I’ve Got a Secret – WIF Military Bases

Leave a comment

Super “Secret”

Military Bases

World militaries have a strange function in society these days, having to be both present and visible yet secretive and under the radar in many regards. We all know the military exists, but what they do is often so under wraps they’ll deny doing it even when people can see them doing it. Case in point: Area 51. The Nevada base is highly classified and the CIA only admitted the base was a real thing in 2013, despite the fact people could literally go there and see it. So we take it with a grain of salt these days that the military, in the US and abroad, will engage in not just clandestine missions, but build bases that the rest of us aren’t supposed to know about. Here are 10 of the most interesting.

10. Pine Gap

For a secret base, an awful lot of people know about the joint US and Australian base called Pine Gap. That’s mostly thanks to the fact there’s an actual TV show called Pine Gap. Developed in the 1960s as a joint operation between the two countries and given the ambiguously vague name “Joint Defense Space Research Facility,” Pine Gap was built in the Australian Outback away from prying eyes.

In the ‘60s, the base was used to spy on Soviet missiles and these days it still has control over a number of spy satellites. As far as people know that’s what still goes on but it doesn’t get much more clear than that. Even former Australian Prime Ministers weren’t informed about what happens on the base.

Edward Snowden’s data leak in 2013 included information on Pine Gap and how the base and its satellite network helped guide drone strikes in Iraq and elsewhere during the War on Terror. Additionally, it has been a hub of surveillance, spying on targets in Asia.

That’s what we know about Pine Gap today, and odds are there’s plenty that we still don’t know.

9. Porton Down

Across the pond, the British secret base known officially as the Defense Science and Technology Laboratory is located at Porton Down. There are other facilities on the site, even commercial science labs, but it is the DSTL that interested most people. Formed back in 1916 as the War Department Experimental Station, this was where chemical weapons were tested.

In modern times the site still does research into chemical weapons but also diseases. The site researches things like ebola and anthrax as well as deadly nerve agents. Officially, according to the British government, Porton Down does no research into chemical or biological weapons anymore. Those British programs were said to have ended in the 1950s. That said, as a countermeasure to other people developing chemical and biological weapons, the facility does develop them in small quantities for research purposes in an effort to counteract those weapons.

8. Area 6

Everyone knows about Area 51 but not everyone knows that it isn’t just a cool, random number and there are a multitude of other “capital A” Areas in Nevada as well, most of which were nuclear test sites back in the day. You can find a quick breakdown of Areas 1 through 30 on Wikipedia, even. But while this breakdown is fairly limited in scope and just lists every single site as having been the location of nuclear tests back in the day, there’s more to it than all that. For instance, there’s Area 6.

Located just 12 miles from the infamous Area 51, Area 6 is home to a mysterious landing strip visible on Google Earth that indicates there’s obviously more than just nuclear tests from the 1950s going on here.  A spokesman from the National Nuclear Security Administration said that the DOD and DHS use the area to test sensors. That means conducting drone tests, but that’s about the extent of what is publicly known about the facility.

7. Dugway Proving Ground

Spanning 800,000 acres of Utah desert, an area the size of Rhode Island, the Dugway Proving Grounds is as massive as it is mysterious. The facility dates back to 1942 when it was established to test biological and chemical weapons. The stated purpose of the facility is essentially the same as that of Porton Down in the UK. They test chemical and biological weapons to develop countermeasures against them.

The site is also used by the US Army Reserve and National Guard as a training grounds which is part of the reason it’s so enormous, and the US Air Force conducts test flights there as well.

Those who lean more towards the outlandish think there’s a lot more going on at Dugway and it’s been dubbed, at least in some circles, the New Area 51. The base opened its doors to the media for the first time in 2018 to potentially quell some of the rumors and conspiracy theories, but obviously the reveal was very controlled and only a small portion of the massive base was revealed.

6. Kapustin Yar

If Russia has an Area 51, this is it. Both in terms of alien conspiracy theories and in terms of secrecy. This was their most top secret air base and the place that Laika, the dog that became the first living thing ever to orbit the planet, was launched from. On the weirder side, former employees have alleged that there are underground labs where alien’ autopsies occur and alien craft are tested. To get some idea of how serious this alien business is, here’s a New York Times article about an alien crash that occurred near the base. Does that mean an alien ship crashed there? No. But someone sure reported that one did.

The existence of the site wasn’t even confirmed by the Soviet government until 1983, decades after the site had been built. It had been used not just for rocket launches and test flights but  low-yield nuclear tests. Most of the facility is located underground and to this day no one outside of those involved with the base really knows what goes on there or even how much base is located under the ground.

5. South China Sea Bases

Located mostly in the Spratley Islands and the Paracel Islands in the South China Sea, the Chinese government engaged in a seriously impressive effort of dredging and island building, constructing 3,200 acres of new land. There are numerous facilities spread across the area used for radar, missile launches, and helicopters. More than that, they announced plans in 2016 to build an underwater base 10,000 feet below the surface. Why announce something like that if it’s a secret base? Why, indeed.

Those who fly too close to the bases are warned to leave immediately by Chinese forces so the precise goings-on at the bases are really just left to speculation and what the government is willing to tell the world since there is no way to get to them as isolated as they are. In fact, the nature of the bases is so mysterious it’s not fully known whether they are strictly military, they’re for controlling trade routes, or even if they’re being used to control natural gas and oil rights. Whatever their ultimate purpose, they are well-armed with surface-to-air missiles and ground-launched missile systems.

4. HAARP

Few military bases have reached the heights of conspiracy theories around them as much as the High Frequency Active Auroral Frequency Program, or HAARP has. In fact, this base may even outdo Area 51 for sheer volume of conspiracies about the nature of what goes on there, and it’s technically not even a military base anymore.

Located in Alaska, HAARP was an ionospheric research facility run jointly by the Air Force, the Navy, the University of Alaska Fairbanks and everyone’s favorite hub of conspiracy fodder, DARPA. It’s that last one that probably made so many people start to question what was happening at HAARP.

The stated goal of HAARP was to research ways to improve communication and surveillance technology by analyzing the ionosphere. One of the main conspiracies about the facility is that it was designed to weaponize the weather. Hugo Chavez once accused the facility of causing the 2010 Haiti earthquake.

Other conspiracy theories claim that the facility has the capability to burn the sky, cause floods, hurricanes, and droughts. It’s also been accused of developing mind control technology, chronic fatigue syndrome, Gulf War Syndrome, causing plane crashes and power outages. It can flip the Earth’s poles and even trap human souls.

