The Trillion-Dollar Conspiracy (40 page)

BOOK: The Trillion-Dollar Conspiracy
13.59Mb size Format: txt, pdf, ePub
ads

Yet there was still controversy with the bill. After Iowa Republican representative Steve King failed in his effort to add an amendment specifying that pedophiles could not use the law as protection of their conduct, the bill was derisively nicknamed “The Pedophile Protection Act.” South Carolina senator Jim DeMint believed the bill was a “dangerous step” toward thought crimes and serves “as a warning to people not to speak out too loudly about their religious views.” How could legislation that has prompted so much controversy and debate sail through Congress?

The answer is simple. It was attached to the $680 billion defense appropriations bill. Congress had the choice of voting for expanding the dubious hate crime laws or voting against funding the nation’s military personnel.

“The inclusion of the controversial language of the hate crimes legislation, which is unrelated to our national defense, is deeply troubling,” said Alabama senator Jeff Sessions, one of the Republicans who voted against the bill.

DARPA

 

E
VADING CONFINEMENT IN A
military-run FEMA camp or hoping for assistance from an Oath Keeper may be the least of a modern American’s worries. The government is now intruding into the public’s lives on a wide scale. In any police state, surveillance of the population is paramount.

In late 2002, it was revealed that the army’s Intelligence and Security Command (INSCOM) in Fort Belvoir, Virginia, planned to use high-powered computers to secretly search the citizenry’s e-mail messages, credit card purchases, telephone records, and bank statements on the chance that one might be associated, or sympathetic to, terrorists. Meanwhile, the Pentagon’s new Office of Information Awareness (OIA) was to create a “vast centralized database” filled with information on the minutest details of citizens’ private lives.

Opponents of this plan were incensed at the appointment of John Poindexter, a former national security adviser and vice admiral, as the head of the OIA. Poindexter had previously been involved in the Iran-Contra scandal during the Reagan administration, which involved the illegal sale of weapons to Iran and using the profits to fund the CIA-backed Contra army fighting in Nicaragua, all done in defiance of Congress. Poindexter lost his national security adviser job in 1990 after being convicted of lying to Congress, defrauding the government, and destroying evidence. But from 1996 to 2003, as vice president of Syntek Technologies, Poindexter worked with the Defense Advanced Research Projects Agency (DARPA) to develop Genoa, a powerful search engine and information-harvesting program. In 2002 and 2003, he served as director of the DARPA Information Awareness Office (IAO), tasked with creating all-encompassing electronic and computer surveillance—total information awareness—in the war on terrorism. But after a public outcry over the possibility that such a mass surveillance program could be turned on honest Americans, Congress stopped IAO funding and Poindexter lost his job. Researchers believe that some of the IAO programs continue to operate today under different names and other funding.

Christopher H. Pyle, a teacher of constitutional law and civil liberties at Mount Holyoke College, wrote, “That law enforcement agencies would search for terrorists makes sense. Terrorists are criminals. But why the Army? It is a criminal offense for Army personnel to become directly involved in civilian law enforcement [the Posse Comitatus Act]. Are they seeking to identify anti-war demonstrators whom they harassed in the 1960s? Are they getting ready to round up more civilians for detention without trial, as they did to Japanese Americans during World War II? Is counterterrorism becoming the sort of investigative obsession that anti-Communism was in the 1950s and 1960s, with all the bureaucratic excesses and abuses that entailed? This isn’t the first time that the military has slipped the bounds of law to spy on civilians. In the late 1960s, it secretly gathered personal information on more than a million law-abiding Americans in a misguided effort to quell anti-war demonstrations, predict riots and discredit protesters. I know because in 1970, as a former captain in Army intelligence, I disclosed the existence of that program.”

While writing two book-length reports on army spying for Senator Sam Ervin’s Subcommittee on Constitutional Rights, Pyle was struck by the harm that could be done to the nation if the government ever gained untraceable access to the financial records and private correspondences of its critics. “Army intelligence was nowhere near as bad as the FBI [with its infamous COINTELPRO], but it responded to my criticisms by putting me on Nixon’s ‘enemies list,’ which meant a punitive tax audit. It also tried to monitor my mail and prevent me from testifying before Congress by spreading false stories that I had fathered illegitimate children. I often wondered what the intelligence community could do to people like me if it really became efficient.”

