Cute girl with tattoos and glboobieses at Wyliepalooza I've seen you work at the ice cream shop since the summer. You do. If Sex ads in Penola are interested send me a pic and some info about you So as for me, I'm an open minded Chinese American man, employed, who is dd free waiting for the ideal part time Gennoa without the commitment.
|Relationship Status:||Never Married|
|Seeking:||I Seeking Swinger Couples|
|Relation Type:||Mature Personals Want Sexy Milf|
Lets play a dirty game online m4w I'm looking for a cool, down to earthlady back lady to chat with online.
I am a huge romantic sap. Hey guysI am a young, VERY attractive asian girl looking to have a casual encounter with a sexy, hot, white guy with a large package. I also like to cuddle and touch. If you want to know more about me just ask.
Cute, hung man for a sexy woman. I'm a 26 year old tall, attractive, clean, personable guy in decent shape with a good sense of humor. I'm looking for an intimate encounter s with a good looking girl, in good shape also or few extra pounds is fine but not into "bbws" sorry. Just looking trying to be spontaneous and try something fun and exciting! I think it could be fun to meet at a park or public place to meet and go for a walk and find a place to be alone ; Do you have any ideas?
Could keep it completely one time thing or maybe fwb's? I'm curious to see what kind of replys I get, I am real it was kinda cold and it rained today! Please send a and tell me just a little about yourself and what you'd like to do.
Put " rainy " in the subject line please. And yes that is me in the attached below. Rich women ready women looking men, bbw swingers ready girls having sex.
People looking sex orgy Contact Us Login Register. Whole foods girls looking for free sex Seeking: Search sexy chat Relationship Status: Discover up to matches. You must be between the age of. I love your face Lady wants casual sex Pantego Sexy older very attractive chubby single female seeks younger BBW, horney mother in Mawodpawod Sexy women wants casual sex Foley Lookin for a woman ; m4w Hi im johnny, college student at apsu for chem.
Hit me up if you wanna talk chill or do somethin else ; text me? If you are then it is a huge bonus: Friends search i want cock, versauter sex natursektspenderin gesucht fwb I'm looking for a girl to hang out with and possibly to mess around with..
Which could turn into something serious. Not really looking for a relationship right now, can't maintain A relationship, trying to concentrate on myself.. Females only, no men or couples, you have to be single!!
Also you need to live close to yucaipa or Redlands, have your own car, basiy have your life together. Looking for a woman who likes a good spanking!
Any ladies interested, lets discuss. I am 22, no.. I'm in a relationship but i do want girl time every once in awhile I will give you what you are looking for.. I am very respectful.. The olympics just started Lady wants casual sex Simsbury Anyone go to mature adult hooker horny bitches na meetings./p>
It can also include simple no- or relatively low-technology methods such as human intelligence agents and postal interception. The word surveillance comes from a French phrase for "watching over" sur means "from above" and veiller means "to watch" and is in contrast to more recent developments such as sousveillance.
Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organisations to plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence, and by private investigators.
Surveillance can be viewed as a violation of privacy , and as such is often opposed by various civil liberties groups and activists. Authoritarian government seldom have any domestic restrictions, and international espionage is common among all types of countries. The area of surveillance is increasingly a topic of academic study,  including through research centers,  books,    and peer-reviewed academic journals. The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.
There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious.
This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups.
Computers can be a surveillance target because of the personal data stored on them. Such software could be installed physically or remotely. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.
The official and unofficial tapping of telephone lines is widespread. About half of these letters requested information on U.
Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office , or companies such as Verint , and Narus , which search for certain words or phrases, to decide whether to dedicate a human agent to the call.
Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone. The StingRay tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom.
Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number , just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further.
A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it. Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone and thus the person carrying it can be determined easily even when the phone is not being used, using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone.
In response to customers' privacy concerns in the post Edward Snowden era,  Apple's iPhone 6 has been designed to disrupt investigative wiretapping efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple.
Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code themselves or to get the code from the phone's owner.
Although the CALEA requires telecommunication companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to e-mails and metadata. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official". Surveillance cameras are video cameras used for the purpose of observing an area.
They are often connected to a recording device or IP network , and may be watched by a security guard or law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database , and by video analysis software such as VIRAT and HumanID.
The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. There are about million surveillance cameras worldwide as of The growth of CCTV has been slowing in recent years. In the United States , the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment.
Speaking in , Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by the year In the United Kingdom , the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses.
In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the red-light districts and the train stations. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: The Defense Advanced Research Projects Agency DARPA is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity such as waving arms, looking side-to-side, standing in a group, etc.
At Super Bowl XXXV in January , police in Tampa, Florida, used Identix's facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event  it found 19 people with pending arrest warrants.