As goofy as these conspiracies may sound, people take them seriously. That last one about trapping souls was a claim made by two men who were arrested on drug charges and found to be plotting a massive terrorist attack on the facility in 2016. The men had numerous weapons and thousands of rounds of ammo they were going to use because God told them to free the trapped souls at HAARP.

3. Dulce Base

The moment people learn about a base that’s secret, the first conspiracy to be floated about it is that it houses aliens. Welcome to New Mexico’s Dulce base, another hub of extraterrestrial involvement.

The town the base is named for, Dulce, has a population of just over 2,700. Word is they don’t even have a traffic light in town, it’s so small. But the base isn’t in the town. It’s under the ground. A New Mexico businessman blew the lid off of the alien conspiracy back in 1979, believing he had been intercepting alien communications around the same time a former state trooper began documenting animal mutilations in the area.

A former explosive engineer with security clearance said he helped in the construction of the facility and while he was there, he witnessed a straight up battle between humans and aliens, so take from that what you will. The town of Dulce has been home to numerous UFO sightings over the years as well.

As for the official word from the US government on Dulce, they don’t have one. Dulce doesn’t exist in any official or even unofficial capacity. No one has ever proven there’s a base anywhere in the area so if it exists, it’s incredibly well hidden.

2. Raven Rock Mountain

Known as Site R, the Raven Rock Mountain Complex is a poorly kept secret located in Pennsylvania and basically where control of the military would head in the event of nuclear war. They call it the Underground Pentagon and it was built to keep the whole machine running below ground if everything above ground was destroyed.

The facility is dug out of a mountain, a half mile in and a half mile down. It has a power plant, water reservoirs, three-story buildings carved into the rock, and room for 2,000. There’s infrastructure for having its own police and fire departments as well as a cafeteria to serve everyone. Essentially it’s a city inside a mountain and it’s still the go to location for high-ranking officials should the world fall into chaos.

The facility runs all day, every day and you have to assume that there’s a lot going on no one knows about since it’s planned to be the center of US power in the event of catastrophe. The existence is far from a secret though and it’s so well known you can even visit the facility in the world of Fallout video games.

1. Mount Yamantau and Mezhgorye

Deep in the Ural Mountains of Russia you’ll find Mount Yamantau which the US government is pretty sure is home to a top secret Russian base, equivalent to Cheyenne Mountain. Surveillance and eyewitnesses in the 1990s attested to a massive undertaking in the mountains that had apparently started during the reign of Brezhnev.

The official explanation from Russia about what goes on at Yamantau is about as unhelpful as it gets. They have at different times claimed it’s just a mining site, a storage facility for food or treasure, or a place for Russian officials to wait out a nuclear apocalypse.

A hop, skip, and a jump from Yamantau is the town of Mezhgorye, which is a closed city. You can’t visit this place unless the government gives you permission. That’s just as well since it doesn’t exist on maps, even though 17,000 people live there according to a census. But why would you take a census of a secret town? Military battalions are stationed there and between it and Yamantau there are supposed to be a whole underground facility and nuclear test sites in the area.


I’ve Got a Secret

WIF Military Bases

THE RETURN TRIP – Episode 133

Leave a comment

THE RETURN TRIP – Episode 133

Hey buddy, you’re out in real space, you better be prepared for the unknown…

Floating In Unknown by Andrea Banjac

— With the condition of Braden King weighing him down, the well-being of the Space Family McKinney both here and on Mars occupying its regular space, and his unattended new relationship with Francine Bouchette bouncing around the lonely corners of his heart, Roy is forced to put those on back burners to deal with the not-so-clear and present realities that reside in that yawning dark space between the Moon and the Red Planet.

There at the launch facility he can speak directly to Cmdr. Rick Stanley, which is a luxury, considering the fractional parsecs of unknown-ities that surround the situation, “How are you doing young Rick?”

“We are just about ready to hit the hay for a month or so. Without a night and day as guideposts, it has been hard to get any rest at all.”

“I hate to the bearer of bad news, but we will need to put-off your long summer’s nap for a few days; I have a couple of things I need you to do.”

“As long as we get paid overtime… sure thing Boss!”

“I have a meeting with Global 9 Insurance and I’ll see what they cover, but for now I need for you change your heading, enough to take you a couple thousand miles to the right hand side of your flight plan and stick to that course until I tell you to go back to the original.”

“Okay?” The New Mayflower space pilot complies, taking mere seconds to do so. “Are we trying to lose that nagging echo? I know it cannot keep up with our new propulsion system?”

“Good. Now if you check your data banks, you will find a .pdf file named Afridi. Please download it now.”

“Afraid-y? We ain’t scared of nothing out here, ‘cept asteroids and hemorrhoids.”

“a-f-r-i-d-i and do not sit on this. I want you to hotwire it into the circuits of that
bucket of titanium you are driving.”

“This looks like a combination of an energy damper and electron scrambler. Is this a weapon or a shield and why are you being cryptic?” These defensive alterations have the rescue mission captain wondering. “And what about the bogey we’re trying to shake?”

Roy wants Rick to stick to the basics, so as not to keep them awake for the final two months of their mission. “And one more thing, tell your buddy AL to wake you guys up if he senses anything else manmade out there.”

AL is the generic, but contiguously used name for the on-board annoyingly expressive interactive computer systems that are built-in to every NASA spacecraft.

“We have AL’s volume muted. Someone, who best remains nameless, decided to give him a sense of humor.”

“Don’t blame it on anyone here Rick. I think AL is doing his own evolutionary augmentations; can you blame him after losing his brother the Chronicle. They are all interconnected you know.””

“You talk about AL like he is a life form.”

“Hey buddy, you’re out in real space, you better be prepared for the unknown. Is an evolving computer so unbelievable?  No it’s not, so work with AL… and keep your powder dry.”


THE RETURN TRIP

Artificial Intelligence by Mehau Kulyk

Episode 133


page 125 + 126

THE RETURN TRIP – Episode 124

Leave a comment

THE RETURN TRIP – Episode 124

you have seen what these people are capable of, so do not underestimate their reach or cunning

Cunning by Skia on DeviantArt.com

“In opening, my only question for you is, did you recognize the man who shot you?” asks the Man in Black

That is a stupid question from someone who should already know the answer, considering that the hail of bullets sailed through the closed door of the lavatory, while the victim was seated on the stainless steel pedestal.

