10.10.10 Illusionati Ships from the Doc to Begin to See Beyond the Veil and Expose the World Wide Mind Control System

Check out the Official Illusionati Website Click the Banner Below

Start Slide Show with PicLens Lite PicLens

12.08.2009 Banned by the Catholic Church

If you go to this link and listen to it 3 times in a row…. you tell me why the church banned this ghost band?

http://margaretnoble.net/blog/banned-by-the-catholic-church/

Please leave your comments on the original page… and wait to see what happens….guess what the church was scared off???

lets see who posts the right answer before October 31 2010

USE THE FORCE LUKE

12.08.2009
Banned by the Catholic Church
Categories: Sound Oddities

800px-Shepard_Tones_spectrum_linear_scale

Sound Clip: Shepard Tone by Roger Shepard

This is a classic sound oddity and illusion. Or is it? There are some corrections to this post with much discussion, see below and follow the trail of comments to clarify the inaccuracies.

Originally posted:

“It is rumored to be called the “devil’s tone” by the Catholic church. The Shepard tone is a sound consisting of a superposition of sine waves separated by octaves. When played with the base pitch of the tone moving upwards or downwards, it is referred to as the
Shepard Scale. This creates an auditory illusion that continually ascends or descends in pitch, yet which ultimately seems to get no higher or lower.”

shepard_tone2

Corrections here and below in comments from Brent Williams:

“Hi Margaret.

“Baned by the Catholic Church“, about a Shepard-Risset Glissando. This post contained links to certain webpages, but when the post went up (even before it was moderated) the links were missing. Just in case you want to put them up for your readers, here they are:

The original source page for this sound file is here . It is in French.

You can find the Wiki source page here . This contains a little more info on the sound. This is where I confirmed that the sound is a minor chord of synchronised Shepard-Risset glissandi.

Read about Diana Deutsch here . She is currently a Professor at UCSD.

All the best, and please continue with your excellent website.

Brent Williams”
Categories: Sound Oddities -

Start Slide Show with PicLens Lite PicLens

Disinformation Tactics: The Methods Used To Keep You In The Dark

February 10, 2010 by admin  
Filed under Big Brother, Cyber/Space Control, Featured Stories

Source: Dprogram.net

There was a time, not too long ago (relatively speaking), that governments and the groups of elites that controlled them did not find it necessary to conscript themselves into wars of disinformation. Propaganda was relatively straightforward. The lies were much simpler. The control of information flow was easily directed. In fact, during the early Middle-Ages in most European countries commoners were not even allowed to own a Bible, nor was the Bible allowed to be interpreted from Latin to another language, let alone any other tome that might breed “dangerous ideas”. This was due in large part to the established feudal system and its hierarchy of royals and clergy. Rules were enforced with the threat of property confiscation and execution for anyone who strayed from the rigid socio-political structure. Those who had theological, metaphysical, or scientific information outside of the conventional and scripted collective world view were tortured and slaughtered. The elites kept the information to themselves, and removed its remnants from mainstream recognition, sometimes for centuries before it was rediscovered.

With the advent of anti-feudalism, and most importantly the success of the American Revolution, elites were no longer able to dominate information with the edge of a blade or the barrel of a gun. The establishment of Democracies (and Democratic Republics), with their philosophy of open government and rule by the people, compelled Aristocratic minorities to plot more subtle ways of obstructing the truth and thus maintaining their hold over the world without exposing themselves to retribution from the masses. Thus, the complex art of disinformation was born. The technique, the “magic” of the lie, was refined and perfected. The mechanics of the human mind and the human soul became an endless obsession for the elites.

The goal was malicious, but socially radical; instead of expending the impossible energy needed to dictate the very form and existence of the truth, they would allow it to drift, obscured in a fog of contrived data. They would wrap the truth in a “Gordian Knot” of misdirections and fabrications so elaborate that they felt certain the majority of people would surrender, giving up long before they ever finished unraveling the deceit. The goal was not to destroy the truth, but to hide it in plain sight.

In modern times, and with carefully engineered methods, this goal has for the most part been accomplished. However, these methods also have inherent weaknesses. Lies are fragile. They require constant attentiveness to keep them alive. The exposure of a single truth can rip through an ocean of lies, evaporating it instantly. In this article, we will examine the methods used to fertilize and promote the growth of disinformation, as well as how to identify the roots of disinformation and effectively cut them, starving out the entire system of fallacies once and for all.

Media Disinformation Methods

The mainstream media, once tasked with the job of investigating government corruption and keeping elitists in line, has now become nothing more than a PR firm for corrupt officials and their Globalist handlers. The days of the legitimate “investigative reporter” are long gone, and journalism itself has deteriorated into a rancid pool of so called “TV Editorialists” who treat their own baseless opinions as supported fact.

The elitist co-opting of news has been going on in one form or another since the invention of the printing press, however, the first methods of media disinformation truly came to fruition under the supervision of newspaper magnate William Randolph Hearst, who believed the truth was “subjective” and open to his personal interpretation. Hearst’s legacy of lies and sensationalism lives on in the Hearst published magazine ‘Popular Mechanics’, who accuse the growing 9/11 Truth Movement of outrageous “conspiracy theory” while at the same time consistently publishing articles about UFO sightings and secret government flying saucer programs.

popularmechanics-hearst-911-med.jpg

As we will show, this strange juxtaposition of mixed signals and hypocritical accusations is characteristic of all purveyors of disinformation.