Governments often  initially claim that cameras are meant to be used for traffic control , but many of them end up using them for general surveillance. For example, Washington, D. The development of centralized networks of CCTV cameras watching public areas — linked to computer databases of people's pictures and identity biometric data , able to track people's movements throughout the city, and identify whom they have been with — has been argued by some to present a risk to civil liberties.
One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook , MySpace , Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database ,  and others. These types of threats are most easily countered by finding important nodes in the network, and removing them.
To do this requires a detailed map of the network. Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:.
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. Examples of mostly behavioral characteristics include gait a person's manner of walking or voice.
Facial recognition is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video.
Another form of behavioral biometrics, based on affective computing , involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits.
This might be used for instance to see if a person's behavior is suspect looking around furtively, "tense" or "angry" facial expressions, waving arms, etc. A more recent development is DNA profiling , which looks at some of the major markers in the body's DNA to produce a match. The computers running the database are contained in an underground facility about the size of two American football fields. The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.
Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face.
Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle , helicopter , or spy plane.
Military surveillance aircraft use a range of sensors e. Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles , forward-looking infrared , and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper ,  a U. The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection , border patrol, "transit monitoring", and general surveillance of the U.
The United Kingdom , as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones , to be used by police forces throughout the U. In addition to their surveillance capabilities, MAVs are capable of carrying tasers for " crowd control ", or weapons for killing enemy combatants. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring.
This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station.
Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.
Economic such as credit card purchases and social such as telephone calls and emails transactions in modern society create large amounts of stored data and records. In the past, this data was documented in paper records, leaving a " paper trail ", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.
But today many of these records are electronic, resulting in an "electronic trail". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record.
Public records—such as birth, court, tax and other records—are increasily being digitized and made available online. In addition, due to laws like CALEA , web traffic and online purchases are also available for profiling.
Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs. Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive.
However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections , and preferences of the individual. The centers will collect and analyze vast amounts of data on U. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc.
Under United States v. Miller , data held by third parties is generally not subject to Fourth Amendment warrant requirements. Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions.
Data collected on individuals and groups can be sold to other corporations, so that they can use it for the aforementioned purpose. It can be used for direct marketing purposes, such as targeted advertisements on Google and Yahoo. These ads are tailored to the individual user of the search engine by analyzing their search history and emails  if they use free webmail services , which is kept in a database.
For instance, Google , the world's most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months. Their revenue model is based on receiving payments from advertisers for each page-visit resulting from a visitor clicking on a Google AdWords ad, hosted either on a Google service or a third-party website.
Millions of sites place Google's advertising banners and links on their websites, in order to share this profit from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies "cookies" on each visitor's computer. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for building a profile of the user to deliver better-targeted advertising.
According to the American Management Association and the ePolicy Institute that undertake an annual quantitative survey about electronic monitoring and surveillance with approximately U. In addition, most companies use software to block non-work related websites such as sexual or pornographic sites, game sites, social networking sites, entertainment sites, shopping sites, and sport sites. The American Management Association and the ePolicy Institute also stress that companies "tracking content, keystrokes, and time spent at the keyboard The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking.
The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies—such as Google—for augmenting the profiles of individuals whom it is monitoring.
Federal government has gathered information from grocery store "discount card" programs, which track customers' shopping patterns and store them in databases, in order to look for "terrorists" by analyzing shoppers' buying patterns.
Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of infiltration.
In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants i.
Fielding operatives is very expensive, and for governments with wide-reaching electronic surveillance tools at their disposal the information recovered from operatives can often be obtained from less problematic forms of surveillance such as those mentioned above. Nevertheless, human infiltrators are still common today. For instance, in documents surfaced showing that the FBI was planning to field a total of 15, undercover agents and informants in response to an anti-terrorism directive sent out by George W.
On May 25, the U. Director of National Intelligence Michael McConnell authorized the National Applications Office NAO of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.
The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.
One of the simplest forms of identification is the carrying of credentials. Some nations have an identity card system to aid identification, whilst others are considering it but face public opposition. Other documents, such as passports , driver's licenses, library cards, banking or credit cards are also used to verify identity.
If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number such as a Social Security number , it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above.
Radio Frequency Identification RFID tagging is the use of very small electronic devices called "RFID tags" which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.
Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a shot. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc. Thousands of people have already had them inserted. This information could be used for identification, tracking, or targeted marketing.
As of [update] , this has largely not come to pass. Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.
Mobile phones are also commonly used to collect geolocation data. The geographical location of a mobile phone and thus the person carrying it can be determined easily whether it is being used or not , using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. Victor Kappeler  of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from Of the , law enforcement requests made to Verizon, 54, of these requests were for "content" or "location" information—not just cell phone numbers or IP addresses.
Content information included the actual text of messages, emails and the wiretapping of voice or messaging content in real-time. A comparatively new off-the-shelf surveillance device is an IMSI-catcher , a telephone eavesdropping device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle MITM attack.