Today, national security programs are gaining that efficiency, thanks to the proliferation of computer technology. In his book
The Puzzle Palace,
author James Bamford wrote about two new locations for National Security Agency (NSA) databases—one in Utah and the other in Texas. Apparently lacking space at Fort Meade, Maryland, NSA headquarters needed new space to house “trillions of phone calls, e-mail messages, and data trails: Web searches, parking receipts, bookstore visits, and other digital ‘pocket litter.’

“Unlike the British government, which, to its great credit, allowed public debate on the idea of a central data bank, the NSA obtained the full cooperation of much of the American telecom industry in utmost secrecy after September 11. For example, the agency built secret rooms in AT&T’s major switching facilities where duplicate copies of all data are diverted, screened for key names and words by computers, and then transmitted on to the agency for analysis. Thus, these new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America’s version of [a] ‘big brother database,’” wrote Bamford.

Bamford was skeptical as to whether the NSA’s surveillance would even benefit the country in any ways. “Based on the NSA’s history of often being on the wrong end of a surprise and a tendency to mistakenly get the country into, rather than out of, wars, it seems to have a rather disastrous cost-benefit ratio. Were it a corporation, it would likely have gone belly-up years ago,” said Bamford. “The September 11 attacks are a case in point. For more than a year and a half the NSA was eavesdropping on two of the lead hijackers, knowing they had been sent by bin Laden, while they were in the US preparing for the attacks. The terrorists even chose as their command center a motel in Laurel, Maryland, almost within eyesight of the [NSA] director’s office. Yet the agency never once sought an easy-to-obtain FISA warrant to pinpoint their locations, or even informed the CIA or FBI of their presence.”

Although more thoughtful and aware citizens are concerned enough with the potential misuse of the nationwide electronic surveillance systems increasingly coming online, most are blissfully unaware that these systems, whether operated by military or civilian intelligence agencies, are commanded at the highest levels of the federal government, which have been demonstrated in this work to be filled with globalists seeking to control the world and its population.

ELECTRONIC SURVEILLANCE

 

T
HE POTENTIAL FOR
“B
IG
B
ROTHER
” surveillance has been part of American life for decades. As far back as 1975, Senator Frank Church performed a study of the National Security Agency (NSA) and warned Congress, “That [the NSA] capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter. There would be no place to hide.” It is ironic that Bush bypassed the 1978 Foreign Intelligence Surveillance Act (FISA), which was passed after President Nixon used the NSA to spy domestically on political enemies.

The PATRIOT Act, which clearly abridges many American rights, was built upon the little-known FISA bill, which cracked the door open to secret government searches. FISA was passed in the contingencies of the cold war and in the wake of revelations of abuse in surveillance by the FBI and CIA.

The FISA law created the secret federal Foreign Intelligence Surveillance Court (FISC), which meets in total secrecy to routinely approve covert surveillances on non-Americans by intelligence agencies. All applications to the court must be approved by the attorney general. Either federal prosecutors are extremely efficient and effective in their work or the federal judges (originally numbering seven but expanded to eleven by the PATRIOT Act) who make up this secret court are not picky about the Constitution because out of the some twelve thousand requests for secret surveillances and physical searches made during the first twenty-three years of the FISC, not one application was denied until four in 2003.

Why the sudden scrutiny of surveillance requests to the FISC? This was due to provisions of the PATRIOT Act, drafted by the Bush administration and secretly fine-tuned by the House and Senate leadership, that expanded FISA to include Americans.

Although FISA legislation was meant to impose limits and a review process upon warrantless surveillance and searches conducted for “national security” purposes, the current use of the FISA process, now expanded through the PATRIOT Act and its revisions, has resulted in the erosion of numerous constitutional rights and basic legal procedures traced back to the Magna Carta.