Some of the main tactics used by the mainstream media to mislead the masses are as follows:

Lie Big, Retract Quietly

Mainstream media sources (especially newspapers) are notorious for reporting flagrantly dishonest and unsupported news stories on the front page, then quietly retracting those stories on the very back page when they are caught. In this case, the point is to railroad the lie into the collective consciousness. Once the lie is finally exposed, it is already too late, and a large portion of the population will not notice or care when the truth comes out. A good example of this would be the collusion of the MSM with the Bush administration to convince the American public after 9/11 that Iraq had WMDs, even though no concrete evidence existed to prove it. George W. Bush’s eventual admission that there had never been any WMDs in Iraq (except chemical weapons which the U.S. actually sold to Saddam under the Reagan / Bush administration) was lightly reported or glazed over by most mainstream news sources. The core reason behind a war that has now killed over a million people was proven to be completely fraudulent, yet I still run into people today who believe that Iraq had nukes…

Unconfirmed Or Controlled Sources As Fact

Cable news venues often cite information from “unnamed” sources, government sources that have an obvious bias or agenda, or “expert” sources without providing an alternative “expert” view. The information provided by these sources is usually backed by nothing more than blind faith. A recent example of this would be the Osama Bin Laden audio tapes which supposedly reveal that the Christmas “Underwear Bomber” was indeed Al-Qaeda:

http://abcnews.go.com/WN/osama-bin-laden-addresses-president-obama-audio-tape/story?id=9650267

The media treats the audio tape as undeniable fact in numerous stories, then at the same time prints a side story which shows that the White House cannot confirm that the tape is even real:

http://www.reuters.com/article/idUSTRE60N16I20100124

If the White House cannot confirm the authenticity of the tape, then why did the media report on its contents as if it had been confirmed?

Calculated Omission

Otherwise known as “cherry picking” data. One simple piece of information or root item of truth can derail an entire disinfo news story, so instead of trying to gloss over it, they simply pretend as if it doesn’t exist. When the fact is omitted, the lie can appear entirely rational. This tactic is also used extensively when disinformation agents and crooked journalists engage in open debate.

Distraction, and the Manufacture of Relevance

Sometimes the truth wells up into the public awareness regardless of what the media does to bury it. When this occurs their only recourse is to attempt to change the public’s focus and thereby distract them from the truth they were so close to grasping. The media accomplishes this by “over-reporting” on a subject that has nothing to do with the more important issues at hand. Ironically, the media can take an unimportant story, and by reporting on it ad nauseum, cause many Americans to assume that because the media won’t shut-up about it, it must be important! An example of this would be the recent push for an audit of the Federal Reserve which was gaining major public support, as well as political support. Instead of reporting on this incredible and unprecedented movement for transparency in the Fed, the MSM spent two months or more reporting non-stop on the death of Michael Jackson, a pop idol who had not released a decent record since “Thriller,” practically deifying the man who only months earlier was being lambasted by the same MSM for having “wandering hands” when children were about.

Dishonest Debate Tactics

Sometimes, men who actually are concerned with the average American’s pursuit of honesty and legitimate fact-driven information break through and appear on T.V. However, rarely are they allowed to share their views or insights without having to fight through a wall of carefully crafted deceit and propaganda. Because the media knows they will lose credibility if they do not allow guests with opposing viewpoints every once in a while, they set up and choreograph specialized T.V. debates in highly restrictive environments which put the guest on the defensive, and make it difficult for them to clearly convey their ideas or facts.

TV pundits are often trained in what are commonly called “Alinsky Tactics.” Saul Alinsky was a moral relativist, and champion of the lie as a tool for the “greater good;” essentially, a modern day Machiavelli. His “Rules for Radicals” were supposedly meant for grassroots activists who opposed the establishment, and emphasized the use of any means necessary to defeat one’s political opposition. But is it truly possible to defeat an establishment built on lies, by use of even more elaborate lies, and by sacrificing one’s ethics?

Today, Alinsky’s rules are used more often by the establishment than by its opposition. These tactics have been adopted by governments and disinformation specialists across the world, but they are most visible in TV debate. While Alinsky sermonized about the need for confrontation in society, his debate tactics are actually designed to circumvent real and honest confrontation of opposing ideas with slippery tricks and diversions. Alinsky’s tactics, and their modern usage, can be summarized as follows:

1) Power is not only what you have, but what the enemy thinks you have.

We see this tactic in many forms. For example, projecting your own movement as mainstream, and your opponent’s as fringe. Convincing your opponent that his fight is a futile one. Your opposition may act differently, or even hesitate to act at all, based on their perception of your power.

2) Never go outside the experience of your people, and whenever possible, go outside of the experience of the enemy.

Don’t get drawn into a debate about a subject you do not know as well as or better than your opposition. If possible, draw them into such a situation instead. Look for ways to increase insecurity, anxiety and uncertainty in your opposition. This is commonly used against unwitting interviewees on cable news shows whose positions are set up to be skewered. The target is blind-sided by seemingly irrelevant arguments that they are then forced to address. In television and radio, this also serves to waste broadcast time to prevent the target from expressing his own positions.