“No I do not.”

Related image“Was there anyone on your flight who looked familiar to you, suspicious or otherwise?”

“I did recognize that pop singer my daughters are so crazy for, the one that has all those tattoos…”

When a bad-guy can board an international flight with a weapon and a covert agency of the USA cannot identify him, it is an insecure feeling.

It is obvious that neither Afridi nor his family can be of any help, at least for the Man in Black. He motions to the other non-family interested party, who has her own set of questions.

“My name is Sandi Gilbert, a close associate of Roy Crippen, here at Lovell and at Galveston and we would like for you to tell us about the revelation you flew all this way to share.”

Lieutenant II Gilbert has been leading the Incident Audit Team {Space Colony 1.20.2030} from the beginning and the older sister of KHST’s NASA Expert Randi Gilbert. All the evidence supporting the accidental destruction of the Mars orbiting Colony has been peeling away, one pungent layer at a time. Unlike the Space Shuttle Challenger that exploded on a frosty Florida morning in 1986 or Shuttle Columbia’s re-entry miscalculation in 2003, both of which happened with wide-eyed witnesses in Earth’s atmosphere Space Colony 1 disappeared into the abyss of space, without Earthly observation. NASA has been out of the disaster business since the funding drought began in 2009 and the Mars mission inception a decade ago.

Aldona Afridi is shell-shocked, both literally and figuratively. What an odd path:

  • He had successfully defected from his Far East homeland, at great risk to life and limb
  • Navigated The Orient Express all the way to its Istanbul railhead
  • Made few friends and many enemies along the way
  • Tried and did to warn NASA about a space probe with bad intent
  • Got a ride out of the Near East for him and his family, for safe asylum in the United States only to be shot to pieces while using a Turkish Airlines toilet

Not a bad month’s work for someone who isn’t employed by anyone in particular.

“You may want to check the flight path of Sang-Ashi. It was never intended to continue on out of the solar system. I believe it used Mars gravity to slingshot itself back in the direction of Earth.”

“I’m still not sure what that has to do with NASA or you ignoring a global manhunt to speak to someone,” Lt. Gilbert is trying to blend compassion with curiosity.

“You have a rescue mission underway, do you not?”

“The New Mayflower is on its way; yes that is no secret?”

The New Mayflower

The New Mayflower

NASA

“You would be well advised to compare the flight paths of your Mayflower and the Sang-Ashi probe.”

“NASA can do that Mr. Afridi, especially since a security breach was uncovered in the Mission protocols.”

“Then you have seen what these people are capable of. Do not underestimate their reach or cunning.”

“I will pass on your concerns.” Sandi Gilbert removes her flight cap to add, “Please excuse me for saying so, but whoever “they” are, have been dogging your ass ever since you left Talibanistan.”

“Thank you for noticing… now can I see my family?”

— Some lessons can only be learned the hard way and for NASA, a non-warring agency of peaceful exploration, it is difficult to shift mental philosophies mid-mission.


THE RETURN TRIP

Episode 124


pages 118 + 119

THE RETURN TRIP – Episode 46

Leave a comment

THE RETURN TRIP – Episode 46

CHAPTER THREE

 Up A Creek

…like I was saying, the Korean Sang-Ashi Probe is not an ordinary satellite…

whistleblower2

Whistleblower © Ben Jennings/Cartoon Movement

 “I think we have reestablished voice-com on the secure channel, listen,” Braden King carries it over to the intercom.

Colony Control

Colony Control

“Mission Control Galveston, can you hear me please?”

“Sam must be trying out a new accent,” comments Roy.

“Is this another of your jokes Sam?” Braden is sorting things out.

Aldona Afridi is just as, if not more confused. Is this the way Americans communicate on their space missions?

“I need to speak to a Roy Crippen, the Mission Director.”

The man himself answers, “This is he and what are you doing on this secure band?” He is firm, yet yielding.

Sang-Ashi Probe“My name is Aldona Afridi. I am the Chief Ordinance and Systems Engineer for the Sang-Ashi Deep Space Probe. I have defected; I am in Turkey in order to give you vital information.”

Roy is holding back, waiting for anyone else with a clue to jump in. He whispers, “I seem to remember hearing that name in connection to Korean Space. Isn’t that probe passing by Mars soon … and could this be the cause of our communication gap with Mars, Braden? Maybe they are doing some spying.”

“No telling Crip, this is strange, but yes that Korean thing is out there somewhere, maybe it’s lost. We are not seeing it.”

“You have obviously gone to some effort to speak to me, so for now, I will listen to what you have to say.”

“Very well, like I was saying, the Korean Sang Ashi Probe is not an ordinary satellite, in the codessense that it has its own defense laser ordinance. It is far more powerful than it needs to be, but I was forced to design it as such.”

“Why does a space probe need defensive systems?” wonders Roy aloud.

“They told me it was for warding off asteroids and meteors; not an unusual reaction for the paranoid Koreans. But I start to suspect that they had something else in mind, when they ask me for the manual override codes for the laser. I refuse and that is why my family and I escape to Turkey and precisely why I need to warn you.”


THE RETURN TRIP

Image result for warning gif

Episode 46


page 44

THE RETURN TRIP – Episode 42

Leave a comment

THE RETURN TRIP – Episode 42

May God bless everyone,” is all Aldona can say, in this all-hands-on-deck, everyone-for-themselves, Turkish Delight  free-for-all.

free-for-all-001

With the trouble heading to the floor above, Afridi leaps into action, “We are leaving this mosque, Allah be damned! They will not leave until they have found me.”

Fatima stares at the Sultan Ahmet Mosque ceiling, where the Deming and the staff are/were sleeping.

May God bless everyone,” is all Aldona can say, in this all-hands-on-deck, everyone-for-themselves, Turkish Delight,  free-for-all.

Fatima Alfridi stares at the Sultan Ahmet Mosque ceiling, where the Deming and the staff are/were sleeping.

“May God bless their souls,” is all Aldona can say, in this free-for-all, all-hands-on-deck, everyone-for-themselves shake-up.

His timing is good, in this case only fair, considering his run of uncanny luck. Upon seeing that the assailants failed to leave a “trailer” to protect the rear; the Afridis show exceptional speed in streaking out the back door, one after the other, to parts unknown.

Parts unknown are a sure thing. Had they waited for protection from US official guard, they would be facing no future at all. Perhaps if they had the powers-that-be listened and taken his story at face value, both they and Afridi would be winging their way to Galveston Texas.

