research findings only days before his death. He was in Martinsburg to interview a source who, he told friends, would help him nail down a last piece of evidence in the INSLAW software theft case.

Bleifuss, reporting on the Casolaro death in In These Times, talked to a close friend who said Casolaro began receiving death threats eight or nine months before his demise. The last one, according to Casolaro’s brother, came five days before his trip to West Virginia. Casolaro reportedly told his brother that “if anything happens to me, don’t believe it is an accident.”

Casolaro’s body was found on a Saturday and was embalmed the following Monday -- before family members could be notified -- without a careful autopsy or forensic investigation; the death scene was quickly sanitized by a “cleaning contractor.” Four days later authorities ruled the young journalist’s death was a likely suicide.

Two years later attorney and corruption investigator Paul Wilcher, representing jailed former CIA operative Gunther Russbacher while also looking into the Inslaw case and its possible connections of other high-level conspiracies and cover-ups, was found dead in his bathroom with no apparent cause of death.

Days earlier Wilcher told a friend, now deceased White House correspondent (and Tyler, TX, native) Sarah McClendon, that his investigation had taken him deeper into the conspiracy than Casolaro’s had and that he had become a “danger signal” to powerful interests.

Wilcher’s personal records, documents, computer files, and other information also disappeared, and his body was cremated without positive identification, fingerprinting, or complete forensic examination to determine cause of death. Wilcher was 40 years old and, according to friends, in good health.

Russbacher claims that, as a aviator attached to the Office of Naval Intelligence, he piloted George Bush to Paris in 1980 to rendezvous with Iranian revolutionaries and hammer out details for the hostage release delay. He also claims that $40 million was handled over to the Iranians in Paris to seal the deal. Furthermore, Russbacher said that he had cockpit tape showing the former CIA director in the back seat of the SR71 spy plane used in the return flight.

Russbacher convinced Milcher that his intimate knowledge of the October Surprise as well as other agency “dirty tricks” was the real reason he had been imprisoned, charged, he said, with violating parole in fictional criminal cases originally fabricated by the government to provide cover in his clandestine work.

Riconoscuito also is in the slammer, convicted of illegal drug manufacture. He says he was framed as punishment for going public with his dealings with Brian, the development of PROMIS’s backdoor, and Wackenhut weapons manufacturing and Contra connections.

The developer of the Brainstorm AI component, Barry Kumnick, disappeared amidst the PROMIS scandal fallout. Before disappearing, Kumnick told his sister in Idaho that his new program would be extremely dangerous if it got into the wrong hands. Kumnick has recently resurfaced but has had little to say about INSLAW or his disappearance.


The Inslaw case is indeed an octopus with tentacles reaching into many dark places, and this telling barely scratches the surface of the layers of deception and intrigue.

For instance, we have omitted Debra von Tripp’s story of how the U.S. came perilously close to war with Japan over CIA intrusions into confidential Japanese business dealings and Japanese bugging of the White House; her allegations connect the Saran gas attack in Tokyo, the mid-air explosion of a Lear jet carrying the assistant secretary of the Army, and the Oklahoma bombing, planned and carried out, she said, by rogue U.S. intelligence agents working for the Japanese government.

Von Tripp states that the FBI-CIA dual-assignment agent behind these plots, Robert Goetzman, also murdered Vincent Foster because he “got greedy” and started selling NSA code to the Israelis. She states that one of Goetzman’s covers was as an executive for MCA/Universal, a Japanese-owned multinational entertainment conglomerate with ties to both the Yakuza and American organized crime... and also to Ronald Reagan -- who was represented by the MCA talent management company during his Hollywood career. That is her story, and she is still alive and free and apparently sticking to it, though few are listening.

In 2001, the Unification Church-owned Washington Times and Fox News each quoted federal law enforcement officials familiar with debriefing former FBI agent Robert Hanssen as claiming that the convicted spy had stolen copies of a PROMIS-derivative for his Soviet KGB handlers.

These reports further stated that Osama bin Laden later bought copies of the same PROMIS-derivative on the Russian black market for $2 million and used the software to penetrate database systems in order to move funds throughout the banking system and evade detection by U.S. law enforcement.

In 2006, former Polish-CIA double-agent and now international journalist David Dastych alleged that Chinese military intelligence (PLA-2) devised their own double backdoor through which they penetrated the PROMIS database systems in the Los Alamos and Sandia national laboratories in order “to steal U.S. nuclear secrets."

Despite first a federal bankruptcy judge’s blistering ruling that “through trickery, deceit, and fraud,” the U.S. Department of Justice “took, converted, and stole” software belonging to INSLAW, and then an equally damning investigation by the House Judicial Committee, chaired by Texas congressman Jack Brooks, which also called for a full investigation of Danny Casolaro’s death, the Department of Justice and the CIA have managed to divert or outright quash every serious investigation into the PROMIS affair and the web of shadowy subplots surrounding the story.