3) Make the enemy live up to their own book of rules.

The objective is to target the opponent’s credibility and reputation by accusations of hypocrisy. If the tactician can catch his opponent in even the smallest misstep, it creates an opening for further attacks.

4) Ridicule is man’s most potent weapon.

“Ron Paul is a crackpot.” “Dennis Kucinich is short and weird.” “9-11 twoofers wear tinfoil hats.” Ridicule is almost impossible to counter. It’s irrational. It infuriates the opposition, which then reacts to your advantage. It also works as a pressure point to force the enemy into concessions.

5) A good tactic is one that your people enjoy.

The popularization of the term “Teabaggers” is a classic example, it caught on by itself because people seem to think it’s clever, and enjoy saying it. Keeping your talking points simple and fun keeps your side motivated, and helps your tactics spread autonomously, without instruction or encouragement.

6) A tactic that drags on too long becomes a drag.

See rule number 6. Don’t become old news. If you keep your tactics fresh, its easier to keep your people active. Not all disinformation agents are paid. The “useful idiots” have to be motivated by other means. Mainstream disinformation often changes gear from one method to the next and then back again.

7) Keep the pressure on with different tactics and actions, and utilize all events of the period for your purpose.

Keep trying new things to keep the opposition off balance. As the opposition masters one approach, hit them from the flank with something new. Never give the target a chance to rest, regroup, recover or re-strategize. Take advantage of current events and twist their implications to support your position. Never let a good crisis go to waste.

8) The threat is usually more terrifying than the thing itself.

This goes hand in hand with Rule #1. Perception is reality. Allow your opposition to expend all of its energy in expectation of an insurmountable scenario. The dire possibilities can easily poison the mind and result in demoralization.

9) The major premise for tactics is the development of operations that will maintain a constant pressure upon the opposition.

The objective of this pressure is to force the opposition to react and make the mistakes that are necessary for the ultimate success of the campaign.

10) If you push a negative hard and deep enough, it will break through into its counterside.

As grassroots activism tools, Alinsky tactics have historically been used (for example, by labor movements) to force the opposition to react with violence against activists, which leads to popular sympathy for the activists’ cause. Today, false (or co-opted) grassroots movements use this technique in debate as well as in planned street actions. The idea is to provoke (or stage) ruthless attacks against ones’ self, so as to be perceived as the underdog, or the victim. Today, this technique is commonly used to create the illusion that a certain movement is “counterculture” or “anti-establishment.”

11) The price of a successful attack is a constructive alternative.

Never let the enemy score points because you’re caught without a solution to the problem. Today, this is often used offensively against legitimate activists, such as the opponents of the Federal Reserve. Complain that your opponent is merely “pointing out the problems.” Demand that they offer a solution.

12) Pick the target, freeze it, personalize it, and polarize it.

Cut off the support network and isolate the target from sympathy. The targets supporters will expose themselves. Go after individual people, not organizations or institutions. People hurt faster than institutions.

The next time you view an MSM debate, watch the pundits carefully, you will likely see many if not all of the strategies above used on some unsuspecting individual attempting to tell the truth.

Internet Disinformation Methods

Because the MSM’s bag of tricks has been so exhausted over such a long period of time, many bitter and enraged consumers of information are now turning to alternative news sources, most of which exist on the collective commons we call the internet. At first, it appears, the government and elitists ignored the web as a kind of novelty, or just another mechanism they could exploit in spreading disinformation. As we all now well know, they dropped the ball, and the internet has become the most powerful tool for truth history has ever seen.

That being said, they are now expending incredible resources in order to catch up to their mistake, utilizing every trick in their arsenal to beat web users back into submission. While the anonymity of the internet allows for a certain immunity against many of Saul Alinsky’s manipulative tactics, it also allows governments to attack those trying to spread the truth covertly. In the world of web news, we call these people “disinfo trolls.” Trolls are now being openly employed by governments in countries like the U.S. and Israel specifically to scour the internet for alternative news sites and disrupt their ability to share information.

http://www.rawstory.com/news/2006/Raw_obtains_CENTCOM_email_to_bloggers_1016.html

http://www.thenational.ae/article/20090104/FOREIGN/882042198/1002

http://www.atlanticfreepress.com/news/1/10793-twitterers-paid-to-spread-israeli-propaganda-internet-warfare-team-unveiled.html

Internet trolls, also known as “paid posters” or “paid bloggers,” are increasingly being employed by private corporations as well, often for marketing purposes. In fact, it is a rapidly growing industry.

Trolls use a wide variety of strategies, some of which are unique to the internet, here are just a few:

1) Make outrageous comments designed to distract or frustrate: An Alinsky tactic used to make people emotional, although less effective because of the impersonal nature of the web.

2) Pose as a supporter of the truth, then make comments that discredit the movement: We have seen this even on our own forums — trolls pose as supporters of the Liberty Movement, then post long, incoherent diatribes so as to appear either racist or insane. Here is a live example of this tactic in use on Yahoo! Answers.