IMSI-catchers are used in some countries by law enforcement and intelligence agencies , but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries. A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being.
A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information. Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies, [ clarification needed ] a "killer" tracking chip patent was filed at the German Patent and Trademark Office DPMA around May Law enforcement and intelligence services in the U.
As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances. Central Intelligence Agency and Federal Bureau of Investigation have performed twelve separate mail-opening campaigns targeted towards U.
In one of these programs, more than , communications were intercepted, opened, and photographed. A stakeout is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering evidence related to criminal activity. The term derives from the practice by land surveyors of using survey stakes to measure out an area before the main building project is commenced.
The management of wildlife populations often requires surveillance. This includes, for example surveillance of 1 Invasive species  location and abundance for more effective management,  2 illegal fishers and poachers   to reduce harvest and overexploitation of natural resources, 3 the population abundances of endangered species to decrease the risk of extinction, and 4 wildlife diseases that can damange crops, agriculture and natural populations.
Supporters of surveillance systems believe that these tools can help protect society from terrorists and criminals. They argue that surveillance can reduce crime by three means: Surveillance can deter by increasing the chance of being caught, and by revealing the modus operandi. This requires a minimal level of invasiveness. Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system for instance, a camera system that has its feed run through a facial recognition system.
This can for instance auto-recognize fugitives and direct police to their location. A distinction here has to be made however on the type of surveillance employed. Some people that say support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in how this surveillance is done also matters a lot; i.
Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.
Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt.
Some of the surveillance systems such as the camera system that has its feed run through a facial recognition system mentioned above can also have other uses besides countering criminal activity. For instance, it can help on retrieving runaway children, abducted or missing adults and mentally disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy.
Another common argument is: MoveOn Democratic Trojan Horse to control dissent. Several USA Today reporters saw Flight 77 hit the Pentagon while they were driving to work their offices are not far from the Pentagon. Therefore, the fact this publication chose to highlight a film claiming Flight 77 did not hit the Pentagon is not a compliment - presumably USA Today like other media publications understands that this is one of the fake claims about complicity.
The most amusing - and bizarre - smear against oilempire. State Department "Identifying Misinformation" website: TV Minds Propagandized by Photos - electronic hypnosis. Karl Rove uses fake evidence to discredit real scandals. Flight 77 black boxes found. While the unresolved conflict with Iraq provides the immediate justification, the need for a substantial American force presence in the Gulf transcends the issue of the regime of Saddam Hussein It's similar to the experience that rank and file FBI agents had when they tried to get a warrant to search Mr.
Moussaoui's computer after he was arrested in August when the flight school he was attending called the FBI, worried - correctly - about his intentions. The probable cause for the warrant was removed by headquarters and the search didn't happen until after the attack. If they had been allowed to search his computer beforehand, the attacks could not have happened.
Kevin Fenton, "Disconnecting the Dots: In the unlikely event there is a real investigation Disconnecting the Dots would be a good place to start. Don't count on the super conspiracy sites to even mention this.
Newsweek is generally not a trusted publication for investigations of the National Insecurity State, but sometimes useful things are published and this is one of them. Who is Rich Blee? Most of their questions were ignored by the official Comission report, although many chose to endorse the Commission anyway.
Michael Ruppert's book "Crossing the Rubicon: The Decline of the American Empire at the End of the Age of Oil" This investigation has been publicly attacked more than any other independent effort, which is a testament to its effectiveness. Simplifying the case against Dick Cheney by Michael Kane www. It spends too much on the obscure conspiracy theorists who are peripheral to the actual story.
This site has been pressured by "no-planers" and has been renamed part of the title from "No Plane" to "No " in deference to those who pretend there is any evidence there isn't for an alleged crash of a smaller-than plane. His writings are archived at www. Sibel Edmonds, an FBI whistleblower gagged by a federal Court injunction, discloses some of what she knows on her website. Sill on line but no longer active. It is always possible, however, to rebuild and extend the work of social repair that such movements represent.
That sense-making happens in paperback-and-podium argumentation pitched at various levels of sophistication for various audiences; it happens in documentaries; and it can happens in the arts. It cannot happen in the courts: The way to get media attention is to publish — wittingly or unwittingly — a true story mixed with a poison pill of disinformation. Yet within the span of less than a day, these same agencies asserted the identity of those responsible with such certainty as to preclude any serious investigation of other possible perpetrators.
Whose interests are truly served by such investigations and their near instantaneous conclusions? This verifies the conclusion taken by this website in that a "free for all" forum on these controversies is probably impossible to screen out shrill attackers who promote false claims.