So, without concrete direction and armed only with the Ashtaar business card {the key toabdullah-ashtaar-001 Istanbul}, these four hunted people, throw caution to the wind and head for much needed anonymity. “Us against the world” is not a strange feeling to Afridi, though one he thought would vanish once they reached the American Consulate. But they did not make it and the Sultan Ahmet Mosque is now awash in conflict, innocent participants in a fight for now distant outer space.

Amid the smattering of near-distant gunfire and the rushing stream of sirens, a Mehmet Ali Erim driven something-or-other joins the chaotic scene, Mehmet having worried about Afridi’s safety. From out of the shadows Afridi cries out, “Mehmet, Mehmet,” jumps in front of his taxi, lest he not notice him. Taxi drivers are not notoriously good drivers and the man’s actions cause him to panic, depressing the accelerator instead of the brake. With little time to react, Afridi is thrown up onto the hood.

“Are you mad man? There are better ways to hail a cab than this,” helping the dazed man off turkish-taxi-001his front windshield.

“Aldona!!!” Fatima and the girls rush to the scene.

Mehmet begins to piece things together, “My friend from the train station. Hey, did not things work out with the Americans?”

“We had to leave—THEY have found me.”

“The Americans? You found them. I am confused. I think they believe you.”

“There are others who want me dead.”


THE RETURN TRIP

Related image

Episode 42


page 40

THE RETURN TRIP – Episode 41

Leave a comment

THE RETURN TRIP – Episode 41

…A sole window allows Afridi to peer into the Turkish night. His wrist-digital device flashes 12:00, leaving him with at least five more hours to fret.

turkish-nights-001

Turkey Night Wallpaper (Istanbul) by alisarikaya

And so it is that the Afridi’s are a family unit again, after a harrowing month on the run. At least they have each other, away from evil powers bent on jealous destruction.

Even still, Aldona Afridi will not rest easy.

Back with his three dear ones, he continues his tirade in the form of a letter. He struggles to find the words camel-to-water-001that will open up the correct ears & eyes. If only they would come to their senses.

Points be made or not, Afridi decides to let it go, roll with the flow, having done everything in his power to express his concerns about Space Colony 1. He recites a Talibanistani Proverb: ‘You can lead a camel to water— but he won’t stop drinking.’ It has little to do with his quandary, but he does thirst for swift resolution.

Now would be a convenient time to rest his weary soul, post-New Orient Express excursion aside, he finds a deep sleep elusive. In its stead, he is content holding his bride close. His mind strays to several options and back, unable to resolve a single one of them.

Image result for flashing 12:00 clock gifSo he retracts is arm, as not wake anyone and he inches off the bed. A sole window allows him to peer into the Turkish night. His wrist-digital device flashes 12:00, leaving him with at least five more hours to fret.

After watching a steady stream of headlights at this early hour, wondering who may be out this late/early, two very long speeding black cars come to a halt outside the mosques gates. His initial reaction is one of relief, anticipating the arrival of those in authority; the Ambassador and the CIA are ahead of schedule!

He fumbles in the dark to find the clothes given him by those nice folks that allowed him to get this far. He efforts not to disturb the others, running a comb through his untidy black hair to look as professional as possible.

The intent of the visitors at the gate seems curious though. If they have peaceful plans, their actions are quite hasty.

An explosion, of sufficient intensity to bring down the perimeter fencing of the Muslim place of prayer, lays waste to anything within 30 yards.

Before the smoke can clear, six armed men sprint to the buildings many steps. Afridi warns his family, “They must be after me…….get dressed quickly, children please be quiet as a mouse! They must believe this room is empty. He ushers one and all into a hidden nook, behind a false curtain.

Sure enough, those cars did not carry peaceful men of diplomacy. Automatic weapons spray the room without respect to its occupants or their business. Once determined empty, it is on to the next and the next.

6 pairs of feet scamper across the marble floors, then up the granite stairs.

With the trouble heading to the floor above, Afridi leaps into action, “We are leaving this mosque, Allah be damned! Those men will not leave until they have found me.”


THE RETURN TRIP

Episode 41


page 39

THE RETURN TRIP – Episode 32

Leave a comment

THE RETURN TRIP – Episode 32

…Four armed guards charge out of the left-hinged gate, the one in the lead asking, “Are you Aldona Afridi?”…

turkish-taxi-001

All in all, Afridi has time to loosen the noose around his neck, having left the hardest roads behind. That he lives to tell the tale is testimony to his firm resolve and evidence of his good fortune.

The homemade taxi pulls up to the gates of the Ahmet Mosque, tall and unwelcoming. Four armed guards are-you-001charge out of the left-hinged gate, the one in the lead asking, “Are you Aldona Afridi?”

“I didn’t know what he was up to, I swear,” pleads the spineless driver, once an ally.

“Not you Cabbie! We are from the American Consulate, called here by your wife, she told us you would be coming.” Those are Marine uniformed men. “Pull that hunk of junk into that garage and leave the keys with the Sergeant.”

Naturally they comply, while being led inside, then left alone. The young Turk comments, “Whoever you are or whatever you know, I am impressed Saied.”

“Fatima, my dear Fatima,” Afridi prays aloud.

“Your fat mother?”

He needs to fill in the gaping blanks, “My name is Aldona Afridi and my wife Fatima and my two daughters are probably inside somewhere.”

“And mine is Mehmet Ali Erim,” they embrace like old friends. “I own a taxi, what do you do?”

“I am a scientist not a criminal, and there evil men chasing me!”

“I am intrigued, but not surprised Saied Al. You act like a man with a scorpion in your pants.”

“Do not tell Mr. Erim anything else,” the embassy guards warn.

“They know my name!”Image result for spy

“They may have been listening when you introduced yourself,” Afridi remarks, being the “seasoned spy” that he has become.

They are escorted into the catacombs of the 3rd Century structure and shown separate rooms. The two shake hands, not knowing what the future holds.

Mehmet Ali Erim is briefly debriefed as a precaution and released to the streets and his next fare.

Aldona Afridi is grilled on a number of subjects, none of which mention his defection, so it is he who asks, “May I see my family and when can I speak to someone about the Space Colony?”space-colony-banner-001

The team of inquisitors is headed by Elliot Deming, Consulate General of the Turkish delegation based in Ankara. The very tall middle-aged American political appointee paces in front of Aldona, knowing that he has not heard the whole story. “The Ambassador to Turkey is scheduled to arrive in another hour. We cannot move on your wife’s suspicious information until the Ambassador personally speaks with the United States Secretary of State.