The key to this tactic is to make references to common Liberty Movement arguments while at the same time babbling nonsense, so as to make those otherwise valid arguments seem ludicrous by association.

In extreme cases, these “Trojan Horse Trolls” have been known to make posts which incite violence — a technique obviously intended to solidify the false assertions of the notorious MIAC report and other ADL/SPLC publications which purport that constitutionalists should be feared as potential domestic terrorists.

3) Dominate Discussions: Trolls often interject themselves into productive web discussions in order to throw them off course and frustrate the people involved.

4) Prewritten Responses: Many trolls are supplied with a list or database with pre-planned talking points designed as generalized and deceptive responses to honest arguments. 9/11 “debunker” trolls are notorious for this.

5) False Association: This works hand in hand with item #2, by invoking the stereotypes established by the “Trojan Horse Troll.”

For example: calling those against the Federal Reserve “conspiracy theorists” or “lunatics”. Deliberately associating anti-globalist movements with big foot or alien enthusiasts, because of the inherent negative connotations. Using false associations to provoke biases and dissuade people from examining the evidence objectively.

6) False Moderation: Pretending to be the “voice of reason” in an argument with obvious and defined sides in an attempt to move people away from what is clearly true into a “grey area” where the truth becomes “relative.”

7) Straw Man Arguments: A very common technique. The troll will accuse his opposition of subscribing to a certain point of view, even if he does not, and then attacks that point of view. Or, the troll will put words in the mouth of his opposition, and then rebut those specific words. For example: “9/11 truthers say that no planes hit the WTC towers, and that it was all just computer animation. What are they, crazy?”

Sometimes, these strategies are used by average people with serious personality issues. However, if you see someone using these tactics often, or using many of them at the same time, you may be dealing with a paid internet troll.

Government Disinformation Methods

Governments, and the globalists who back them, have immense assets — an almost endless fiat money printing press — and control over most legal and academic institutions. With these advantages, disinformation can be executed on a massive scale. Here are just a handful of the most prominent tactics used by government agencies and private think tanks to guide public opinion, and establish the appearance of consensus:

1) Control The Experts: Most Americans are taught from kindergarten to ignore their instincts for the truth and defer to the “professional class” for all their answers. The problem is that much of the professional class is indoctrinated throughout their college years, many of them molded to support the status quo. Any experts that go against the grain are ostracized by their peers.

2) Control The Data: By controlling the source data of any investigation, be it legal or scientific, the government has the ability to engineer any truth they wish, that is, as long as the people do not care enough to ask for the source data. Two major examples of controlled and hidden source data include; the NIST investigation of the suspicious 9/11 WTC collapses, in which NIST engineers, hired by the government, have kept all source data from their computer models secret, while claiming that the computer models prove the collapses were “natural”. Also, the recent exposure of the CRU Climate Labs and their manipulation of source data in order to fool the public into believing that Global Warming is real, and accepting a world-wide carbon tax. The CRU has refused to release the source data from its experiments for years, and now we know why.

3) Skew The Statistics: This tactic is extremely evident in the Labor Department’s evaluations on unemployment, using such tricks as incorporating ambiguous birth / death ratios into their calculation in order to make it appear as though there are less unemployed people than there really are, or leaving out certain subsections of the population, like those who are unemployed and no longer seeking benefits.

3) Guilt By False Association: Governments faced with an effective opponent will always attempt to demonize that person or group in the eyes of the public. This is often done by associating them with a group or idea that the public already hates. Example: During the last election, they tried to associate Ron Paul supporters with racist groups (and more recently, certain Fox News anchors) in order to deter moderate Democrats from taking an honest look at Congressman Paul’s policies.

4) Manufacture Good News: This falls in with the skewing of statistics, and it also relies heavily on Media cooperation. The economic “Green Shoots” concept is a good example of the combination of government and corporate media interests in order to create an atmosphere of false optimism based on dubious foundations.

5) Controlled Opposition: Men in positions of power have known for centuries the importance of controlled opposition. If a movement rises in opposition to one’s authority, one must usurp that movement’s leadership. If no such movement exists to infiltrate, the establishment will often create a toothless one, in order to fill that social need, and neutralize individuals who might have otherwise taken action themselves.

During the 1960’s and 70’s, the FBI began a secretive program called COINTELPRO. Along with illegal spying on American citizens who were against the Vietnam conflict or in support of the civil rights movement, they also used agents and media sources to pose as supporters of the movement, then purposely created conflict and division, or took control of the direction of the movement altogether. This same tactic has been attempted with the modern Liberty Movement on several levels, but has so far been ineffective in stopping our growth.

The NRA is another good example of controlled opposition, as many gun owners are satisfied that paying their annual NRA dues is tantamount to actively resisting anti-gun legislation; when in fact, the NRA is directly responsible for many of the compromises which result in lost ground on 2nd amendment issues. In this way, gun owners are not only rendered inactive, but actually manipulated into funding the demise of their own cause.