Deceptive evidence is often delivered alongside accurate information. Disinformation requires intentionality while misinformation does not. The objectives and methods of disinformation are quite sophisticated. Here are a few of the main strategies:. World Trade Center Environmental Organization advocacy for those poisoned by the dust clouds from the collapsing towers also mirrored at ea.
The author is careful to avoid the charge that the obstruction of efforts to prevent the attacks were deliberate but the amount of evidence presented is astounding. Paul Thompson's work tells what happened that day, tracing the events leading up to the attack, and what has transpired since. After years of self-serving reports by ineffectual politicians in Washington, there is at last an independent report, based entirely on publicly known facts, that is thorough and reliable.
Read it and decide for yourself whether there was a cover-up. It is truly remarkable. Thank God there are people like Thompson. This book [could] effect a major change in the course of U. If the many questions raised by this book are ever answered, it would go a long way toward making us all safer.
War on Truth is an updated, improved version of The War on Freedom And How to Save It," one of the best descriptions of the synergistic crises that we face ecology, energy, money. Peter Dale Scott coined the term "deep politics" in relation to understanding the Kennedy assassinations. This reviewer is mentioned in "Rubicon" see www. It is the main book that delved into the "why" the attacks were allowed in the context of Peak Energy and the inevitable permanent economic decline caused by reaching the limits to growth on a finite planet.
Rubicon makes startling charges about Vice President Dick Cheney's alleged role in coordinating wargame exercises that morning. He died in the September 11 attack. Hopsicker is the only journalist to interview participants and bystanders -- and developed some amazing, twisted evidence tying the flight schools to drug smuggling and covert operations.
However, some of the claims seem to overreach or are based on a sole person's after-the-fact statements. It ties together the CIA war on Cuba in the early s, the assassination of President Kennedy, Watergate, and the smuggling of cocaine to fund the Iran-Contra scandal. This is the story of Barry Seal, the biggest drug smuggler in American history, who died in a hail of bullets with George Bush's private phone number in his wallet It is still accurate after all these years.
A similar, much more flawed event called "Confronting the Evidence" was held in New York City on September 11, which did focus on the hoaxes a mix of good information and nonsense and has received much more publicity. It is a full length documentary that updates the earlier work. A very good production for the most part , but the finale includes Thierry Meyssan's "no plane hit Pentagon" hoax.
Was this inaction [the Air Force " stand down "] simply the result of key people disregarding, or being ignorant of, the evidence? Or could US air security operations have been deliberately stood down on September 11? If so, why, and on whose authority? The former US federal crimes prosecutor, John Loftus, has said: The overriding motivation for this political smokescreen is that the US and the UK are beginning to run out of secure hydrocarbon energy supplies.
As demand is increasing, so supply is decreasing, continually since the s. The conclusion of all this analysis must surely be that the "global war on terrorism" has the hallmarks of a political myth propagated to pave the way for a wholly different agenda - the US goal of world hegemony, built around securing by force command over the oil supplies required to drive the whole project.
Why didn't the White House listen? Many of these theories are outlandish on their face, such as claims that the twin towers were brought down by controlled demolition, that airplanes never struck them, that Flight 93 landed in Cleveland rather than crashing in a Pennsylvania field, and so forth.
This meta-conspiracy theory would go something like this: Throughout the spring and summer of , Eichenwald claims the CIA presented the administration with compelling evidence that al-Qaida operatives were in the United States, that they were planning a major terrorist attack intended to produce mass casualties, and that this attack was imminent.
In response, the Bush administration did nothing. Indeed, the administration's level of inaction was so negligent that senior intelligence officials actually considered resigning, so as not to be in a position of responsibility when the attack took place: On July 9, at a meeting of the counterterrorism group, one official suggested that the staff put in for a transfer so that somebody else would be responsible when the attack took place, two people who were there told me in interviews.
The suggestion was batted down, they said, because there would be no time to train anyone else. For a long time, the administration successfully covered up this series of events, by employing the clever strategy of revealing a small and ultimately misleading part of the truth: In April , it declassified a single daily briefing, that featured the startling headline "Bin Laden Determined to Strike in U.
Releasing this single briefing was deeply misleading, because it gave the impression that the administration had been given just one rather vague warning about the impending attack, rather than a series of much more concrete briefings, which ought to have put the government on high alert.
According to Eichenwald, some White House neocons believed, "Bin Laden was merely pretending to be planning an attack to distract the administration from Saddam Hussein, whom the neoconservatives saw as a greater threat. Note that to this point my meta-conspiracy narrative has the unusual virtue of being based on nothing but what are now the known facts of the matter.
To go beyond this, we have to enter the realm of speculation, which is where things get "conspiratorial" in the dismissive sense of the word. We might, for example, speculate that certain neoconservatives in and around the White House were not wholly displeased with the failure to stop the attacks, since they provided an emotionally compelling, although completely irrational, basis for launching the invasion of Iraq these people were laboring to bring about.