“What I have to say cannot wait… I would not have risked my family’s lives for anything less!”

“We have to fully vet your story, I hope you understand?”

“No I do not.” This is no time for governmental red tape. He hangs his weary and exasperated head.


THE RETURN TRIP

embassy-istanbul

Episode 32


page 31

http://wp.me/p2MBwN-1eV

Alpha Omega M.D. – Episode #260

1 Comment

Alpha Omega M.D. – Episode # 260

…Constance and Fanny  nearly circle the globe in pursuit of spies, spy secrets and spy hideouts from Jakarta and Bahrain to Khartoum and Port of Spain…

Spy vs Spy by Peter Kuper

Spy vs Spy by Peter Kuper

“My guess is that Christmas in Africa in our future,” laments Sara Fenwick, who is hoping that Jenny Hawkins will have the good sense to take care of Fenwick Fabrique’s holiday business. No one will learn the fate of the Pacific Clipper until it does, or does not, reach New York.

Carolyn Hanes has seized the opportunity to deviate from her original story line. She is going to stick out the flight of the Pacific Clipper, using the travels as background fodder for Constance and Fanny as they nearly circle the globe in pursuit of spies, spy secrets and spy hideouts from Jakarta and Bahrain to Khartoum and Port of Spain.

Ford Map-001

“Try to make the best of this, Sara. I am truly sorry that I practically dragged you along, but to be honest, I cannot imagine being away from you for two weeks… The thought just struck me, this is December 15th. Had I gone alone, I would already be late in arriving! And with the war going on, you would beside yourself.”

          “I would?” That’s the spirit. “Of course I would, Lyn. I just think that I’m not the globetrotting type.”

          “Well, you are now, sweetie!” Lyn applies an embrace worthy of her appreciation. Then there is business. “Were you able to locate a typewriter?”

          “It’s in our berth.”

          “You are the best!”

          “I know,” she winks. “Now get in there and use it! I traded my best string of pearls for it.”

          “When we get to New York, I will replace it with diamonds!”

          “If that’s the case, I better throw in a ream of paper and a multi-color ribbon.” Sara sees the Captain coming toward them.

“I thought you would like to know that we will be making for Noumea in the morning. I need to know if you ladies will be getting off at Gladstone? We should arrive there before dusk.”

“Hell, no!” Sara blurts, then blushes. “I mean, no sir. We have a book to write. Can we use you as our hero?”

“Can we,” adds the author?

“I don’t know about hero, but I would be honored Miss Hanes, Miss Fenwick. I must confess that I have a copy of Constance Caraway, Deadly Shenanigans in the cabin, packed it in with my flight gear. Say, how does that Doctor fella get even with that hotel guy? I would have burned down his house.”

          “I do not believe you could hurt a fly, Captain Ford, but I can tell you that the good guys usually win.”

          “Touché. I guess you are going to make me finish it, aren’t you?”

          “I would rather you get us home!”


Alpha Omega M.D.

CC P.I. Deadly-001

Episode # 260


page 242

Nazis in the USA 1942 – WIF Forgotten History

Leave a comment

Operation Pastorius:

Germany’s Failed

WWII American

Sabotage Scheme

When Adolf Hitler’s Nazi Germany declared war on the United States, his hatred for America was visceral. So when his chief of military intelligence, Admiral Wilhelm Canaris of the Abwehr, proposed a means of striking in America’s heartland, crippling its industry and terrorizing its people, he approved immediately. The plan was to recruit German men, former residents of the United States, to conduct a campaign of terror bombings targeting America’s infrastructure including transportation facilities, manufacturing plants, electrical distribution grids, and other targets of opportunity. It was called Operation Pastorius, named for the founder of America’s first German settlement, Germantown, Pennsylvania.

The first team of bombers would be followed by a second, then a third, and support for the bombers would be drawn from Nazi sympathizers in America, according to the plan developed by Canaris and run by a deputy, Walter Kappe. Its agents were trained to identify and target Jewish owned businesses in American cities, which Hitler believed carried undue influence with the American government. Operation Pastorius was not a single wave of terror bombings, but a series of them calculated to cripple America’s ability to make war through the flexing of industrial muscle. It was betrayed by at least one of the agents involved, and J. Edgar Hoover took advantage of the betrayal.

10. The Germans planned a wave of terror in the Northeast and Midwest

German military planners of the Abwehr selected the primary targets for the first wave of Operation Pastorius. They included the hydroelectric plant at Niagara, which provided electrical power for much of the northeastern United States. The Hell Gate Bridge complex, a critical railroad link connecting New York to New England was to be bombed, disrupting freight and passenger traffic. America’s aluminum industry figured heavily in the target lists, which included a cryolite processing plant in Philadelphia (cryolite being essential in the smelting of the metal), and several aluminum plants in Tennessee, Illinois, and New York.

Railroad repair facilities and stations were targeted, as were locks crucial to the navigation of barges on the Mississippi and Ohio Rivers. During their preparation, the agents selected for Pastorius were trained in identifying and bombing targets of opportunity. They were to be selected for their economic value as well as terror effect, and included department stores and restaurants, railway depots, airports, subways, and places of public gathering. Abwehr planners envisioned the operation in effect for two years in the United States, with minimal communication between the agents and planners in Germany. The agents were trained to recognize emerging targets and act accordingly.

9. Eight agents were recruited and trained by the Abwehr

Originally, 12 men were recruited by the Abwehr, selected by Walter Kappe from lists of men who had been repatriated from the United States. Four quickly dropped out of the program, and eight were sent to complete three weeks of training at an Abwehr facility in April 1942. They were trained in the handling of demolition charges and timers, the manufacturing of bombs and munitions, and their placement for maximum effect. They also received training in target selection, small arms, and other aspects of espionage. The training was conducted at an Abwehr facility about 50 miles from Berlin, with some of the instruction provided by operatives of the Irish Republican Army working in concert with the Abwehr.

All of the men selected had lived in the United States for some time, and at least two were American citizens. Another two had served in the United States Army or National Guard. As they were trained, the Abwehr created life histories for each, giving them fictional backgrounds based on their American experiences, and the documents necessary to sustain the charade. Drivers licenses, birth certificates, passports, social security cards, and letters from friends and family were prepared for the men to carry during their mission in the United States. When the training was complete the men traveled to L’Orient in France, from whence the Kriegsmarine carried them to the America.