6) False Paradigms: Human beings have a tendency to categorize and label other people and ideas. It is, for better or worse, a fundamental part of how we understand the complexities of the world. This component of human nature, like most any other, can be abused as a powerful tool for social manipulation. By framing a polarized debate according to artificial boundaries, and establishing the two poles of that debate, social engineers can eliminate the perceived possibility of a third alternative. The mainstream media apparatus is the key weapon to this end. The endless creation of dichotomies, and the neat arrangement of ideologies along left/right lines, offers average people a very simple (though hopelessly inaccurate) way of thinking about politics. It forces them to choose a side, usually based solely on emotional or cultural reasons, and often lures them into supporting positions they would otherwise disagree with. It fosters an environment in which beating the other team is more important than ensuring the integrity of your own. Perhaps most importantly, it allows the social engineer to determine what is “fair game” for debate, and what is not.

Alinsky himself wrote: “One acts decisively only in the conviction that all the angels are on one side and all the devils on the other.”

One merely needs to observe a heated debate between a Democrat and a Republican to see how deeply this belief has been ingrained on both sides, and how destructive it is to true intellectual discourse.

Stopping Disinformation

truth.jpg

The best way to disarm disinformation agents is to know their methods inside and out. This gives us the ability to point out exactly what they are doing in detail the moment they try to do it. Immediately exposing a disinformation tactic as it is being used is highly destructive to the person utilizing it. It makes them look foolish, dishonest, and weak for even making the attempt. Internet trolls most especially do not know how to handle their methods being deconstructed right in front of their eyes, and usually fold and run from debate when it occurs.

The truth, is precious. It is sad that there are so many in our society that have lost respect for it; people who have traded in their conscience and their soul for temporary financial comfort while sacrificing the stability and balance of the rest of the country in the process. The human psyche breathes on the air of truth, without it, humanity cannot survive. Without it, the species will collapse in on itself, starving from lack of intellectual and emotional sustenance. Disinformation does not only threaten our insight into the workings of our world; it makes us vulnerable to fear, misunderstanding, and doubt, all things that lead to destruction. It can lead good people to commit terrible atrocities against others, or even against themselves. Without a concerted and organized effort to diffuse mass-produced lies, the future will look bleak indeed.

Start Slide Show with PicLens Lite PicLens

Bin Laden reportedly claims responsibility for Christmas bomb scare (If you believe this your an IDIOT)

January 25, 2010 by admin  
Filed under Featured Stories

By Agence France-Presse
Sunday, January 24th, 2010 — 8:31 pm

Al-Qaeda chief Osama bin Laden claimed responsibility for the botched Christmas Day bombing of a US airliner and vowed further strikes on American targets, according an audio message broadcast on Sunday.

The brief statement carried by Al-Jazeera satellite television warned Washington that the attack was meant as a similar message to that of the September 11, 2001 attacks on the US by 19 Al-Qaeda militants who hijacked airliners and crashed them into buildings.

Bin Laden praised as a “hero” Nigerian national Umar Farouk Abdulmutallab who allegedly tried to detonate explosives on a Northwest Airlines plane approaching Detroit on December 25 but was foiled by passengers.

“The message that was conveyed through the (attacked) plane of the hero Umar Farouk is to stress earlier messages delivered to you by the heroes of the 11″ September attack, he said.

“That (message) is, that America should not dream of security until we enjoy it as a reality in Palestine,” he added.

The authenticity of the statement could not immediately be verified, but Al-Jazeera said the voice was bin Laden’s.

“Had we been able to deliver our messages to you in words, we would not have sent them by planes,” the statement said.

“It is not fair that you (America) enjoy a good life while our brothers in Gaza endure the worst standard of living. Therefore, God willing, our attacks against you will continue as long as you maintain your support to Israel.”

Al-Qaeda in the Arabian Peninsula (AQAP) had claimed responsibility for the Christmas Day plane attack, and analysts said bin Laden through his latest statement is stressing that he is still in overall control of the network.

Intelligence officials, military analysts and other experts have long believed he is holed up along the remote mountainous border between Pakistan and Afghanistan and have hinted that groups such as AQAP could be operating autonomously.

Washington has accused AQAP of training Abdulmutallab, who spent some time in Yemen.

The US administration is putting pressure on Yemen to clamp down on Al-Qaeda militants in the impoverished country, and an international meeting to discuss militancy in Yemen will be held on January 27 in London.

British Foreign Secretary David Miliband said in London on Sunday that the foiled Christmas attack marks a “new phase” in Al-Qaeda’s campaign against the West.

“The heart of the Al-Qaeda senior leadership remains on the Afghan/Pakistan border,” Miliband said.

“But there is a real issue in Yemen — the fact that Al-Qaeda in the Arabian Peninsula should have tried to strike in Detroit marks a new phase in the campaign and that’s why there’s an important meeting on Yemen on Wednesday.”

Yemen’s government has intensified its campaign against Al-Qaeda, launching waves of air strikes on the extremists’ hideouts, and insists it can battle the group on its own, without any foreign military intervention.

Sanaa stopped granting visas to foreigners at airports on Thursday in a bid to curb a feared inflow of militants, believed to be training with Al-Qaeda.

Earlier this week, the US Senate Foreign Relations Committee released a report warning that AQAP might be training as many as three dozen Americans who converted to Islam in prison.