Church’s warning that the NSA’s surveillance ability could be turned on Americans became reality thirty years later when President George W. Bush ordered the NSA to monitor Americans without seeking warrants from the special intelligence court (FISC) or any other court. It was also revealed in 2006 that the NSA had already been secretly collecting phone call records of millions of Americans using data from AT&T, Verizon, and BellSouth, the three largest companies in the United States. General Michael Hayden, appointed director of the CIA in 2006, oversaw the program during his tenure heading the NSA.

During the Bush years, wiretapping and surveillance became highly politicized after the
New York Times
disclosed to the public news of a secret electronic monitoring program that had swept up information on American citizens for years without court approval. Controversy grew in early 2006 when it was reported that President Bush had instructed the NSA to electronically monitor Americans for signs of terrorism.

It is interesting to note that elements of the PATRIOT Act existed even before George W. Bush came into office. One feature of the PATRIOT Act that was approved in 2001 had actually been introduced (yet failed to pass) in 1998.

During the Clinton administration, there was a brief furor over proposed new federal banking regulations that would require all banks to report to the government any large deposits, withdrawals, or unusual activity from the banking public. Euphemistically called the “Know Your Customer” program, it heralded a new era where law-abiding citizens might have to defend their financial matters before government agents.

Under the program, banks would be required to create a profile of each customer and report any deviation from the profile to the feds. For example, if a person sold an unneeded car and then deposited the cash into his bank account, the banks would report this to the government. The bank computer would flag the transaction because the money from the car sale was an unusually large deposit based on the person’s previous deposit record. Federal authorities would be notified and soon agents would be sent to interrogate the customer on the chance he or she might be a drug dealer or terrorist.

In 1998, Representative Ron Paul planned to introduce legislation to stop this intrusive program, but an irate citizenry saved him the trouble. The schemers behind the proposal, the Federal Deposit Insurance Corp, the IRS, and other agencies, quickly backed off. Paul said quite prophetically, “Somehow, though, I imagine such action will not stop them, only slow them down.”

Paul was right. Almost all of the provisions of the Know Your Customer program can be found in the PATRIOT Act.

This legislation can undermine the general public’s ability to carry out their daily lives. It can red-flag your bank account if you deposit or withdraw a certain amount of money and this amount keeps changing. Once the government was notified if there was more than $10,000 involved. By 2010, this amount had dropped to $5,000. In early 2006, Rhode Island retired schoolteacher Walter Soehnge and his wife tried to pay down an excessive credit card bill with a JC Penney MasterCard. They sent in a check for $6,500 to pay down their debt. When the Soehnges found the money had not been credited to their account, they began to make inquiries. They were told that when a payment is much larger than usual, Homeland Security must be notified and that the money is held until a threat assessment is made.

The couple’s money was eventually freed, although they never found out how making a large credit card payment posed a threat to national security.

“If it can happen to me, it can happen to others,” Soehnge said.

Even after Congress revised the PATRIOT Act in 2006, portions of the act still concerned both libertarians and some congressmen. Representative C. L. “Butch” Otter of Idaho was one of the three Republicans who found the entire act potentially unconstitutional from the onset. One section made it illegal for one citizen to tell another that the authorities were conducting searches of his property or business. “Section 215 authorizes the FBI to acquire any business records whatsoever by order of a secret US Court. The recipient of such a search order is forbidden from telling any person that he has received such a request. This is a violation of the First Amendment right to free speech and the Fourth Amendment protection of private property,” commented Otter. “[S]ome of these provisions place more power in the hands of law enforcement than our Founding Fathers could have dreamt and severely compromises the civil liberties of law-abiding Americans. This bill, while crafted with good intentions, is rife with constitutional infringements I could not support.”

BOOK: The Trillion-Dollar Conspiracy
13.59Mb size Format: txt, pdf, ePub
ads

Other books

Hell's Heart by John Jackson Miller
To Catch a Queen by Shanna Swendson
With the Enemy by Eva Gray
Devil's Paw (Imp Book 4) by Dunbar, Debra
Borrow-A-Bridesmaid by Anne Wagener
Three Classic Thrillers by John Grisham
The Anonymous Bride by Vickie Mcdonough