Note how former Bush press secretary Ari Fleischer is already attacking Eichenwald as a "truther. Now, do I believe in this meta-conspiracy theory? Of course not, because I am — or at least aspire to be — a Very Serious Person, and Very Serious People do not believe in conspiracies.
They do, however, participate in them. There are plenty of reasons to be sceptical. The magical appearance of the terrorists' luggage, passports and flight manual looks rather too good to be true. The dossier of "evidence" purporting to establish Bin Laden's guilt consists largely of supposition and conjecture.
The ration packs being dropped on Afghanistan have no conceivable purpose other than to create the false impression that starving people are being fed. Even the anthrax scare looks suspiciously convenient. Just as the hawks in Washington were losing the public argument about extending the war to other countries, journalists start receiving envelopes full of bacteria, which might as well have been labelled "a gift from Iraq".
This could indeed be the work of terrorists, who may have their own reasons for widening the conflict, but there are plenty of other ruthless operators who would benefit from a shift in public opinion. Democracy is sustained not by public trust but by public scepticism. Unless we are prepared to question, to expose, to challenge and to dissent, we conspire in the demise of the system for which our governments are supposed to be fighting.
The true defenders of America are those who are now being told that they are anti-American. The far-out false claims succeeded in alienating someone who had healthy skepticism immediately after the attacks. F2 A contemptible offense. It's about time conservative idiots like Steve Kelly and Rod Musgrove got a dose of reality.
Of course President Bush knew about the impending attacks on America. He wasn't elected by the American people, but placed into the Oval Office by the conservative supreme court. The economy was sliding into the usual Republican pits and he needed something on which to hang his presidency.
For them to accuse Democrats of being "sleazy" is laughable. Isn't it ironic that Kelly begins his inane babble with a reference to Monica Lewinsky? How many people died because of Monica Lewinsky? And for Musgrove to call the assertions "contemptible" is another joke. Funny how he manages to make disparaging remarks about President Clinton, as well. Face it people, Bill Clinton was a great president. The Democrats asking pertinent questions is their duty as public servants. One of the best articles pointing out the likelihood of remote control of the four planes hijacking the hijackers.
But the evidence indicates his guilt involves more than just a huge intentional sin of omission — this now seems certain.
In the corporate and political world, this admission is a strategy that has been used over and over by creeps who are guilty of huge crimes and know the heat is on.
By confessing to a lesser charge, they try to draw the heat away from the main, more dangerous issue. And that's saying something, in light of the long and totally-neglected history of this kind of war-triggering deception perpetrated by powerful special interests to sway public opinion in favour of deadly agendas that almost always result in serious grief for just about everyone.
At the levers is a clique of neocons that has hijacked this country's foreign policy at the behest largely and to the benefit mainly of Big Arms and Big Oil, with the rest of the worst at the top, giving the thumbs-up and boarding the gravy train.
The psychological trick at the heart of September 11th, by the way, is that people confuse their compassion for the victims with their certainty about who the perpetrators are. The public was presented with instant perpetrators. The trick will most likely continue working for all future planned invasions — looks as if Iraq is next — so long as the public remains blindfolded by the media. Zwicker claimed that those who point out that some claims of complicity are not actually true - particularly the debunked "Flight 77 did not hit the Pentagon" hoax - are helping the government.
In reality, the "no plane" claims were created by the government to create a strawman to discredit legitimate skepticism of the official story. A young man approximating Oswald's description and using Oswald's name -- we believe we have discovered his identity -- engaged in a variety of activities designed to create such a strong impression of Oswald's instability and culpability in people's minds that they would recall him as a suspicious character after the President was murdered.
In one instance, a man went to an auto salesroom, gave his name as Lee Oswald, test-drove a car at 80 miles an hour -- Oswald couldn't drive -- and, after creating an ineradicable impression on the salesman by his speeding, gratuitously remarked that he might go back to the Soviet Union and was expecting to come into a large sum of money. Parenthetically, the salesman who described this "second Oswald" was subsequently beaten almost to death by unknown assailants outside his showroom.
He later fled Dallas and last year was found dead; it was officially declared a suicide. In another instance, this "second Oswald" visited a shooting range in Dallas and gave a virtuoso demonstration of marksmanship, hitting not only his own bull's-eye but the bull's-eyes of neighboring targets as well -- thus leaving an unforgettable impression of his skill with a rifle. The real Oswald, of course, was a mediocre shot, and there is no evidence that he had fired a rifle since the day he left the Marines.
Consequently, the fact that he couldn't hit the side of a barn had to be offset, which accounts for the tableau at the rifle range.