Intelligence reports have pointed for some time at Yemen as the new hub for Al-Qaeda fighters as pressure increases on them in Afghanistan and Pakistan.

Michael Leiter, director of the US National Counterterrorism Center, told lawmakers in September that Yemen could become a base for Al-Qaeda to train and plot anti-US attacks.

Analysts believe that the problems facing Yemen, including a Shiite rebellion in the north, secession bid in the south, and poverty, create a perfect environment for Al-Qaeda to thrive.

US intelligence chiefs last Wednesday admitted that they missed a slew of warning signs that should have prevented the attempted airliner attack.

A US grand jury has indicted 23-year-old Abdulmutallab on six counts arising from the attempt to blow up the jet packed with 279 passengers and 11 crew on Northwest Airlines Flight 253 from Amsterdam to Detroit.

Bin Laden, who has a 50-million-dollar bounty on his head, last made a public statement four months ago when he was quoted on September 25 by SITE Intelligence Group monitoring service as urging European countries to withdraw their forces from Afghanistan.

Start Slide Show with PicLens Lite PicLens

ACLU slams Senators: The Constitution is not ‘optional’

January 25, 2010 by admin  
Filed under Featured Stories

By Stephen C. Webster
Sunday, January 24th, 2010 — 10:29 pm

Four U.S. Senators are pursuing legislation they believe would fix the “mistake” President Obama made with the man who allegedly failed to blow up a Christmas Day flight into Detroit.

That “mistake” was treating him like a serious criminal, tossing him in jail and planning a trial.

Nevertheless, Senators Joseph Lieberman (I-CT), Susan Collins (R-ME), Robert Bennett (R-UT) and John Ensign (R-NV) are pushing legislation that would require civilian authorities to consult with intelligence leaders when taking an accused terrorist into custody.

“[This] legislation would not deprive the President of any investigative tool,” Sen. Lieberman’s Web site claims. “It would not preclude a decision to charge a foreign terrorist in our military tribunal system or in our civilian criminal justice system.”

In a response, Anthony D. Romero, executive director of the American Civil Liberties Union, fired back: “It is extremely disturbing that members of the U.S. Congress are essentially calling for Obama administration officials to discard the Constitution when a terrorist suspect is apprehended – as if the Constitution should be applied on a case by case basis.”

In the Lieberman press release, Sen. Ensign explained that he believes informing Umar Farouk Abdulmutallab of his Miranda rights before condemning him to possible life in prison is “as perplexing as it is dangerous.”

“This more clearly illustrates that this Administration is more concerned with gently prosecuting terrorists than it is with extracting important intelligence from them that would help prevent future attacks and protect the citizens of this country,” he claimed.

“Terrorism is a crime, and to treat terrorism that takes place far from any battlefield as an act of war is to propose that the entire world is a battlefield, to give criminals the elevated status of warriors and to invest whoever the current president may be with the authority to imprison a broad category of people potentially forever, without ever being afforded an opportunity to defend themselves,” noted ACLU’s Romero.

To abandon due process in terrorism cases turns the rule of law on its head and flies in the face of the values that we are fighting to protect in the first place. Our criminal justice system is fully capable of accommodating the government’s legitimate security interests while at the same time providing fundamental rights to defendants.”

This video was broadcast by ABC News on Jan. 3, 2010, as snipped by Talking Points Memo.

Share this article:

5 Americans from Washington D.C. in Pakistan to face terror charges

January 1, 2010 by admin  
Filed under Featured Stories, US News, World News

D.C.-area men are set to appear before anti-terror court on Monday
The Associated Press
updated 11:21 a.m. ET, Thurs., Dec . 31, 2009

ISLAMABAD – Pakistani police said Thursday they plan to ask a court to charge five Americans arrested in early December with terrorism, and will seek life sentences against them.

The young Muslim men, who are from the Washington D.C. area, were captured in the eastern Pakistan city of Sargodha in a case that has spurred fears that Westerners are traveling to Pakistan to join militant groups.

Tahir Gujar, a senior police investigator in Sargodha, said police had almost concluded their investigation and that the men would appear in an anti-terrorist court in the city on Jan. 4.

“We are certain that these five Americans wanted to carry out attacks in Pakistan, and we will seek life imprisonment for them,” he said.

Under Pakistan’s complicated judicial system, the police will recommend the charges during the court appearance on Monday. However, the court might not charge the men immediately, and the five will likely be given time to prepare their defense after they have seen the charges.

Gujar didn’t say what police believe the men intended to target.

Map reportedly found on men
Authorities have said that the five had a map of Chashma Barrage, a complex that includes a water reservoir and other structures in the populous province of Punjab. It is located near nuclear power facilities about 125 miles southwest of the capital, Islamabad.

Pakistan has a nuclear weapons arsenal, but it also has nuclear power plants for civilian purposes.

Any nuclear activity in Pakistan tends to come under scrutiny because of growing Islamic militancy and the South Asian nation’s past history of leaking sensitive nuclear technology due to the actions of the main architect of its atomic weapons program, Abdul Qadeer Khan. But as militancy has spread in Pakistan, officials have repeatedly insisted the nuclear weapons program is safe.