8. They were landed in the United States by two separate U-boats

Divided into two teams of four — one led by George John Dasch, the other by Edward Kerling — the agents were carried by U-Boats to the United States. The first to arrive reached Long Island near Montauk in the early morning of June 13, 1942. The team led by Dasch went ashore wearing German uniforms. The uniforms and the explosives which they brought ashore were buried near their landing point, to be retrieved later, and the four men walked to nearby Amagansett, where they boarded a Long Island Railroad train to New York, inconspicuous amongst the early morning commuters. By the time they arrived in New York their presence in America was known to the authorities.

The second team, led by Kerling, was deposited on Ponte Vedra beach near Jacksonville, Florida, going ashore in the darkness wearing swim trunks and German uniform caps. They arrived on June 16. They dressed on the beach, buried their explosives, and walked to a Greyhound bus station, where they caught a bus to Jacksonville. From there they traveled by train to Cincinnati, where they split into pairs, with two moving on to Chicago and the other two, including Kerling, traveling to New York. All eight agents were to reconnoiter their targets, and rendezvous in Cincinnati on July 4, 1942, to coordinate the bombings to ensure maximum terror effect.

7. The teams planned a campaign of sabotage to last two years

The teams went ashore carrying explosives for their first wave of bombings on targets assigned by the Abwehr. In Germany, Walter Kappe was already planning for additional teams to be sent to America, including himself. He planned to establish a headquarters for sabotage and espionage in the United States following the success of the first wave. Supported by Canaris, he sent the first teams of agents to America well-equipped to support themselves and their operations for two years. Each team leader – Dasch and Kerling – carried with them a list of contacts, Germans known to be sympathetic to the Nazis. The lists were written in invisible ink on a handkerchief.

The team leaders were to contact Nazi sympathizers known to the Abwehr and Gestapo, establishing and utilizing a network of mail drops and contacts through which additional teams could communicate with one another. Substantial German communities in cities were to be plumbed for support for the German operations. The support of the German communities was considered to be necessary for the long-term maintenance of the teams. The United States was not yet on a full war footing when the teams arrived in America, and security was still relatively lax, which the Abwehr believed would allow their agents to assimilate in the German areas with little difficulty.

6. The sabotage teams had false documents and American money

The teams carried $50,000 dollars, in denominations of $50 or less, under control of the team leader, to be used for expenses including travel, purchases of additional explosives and, if necessary, bribes of officials or supporters. Each man was also allotted $9,000 — about half of which was controlled by the team leader, with the rest carried in money belts by the agents. An additional $400 was held by each member for immediate use. All of the money was genuine to avoid the unnecessary risks inherent with using counterfeit funds.

Kerling’s team was tasked with bombing the Newark station of the Pennsylvania Railroad, repair facilities near Altoona, Pennsylvania, the Hell Gate Bridge, and Ohio River dams and locks between Cincinnati and Louisville. Dasch was to target the electrodynamic plants at Niagara, Alcoa plants in several states, and the cryolite processing plant in Philadelphia. Both teams were to target department stores and large train stations wherever possible, with the aim of creating terror among the populace. The agents all carried false documentation which supported their carefully crafted backstories as they moved freely to accomplish their missions.

5. The New York team was accosted by the Coast Guard, escaped, and a manhunt began

As Dasch and his team buried their explosives on the beach in the dark at about 2:30 in the morning of June 13, he noticed someone on the beach staring at him. It was US Coast Guardsman John Cullen. Dasch told Cullen that he and his party were fishing, though they lacked fishing equipment. When Cullen appeared suspicious, Dasch threatened him, then attempted to bribe him with $260. Cullen promised to forget what he had seen and returned to his station at Amagansett, where he informed his superiors of what he had seen, and more importantly, heard. While Dasch was speaking to him Cullen heard the others talking – in German

By the time the Coast Guard returned to the site the Germans were gone, but they discovered evidence of digging and when they went back to their station it was with the information that explosives and German uniforms were buried on the beach. Before Dasch’s team arrived at Penn Station in New York, the FBI in Washington knew of the discovery on Long Island. Dasch and his team split up in New York, registering in pairs at two hotels, safely hidden in the throngs of the city. In Washington, the information was filed accordingly. Kerling’s team had not yet landed when Dasch arrived in New York.

4. The teams planned to meet in Cincinnati to begin their attacks on the 4th of July, 1942

The following day Dasch told the agent he was traveling with, Ernst Burger, that he had no intention of carrying out the attacks as planned, and was instead going to inform the FBI of the entire operation. Burger was given the choice of either cooperating or being thrown out of their upper story hotel room window. Dasch called the FBI on June 15 and was disregarded as a crackpot. The next day he traveled to Washington, checked in at the Mayflower Hotel, and went to the FBI with his information. After he presented the large sum of American cash he was carrying he got the Bureau’s attention. The fact that his story confirmed the findings on Long Island was also noted. Within a few hours, using his information, the FBI had the rest of his team in custody. Kerling’s team landed in Florida the same day.

Dasch could not give the FBI much information regarding the whereabouts of the second team, only that the teams were to meet in Cincinnati on July 4. He did tell the FBI about the invisible ink on the handkerchief. He could not recall the means of revealing the ink. The FBI allowed Dasch to remain in his Mayflower Hotel room, where he was closely watched, while it rapidly solved the mystery of the invisible ink, which was reactive to ammonia. The listed contacts in several cities were placed under 24-hour surveillance. FBI Director J. Edgar Hoover ordered the arrest of Dasch’s team kept secret, so as not to alert the remaining four German saboteurs.

3. The remaining Germans were rounded up in New York and Chicago

Kerling and his associate, Werner Thiel, traveled from Cincinnati to New York, where Kerling contacted Helmut Leiner, whom he knew from his earlier life in America. Leiner’s name was on the list provided to the FBI and he was under surveillance. The FBI followed Kerling from that point on, and when he met with Thiel in a bar a few days later they promptly arrested the pair, leaving just two of the German agents still free. Though the FBI did not know it, they were in Chicago, where one of them, Herbert Laupt, had also decided to forego his mission.