I could go on and on recounting similar instances, but there is no doubt that there was indeed a "second Oswald. As it turned out, of course, the organizers of the conspiracy needn't have bothered to go to all this trouble of laying a false trail incriminating Oswald. They should have realized, since Oswald was a "self-proclaimed Marxist," that it wasn't necessary to produce any additional evidence to convict him in the eyes of the mass media; any other facts would simply be redundant in the face of such a convincing confession of guilt.
Mohamed Atta apparently visited a U. An interesting point is that he is supposed to have visited the office in the spring of , about 17 months before September 11, , i. While discussing this doomed mission with the loan officer who turned him down because it did not make sense, Atta made many odd statements, all of which are an obvious attempt to leave the impression that he was really and truly a crazed fundamentalist Islamic terrorist. He lays it on so thick, I don't know how he managed to keep from laughing: He almost refused to deal with her, because she is a woman.
He admired a picture of Washington, D. When she refused to sell it to him she recounts: He gave her evil, terrorist looks with his 'very scary' black eyes. She said he referred to a safe in her office and she recounts: He talked of the massive size of the chemical tank he wanted to install, filling the whole inside of the plane except for the pilot's seat.
He mentioned Osama bin Laden, who she had never heard of, and said that bin Laden "would someday be known as the world's greatest leader. He knew he wasn't allowed to stay to ever be able to use the airplane for any plausibly legitimate purpose. Even if he mistakenly thought he could get away with this, what was his reasoning for sending three other terrorists to the same office on the much the same mission? In one case, he put on glasses as a disguise and pretended to be the accountant of one of the other hijacker-applicants, another obvious attempt to draw attention to himself.
The whole thing must have sounded like a Monty Python sketch it reminds me of the Dead Parrot sketch when Michael Palin puts on the fake mustache.
The ridiculous overacting left the bureaucrat completely unsuspicious. I imagine if he had asked her if it would be OK for him to fill the plane full of explosives and fly it into the World Trade Center, she would have replied that she would strongly object to that as blowing up the collateral would be a breach of one of the terms of his loan agreement.
If this isn't some kind of hoax, what we have here is another example of Atta creating his 'legend', filling out his terrorist personal identity before a witness who would surely remember him. Notice again that he appears to have no fear that this bureaucrat will report him before September 11 and end the terrorist project he has spent so much work on.
These facts, while not sufficient to prevent the day that changed the world, nonetheless were more than sufficient to identify the culprit in less than the next 24 hours; who was then the justification for embarking on a war that, according to Dick Cheney, "may never end. At least, not in our lifetime"; and who less than a year later has dropped off the world stage slowing down this lifetime war, on his behalf, not one iota.
Whose interests are advanced by this monumental campaign to trade our liberty for security? That's why we say that this investigation must be more a movement of concerned citizens than just a mechanical weighing of facts.
In the light of our ongoing march to war, and the wholesale sacrifice of the Bill of Rights for an illusory security, this movement is both urgent and timely.
Some may say, "What's to discover? Usama Bin Laden and his network hijacked some planes and flew them into buildings. We think you will be amazed and shocked at how flimsy the "official" explanations actually are - and how the media seems prepared to not take a closer look. We have no time for those who would dismiss our misgivings as "conspiracy theory" a term most often used by people who haven't done their homework. We demand evidence, credible inquiry, commitment to find the truth, and a faith in the ability of the people to reason things out.
If no one else is going to step forward, then we must. Citizens, friends, our nation has been swept up in a tide of vengeance and price-tag patriotism. We are being denied our right to direct the course of our democracy -even as our civil liberties are being stripped away; and beneath all this, there lies a dark day, whose real meaning has yet to be unveiled. Mon, 22 Oct From: Another "four Arab men" were reported to have had a heated argument in the parking area around Logan airport with a passenger who later recalled them when he heard one of the planes was hijacked from there, and led the FBI back to their rented car.
The four men, part of the list of 19, were reported to have come into the US via Canada and then rented a car in Boston which they drove to Logan airport. Presumably this story is based on use of 4 passports or ID cards at the border and the car rental agency. In the car the FBI reportedly found a copy of the Koran in a suitcase, a flight manual for the type of plane hijacked written in Arabic, and one of several instruction letters to the hijackers also in Arabic. This story and its details strike me as completely false and planted evidence for a number of reasons.
The "road rage" part may not have happened, since the person leading the FBI to false evidence may have been part of the game. No one seriously involved in such an operation would risk such notice, no devout Muslim would put a Koran in a suitcase, and no sensible person would deliver a flight manual in Arabic to the airport and fail to take it onto the plane for use, it seems to me.
If the incident happened as reported, did the four men using these ID's actually board the plane? Or did they just stage an incident to take the FBI by the nose to the planted evidence? The sophistication of the events of September 11 suggest to anyone who knows about covert operations that this had to be state sponsored, at a level of resources and training and planning that the al'Quaida are not capable of, nor the Taliban.