Pakistani police and government officials have made a series of escalating and, at times, seemingly contradictory allegations about the five men’s intentions, while U.S. officials have been far more cautious, though they, too, are looking at charging the men.

Officials in both countries have said they expected the men would eventually be deported back to the United States, but charging the men in Pakistan could delay that process. Pakistan’s legal system can be slow and opaque.

Taliban contact alleged
In an interview with The Associated Press last week, Punjab province Law Minister Rana Sanaullah said the men had established contact with Taliban commanders. He said they had planned to meet Pakistani Taliban chief Hakimullah Mehsud and his deputy Qari Hussain in Pakistan’s tribal regions before going on to attack sites inside Pakistan.

The nuclear power plant “might have been” one of the targets, Sanaullah alleged.

The U.S. Embassy declined to comment on the potential charges and would not say what efforts Washington was making to bring the men back.

Copyright 2009 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

URL: http://www.msnbc.msn.com/id/34642398/ns/world_news-south_and_central_asia/

Flight 253 passenger: Sharp-dressed man aided terror suspect Umar Farouk Abdul Mutallab onto plane without passport

December 29, 2009 by admin  
Filed under Featured Stories, World News

By Sheena Harrison | MLive.com

December 26, 2009, 2:22PM
haskell pass.jpgKurt HaskellKurt Haskell’s boarding pass for NWA Flight 253
Update: Dutch police investigating report of accomplice in Northwest Flight 235 terror plot

A Michigan man who was aboard Northwest Airlines Flight 253 says he witnessed Umar Farouk Abdul Mutallab trying to board the plane in Amsterdam without a passport.

Kurt Haskell of Newport, Mich., who posted an earlier comment about his experience, talked exclusively with MLive.com and confirmed he was on the flight by sending a picture of his boarding pass. He and his wife, Lori, were returning from a safari in Uganda when they boarded the NWA flight on Friday.
Lori Kurt Haskell.jpgKurt HaskellLori and Kurt Haskell
Haskell said he and his wife were sitting on the ground near their boarding gate in Amsterdam, which is when they saw Mutallab approach the gate with an unidentified man.
Kurt and Lori Haskell are attorneys with Haskell Law Firm in Taylor. Their expertise includes bankruptcy, family law and estate planning.
While Mutallab was poorly dressed, his friend was dressed in an expensive suit, Haskell said. He says the suited man asked ticket agents whether Mutallab could board without a passport. “The guy said, ‘He’s from Sudan and we do this all the time.’”
Mutallab is Nigerian. Haskell believes the man may have been trying to garner sympathy for Mutallab’s lack of documents by portraying him as a Sudanese refugee.
The ticket agent referred Mutallab and his companion to her manager down the hall, and Haskell didn’t see Mutallab again until after he allegedly tried to detonate an explosive on the plane.
Haskell said the flight was mostly unremarkable. That was until he heard a flight attendant say she smelled smoke, just after the pilot announced the plane would land in Detroit in 10 minutes. Haskell got out of his seat to view the brewing commotion.
RELATED CONTENT
First-hand account you want to share? Email us with your story and proof of your flight at detroit@mlive.com.

Complete coverage of Detroit terrorist attack

Explosive used on Detroit-bound flight is common, easily detectible with right equipment

Obama stresses airline security

Was arrest of sick man aboard plane justified, or was it overreaction?

Meet Dutch hero Jasper Schuringa

Alleged airline terrorist Umar Farouk Abdulmutallab transferred to Milan prison

Umar Farouk Abdulmutallab faces $250,000 fine and up to 20 years in prison for attempting to blow up plane. Too harsh, too light or just right?

“I stood up and walked a couple feet ahead to get a closer look, and that’s when I saw the flames,” said Haskell, who sat about seven rows behind Mutallab. “It started to spread pretty quickly. It went up the wall, all the way to ceiling.”
Haskell, who described Mutallab as a diminutive man who looks like a teenager, said about 30 seconds passed between the first mention of smoke and when Mutallab was subdued by fellow passengers.
“He didn’t fight back at all. This wasn’t a big skirmish,” Haskell said. “A couple guys jumped on him and hauled him away.”
The ordeal has Haskell and his wife a little shaken. Flight attendants were screaming during the fire and the pilot sounded notably nervous when bringing the plane in for a landing, he said.
“Immediately, the pilot came on and said two words: emergency landing,” Haskell said. “And that was it. The plane sped up instead of slowing down. You could tell he floored it.”
As Mutallab was being led out of the plane in handcuffs, Haskell said he realized that was the same man he saw trying to board the plane in Amsterdam.
Passengers had to wait about 20 minutes before they were allowed to exit the plane. Haskell said he and other passengers waited about six hours to be interviewed by the FBI.

About an hour after landing, Haskell said he saw another man being taken into custody. But a spokeswoman from the FBI in Detroit said Mutallab was the only person taken into custody.

Update: Dutch police investigating report of accomplice in Northwest Flight 235 terror plot

Start Slide Show with PicLens Lite PicLens

Leaked: Homeland Security’s Post Underwear Bomb Airplane Rules

December 29, 2009 by admin  
Filed under Featured Stories

Gizmodo
December 28, 2009

Editor’s note: The new rules do not apply to the elite and their nomenklatura.