INSLAW has not received an additional penny for the massive theft and widespread sale of its intellectual property. Faced with closing its doors due to bankruptcy, the company was rescued by a substantial cash investment by IBM and is still in business, though perhaps just barely judging from its modest presence on the World Wide Web.

The possible moral: Crime pays... if you are the Department of Justice.

Please see:Also see:The Rag Blog

[+/-] Read More...

16 January 2010

Rag Blog Scoop about 'Cognitive Infiltration' Stirs up Internet Storm

Marc Estrin exhibits the tag line to his exclusive Rag Blog article about Obama advisor Cass Sunstein that has received much attention in the blogosphere.

Estrin's exclusive about Obama confidant
Triggers alarm about controversial scheme


By Thorne Dreyer / The Rag Blog / January 16, 2010

The Rag Blog broke a story on January 11 entitled "Got Fascism?: Obama Advisor Promotes 'Cognitive Infiltration’” that has stirred up an internet storm.

The article, written for The Rag Blog by novelist Marc Estrin, reveals a previously unreported and highly controversial strategy for fighting dissension and “extremism” -- especially targeted at those adhering to "conspiracy" theories -- originated by Obama appointee and long-time Obama friend and colleague Cass Sunstein in a 2008 scholarly journal.

The material published in The Rag Blog was in turn covered by Daniel Tencer at The Raw Story on January 13. It was followed up by Glenn Greenwald in an extensive article published by Salon.com entitled “Obama confidant's spine-chilling proposal,” that has been updated several times since and even received a response from Paul Krugman. Greenwald’s Salon.com article was also distributed by CommonDreams.

Both Tencer and Greenwald credited The Rag Blog and Marc Estrin with breaking the story. Marc Estrin’s original article has been reposted extensively on domestic and international websites, and The Rag Blog has received thousands of referral hits from the Raw Story, Salon.com, and CommonDreams postings and from the republishing of our original story around the internet.

Visits to The Rag Blog have come from links placed on a wide variety of sites and from across the political spectrum, but the story has especially caught on with conspiracy buffs and among some on the ultra-right.

(In December The Rag Blog published an article about a Supreme Court decision that let stand a lower court ruling declaring torture, in the words of the author, “an ordinary, expected consequence of military detention” -- a ruling that in effect denied even suspected enemy combatants the protection that comes with being classified a "legal entity.” The Rag Blog posting of that article (a story that did not originate with us) also drew extensive attention including a front page link on The Raw Story -- much of it again from the conspiracy fringe -- and resulted in thousands of visits to The Rag Blog.)

In his original Rag Blog feature Estrin wrote:
In a recent scholarly article, [Cass Sunstein] and coauthor Adrian Vermeule take up the question of "Conspiracy Theories: Causes and Cures." (J. Political Philosophy, 7 [2009], pp. 202-227). This is a man with the president's ear. This is a man who would process information and regulate things. What does he here propose?
[W]e suggest a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity. (Page 219.)
Estrin reflected:
We expect such tactics from undercover cops, or FBI. There the agents are called "provocateurs" -- even if only "cognitive." One learns to smell or deal with them in a group, or recognize trolling online. But even suspicion or partial exposure can “sow uncertainty and distrust within conspiratorial groups [now conflated with conspiracy theory discussion groups] and among their members,” and “raise the costs of organization and communication” -- which Sunstein applauds as "desirable." "[N]ew recruits will be suspect and participants in the group’s virtual networks will doubt each other’s bona fides." (p.225).
Glenn Greenwald wrote for Salon.com:
Cass Sunstein has long been one of Barack Obama's closest confidants. Often mentioned as a likely Obama nominee to the Supreme Court, Sunstein is currently Obama's head of the Office of Information and Regulatory Affairs where, among other things, he is responsible for "overseeing policies relating to privacy, information quality, and statistical programs."

In 2008, while at Harvard Law School, Sunstein co-wrote a truly pernicious paper proposing that the U.S. Government employ teams of covert agents and pseudo-"independent" advocates to "cognitively infiltrate" online groups and websites -- as well as other activist groups -- which advocate views that Sunstein deems "false conspiracy theories" about the Government. This would be designed to increase citizens' faith in government officials and undermine the credibility of conspiracists. The paper's abstract can be read, and the full paper downloaded, here.

Sunstein advocates that the Government's stealth infiltration should be accomplished by sending covert agents into "chat rooms, online social networks, or even real-space groups." He also proposes that the Government make secret payments to so-called "independent" credible voices to bolster the Government's messaging (on the ground that those who don't believe government sources will be more inclined to listen to those who appear independent while secretly acting on behalf of the Government).