In any covert operation, far more time and effort is put into the cover story than into the event. Given the sophistication of the event, we should expect a sophisticated cover story. In the past, covert operations have often used a bait and switch approach. First we are given a plausible patsy, but the evidence is meant to be transparent and fall apart after buying some time. This is false sponsorship.
However, when the first layer erodes, there is a second layer of even more plausible but equally false sponsorship, including organizations or countries that either willingly or unwittingly contributed or been involved for their own reasons to the plan and will take credit, at least silently, at first, and can be used to take blame later.
They will still not be the authors. False sponsorship is key to a good cover story. Extra pieces of the puzzle: They did not mention Arabs.
Glick, wife of one of the men who reportedly decided to "do something" on the plane that went down in Pennsyvania. Glick mentioned a detail from her husband's call or the NYT added one about "four Arab men in red headbands". Another puzzle in my book, or a stereotypically racist canard. Soon after, we got the official list of 19 names of the hijackers. Another group of people were reported in Saudi Arabia to be the actual people on the ID's but still living there and uninvolved on September At least one was reported to have been on an FBI "watch list".
Some had been to "flight training" schools, which could not actually have trained them well enough to do what was done by those planes on September I suggest you ask any pilot that has flown one what it takes to bank into a building at miles an hour, or to dive in a degree turn from feet to fly so low that streetlamps are clipped off, into a building.
There are two options: Military or experienced civilian pilots many are military anyway piloted these planes. The planes were flown on remote control. Right now it looks like layer two will be Iraq, among other countries.
This was apparent to me the week of the event in early statements about "state sponsorship" by James Woolsey former CIA director and by a conservative think tank member at the Johns Hopkins Center for Advanced International Studies. The academic laid out many of the same items I noticed, but ended up saying it was Iraq.
I talked to him subsequently and he admitted he has no proof about Iraq as the sponsor, only suspicion. Iraq has been named more recently as the source of the anthrax, but the type discovered is US manufacture with some foreign distribution, not easy to get hold of in Iraq. The seat numbers given, according to these articles, did not match the seats assigned to the "Arab terrorists".
This is interesting given your information that suggests they had no seat numbers, eh? Whose seat numbers were they? So, the bottom line is, we still do not know who hijacked the planes or how.
We do not know who piloted the planes so expertly into the buildings or how that was accomplished. And we do not know how they got onto the flights, if they did. Ever try to sit in the wrong one? Who were the "guys with box knives"? Were their identities removed from the passenger lists because they were NOT among the 19 named? Were they even Arabs? And did they actually fly the planes into the buildings? I for one am very suspicious of mass suicide pacts and have, with detailed work, deconstructed many of the recently reported ones from Jonestown forward, and back as far as Massada.
Almost all are actually mass murders. If there were 19 in the plot, perhaps only one in each plane knew they were all to die. You can get a pilot to kamikaze, we know that much. But a whole crew? I know, for the "greater glory of Allah against the infidels", or for a preacher in Guyana, or for a UFO cult in California, or for a sun cult in France.
Just don't check the details. Which leaves two unexplored options: But those are "conspiracy theories" aren't they. Is bin Laden and his thugs a conspiracy theory? Does it require a modicum of proof? The secret evidence was viewed by foreign leaders, who are more qualified than the American public, and even they called it "circumstantial" and "not enough to take into court" but they agreed it was "sufficient" to go to WAR.
Probably true, the first casualty of war is always the truth, and you don't need much "evidence" to get a war going. But you can't even get the secret evidence to work if you can't put the suspects on the planes now can you? Oh, dear, have I revealed that I am not a "coincidence theorist"? Let's just stick to the evidence, it will lead us where we need to go if we ever get to see it. For now the lack of it is enough for me. Good luck on a great puzzle. As my old pal Penn Jones used to say, "Take any one piece and research the hell out of it.
It will eventually show you the whole". There have been three bumps in the history of the discussion of the truth of what happened on November 22, Between those bumps there have been long stretches of wheel-spinning, where absence of new information meant that conspiracy buffs spent their time constructing dream palaces in the air of their own imaginations. Those who conspire must love this, as the buffs themselves create the forest of misleading data in which the truth can easily hide.
The main problem of conspiracy research now is separating the disinformation from the truth, with by far the greatest collection of disinformation created by well-meaning but misguided 'researchers' who, in the absence of new data, let their imaginations run wild. It is sad to see exactly the same thing happening in the field of discussion of September The Bush Administration has successfully managed to completely stonewall even the rather suspicious official investigation, and I have not seen any new important revelations in at least a year.