U.S. DEPARTMENT OF HOMELAND SECURITY
Transportation Security Administration
Aviation Security Directive
Subject: Security Directive
Number: SD 1544-09-06
Date: December 25, 2009
EXPIRATION: 0200Z on December 30, 2009
This Security Directive (SD) must be implemented immediately. The measures contained in this SD are in addition to all other SDs currently in effect for your operations.
INFORMATION: On December 25, 2009, a terrorist attack was attempted against a flight traveling to the United States. TSA has identified security measures to be implemented by airports, aircraft operators, and foreign air carriers to mitigate potential threats to flights.
APPLICABILITY: THIS SD APPLIES TO AIRCRAFT OPERATORS THAT CARRY OUT A SECURITY PROGRAM REGULATED UNDER 49 CODE OF FEDERAL REGULATIONS (CFR)1544.101(a).
ACTIONS REQUIRED: If you conduct scheduled and/or public charter flight operations under a Full Program under 49 CFR 1544.101(a) departing from any foreign location to the United States (including its territories and possessions), you must immediately implement all measures in this SD for each such flight.

1. BOARDING GATE

1. The aircraft operator or authorized air carrier representative must ensure all passengers are screened at the boarding gate during the boarding process using the following procedures. These procedures are in addition to the screening of all passengers at the screening checkpoint.
1. Perform thorough pat-down of all passengers at boarding gate prior to boarding, concentrating on upper legs and torso.
2. Physically inspect 100 percent of all passenger accessible property at the boarding gate prior to boarding, with focus on syringes being transported along with powders and/or liquids.
3. Ensure the liquids, aerosols, and gels restrictions are strictly adhered to in accordance with SD 1544-06-02E.
2. During the boarding process, the air carrier may exempt passengers who are Heads of State or Heads of Government from the measures outlined in Section I.A. of this SD, including the following who are traveling with the Head of State or Head of Government:

1. Spouse and children, or
2. One other individual (chosen by the Head of State or Head of Government)
3. For the purposes of Section I.B., the following definitions apply

1. Head of State: An individual serving as the chief public representative of a monarchic or republican nation-state, federation, commonwealth, or any other political state (for example, King, Queen, and President).
2. Head of Government: The chief officer of the executive branch of a government presiding over a cabinet (for example, Prime Minister, Premier, President, and Monarch).

2. IN FLIGHT

1. During flight, the aircraft operator must ensure that the following procedures are followed:
1. Passengers must remain in seats beginning 1 hour prior to arrival at destination.
2. Passenger access to carry-on baggage is prohibited beginning 1 hour prior to arrival at destination.
3. Disable aircraft-integrated passenger communications systems and services (phone, internet access services, live television programming, global positioning systems) prior to boarding and during all phases of flight.
4. While over U.S. airspace, flight crew may not make any announcement to passengers concerning flight path or position over cities or landmarks.
5. Passengers may not have any blankets, pillows, or personal belongings on the lap beginning 1 hour prior to arrival at destination.

AIRCRAFT OPERATOR ACKNOWLEDGMENT: The aircraft operator must immediately provide written confirmation to its assigned PSI indicating receipt of this SD.
AIRCRAFT OPERATOR dissemination required: The aircraft operator must immediately pass the information and directives set forth in this SD to all stations affected, and provide written confirmation to its PSI, indicating that all stations affected have acknowledged receipt of the information and directives set forth in this SD. The aircraft operator must disseminate this information to its senior management personnel, ground security coordinators, and supervisory security personnel at all affected locations. All aircraft operator personnel implementing this SD must be briefed by the aircraft operator on its content and the restrictions governing dissemination. No other dissemination may be made without prior approval of the Assistant Secretary for the Transportation Security Administration. Unauthorized dissemination of this document or information contained herein is prohibited by 49 CFR Part 1520 (see 69 Fed. Reg. 28066 (May 18, 2004).
APPROVAL OF ALTERNATIVE MEASURES: With respect to the provisions of this SD, as stated in 49 CFR 1544.305(d), the aircraft operator may submit in writing to its PSI proposed alternative measures and the basis for submitting the alternative measures for approval by the Assistant Administrator for Transportation Sector Network Management. The aircraft operator must immediately notify its PSI whenever any procedure in this SD cannot be carried out by a government authority charged with performing security procedures.
FOR TSA ACTION ONLY: The TSA must issue this SD immediately to the corporate security element of all affected U.S. aircraft operators.
FOR STATE DEPARTMENT: Retransmittal to appropriate foreign posts is authorized. Post must refer to STATE 162917, 201826Z Sep 01, Subject: FAA Security Directives and Information Circulars: Definitions and Handling, for specific guidance and dissemination.

Gale Rossides
Acting Administrator

Start Slide Show with PicLens Lite PicLens

Ben Stein Accuses Ron Paul of Anti-Semitic Arguements on Avoiding Terror Attacks

December 29, 2009 by admin  
Filed under Featured Stories, US News

Start Slide Show with PicLens Lite PicLens

CNBC Kudlow Report: Racial Profiling Warranted because of Christmas Terror Plot

December 29, 2009 by admin  
Filed under Featured Stories

Next Page »