The Eye of Sauron – Boeing’s Border Watchtowers Can’t See Straight

sauron.jpg

“After revealing last week that a pilot installation of controversial, buggy border-security scanner towers had finally been accepted into service, the US government has now admitted that the project is a technical failure,” Lew Page observes.

Plans to build a so-called ‘virtual fence’ along the Mexican border will proceed, but there will be long delays and very little of the current technology will be used. The expected rollout of the first 100 mile stretch of scanner-swept, networked border has now been moved back to 2011. The planned line south of Tucson in Arizona was to have been huddled-mass proofed by this year.

The initial piece of the fence — nine sensor-laden towers, collectively called “Project 28” — has been in trouble, for a while. But yesterday, the Government Accountability Office revealed a whole host of new problems. Like using inappropriate commercial software, originally meant for police dispatchers, to keep track of cross-border traffic. Like designing and developing by the whole thing “with minimal input from the intended operators of the system, including Border Patrol agents.” Oops.

Boeing, the big contractor behind the effort, tells the Washington Post that “the initial effort, while flawed, still has helped Homeland Security apprehend 2,000 illegal immigrants since September. It estimated in 2006 that it would spend $7.6 billion through 2011 to secure the entire 2,000-mile southern border, an ambition that was meant to win support from conservatives for legislation creating a guest-worker program and a path to legalization for 12 million illegal immigrants.”

But officials said yesterday that they now expect to complete the first phase of the virtual fence’s deployment — roughly 100 miles near Tucson and Yuma, Ariz., and El Paso, Tex. — by the end of 2011, instead of by the end of 2008…
“The total cost is not yet known,” testified Richard M. Stana, the GAO’s director of homeland security issues, because DHS officials “do not yet know the type of terrain where the fencing is to be constructed, the materials to be used, or the cost to acquire the land.”

“The pilot virtual fence included nine mobile towers, radar, cameras, and vehicles retrofitted with laptops and satellite phones or handheld devices. They were to be linked to a near-real-time, maplike projection of the frontier that agents could use to track targets and direct law enforcement resources,” the Post adds. Pagey has long called these sensors the Eye-o-Sauron™. (If you don’t get the reference, click away immediately.) “The cameras, much like the Eye of Sauron in the films, often struggled to spot unwelcome visitors,” he notes. For example…

GAO investigators said that Boeing’s software could not process large amounts of sensor data. The resulting delays made it hard for operators in a Tucson command center 65 miles to the north to lock cameras on targets. Radar systems were also triggered inadvertently by rain and other environmental factors. Cameras had trouble resolving images at five kilometers when they were expected to work at twice that distance, Stana said.

By Noah Shachtman
February 28, 2008 | 10:19:31 AM

Source: wired.com

FBI Taps Cell Phone Microphone As Surveillance Tool

fbi

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone’s microphone and using it to eavesdrop on nearby conversations.

The technique is called a “roving bug,” and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the “roving bug” was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect’s cell phone.

Kaplan’s opinion said that the eavesdropping technique “functioned whether the phone was powered on or off.” Some handsets can’t be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

The U.S. Commerce Department’s security office warns that “a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone.” An article in the Financial Times last year said mobile providers can “remotely install a piece of software on to any handset, without the owner’s knowledge, which will activate the microphone even when its owner is not making a call.”

Nextel and Samsung handsets and the Motorola Razr are especially vulnerable to software downloads that activate their microphones, said James Atkinson, a counter-surveillance consultant who has worked closely with government agencies. “They can be remotely accessed and made to transmit room audio all the time,” he said. “You can do that without having physical access to the phone.”

Read moreFBI Taps Cell Phone Microphone As Surveillance Tool

Beyond Treason

Beyond Treason investigates causes of Gulf War Illness and continuing deaths of gulf war veterans. Beyond Treason outlines: – exposure to depleted uranium munitions used on the battlefield. – chemical and biological exposures. – experimental vaccines given.

Statistics show that 250,000 troops are now permanently disabled, 15,000 troops are dead and over 425,000 are ill and slowly dying.

Beyond Treason 100 minute documentary presents comprehensive and compelling documentation from United States Government archives of a massive cover-up lasting over two generations.
Over 70,000 deaths, and over 1 million disabilities among American soldiers attributed to Iraq Wars says U.S. government data

The video has been removed before. Let me know if this happens again.