People who rode hobbyhorses in the months after September 11 are still riding the same hobbyhorses, in love with their own theories more than the truth my personal hobbyhorse is that November 22 and September 11 were arranged by the same two American institutional groups. Now we're even beginning to see the beginnings of the grand meta-theories, with the attack blamed on some secret conspiracy involving Israel with the happy Israeli witnesses making a video of the attack paralleling the fact that Yitzhak Rabin was in Texas at Fort Bliss on November 22, ; it's as if Israel makes a point of sending witnesses whenever they hear about such things , or, in a possible attempt to shield Israel, weird conspiracy chestnuts like the Bilderbergers or the Illuminati whatever happened to the Rockefellers, who used to be blamed for everything?
These meta-theories are worse than useless, serving as a method of appearing to discuss the case while simply constructing a wall of smoke. There is significant real information readily available if the American political situation would allow it to be released. I'd like to start with testimony from the pilots who just missed reaching the targets on time, and ask them who arranged for them to be so near and yet so far.
The old Babylonian furnace surely did not develop the temperature of burning jet fuel. Arab-language flying manuals in the trunk of a car, inaudible videotapes and other conveniently recovered exhibits make Moscow trials of a bright example of justice incorrupt. The prisoners of Afghani war have been kept away from prying eyes, in the limbo of Guantanamo, lest they disclose the greatest secret of all: The view that the official conspiracy theory 19 hijackers, an evil man in a cave, and perhaps a few accomplices did by themselves and caught the government by surprise has zero evidence to justify it.
It's reminiscent of the JFK assassination coverup, where Lee Harvey Oswald's bio was immediately given to the media and in at least one case, before the assassination happened, according to Col.
The phony evidence "found" in the immediate wake of is symptomatic of this type of propaganda campaign - the paper passport on the streets of NYC even though the black boxes weren't found, the Arabic flight manual found in the Boston airport parking lot that was supposedly left behind by the terrorists, the "wag the dog" stories of flight 93 even though the aircraft left debris scattered over 8 miles indicating a mid-air explosion, etc.
As to Smoking Gun, I feel that people cannot have an entire barrel of facts and red herrings dumped in their laps and expect to sort it all out I lean towards the theory that the 19 Arab hijackers are a complete fiction, which raises very hard questions about the integrity of these so called warnings which were ignored.
I'm not saying that they shouldn't be looked at, because this piece of the puzzle is far from clear, but my point is -- how could there have been warnings about the hijackers, if they never existed. But where are the answers? Bush and Cheney's private chat is a public disgrace. Bush and Cheney can make a record of the interview, but the commission, under a bizarre agreement, is prohibited from doing so.
By refusing to appear separately or in public, the two may have taken the panel for a ride, but they can't avoid the tough questions forever. Both give every sign of having been asleep at the switch on Worse, for months they have been engaged in collusion to obstruct justice by thwarting first congressional and then commission investigations.
Let's start with Bush. Morning, September 11, At 9, Bush arrives at the Booker Elementary School in Sarasota, Florida, where he takes a call from Condoleezza Rice before entering an elementary school classroom for a photo op.
Certainly by that moment Rice must have known that one plane had hit the World Trade Center and another had been hijacked. Now a few simple questions for our president, the last six from the Family Steering Committee, whose members lost loved ones on What did you know about the emerging crisis before speaking to Rice? What was your response? What did Rice tell you? And why, after speaking to her, did you go ahead with a meaningless photo op? Given the warnings on hijackings and flying bombs, why were there only 14 fighter planes assigned to cover the entire U.
A briefing prepared for senior U. The attack will be spectacular and designed to inflict mass casualties against U. Attack preparations have been made. Attack will occur with little or no warning. Did you receive such warnings before ? If so, what did you do in response? President, European security forces were widely reported to have prepared elaborate measures to prevent a possible bin Laden attempt to assassinate you at the G8 Summit in Genoa, Italy, in July According to German intelligence sources, the plot involved bin Laden paying German neo-Nazis to fly remote-controlled model aircraft packed with Semtex into the conference hall and blow the leaders of the industrialized world to smithereens.
The reports were taken so seriously that you stayed overnight on an aircraft carrier offshore, according to CNN, and other world leaders stayed on a luxury ship. Two days before the summit began, the BBC reported: Were you aware of the planned Al Qaeda attack on Genoa using planes as weapons? If so, what did you do to safeguard the homeland and U.
Tony Blair: a liar and a coward War is the greatest interest bearing debt generator known to mankind War is Murder for Profit UNICEF say Iraqi children are dying EVERY MONTH - stop sanctions NOW! To save the lives of innocent fellow countrymen Western rulers must stop military invasions, occupation and covert operations NOW! Tensions Grow as China, Russia and Iran Lead the Way Towards a New Multipolar World Order Military and economic tensions are increasing due to the ramped up warlike stance of the US establishment. John Steppling is an original founding member of the Padua Hills Playwrights Festival, a two-time NEA recipient, Rockefeller Fellow in theatre, and PEN-West winner for playwriting. Plays produced.