This program would target those advocating false "conspiracy theories," which they define to mean: "an attempt to explain an event or practice by reference to the machinations of powerful people, who have also managed to conceal their role." Sunstein's 2008 paper was flagged by this blogger [The Rag Blog's Marc Estrin], and then amplified in an excellent report by Raw Story's Daniel Tencer...
And from Daniel Tencer at The Raw Story:
Sunstein's article, published in the Journal of Political Philosphy in 2008 and recently uncovered by blogger Marc Estrin, states that "our primary claim is that conspiracy theories typically stem not from irrationality or mental illness of any kind but from a 'crippled epistemology,' in the form of a sharply limited number of (relevant) informational sources."

By "crippled epistemology" Sunstein means that people who believe in conspiracy theories have a limited number of sources of information that they trust.

Therefore, Sunstein argued in the article, it would not work to simply refute the conspiracy theories in public -- the very sources that conspiracy theorists believe would have to be infiltrated.

Sunstein, whose article focuses largely on the 9/11 conspiracy theories, suggests that the government "enlist nongovernmental officials in the effort to rebut the theories. It might ensure that credible independent experts offer the rebuttal, rather than government officials themselves. There is a tradeoff between credibility and control, however. The price of credibility is that government cannot be seen to control the independent experts."

Sunstein argued that "government might undertake (legal) tactics for breaking up the tight cognitive clusters of extremist theories." He suggested that "government agents (and their allies) might enter chat rooms, online social networks, or even real-space groups and attempt to undermine percolating conspiracy theories by raising doubts about their factual premises, causal logic or implications for political action."

"We expect such tactics from undercover cops, or FBI," Estrin writes at the Rag Blog, expressing surprise that "a high-level presidential advisor" would support such a strategy.

Estrin notes that Sunstein advocates in his article for the infiltration of "extremist" groups so that it undermines the groups' confidence to the extent that "new recruits will be suspect and participants in the group’s virtual networks will doubt each other’s bona fides."

Sunstein has been the target of numerous "conspiracy theories" himself, mostly from the right wing political echo chamber, with conservative talking heads claiming he favors enacting "a second Bill of Rights" that would do away with the Second Amendment. Sunstein's recent book, On Rumors: How Falsehoods Spread, Why We Believe Them, What Can Be Done, was criticized by some on the right as "a blueprint for online censorship."

Sunstein "wants to hold blogs and web hosting services accountable for the remarks of commenters on websites while altering libel laws to make it easier to sue for spreading 'rumors,'" wrote Ed Lasky at American Thinker.
[Versions of The Rag Blog's story about Cass Sunstein are also up on Daily Kos, OpEd News, and Information Clearing House, along with numerous other blogs and news aggregators.]

[Thorne Dreyer is editor of The Rag Blog.]

The Rag Blog

[+/-] Read More...

11 January 2010

Got Fascism? : Obama Advisor Promotes 'Cognitive Infiltration'

This page has moved. You will be redirected in 5 seconds.

Presidential advisor and long-time Obama buddy Cass Sunstein.

Your government appointees at work:
Cass Sunstein seeks 'cognitive' provocateurs


By Marc Estrin / The Rag Blog / January 11, 2010

Cass Sunstein is President Obama's Harvard Law School friend, and recently appointed Administrator of the White House Office of Information and Regulatory Affairs.

In a recent scholarly article, he and coauthor Adrian Vermeule take up the question of "Conspiracy Theories: Causes and Cures." (J. Political Philosophy, 7 [2009], pp. 202-227). This is a man with the president's ear. This is a man who would process information and regulate things. What does he here propose?
[W]e suggest a distinctive tactic for breaking up the hard core of extremists who supply conspiracy theories: cognitive infiltration of extremist groups, whereby government agents or their allies (acting either virtually or in real space, and either openly or anonymously) will undermine the crippled epistemology of believers by planting doubts about the theories and stylized facts that circulate within such groups, thereby introducing beneficial cognitive diversity. (Page 219.)
Read this paragraph again. Unpack it. Work your way through the language and the intent. Imagine the application. What do we learn?
  • It is "extremists" who "supply" "conspiracy theories."
  • Their "hard core" must be "broken up" with distinctive tactics. What tactics?
  • "Infiltration" ("cognitive") of groups with questions about official explanations or obfuscations or lies. Who is to infiltrate?
  • "Government agents or their allies," virtually (i.e. on-line) or in "real-space" (as at meetings), and "either openly or anonymously," though "infiltration" would imply the latter. What will these agents do?
  • Undermine "crippled epistemology" -- one's theory and technique of knowledge. How will they do this?
  • By "planting doubts" which will "circulate." Will these doubts be beneficial?
  • Certainly. Because they will introduce "cognitive diversity."
Put into English, what Sunstein is proposing is government infiltration of groups opposing prevailing policy. Palestinian Liberation? 9/11 Truth? Anti-nuclear power? Stop the wars? End the Fed? Support Nader? Eat the Rich?