Former British Foreign Secretary Robin Cook: ‘Al-Qaida, Literally “The Database”, Was Originally The Computer File Of The Thousands Of Mujahideen Who Were Recruited And Trained With Help From The CIA To Defeat The Russians’

At around 2:20 pm, on 6 August 2005, whilst walking down Ben Stack in Sutherland, Scotland, Cook suddenly suffered a severe heart attack, collapsed and lost consciousness.
(Source: Wikipedia)

CIA Whistleblower talks about Heart Attack gun

YouTube


The struggle against terrorism cannot be won by military means (Guardian, by Robin Cook July 8, 2005):

In the absence of anyone else owning up to yesterday’s crimes, we will be subjected to a spate of articles analysing the threat of militant Islam. Ironically they will fall in the same week that we recall the tenth anniversary of the massacre at Srebrenica, when the powerful nations of Europe failed to protect 8,000 Muslims from being annihilated in the worst terrorist act in Europe of the past generation.Osama bin Laden is no more a true representative of Islam than General Mladic, who commanded the Serbian forces, could be held up as an example of Christianity. After all, it is written in the Qur’an that we were made into different peoples not that we might despise each other, but that we might understand each other.

Bin Laden was, though, a product of a monumental miscalculation by western security agencies. Throughout the 80s he was armed by the CIA and funded by the Saudis to wage jihad against the Russian occupation of Afghanistan. Al-Qaida, literally “the database”, was originally the computer file of the thousands of mujahideen who were recruited and trained with help from the CIA to defeat the Russians. Inexplicably, and with disastrous consequences, it never appears to have occurred to Washington that once Russia was out of the way, Bin Laden’s organisation would turn its attention to the west.

The danger now is that the west’s current response to the terrorist threat compounds that original error. So long as the struggle against terrorism is conceived as a war that can be won by military means, it is doomed to fail. The more the west emphasises confrontation, the more it silences moderate voices in the Muslim world who want to speak up for cooperation. Success will only come from isolating the terrorists and denying them support, funds and recruits, which means focusing more on our common ground with the Muslim world than on what divides us.

More on Al-CIAda:

“The truth is, there is no Islamic army or terrorist group called Al Qaeda. And any informed intelligence officer knows this. But there is a propaganda campaign to make the public believe in the presence of an identified entity representing the ‘devil’ only in order to drive the TV watcher to accept a unified international leadership for a war against terrorism. The country behind this propaganda is the US.”
– Robin Cook, Former British Foreign Secretary

Al Qaeda Doesn’t Exist or How The US Created Al Qaeda (Documentary)

BBC: Al-Qaeda Does Not Exist

10-Year U.S. Strategic Plan For Detention Camps Revives Proposals From Oliver North

Editor’s Note: A recently announced contract for a Halliburton subsidiary to build immigrant detention facilities is part of a longer-term Homeland Security plan titled ENDGAME, which sets as its goal the removal of “all removable aliens” and “potential terrorists.” Scott is author of “Drugs, Oil, and War: The United States in Afghanistan, Colombia, and Indochina” (Rowman & Littlefield, 2003). He is completing a book on “The Road to 9/11.” Visit his Web site at http://www.peterdalescott.net.

The Halliburton subsidiary KBR (formerly Brown and Root) announced on Jan. 24 that it had been awarded a $385 million contingency contract by the Department of Homeland Security to build detention camps. Two weeks later, on Feb. 6, Homeland Security Secretary Michael Chertoff announced that the Fiscal Year 2007 federal budget would allocate over $400 million to add 6,700 additional detention beds (an increase of 32 percent over 2006). This $400 million allocation is more than a four-fold increase over the FY 2006 budget, which provided only $90 million for the same purpose.

Both the contract and the budget allocation are in partial fulfillment of an ambitious 10-year Homeland Security strategic plan, code-named ENDGAME, authorized in 2003. According to a 49-page Homeland Security document on the plan, ENDGAME expands “a mission first articulated in the Alien and Sedition Acts of 1798.” Its goal is the capability to “remove all removable aliens,” including “illegal economic migrants, aliens who have committed criminal acts, asylum-seekers (required to be retained by law) or potential terrorists.”

There is no question that the Bush administration is under considerable political pressure to increase the detentions of illegal immigrants, especially from across the Mexican border. Confrontations along the border are increasingly violent, often involving the drug traffic.

Read more10-Year U.S. Strategic Plan For Detention Camps Revives Proposals From Oliver North