Laupt had been raised from the age of five in Chicago, and in 1940 failed to register for the draft, as the law then required. Desirous of marrying his girlfriend, he went to the FBI office in Chicago and told them that he had contacted his draft board. The FBI recognized his name and let him go, hoping he would lead them to the sole remaining German agent. After three days of following him, they arrested Laupt for espionage. Laupt, hoping for leniency, told them they could find the last agent of Operation Pastorius, Hermann Neubauer, at the Sheridan Plaza Hotel. He was taken into custody by the FBI that same evening when he returned from watching a movie. As soon as news of the arrests in Chicago reached Washington, Dasch was arrested.

2. The Germans were tried as spies by a military tribunal

Hoover proudly announced the arrests of the team of German saboteurs as the result of an FBI operation, failing to mention the role played by Dasch when he approached the Bureau with the story. He preferred the public and the Germans believe in the efficiency of the American security effort. For the same reason, he urged the Germans be tried by military tribunal, in secret, telling President Roosevelt that a public trial would reveal too much of the FBI’s methods. Roosevelt agreed, and the eight were tried together by a tribunal of seven Army generals, with the Attorney General of the United States, Francis Biddle, serving as the prosecutor.

The Germans were provided with legal representation, but the outcome of the trial was a foregone conclusion. All of the Germans were tried under the penalty of death if found guilty, which they were on July 27. The court recommended the death penalty, though Biddle recommended clemency for Dasch and Burger. The entire court transcript, which ran over 3,000 pages, was sent to Roosevelt, who held the authority to implement the court’s recommendation or grant lesser sentences. Roosevelt’s review of the documents revealed to him that Hoover’s reports of the FBI’s role in the unraveling of the German plan had been somewhat exaggerated. Dasch’s role in exposing the plot remained hidden from the public.

1. All were sentenced to death by the tribunal, but FDR extended clemency

Roosevelt accepted the recommendation from Biddle, supported by Hoover, and granted clemency for Burger, who was sentenced to life at hard labor, and Dasch, who was sentenced to 30 years in prison. His decision was announced on August 7, 1942. The following day the remaining six German agents were executed in the District of Columbia Jail, using the electric chair. They had been back in the United States less than two months. An enraged Hitler forbade Canaris from conducting further sabotage operations in the United States when he learned that all eight of the agents had denounced Nazism to the FBI. Truman later commuted the sentences of Burger and Dasch, ordering them deported to occupied Germany

Neither were welcomed in Germany, where they were generally reviled as traitors. Dasch tried several times over the remainder of his life to return to the United States, but Hoover blocked his efforts each time. Dasch reported that Hoover had offered him immunity from prosecution in exchange for his giving the story to the FBI; Hoover steadfastly denied he had. In 1959 Dasch published a book entitled Eight Spies Against America, which related his side of the story. It did not sell well, nor did it generate support for his quest for a Presidential pardon, as he had hoped. Dasch died in Germany in 1992, still condemned there as a traitor.


Nazis in the USA 1942 –

WIF Forgotten History

FYI NSA BTW – WIF Invasion of Privacy

Leave a comment

Intrusive Programs

Run by

the NSA

Before Edward Snowden revealed us an unprecedented amount of the National Security Agency’s activities in 2013, most of us were only vaguely familiar with the shadowy organization and its information-gathering ways. The NSA has its tendrils in virtually every digital aspect of our daily life, to the point that one of their automated information-collecting programs is probably reading this right now (Hi!) and trying to figure out whether we’re a threat to national security (We really aren’t!).

While reports of their current activities are understandably few and far between, thanks to Mr. Snowden and his leaked documents we do have some insight into the things the NSA were up to in 2013 and before that … and it’s not pretty. Here’s a look at some of the agency’s strangest antics.

10. Angry Birds

No, it’s not just a fun code name, or, for that matter, even code name. It’s that Angry Birds.

In 2014, the Guardian reported that the NSA, along with its significantly less catchy British counterpart GCHQ, were looking into various techniques where they can sneak all up the “leaks” of your favorite phone apps, up to and very much including the world’s premier “Birds Vs. Pigs” game. The idea was to slip through the security cracks of the apps in order to reach the users’ personal data, which would provide the agencies with a number of significant advantages. They would gain access to a huge amount of the kind of data that would allow them to exploit people’s phone information on a mass scale, instead of just having to hack their way into our phones one by one like some commoner. Location, as well: When you use Google Maps to find a place, the NSA can use it to find you.

The NSA seems to put great value on such technology, to the point where one 2010 presentation called it a “Golden Nugget” before rattling off a long list of information the agency could gather from just a single picture uploaded on social media. Fortunately, this plan was among the documents Edward Snowden leaked in 2013, so at least we’re aware that some of America’s taxpayer dollars go towards surreptitiously scrolling through your contact lists as you play Candy Crush or whatever.

9. Boundless Informant

Congress has occasionally challenged the NSA about what they do with all the data they collect from American citizens. One of the agency’s go-to defenses has been that they have no way of keeping track of the waves of information crashing on their shores, but in 2013, it turned out that a secretive agency might, in fact, have been lying about its methods. It’s shocking, we know.

Congress has occasionally challenged the NSA about what they do with all the data they collect from American citizens. One of the agency’s go-to defenses has been that they have no way of keeping track of the waves of information crashing on their shores, but in 2013, it turned out that a secretive agency might, in fact, have been lying about its methods. It’s shocking, we know.

Boundless Informant is a highly sophisticated data mining tool the NSA uses to analyze and record its surveillance information. It’s essentially a hyper-competent archivist that sifts through the sea of data and arranges it to neat folders. However, it doesn’t appear to do it by user — unless they decide to take a personal interest in you, Boundless Informant probably doesn’t have a folder of your most embarrassing emails and IMs. Instead, the system sifts through the incoming information by “counting and categorizing” the communications records metadata (sets of data that describe other data). However, the level of detail it goes to even includes individual IP addresses … which, as you may know, can totally be tracked down to the countries they’re from.

8. Dishfire

SMS texting is slowly but steadily going the way of the dodo as instant messaging platforms are taking over, but the NSA has been collecting them like they were coming back in fashion. According to the 2013 data leak, the Dishfire program performs a daily, global and supposedly untargeted sweep of SMS messages, and took them to a second program called Prefer, which automatically analyzed them for assorted red flags.

The agency was head over heels about this particular avenue of information collection, to the point where a 2011 presentation was titled “SMS Text Messages: A Goldmine to Exploit.” They weren’t exactly wrong, either: automated messages, international roaming charge texts, missed call alerts, electronic business cards and text-to-text payments gave them access to unprecedentedly clear metadata in ridiculous droves.