It's easy to destroy groups with "cognitive diversity." You just take up meeting time with arguments to the point where people don't come back. You make protest signs which alienate 90% of colleagues. You demand revolutionary violence from pacifist groups.

We expect such tactics from undercover cops, or FBI. There the agents are called "provocateurs" -- even if only "cognitive." One learns to smell or deal with them in a group, or recognize trolling online. But even suspicion or partial exposure can “sow uncertainty and distrust within conspiratorial groups [now conflated with conspiracy theory discussion groups] and among their members,” and “raise the costs of organization and communication” -- which Sunstein applauds as "desirable." "[N]ew recruits will be suspect and participants in the group’s virtual networks will doubt each other’s bona fides." (p.225).

And are we now expected to applaud such tactics frankly proposed in a scholarly journal by a high-level presidential advisor?

The full text of a slightly earlier version of Sunstein's article is available for download here.

Marc Estrin. The author gets in the last word.

[Marc Estrin is a writer and activist, living in Burlington, Vermont. His novels, Insect Dreams, The Half Life of Gregor Samsa, The Education of Arnold Hitler, Golem Song, and The Lamentations of Julius Marantz have won critical acclaim. His memoir, Rehearsing With Gods: Photographs and Essays on the Bread & Puppet Theater (with Ron Simon, photographer) won a 2004 theater book of the year award. He is currently working on a novel about the dead Tchaikovsky.]

UPDATE: See Rag Blog Scoop about 'Cognitive Infiltration' Stirs up Internet Storm by Thorne Dreyer / The Rag Blog / January 16, 2009

The Rag Blog

[+/-] Read More...

05 January 2010

U.S. Government : Six Decades of Spying on its Citizens


It's a national tradition:

Spying on Americans

  • Part One: LBJ and Nixon
By Sherman DeBrosse / The Rag Blog / January 5, 2010

[This is the first installment of Sherman DeBrosse's series about the U.S. government's extensive and inglorious history of spying on its own people.]

Difficult as it is to understand, our government now has a number of detention facilities that could house hundreds of thousands of people. Some say they are to house undocumented immigrants, but one wonders. In recent years, government has also acquired the capability to monitor and store information about millions of telephone calls, faxes, and e-mails made by American citizens.

When we reflect that government has a history of spying on and harassing progressives and people who object to some of our wars, we cannot be blamed for wondering if the detention facilities and electronic surveillance capabilities are not there to be used on progressives.

Operation Chaos

In October, 1967, President Lyndon B. Johnson established “Operation Chaos” in the CIA. Its role largely was to spy on American citizens who objected to the war in Vietnam. Of course, to one extent or another, the CIA has been spying on domestic dissidents since 1959. Chaos relied largely upon people from the Domestic Operations Division, and others were borrowed from European assignments.

The Domestic Operations Division was created sometime between 1962 and 1965, and its first head was Charles Tracy Barnes, a CIA veteran who had coordinated the agency’s activities duiring the 1954 Guatemalan coup and 1961 Bay of Pigs invasion. It was located at 1750 Pennsylvania Avenue, not in Langley, VA.

From the beginning, Richard Helms was its driving force, and Helms removed Barnes when he became director in 1967. It is believed that under George W. Bush and Dick Cheney Domestic Operations was headquartered in Denver. The relocation might be related to the fact that NSA has significant storage facilities in the area for intercepted electronic communications of all kind.

The NSA has moved many of its personnel from Fort Meade to Buckley Air Force Base in Aurora, where its National Resources Division has relocated. The Army’s new Northern Command (NORTHCOM) has its headquarters in Colorado, and it too has significant data storage and analysis facilities there. The CIA insists that the Domestic Operations Division only works within the United States to gather information about foreign governments.

From the beginning, Domestic Operations was comprised of old hands. The agency’s charter forbade domestic police and domestic surveillance operations, but this division had existed for some time. For a time, E. Howard Hunt was assigned to it. It occupied a full floor at 1750 Pennsylvania Avenue in Washington. A major objective was to infiltrate the New Left anti-war circles.

As is well known, the CIA pumped huge amounts of money into the National Students Association, and it infiltrated a number of other student organizations. Even before Johnson established Operation Chaos, the CIA was working with students. Gloria Steinem admitted working for the agency in the late 50s and early 60s. She said she never spied on other Americans, but some say that was only because she was never asked. The official report on Chaos says it began in 1967, so the previous material might be labeled “pre-Chaos.“


By 1967, the unit was pursuing dissidents, black militants, and congressmen. It was to learn all it could about campus anti-war militants and to disrupt their activities. The program was justified as an effort to predict violent activities against the United States government. It was claimed that there was possible foreign involvement in the peace activities, and this was also a basis for justifying the program and CIA activity in domestic matters.

The Pentagon joined the efforts directed against dissidents in 1968 when it established the Directorate of Civil Disturbance and Planning Operations. It established a “domestic war room” manned by 180 people in the basement of the Pentagon.

Federal Bureau of Investigation personnel from its Counter-Intelligence Program (COINTELPRO) cooperated with the CIA’s Operation Chaos. Since 1950, the bureau had a database containing the names of thousands of Americans it considered suspicious and potentially subversive. Among them were teachers, doctors, scientists, lawyers -- people from all walks of life.

The bureau had long been watching dissidents -- defined as anyone differing from the thinking of FBI director J. Edgar Hoover. Not only was COINTELPRO devoted to keeping track of people considered political radicals, but the program also carried out an illicit campaign to disrupt and destroy peace and justice organizations. The bureau later admitted carrying out 2,218 COINTELPRO operations between 1956 and mid-1974. Eventually, the Senate’s Church Committee unearthed some of these activities and concluded that many security and law enforcement personnel considered themselves guardians of the status quo.

Operation Chaos continued under Richard Nixon, and national security advisor Henry Kissinger combed through these files. In June, 1970, President Nixon greatly ramped up the operation in a meeting with key figures, such as J. Edgar Hoover, NSA director Noel Gaylor, and Richard Helms.

The agents worked with police and college administrators to identify dissidents, and demonstrations were monitored. Agents also joined anti-war organizations. The FBI gave Chaos its reports on peace groups, amounting to about a thousand a month. The Domestic Operations Division had files on 13,000 individuals and 1,000 organizations. It also burglarized foreign embassies.

Local police departments were rewarded for assistance through gifts of high-grade equipment. By 1972, the CIA inspector general’s report reflected growing concern that the program had gone too far.
We also encountered general concern over what appeared to be a monitoring of the political views and activities of Americans not known to be or suspected of being involved in espionage... Stations were asked to report on the whereabouts and activities of prominent persons... whose comings and goings were not only in the public domain, but for whom allegations of subversion seemed sufficiently nebulous to raise renewed doubts as to the nature and legitimacy of the CHAOS program.
Properly we should be talking about the CIA’s Operation Chaos and the activities of the FBI’s Counter-Intelligence Program. These operations worked together to carry out the goals of Chaos, investigating all sorts of dissidents, including “restless youth,” “advocates of new lifestyles,” and the New Left. Over the life of the program, information on over 300,000 persons was shared with other law enforcement people, including the FBI. Deputy Director William Sullivan intended to tell the House Select Committee on Assassinations that he had opposed continuing COINTELPRO, but he died in a hunting accident before he could testify.

The CIA gathered the names of 300,000 people, and thousands of them were put on a watch list. The United States Army joined in the domestic surveillance program, using 1,500 agents in 350 offices, and created its own list. Army Intelligence spearheaded this effort, and many of its offices were on college campuses. The National Security Administration was also involved, but we know next to nothing about its activities.

Defenders of J. Edgar Hoover said he knew little about Operation Chaos, but a review of some remaining files show that the CIA was using many FBI files, most undigested. They simply pulled names out of them and put them in a master index. Many operatives from the agency’s covert division were used in the United States, sometimes dressed up as hippies. They resented doing this work, as did the leadership of the CIA. There was an effort to reduce this kind of activity, and even Hoover came to see that it could damage the FBI’s profile.


Richard Nixon pointing the way.


The Huston Plan

Richard Nixon greatly expanded the surveillance, and the FBI was ordered to keep track of the private lives of Nixon’s political opponents. When Nixon left office, investigators found hundreds of reports of electronic surveillance and break-ins. None of this was done with warrants. It was illegal, even though Nixon was on record as saying nothing a president does can be illegal.

Under Nixon the Interagency Committee on Intelligence was formed to coordinate domestic spying. It was temporarily chaired by J. Edgar Hoover, but Sullivan, the bureau’s No. 3 man, eventually was to chair it. The committee recommended more mail opening and black bag jobs. It was based on the Huston Plan, which is well known. Tom Charles Huston was a young White House assistant in charge of domestic intelligence.

But few realized it was implemented to some degree because the activities suggested by Tom Huston had been underway for some years. Huston knew about Operation Chaos and wanted to greatly expand the activity. But this occurred at a time when some within the CIA wanted an end to the illegal activity. House majority leader Hale Boggs had an idea of what was going on and denounced the FBI on the House floor for tapping the telephones of representatives and senators.

Under pressure from Attorney General John Mitchell, Nixon rescinded the Huston Plan, giving the appearance the plan was dead. One problem may have been that Huston was simply too young and made the proposal in too open a manner.

But another problem was that the FBI’s aging director had his own agenda and threw a wrench in the works. Hoover claimed to be concerned that there were so many intelligence break-ins that exposure was likely. He quickly fired Sullivan for cooperating too closely with other intelligence agencies.

In March, 1971, a “citizen's’” break-in at the Media, PA, office of the FBI produced more than a thousand documents that exposed the COINTELPRO operation with its infiltration of student groups and spying on dissenters. Six weeks later, Hoover shut down COINTELPRO.

There was no longer a mechanism to coordinate spying, black bag jobs, etc., but these activities continued anyway. There was the less known Intelligence Evaluation Committee (IEC), also known as the Son of Huston Plan. White House Counsel John Dean organized it. It included people from NSA, DOD, and CIA and essentially adopted the Huston Plan, which appeared to have been officially rejected. G. Gordon Liddy attended in order to initiate investigation of “Pentagon Papers” leaks.

Clearly Operation Chaos established a major precedent for domestic spying. Evidence is beginning to surface about domestic surveillance of peace activists by the FBI during the administration of George W. Bush. The Progressive obtained records demonstrating that the bureau had at least two informers within the Iowa City peace and justice group. They provided very detailed information on its operatives, including information on their appearances, living arrangements, and the automobiles they drove.

We do not know to what extent the government spied on its citizens in the balance of the 1970s. The Pike and Church Commissions revealed some aspects of Operation Chaos, and Jimmy Carter appointed Admiral Stansfield Turner to clean up the CIA. We do know that the Reagan administration, which took office in 1981, was interested in resuming the battle with so-called radicals.

Next installment: "Spying on Americans, Part Two: The Reagan Administration Acquires Promis Software."

[Sherman DeBrosse is a retired history teacher. Sherm spent seven years writing an analytical chronicle of what the Republicans have been up to since the 1970s. The New Republican Coalition : Its Rise and Impact, The Seventies to Present (Publish America) can be acquired by calling 301-695-1707. On line, go here.]

Also see:The Rag Blog

[+/-] Read More...

25 August 2009

James Retherford : Who Watches the Watchman? Paranoia and Persecution


Part VI
Who Watches the Watchman?


COINTELPRO and the Federal Government’s
Clandestine Attack on the U.S. Constitution

Paranoia strikes deep / into your life it will creep
it starts when you’re always afraid
step out of line and they’ll come
and take you away... -- Buffalo Springfield
By James Retherford / The Rag Blog / August 25, 2009
Quis custodiet ipsos custodes?
-- Juvenal, Satires, VI, 347
During the 1960s, movement activists discovered a new definition of the clinical term, paranoia. If classic paranoia is an irrational response to irrational fears, then the new paranoia could be defined as an irrational response to rational fears. One of the FBI COINTELPRO’s most effective initiatives was to create and exploit paranoia in order to disrupt the organizing work of the American Left.

The following is a list, both paranoid and rational, of known and suspected COINTELPRO operations that I experienced as an underground newspaper editor in Bloomington, Indiana, and later as a writer and anti-war organizer in New York City. Please note that because of continued secrecy surrounding many federal covert operations I am forced to include events that are unproven but fit the COINTELPRO profile. This illustrates precisely why paranoia proved to be such an effective weapon against dissidents:

1. Sometime in late 1967, small calibre gunshots fired through my front door in Bloomington, Indiana. Later this was revealed to be a “fear” tactic used by the FBI against activists, usually carried out by off-duty local police officers or members of right-wing support groups (such as the Bloomington Ku Klux Klan who months later firebombed an African-American bookstore near the Indiana University campus). (The offices of Space City! in Houston were shot up in similar fashion, with the local police and KKK later implicated.)

2. Publication in a local right-wing newspaper of a rude, crude caricature intended to ridicule my appearance and politics. (Note: one wonders whether FBI field agents perhaps had too much time on their hands -- the cartoon made great refrigerator art.) In Los Angeles, a COINTELPRO-produced Black Panther “coloring book” exploited tensions between the Panthers and white cops, on one hand, and Ron Karenga’s black nationalist US, on the other.

When the smoke had cleared, Black Panthers Bunchy Carter and John Huggins had been shot to death on the UCLA campus, and Geronimo Pratt, targeted by a COINTELPRO operation to “neutralize Pratt as an effective BPP functionary,” spent 27 years in prison falsely imprisoned on a murder charge based solely on the testimony of FBI and Los Angeles Police Department informant Julius Butler. Pratt’s conviction was vacated in 1997 when his defense team discovered Butler’s secret “business relationship” with the police.

3. A probable “snitch jacket”operation in Bloomington, revealed in 1967 when friends told me that someone was spreading rumors that I was an undercover agent. During this period, snitch rumors also were rampant about other local activists, narc rumors about some notable potheads, persistent rumors about impending busts. (One local crazy figured out where the rumors were coming from and started his own counter-counter intelligence rumor campaign: a plot to spike the Bloomington drinking water supply with LSD. The reverse rumor operation peaked when the governor publicly announced plans to call out the National Guard to circle and protect the waters of Lake Lemon, and we -- temporarily -- had to find a new place to go skinny dipping.)

4. A fairly recent discovery, thanks to Texan Geoffrey Rips, that Director Hoover himself approved an attempt by the Indianapolis field office to publish a fake “underground newspaper” -- called Armageddon News -- in another crude attempt to discredit The Spectator and divide the local New Left leadership. Hoover himself critiqued the first issue, chiding his field officers for failing to use words and phrases that would sound “authentic” to students.

A note to Ragsters: the FBI created a similar faux underground newspaper in Austin during this time. It was called Longhorn Tales (though a more apt name would have been The Bull Sheet.) I have not spoken with anyone in Bloomington or in Austin who remembers seeing either of the FBI’s “journalistic” enterprises. However, I briefly examined Armageddon Times at the Indiana University Archives several years ago and have to say that it was NOT one of COINTELPRO’s most effective endeavors.

5. Use of the sympathetic courts to “railroad” activists into prison: While this tactic was successful in imprisoning African American, Native American, and hispanic leaders for decades, it was also used against white activists such as myself. In December 1967 I learned that I was the subject of two federal grand indictments alleging Selective Service law violations. (In January a third indictment was announced.) The indictments were so specious that one must wonder whether the government’s intention was actually to gain a conviction or merely to overextend the Bloomington movement’s limited resources and put The Spectator out of business. The government’s “case” was pathetic, as evidenced by the fact that Attorney General Ramsey Clark ordered the federal prosecutor to stop the investigation and later to drop all charges. The judge refused, and in June 1968 I went on trial.

I did not go on trial, however, for technical violations of the Selective Service act, though that is what was written on the indictments. Rather I was put on trial for the editorial content of The Spectator. Lengthy excerpts of articles and editorials were recited into the court record to build a case of sedition. I was portrayed as a revolutionary advocating the violent overthrow of the government, a communist subversive, a seditious traitor. Every time my attorney attempted to object on grounds of relevance to the actual charges, he was overruled by the trial judge, who, time and again, ruled that the prosecution’s relentless political attack was relevant to the case. I was found guilty on all counts and sentenced to six years in federal prison.

Next the judge ruled that my appeal had been improperly filed, and I was incarcerated for almost three months while my new attorney, Leonard Boudin (representing the Emergency Civil Liberties Committee), successfully appealed for my right to appeal. A year later, noting that my order to appear for “additional processing” was not only unsigned but also hand written on blank note paper, rather than official Selective Service stationary as required by law, and that I “was never officially declared delinquent by the Selective Service System,” a stipulated prerequisite for draft law prosecution, Federal Circuit Court of Appeals for the Seventh Circuit on October 2, 1969, overturned all convictions with a strongly worded rebuke to the prosecution and the presiding district trial judge.

6. Discovery of a new “snitch jacket” operation in New York City, where I had moved in late 1968 to assist Boudin’s preparation of my appeal. As before, friends told me about a rumor that I was an FBI informer. At the time, such rumors were rampant in the close-knit Lower East Side activist community, and, indeed, the Movement had been hard hit by police infiltrators and agents provocateurs, notably Crazy George Demerle in the Sam Melville bombing case.

7. Proverbial cracks, hisses, and buzzes during telephone conversations.

8. Numerous observations of New York Police Red Squad and the ubiquitous Detective Finnegan taking photographs as activists entered and exited public meetings at Washington Square Church and other popular Movement meeting places.

9. Discovery of an electronic surveillance operation set up in an adjoining apartment on West Sixteenth Street near Eighth Avenue. The FBI and local authorities moved my next-door neighbor to another location and then used his apartment to eavesdrop on my activities. During this time frame, the same thing happened to my friends Stew Albert and Judy Gumbo (see below).

After I met my neighbor in the hallway with suitcases in hand, leaving for what he said was a theatre gig in upstate New York, I became suspicious when I ran into a crew cut white male -- 30ish, wearing suit, tie and London Fog trenchcoat, and looking very out-of-his-element in this dilapidated tenement building -- leaving the neighbor’s apartment. When he had gone down the stairs, I tapped on the apartment door. When no one answered, I edged my way out on the fire escape landing through my living room window and peeked into the neighbor’s window. Inside the dark room in front of the common wall separating the two apartments, I spotted banks of green-glowing VU meters illuminating slowly moving tape reels.

10. A couple weeks later, I was awakened by a loud banging on my door. I opened it to discover a half-dozen trenchcoat-clad clones, some very large, nasty-looking guys wearing jeans and jackboots, and about a dozen uniformed SWAT police carrying shotguns lining the hallway. Stepping forth, one of the men identified himself as a federal marshal and handed me a subpoena to appear to a federal grand jury hearing.


11. The Guy Goodwin Grand Jury. Following the bombing of a washroom in the Capitol Building in Washington, the FBI faced increased pressure from the White House to catch some radicals. First they seized my friend Leslie Bacon, age 19, from her bed in the Student Mobilization collective house in Washington, D.C., and transported her incommunicado by automobile to Seattle where they put her, represented by counsel arranged by the government, in front of a specially convened grand jury. For two days, Leslie answered seemingly innocuous questions about her personal life and friends. This was the beginning of the infamous Guy Goodwin grand juries; Goodwin used the names revealed by Leslie to issue subpoenas for grand jury proceedings all over the U.S.

I was one of seven activists commanded to testify in New York. Our response was quite appropriate. Stew Albert, a large man with a big blonde afro, wore a custom-made rainbow-sequined dress with appliquĂ© spelling out the name “Bernardine” (for Bernardine Dohrn, the Weather Underground spokeswoman who had announced the group’s responsibility for the Capitol bombing and a number of other equally provocative “armed” actions). Judy “Gumbo” Clavet and Santa Barbara-Isla Vista activist Sandra Wardwell dressed as witches and carried broomsticks… to assist Goodwin in his witch hunt.

I rented a gorilla costume and showed up at the grand jury chambers as King Cong -- remember, Goodwin was looking for, ah, gorilla fighters… Only Walter Teague (who headed a National Liberation Front support group with perhaps the longest set of initials in U.S. movement history) actually got invited into the chamber -- he was wearing his “Walter Teague” working class disguise, i.e., plaid flannel work shirt, jeans, and work boots, and thus probably looked less frightening to the geriatrics who typically serve on grand jury panels. Walter was quickly dismissed after he recited the litany of constitutional amendments which our legal team was using to launch a legal challenge to the government’s “witch hunt.”

Goodwin eventually was forced to call off all grand jury probes when it became obvious that the government could not make any cases without producing volumes of evidence obtained from illegal wiretaps, electronic surveillance, and other illicit operations.

12. “Dumpster diving” and trashcan espionage: several weeks after the subpoena was served, my apartment house superintendent stopped me on my way in. With a big grin splashed across his face, he asked me if I knew that the FBI had been pulling up in a big garbage truck and hauling off trash for the entire building.


13. In the summer of 1974, Fred Newman’s small New York City Upper West Side psychotherapy cult, newly merged into Lyndon LaRouche’s National Caucus of Labor Committees (NCLC), went to the FBI and Justice Department with the story that I had harbored fugitives such as Jane Alpert, at that time on the FBI most-wanted list as one of Sam Melville’s accomplices. The Newmanites also told the FBI that I was working with the Weather Underground.

At that time, I was “underground” myself, having moved my infant son to safety far away from the Newman cult in whose hands Jesse had been criminally neglected, abused, and almost killed. The group was under investigation for child endangerment. This was the period when NCLC was staging violent attacks on public meetings held by the Communist Party USA and the Socialist Workers Party, when Chairman LaRouche appeared to be mentally unstable and a number of suspected agents (including Zeke Boyd, who had been thrown out of the Baltimore Black Panther chapter as an agent provocateur) had moved into secondary leadership positions and were orchestrating the group’s orgy of thuggery and intimidation. Many New York activists already had concluded that NCLC had, by this time, become a front for the government’s attack on the anti-racism/anti-imperialism movement.

14. As late as 1990 or 1991, in the midst of a very mellow buzz, my telephone range, and the disturbing voice of a man who said something like, “Hey, Jim. This is [name unintelligible]. I’ve been wondering what you’ve been up to. I haven’t seen you since I ran into you at the Indianapolis jail in 1968.” The diction was neither African American nor Southern White, which meant he had not been in lock-up with me. My heightened sense of awareness told me that he sounded like an FBI bureaucrat assigned to work an old case file, trying to scare up some action.

[James Retherford knows firsthand what it was like to be targeted by COINTELPRO. A founder and editor of The Spectator in Bloomington, Indiana, in 1966, Retherford is a director of the New Journalism Project, the nonprofit organization that publishes The Rag Blog.]

Please see
Also see James Retherford : Brandon Darby, The Texas 2, and the FBI's Runaway Informants by James Retherford / The Rag Blog / May 26, 2009

And for more background on the history of informants in Texas, read The Spies of Texas by Thorne Dreyer / The Texas Observer / Nov. 17, 2006.

The Rag Blog

[+/-] Read More...

Only a few posts now show on a page, due to Blogger pagination changes beyond our control.

Please click on 'Older Posts' to continue reading The Rag Blog.