To put the scale of the operations in context, at the time of the leaks the NSA was able to collect over five million missed-call alerts (for contact chaining analysis), Around 800,000 money transactions, 1.6 million border crossings, over 110,000 names, 76,000 people’s real-time locations, and a total of nearly 200 million SMS messages. Per day. 

7. Egoistical Goat and its friends

The anonymous Tor network is obviously a bit of a problem for an information-gathering entity like the NSA, but it appears the agency had already made some progress to lift the veil of secrecy as early as in 2013.

To crack down Tor’s information safe, the agency created a number of programs with increasingly stupid names, all lovingly crafted to compromise Tor user anonymity. There was Egoistical Goat and its sister programs Egoistical Giraffe and Erroneous Identity, which tried to worm their way in the Firefox parts of the Tor Bundles in order to identify users. Before them, the NSA had Mjoliner, which was meant to divert Tor users to insecure channels, and a marking operation called Mullenize, which was the online equivalent of a surveillance helicopter trying to shoot a tracking device in a car before it drives in a hidden tunnel. Meanwhile, NSA’s British version, GCHQ, did its level best to outdo its American counterpart’s ridiculous code names by trying to crack Tor with operations called Epicfail and Onionbreath.

Despite all their antics, the NSA’s success rate at identifying Tor users was spotty at best — but really, who knows what they have come up with since 2013?

6. GILGAMESH

It’s one thing for the NSA to want to know about people’s information, and completely another to use that information to find out your location and giving it to the Joint Security Operations Command in case they need to bomb someone. This explosive application of NSA tracking technology is called GILGAMESH, and it’s essentially what would happen if a bunch of NSA’s geolocation tracking technologies married a Predator drone.

Thanks to the vast array of online information available to them, the NSA has taken to recommending drone targets with complex metadata analysis instead of relying on human intelligence. However, the Intercept points out that while the tactic has had some success it has by no means been particularly accurate and reliable. One drone pilot operating with NSA-dictated targets has admitted it “absolutely” has resulted in innocent people getting killed.

5. Optic Nerve

To be fair, Optic Nerve was technically a brainchild of the British GCHQ, but since they NSA happily assisted in it, we’ll let it slide. It was a code-name for a surveillance program that surreptitiously collected a bunch of images from Yahoo’s webcam chats from all over the world by the million, with little to no regard whether the people they were collecting them from were persons of interest or not.  This might be pretty creepy in and of itself, but becomes doubly so when you remember the sort of stuff that tends to go on in webcam chats. Yes, we’re talking about nudity, and judging by the scale of the operation, there must have been plenty of it, too. In fact, leaked documents reveal that the GCHQ actually had some trouble keeping all the naked pictures away from the interested eyes of its employees, which in a way is even scarier than just stealing images in bulk.

Understandably, Yahoo was less than thrilled to find out about the situation, which they say happened only when the British media reached out to ask some questions. The company called Optic Nerve a “whole new level of violation of our users’ privacy,” and really, it’s hard to argue with them.

4. PRISM

PRISM is massive surveillance program that started in 2007 and came into light when the Washington Post and the Guardian whipped out a pile of leaked documents in 2013. Technically, PRISM was/is a system for monitoring foreign communication passing through American servers. However, in practice, they monitored everything they humanly could, and gathered their data from “providers” that you might be familiar with.

As of 2013, tiny little companies like Google, Microsoft, Apple, Facebook, Yahoo, Skype and the like had to hand the NSA remarkable access to their servers, and the vast buckets of data from their users that lays within. NSA can use this giant pool of information to a terrifying accuracy, to the point where they could just directly access your — yes, specifically your — information and spy on every little thing you do online. The only caveat is that some analyst in their machinery has to vouch that they’re, like, 51% sure that you’re probably foreign, maybe.

3. Upstream

If you thought the NSA was happy just spying what you do on the internet, worry not — there’s more to come. Upstream is basically the same deal as PRISM, only with telecommunications companies such as Verizon and AT&T … and in a much more classic “spying” capacity. Where PRISM relies on intangible tech shenanigans of the “access to big company servers” variety, project Upstream has physically installed a host of surveillance equipment to the internet’s physical “backbone”: the routers, cables and other gear that carry all the online traffic.

The NSA uses this infiltration to track down specific keywords related to potential foreign intelligence activity, though even this noble-ish intent is rendered moot by the fact that they also often target the media, legal attorneys and human rights people instead of just supposed spies and suspected terrorists. The American Civil Rights Union has called the practice “unprecedented and unlawful.”

2. Bullrun

What good is stealing data from countless unwary people if you don’t know what to do with it? The NSA answered this question with code-name Bullrun, a state-of-the-art decryption program that can straight up decode the encryption used by several prominent providers, which means they can read your emails with the greatest of ease should the need arise. This powerful Sigint (signals intelligence) weapon is built by stealthily working with large tech companies to install weaknesses in their products, and then exploiting these openings with their own decryption tools. This way, the NSA and its British counterpart GCHQ are able to browse through not only their targets’ emails, but banking accounts and medical history as well. Essentially, if you have personal information online, Bullrun can find out how to decrypt it.

Bullrun’s importance to the NSA can easily be seen by looking at its budget: When Edward Snowden brought the system out in the open in 2013, PRISM’s operating costs were around $20 million a year. Bullrun? Over $250 million.

1. FASCIA

The FASCIA database was among the more interesting documents Edwards Snowden leaked. It was a massive collection of metadata, consisting of all sorts of call information, IP addresses and suchlike. What made the project so impressive(ly scary) was its sheer scale: Though the document dates back to January 2004, it said that FASCIA II had over 85 billion metadata records, and an estimated 125 million were added on a daily basis. Leaked graphs (like the one above) indicate that the system has since evolved, and in 2012, FASCIA already received five billion device-location records every day. There’s no telling what that number is now, but smart money would probably say that it’s significantly larger.

The NSA started getting hold of all this metadata during the War on Terror by straight up forcing phone companies to hand it over to the agency. Originally, this data included pretty intimate stuff, such as the numbers you called and the duration of said calls, though not the actual content. In 2015, the process was slightly changed so that the NSA could only collect bulk metadata and looking at an individual person’s records would require a court order. Even so, the NSA has been known to call this system one of their “most useful tools,” and they say it has even helped them capture multiple terror suspects.


FYI NSA BTW –

WIF Invasion of Privacy

%d bloggers like this: