Sunday, November 24, 2013

Deb's Sunday encouragement and stuff

Happy Sunday everyone!  The beginning of a THANKSGIVING week -  For those of you that didn't know this or see this in an update I sent out last week... Thanksgiving this year is also the first day of Hanukkah!

What a great time to celebrate Thanksgivukkah.  This miraculous convergence will not occur again for hundreds of years! I think this year will be a SUPER special Thanksgiving - don't you? Let's determine to make it so - AMEN?  AMEN!

You KNOW in YOUR KNOWERS that it is just a matter of time when our SUDDENLY will manifest.  Joseph waited 13 yrs. Abraham waited 25 yrs. Moses waited 40 yrs. Jesus waited 30 yrs. If God is making you wait, We are in good company! kjp

So just take this email and let it minister to your faith today - Nothing real big here just the SURE WORD and PROMISE of God spoke to us NOW - IN THIS HOUR - a word we can take and pray over and decree into our lives.  GOD LOVES to be reminded of His word as He daily watches over it to perform it!

STAGGER NOT – (Romans 4:20-21) ”He did not waver at the promise of God through unbelief, but was strengthened in faith, giving glory to God, and being fully convinced that what He had promised He was also able to perform." -  We serve a mighty God, who cannot lie! (Numbers 23:19) “God is not a man, that He should lie; neither the son of man, that He should repent: hath He said, and shall He not do it, or hath He spoken, and shall He not make it good?”. God is faithful to His promises to us, either by what is declared in His Word, or what He has revealed or “spoken” to us by His Spirit. We must not waver, or stagger, but stand on His promises! Be patient, the promise will come, in Gods perfect timing, and in His way. Wait on God, don’t be in a hurry! If GOD, promised something, He will do it!  Wait for the promise...He is faithful that promised. (Hebrews 10:23) “Let us hold fast the confession of our hope without wavering, for He who promised is faithful”. And, worship and give Him glory, while waiting! Peace and blessings. Stephanie Moss

Word of Life World Outreach
Mike & Ck Thompson
God responds to the heart-cry of each generation.  Think of every promise He's given to YOU over the years.  You need to understand He takes it quite personally.  It's a Covenant issue to HIM.

So He sends anointings to keep His Word, which lives and abides forever.
Do you realize God is INCAPABLE of lying?  That's one reason He works in Times & Seasons.  Even though we live in a world of constant flux, God's Word never changes.  Whether it's Rhema or Logos, He goes to great lengths to keep His Word to you.
These things I have spoken to you, that in Me you may have peace. In the world you will have tribulation; but be of good cheer, I have overcome the world.  (John 16:33)
When a "New Season" comes along, it's God keeping His Word to the Body of Christ, and to YOU PERSONALLY.  With each new challenge, we feel a shift in the spirit. Whether it's recession, or war, or natural disasters (which reflect the groaning of creation.)
Each new season counteracts the enemy's attack on the last season.  Each move of God opens new doors of Revelation.  It propels you forward into Destiny, which causes YOU to propel others into Destiny. And THAT, in turn, reaches the next generation with the Gospel of Jesus Christ! 

God is an initiator, not a responder.  He doesn't shift things because of what the devil is doing.  God is WAY AHEAD of the devil!  (I believe it gives the devil panic attacks.)
The End-Time Transfer of Wealth has Begun.  God is purposely releasing anointings for fruitfulness and prosperity on the Body of Christ.  .The wealth of the sinner is stored up for the righteous. (Proverbs 13:22)

It's a time of open doors and opportunities.  Heaven is open. God Himself has commanded the anointing for Supernatural Finances to flow at this time.  
(
Ck had a series of dreams about this, which still continues.)  It does matters who you align with. Anointings FLOW.  It's important to associate with people whose anointing you want to have in your life!

THIS IS SO GOOD - WE LOVE YOU LORD AND WE THANK YOU FOR SPEAKING TO US YOUR WILL AND YOUR PLANS FOR US!
                             FIRE BY NIGHT           

             "Reflections Upon Reflections" [of The Father's Heart] 
Glenn Jackson

        ...."You, in Your great compassion, did not forsake them in the wilderness; The pillar of cloud did not leave them by day, to guide them on their way, nor the pillar of fire by night, to light for them the way in which they were to go".... Nehemiah 9:19 NASB


MANY TIMES MANIFESTATIONS OF THE SUPERNATURAL [THE MIRACULOUS] ARE HINDERED BECAUSE OF OUR FAILURE TO LIFT OUR EYES "CONTINUALLY" UP TO THE WORD [WILL] OF GOD
  
Words of prophecy:
  
*       In this hour you shall see great miracles [attesting signs and wonders] in the lives of those who - in believing -forsake all to follow Me.

*       I am about to unleash the fullness of My power through all those of My children who have given themselves wholly to Me, and they shall "enter fully" into the realm of the miraculous. For they will have transcended both time and space [fear and unbelief] and shall no longer be held in any way by the temporal realm - and, thus, they shall be found carrying out My Will [through an absolute faith] - allowing Me to cause great signs and wonders and miracles to come to pass through them. Hold fast, My beloved ones, for even though at first these things I have said to you [as they manifest themselves in the physical realm] may "seem" like a dream they are not, and you shall surely turn the world "upside down" wherever you walk in this last of the last hour!

*       Always remember this: a "miracle" [My intervention into the natural scheme of things] shall always have a profound [glorious] and far-reaching effect on the "natural circumstances" in any given situation.

 *      Truly I say to you, in this last hour I am raising up a group who shall minister "absolute truth" in the fullness of conviction [the fullness of My power and love] and, as they go forth with My "compassion" burning in their heart, the yoke-destroying, burden-removing power abiding within them shall be continually released upon all who cross their path. And "miracles" such as the earth has never seen before shall manifest to a continually greater degree, and Satan and his forces shall experience a "terror" that I have reserved for him until this time. For is it not written,

        ...."Behold, the tempest of the Lord! Wrath has gone forth, a sweeping [raging] tempest; it will burst on the head of the wicked. The fierce anger of the Lord will not turn back until He has performed and until He has accomplished the intent of His heart; in the latter days you will understand this?".... [Jeremiah 30:23-24]

*"      Miracles" [My life-changing power] is the key word for this hour for all those who are truly seeking the fullness of destiny! It is time for all those who truly love Me to make a "full" transition to walking in the supernatural [in every aspect of life and ministry]. Truly I say to you, those who will take the necessary steps in obedience to My Will in this hour will not be disappointed [Romans 9:33]!

*       I shall command miracles to come to pass through your mouth; for you are My vessel, a channel of blessing [deliverance and empowerment] to My people. Fear not, and proceed with great boldness - for I am with you wherever you go, and I will NEVER fail you nor forsake you. I am watching over My Word [Will] to perform it. Therefore, speak out boldly! Have you not filled your heart with My Word? Indeed, out of the abundance of your heart your mouth will speak, and My blessings shall pour forth upon those who will hear. Have faith, My child, in the fact that I direct your paths. Only position yourself to hear My voice on a continual basis that I might prosper you greatly in every area of your life.

        ...."Behold, I am going to make a covenant. Before all your people I will perform miracles which have not been produced in all the earth nor among any of the nations; and all the people among whom you live will see the working of the LORD, for it is a fearful thing that I am going to perform with you".... Exodus 34:10 NASB

        ...."God was performing extraordinary miracles by the hands of Paul, so that handkerchiefs or aprons were even carried from his body to the sick, and the diseases left them and the evil spirits went out".... Acts 19:11-12 NASB

        One thing that is very interesting to note is that as the men and women of God have operated in God's purpose down through the ages, we really see that distinct "air" of the supernatural in everything that they did in obedience to His commands. Nothing "just" happened, everything had God's hand directly upon it. As we align ourselves with the thoughts and intentions of the Father's heart, and seek to walk only in His PERFECT Will and highest purpose [first gaining a "revelation" and THEN obeying the leading [unction] of the Holy Spirit)] we know that the "anointing" to carry out the task that has been given us, "abides" within us. We can, therefore, "expect" to walk in the pure, unadulterated supernatural power of God - in direct proportion to our perfect obedience to the "prompting" of His Spirit. Many times manifestations of the supernatural are hindered because of our failure to lift our eyes "continually" up to the Word [Will] of God - and, thus, truly depend upon God's power in all things. To the "flesh" it is a "scary" thing to place ourselves "continually" in the position wherein we are "totally" out on God's Word [Will] {fs28 and His power to such a degree that if God does not come through on our behalf, then we are finished; but once one places themselves out in that position [through the denial of their "own" understanding] and, thus, sees clearly that God is indeed watching over His Word to perform it [Jeremiah 1:12], then they shall come to "expect" that "air of the miraculous" as they go forth with the sole intent to glorify honour the Father and Jesus to the greatest degree.
****************************************************

FOR YOUR LISTENING PLEASURE AND AMAZEMENT OF YET ANOTHER FACET OF OUR AWESOME CREATIVE GOD! I can't stop listening to this. It makes me think that this is what God hears as He created all things to worship and praise Him. It almost brings tears to my eyes. Keep listening and you will hear a woman's voice explaining what you are hearing. 

It’s Recorded Crickets then Slowed Down the Track, and It Sounds Like Humans Singing

Composer Jim Wilson has recorded the sound of crickets and then slowed down the recording, revealing something so amazing. The crickets sound like they are singing the most angelic chorus in perfect harmony. Though it sounds like human voices, everything you hear in the recording is the crickets themselves. The recording contains two tracks played at the same time: The first is the natural sound of crickets played at regular speed, and the second is the slowed down version of crickets’ voices. Jim states “I discovered that when I slowed down this recording to various levels, this simple familiar sound began to morph into something very mystic and complex……..almost human.”

****************************************************


NRC - NSA infected 50,000 computer networks with malicious software

NRC - NSA infected 50,000 computer networks with malicious software
Posted By: FreePlanet
Date: Sunday, 24-Nov-2013 05:33:24
At this point, I'm going to leave it to the SOURCE to lay the land:
The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.
READ ON...
NRC - NSA infected 50,000 computer networks with malicious software

NRC - NSA infected 50,000 computer networks with malicious software

At this point, I'm going to leave it to the SOURCE to lay the land:
The American intelligence service - NSA - infected more than 50,000 computer networks worldwide with malicious software designed to steal sensitive information. Documents provided by former NSA-employee Edward Snowden and seen by this newspaper, prove this.

A management presentation dating from 2012 explains how the NSA collects information worldwide. In addition, the presentation shows that the intelligence service uses ‘Computer Network Exploitation’ (CNE) in more than 50,000 locations. CNE is the secret infiltration of computer systems achieved by installing malware, malicious software.
[source NRC]



Obama administration imposes gag order on all government employees and contractors involved in creating

Obama administration imposes gag order on all government employees and contractors involved in creating healthcare.gov
Posted By: MrFusion [Send E-Mail]
Date: Saturday, 23-Nov-2013 20:52:38
This is, after all, the "transparency administration" - as in hunting down and obliterating all traces of transparency wherever they may be...
via Ulsterman:
http://theulstermanreport.com/2013/11/23/obama-white-house-initiates-information-blackout-on-all-involved-with-obamacare-rollout/

~~~~~~~~~~~~~~~~~
Even for an administration already well known for its secrecy (see: Fast and Furious, Benghazi Massacre, Solyndra, IRS scandal, etc.) this most recent blanket move by the Obama administration to attempt to silence any and all involved with the disastrous Obamacare rollout is astonishing both for the breadth of what it is attempting, and the blatant display of tyranny where the Obama White House openly deems itself above having to answer for itself. -Ulsterman

White House Muzzling All Who Worked on Healthcare.gov
by Keith Koffler on November 23, 2013

The Obama administration “has requested that all government officials and contractors involved (in the development of the website) keep their work confidential,” according to the New York Times, in what appears to be at least in part – and perhaps in whole – an effort to minimize the release of information about the development of the catastrophe known as Healthcare.gov.
~~~~~ CONTINUE AT: ~~~~~
http://www.whitehousedossier.com/2013/11/23/white-house-muzzling-worked-healthcaregov/


“Secrets R US”: America’s Spying Apparatus, Echelon, NSA Eavesdropping and the Outsourcing of Intelligence Operations

“Secrets R US”: America’s Spying Apparatus, Echelon, NSA Eavesdropping and the Outsourcing of Intelligence Operations

Global Research, October 29, 2013
Region: USA
 7
 18  9

 613
nsa
This essay is an excerpt from  Big Lies: How Our Corporate Overlords, Politicians and Media Establishment Warp Reality and Undermine Democracy. Greg Guma’s latest book, Dons of Time, is a sci-fi look at the control of history as power.
Despite 24-hour news and talk about transparency, there’s a lot we don’t know about our past, much less current events. What’s worse, some of what we think we know isn’t true.
The point is that it’s no accident.
Consider, for example, the circumstances that led to open war in Vietnam. According to official history, two US destroyers patrolling in the Gulf of Tonkin off North Vietnam were victims of unprovoked attacks in August 1964, leading to a congressional resolution giving President Johnson the power “to take all necessary measures.”
In fact, the destroyers were spy ships, part of a National Security Agency (NSA) eavesdropping program operating near the coast as a way to provoke the North Vietnamese into turning on their radar and other communications channels. The more provocative the maneuvers, the more signals that could be captured. Meanwhile, US raiding parties were shelling mainland targets. Documents revealed later indicated that the August 4 attack on the USS Maddox – the pretext for passing the Gulf of Tonkin Resolution – may not even have taken place.
But even if it did, the incident was still stage managed to build up congressional and public support for the war. Evidence suggests that the plan was based on Operation Northwoods, a scheme developed in 1962 to justify an invasion of Cuba. Among the tactics the Joint Chiefs of Staff considered then were blowing up a ship in Guantanamo Bay, a phony communist Cuba terror campaign” in Florida and Washington, DC, and an elaborate plan to convince people that Cuba had shot down a civilian airliner filled with students. That operation wasn’t implemented, but two years later, desperate for a war, the administration’s military brass found a way to create the necessary conditions in Vietnam.
NSA and Echelon
For more than half a century, the eyes and ears of US power to monitor and manipulate information (and with it, mass perceptions) has been the NSA, initially designed to assist the CIA. Its original task was to collect raw information about threats to US security, cracking codes and using the latest technology to provide accurate intelligence on the intentions and activities of enemies. Emerging after World War II, its early focus was the Soviet Union. But it never did crack a high-level Soviet cipher system. On the other hand, it used every available means to eavesdrop on not only enemies but also allies and, sometimes, US citizens.
In Body of Secrets, James Bamford described a bureaucratic and secretive behemoth, based in an Orwellian Maryland complex known as Crypto City. From there, supercomputers linked it to spy satellites, subs, aircraft, and equally covert, strategically placed listening posts worldwide. As of 2000, it had a $7 billion annual budget and directly employed at least 38,000 people, more than the CIA and FBI. It was also the leader of an international intelligence club, UKUSA, which includes Britain, Canada, Australia, and New Zealand. Together, they monitored and recorded billions of encrypted communications, telephone calls, radio messages, faxes, and e-mails around the world.
  Over the years, however, the line between enemies and friends blurred, and the intelligence gatherers often converted their control of information into unilateral power, influencing the course of history in ways that may never be known. No doubt the agency has had a hand in countless covert operations; yet, attempts to pull away the veil of secrecy have been largely unsuccessful.
  In the mid-1970s, for example, just as Congress was attempting to reign in the CIA, the NSA was quietly creating a virtual state, a massive international computer network named Platform. Doing away with formal borders, it developed a software package that turned worldwide Sigint (short for signal intelligence”: communication intelligence, eavesdropping, and electronic intelligence) into a unified whole. The software package was code named Echelon, a name that has since become a synonym for eavesdropping on commercial communication.
 Of course, the NSA and its British sister, the Government Communications Headquarters (GCHQ), refused to admit Echelon existed, even though declassified documents appeared on the Internet and Congress conducted an initial investigation. But a European Parliament report also confirmed Echelon’s activities, and encouraged Internet users and governments to adopt stronger privacy measures in response.
 In March 2001, several ranking British politicians discussed Echelon’s potential impacts on civil liberties, and a European Parliament committee considered its legal, human rights, and privacy implications. The Dutch held similar hearings, and a French National Assembly inquiry urged the European Union to embrace new privacy enhancing technologies to protect against Echelon’s eavesdropping. France launched a formal investigation into possible abuses for industrial espionage.
When Allies Compete
A prime reason for Europe’s discontent was the growing suspicion that the NSA had used intercepted conversations to help US companies win contracts heading for European firms. The alleged losers included Airbus, a consortium including interests in France, Germany, Spain, and Britain, and Thomson CSF, a French electronics company. The French claimed they had lost a $1.4 billion deal to supply Brazil with a radar system because the NSA shared details of the negotiations with Raytheon. Airbus may have lost a contract worth $2 billion to Boeing and McDonnell Douglas because of information intercepted and passed on by the agency.
According to former NSA agent Wayne Madsen, the US used information gathered from its bases in Australia to win a half share in a significant Indonesian trade contract for AT&T. Communication intercepts showed the contract was initially going to a Japanese firm. A bit later a lawsuit against the US and Britain was launched in France, judicial and parliamentary investigations began in Italy, and German parliamentarians demanded an inquiry.
 The rationale for turning the NSA loose on commercial activities, even those involving allies, was provided in the mid-90s by Sen. Frank DeConcini, then chairman of the Senate Intelligence Committee. “I don’t think we should have a policy where we’re going to invade the Airbus inner sanctum and find out their secrets for the purpose of turning it over to Boeing or McDonnell Douglas,” he opined. “But if we find something, not to share it with our people seems to me to be not smart.”
  President Bill Clinton and other US officials buttressed this view by charging that European countries were unfairly subsidizing Airbus. In other words, competition with significant US interests can be a matter of national security, and private capitalism must be protected from state-run enterprises.
  The US-Europe row about Airbus subsidies was also used as a “test case” for scientists developing new intelligence tools. At US Defense Department conferences on “text retrieval,” competitions were staged to find the best methods. A standard test featured extracting protected data about “Airbus subsidies.”
Manipulating Democracy
In the end, influencing the outcome of commercial transactions is but the tip of this iceberg. The NSA’s ability to intercept to virtually any transmitted communication has enhanced the power of unelected officials and private interests to set covert foreign policy in motion. In some cases, the objective is clear and arguably defensible: taking effective action against terrorism, for example. But in others, the grand plans of the intelligence community have led it to undermine democracies.
  The 1975 removal of Australian Prime Minister Edward Whitlam is an instructive case. At the time of Whitlam’s election in 1972, Australian intelligence was working with the CIA against the Allende government in Chile. The new PM didn’t simply order a halt to Australia’s involvement, explained William Blum in Killing Hope, a masterful study of US interventions since World War II. Whitlam seized intelligence information withheld from him by the Australian Security and Intelligence Organization (ASIO), and disclosed the existence of a joint CIA-ASIO directorate that monitored radio traffic in Asia. He also openly disapproved of US plans to build up the Indian Ocean Island of Diego Garcia as a military-intelligence-nuclear outpost.
  Both the CIA and NSA became concerned about the security and future of crucial intelligence facilities in and near Australia. The country was already key member of UKUSA. After launching its first space-based listening post-a microwave receiver with an antenna pointed at earth-NSA had picked an isolated desert area in central Australia as a ground station. Once completed, the base at Alice Springs was named Pine Gap, the first of many listening posts to be installed around the world. For the NSA and CIA, Whitlam posed a threat to the secrecy and security of such operations.
  An early step was covert funding for the political opposition, in hopes of defeating Whitlam’s Labor Party in 1974. When that failed, meetings were held with the Governor-General, Sir John Kerr, a figurehead representing the Queen of England who had worked for CIA front organizations since the 50s. Defense officials warned that intelligence links would be cut off unless someone stopped Whitlam. On November 11, 1975, Kerr responded, dismissing the prime minister, dissolving both houses of Parliament, and appointing an interim government until new elections were held.
  According to Christopher Boyce (subject of The Falcon and the Snowman, a fictionalized account), who watched the process while working for TRW in a CIA-linked cryptographic communications center, the spooks also infiltrated Australian labor unions and contrived to suppress transportation strikes that were holding up deliveries to US intelligence installations. Not coincidentally, some unions were leading the opposition to development of those same facilities.
     How often, and to what effect, such covert ops have succeeded is another of the mysteries that comprise an unwritten history of the last half century. Beyond that, systems like Echelon violate the human right to individual privacy, and give those who control the information the ability to act with impunity, sometimes destroying lives and negating the popular will in the process.
Hiding the Agenda in Peru
In May 1960, when a U-2 spy plane was shot down over Soviet territory, President Dwight Eisenhower took great pains to deny direct knowledge or authorization of the provocative mission. In reality, he personally oversaw every U-2 mission, and had even riskier and more provocative bomber overflights in mind.
It’s a basic rule of thumb for covert ops: When exposed, keep denying and deflect the blame. More important, never, never let on that the mission itself may be a pretext, or a diversion from some other, larger agenda.
Considering that, the April 20, 2001, shoot down of a plane carrying missionaries across the Brazilian border into Peru becomes highly suspicious. At first, the official story fed to the press was that Peruvian authorities ordered the attack on their own, over the pleas of the CIA “contract pilots” who initially spotted the plane. But Peruvian pilots involved in that program, supposedly designed to intercept drug flights, insist that nothing was shot down without US approval.
Innocent planes were sometimes attacked, but most were small, low flying aircraft that didn’t file flight plans and had no radios. This plane maintained regular contact and did file a plan. Still, even after it crash-landed, the Peruvians continued to strafe it, perhaps in an attempt to ignite the plane’s fuel and eliminate the evidence.
 ”I think it has to do with Plan Colombia and the coming war,” said Celerino Castillo, who had previously worked in Peru for Drug Enforcement Agency. “The CIA was sending a clear message to all non-combatants to clear out of the area, and to get favorable press.” The flight was heading to Iquitos, which “is at the heart of everything the CIA is doing right now,” he added. “They don’t want any witnesses.”
Timing also may have played a part. The shoot down occurred on the opening day of the Summit of the Americas in Quebec City. Uruguay’s President Jorge Ibanez, who had proposed the worldwide legalization of drugs just weeks before, was expected to make a high-profile speech on his proposal at the gathering. The downing of a drug smuggling plane at this moment, near territory held by Colombia’s FARC rebels, would help to defuse Uruguay’s message and reinforce the image of the insurgents as drug smugglers.
If you doubt that the US would condone such an operation or cover it up, consider this: In 1967, Israel torpedoed the USS Liberty, a large floating listening post, as it was eavesdropping on the Arab-Israeli war off the Sinai Peninsula. Hundreds of US sailors were wounded and killed, probably because Israel feared that its massacre of Egyptian prisoners at El Arish might be overheard. How did the Pentagon respond? By imposing a total news ban, and covering up the facts for decades.
Will we ever find out what really happened in Peru, specifically why a missionary and her daughter were killed? Not likely, since it involves a private military contractor that is basically beyond the reach of congressional accountability.
In 2009, when the Peru shoot down became one of five cases of intelligence operation cover up being investigated by the US House Intelligence Committee, the CIA inspector general concluded that the CIA had improperly concealed information about the incident. Intelligence Oversight and Investigations Subcommittee Chairwoman Jan Schakowsky, who led the investigation, didn’t rule out referrals to the Justice Department for criminal prosecutions if evidence surfaced that intelligence officials broke the law. But she couldn’t guarantee that the facts would ever come to light, since the Committee’s report of its investigation would be classified.
The most crucial wrinkle in the Peruvian incident is the involvement of DynCorp, which was active in Colombia and Bolivia under large contracts with various US agencies. The day after the incident, ABC news reported that, according to “senior administration officials,” the crew of the surveillance plane that first identified the doomed aircraft “was hired by the CIA from DynCorp.” Within two days, however, all references to DynCorp were scrubbed from ABC’s Website. A week later, the New York Post claimed the crew actually worked for Aviation Development Corp., allegedly a CIA proprietary company.
Whatever the truth, State Department officials refused to talk on the record about DynCorp’s activities in South America. Yet, according to DynCorp’s State Department contract, the firm had received at least $600 million over the previous few years for training, drug interdiction, search and rescue (which included combat), air transport of equipment and people, and reconnaissance in the region. And that was only what they put on paper. It also operated government aircraft and provided all manner of personnel, particularly for Plan Colombia.
Outsourcing Defense
DynCorp began in 1946 as the employee-owned air cargo business California Eastern Airways, flying in supplies for the Korean War. This and later government work led to charges that it was a CIA front company. Whatever the truth, it ultimately became a leading PMC, hiring former soldiers and police officers to implement US foreign policy without having to report to Congress.
 The push to privatize war gained traction during the first Bush administration. After the first Gulf War, the Pentagon, then headed by Defense Secretary Dick Cheney, paid a Halliburton subsidiary nearly $9 million to study how PMCs could support US soldiers in combat zones, according to a Mother Jones investigation. Cheney subsequently became CEO of Halliburton, and Brown & Root, later known as Halliburton KBR, won billions to construct and run military bases, some in secret locations.
One of DynCorp’s earliest “police” contracts involved the protection of Haitian President Jean-Bertrand Aristide, and, after he was ousted, providing the “technical advice” that brought military officers involved in that coup into Haiti’s National Police. Despite this dodgy record, in 2002 it won the contract to protect another new president, Afghanistan’s Hamid Karzai. By then, it was a top IT federal contractor specializing in computer systems development, and also providing the government with aviation services, general military management, and security expertise.
Like other private military outfits, the main danger it has faced is the risk of public exposure. Under one contract, for example, DynCorp sprayed vast quantities of herbicides over Colombia to kill the cocaine crop. In September 2001, Ecuadorian Indians filed a class action lawsuit, charging that DynCorp recklessly sprayed their homes and farms, causing illnesses and deaths and destroying crops. In Bosnia, private police provided by DynCorp for the UN were accused of buying and selling prostitutes, including a 12-year-old girl. Others were charged with videotaping a rape.
In the first years of the 21st century, DynCorp’s day-to-day operations in South America were overseen by State Department officials, including the Narcotic Affairs Section and the Air Wing, the latter a clique of unreformed cold warriors and leftovers from 80s operations in Central America. It was essentially the State Department’s private air force in the Andes, with access to satellite-based recording and mapping systems.
In the 1960s, a similar role was played by the Vinnell Corp., which the CIA called “our own private mercenary army in Vietnam.” Vinnell later became a subsidiary of TRW, a major NSA contractor, and employed US Special Forces vets to train Saudi Arabia’s National Guard. In the late 1990s, TRW hired former NSA director William Studeman to help with its intelligence program.
DynCorp avoided the kind of public scandal that surrounded the activities of Blackwater. In Ecuador, where it developed military logistics centers and coordinated “anti-terror” police training, the exposure of a secret covenant signed with the Aeronautics Industries Directorate of the Ecuadorian Air Force briefly threatened to make waves. According to a November 2003 exposé in Quito’s El Comercio, the arrangement, hidden from the National Defense Council, made DynCorp’s people part of the US diplomatic mission.
In Colombia, DynCorp’s coca eradication and search-and-rescue missions led to controversial pitched battles with rebels. US contract pilots flew Black Hawk helicopters carrying Colombian police officers who raked the countryside with machine gun fire to protect the missions against attacks. According to investigative reporter Jason Vest, DynCorp employees were also implicated in narcotics trafficking. But such stories didn’t get far, and, in any case, DynCorp’s “trainers” simply ignored congressional rules, including those that restrict the US from aiding military units linked to human rights abuses.
In 2003, DynCorp won a multimillion-dollar contract to build a private police force in post-Saddam Iraq, with some of the funding diverted from an anti-drug program for Afghanistan. In 2004, the State Department further expanded DynCorp’s role as a global US surrogate with a $1.75 billion, five year contract to provide law enforcement personnel for civilian policing operations in “post-conflict areas” around the world. That March, the company also got an Army contract to support helicopters sold to foreign countries. The work, described as “turnkey” services, includes program management, logistics support, maintenance and aircrew training, aircraft maintenance and refurbishment, repair and overhaul of aircraft components and engines, airframe and engine upgrades, and the production of technical publications.
In short, DynCorp was a trusted partner in the military-intelligence-industrial complex. “Are we outsourcing order to avoid public scrutiny, controversy or embarrassment?” asked Rep. Schakowsky upon submitting legislation to prohibit US funding for private military firms in the Andean region. “If there is a potential for a privatized Gulf of Tonkin incident, then the American people deserve to have a full and open debate before this policy goes any further.”
If and when that ever happens, the discussion will have to cover a lot of ground. Private firms, working in concert with various intelligence agencies, constitute a vast foreign policy apparatus that is largely invisible, rarely covered by the corporate press, and not currently subject to congressional oversight. The Freedom of Information Act simply doesn’t apply. Any information on whom they arm or how they operate is private, proprietary information.
 The US government downplays its use of mercenaries, a state of affairs that could undermine any efforts to find out about CIA activities that are concealed from Congress. Yet private contractors perform almost every function essential to military operations, a situation that has been called the “creeping privatization of the business of war.” By 2004, the Pentagon was employing more than 700,000 private contractors.
The companies are staffed by former generals, admirals, and highly trained officers. Name a hot spot and some PMC has people there. DynCorp has worked on the Defense Message System Transition Hub and done long-range planning for the Air Force. MPRI had a similar contract with the Army, and for a time coordinated the Pentagon’s military and leadership training in at least seven African nations.
How did this outsourcing of defense evolve? In 1969, the US Army had about 1.5 million active duty soldiers. By 1992, the figure had been cut by half. Since the mid-1990s, however, the US has mobilized militarily to intervene in several significant conflicts, and a corporate “foreign legion” has filled the gap between foreign policy imperatives and what a downsized, increasingly over-stretched military can provide.
Use of high technology equipment feeds the process. Private companies have technical capabilities that the military needs, but doesn’t always possess. Contractors have maintained stealth bombers and Predator unmanned drones used in Afghanistan and Iraq. Some military equipment is specifically designed to be operated and maintained by private companies.
     In Britain, the debate over military privatization has been public, since the activities of the UK company Sandline in Sierra Leone and Papua New Guinea embarrassed the government in the late 1990s. But no country has clear policies to regulate PMCs, and the limited oversight that does exist rarely works. In the US, they have largely escaped notice, except when US contract workers in conflict zones are killed or go way over the line, as in the case of Blackwater.
     According to Guy Copeland, who began developing public-private IT policy in the Reagan years, “The private sector must play an integral role in improving our national cybersecurity.” After all, he has noted, private interests own and operate 85 percent of the nation’s critical IT infrastructure. He should know. After all, Copeland drafted much of the language in the Bush Administration’s 2002 National Strategy to Secure Cyberspace as co-chair of the Information Security Committee of the Information Technology Association of America.
 Nevertheless, when the federal government becomes dependent on unaccountable, private companies like DynCorp and Blackwater (later renamed Xe Services) for so many key security services, as well as for military logistics, management, strategy, expertise and “training,” fundamental elements of US defense have been outsourced. And the details of that relationship are matters that the intelligence community will fight long and hard to keep out of public view.
Corporate Connections and “Soft Landings”
Although the various departments and private contractors within the military-intelligence-industrial complex occasionally have turf battles and don’t always share information or coordinate strategy as effectively as they might, close and ongoing contact has long been considered essential. And it has expanded as a result of the information revolution. The entire intelligence community has its own secret Intranet, which pulls together FBI reports, NSA intercepts, analysis from the DIA and CIA, and other deeply covert sources.
Private firms are connected to this information web through staff, location, shared technology, and assorted contracts. Working primarily for the Pentagon, for example, L-3 Communications, a spinoff from major defense contractor Lockheed Martin, has manufactured hardware like control systems for satellites and flight recorders. MPRI, which was bought by L-3, provided services like its operations in Macedonia. L-3 also built the NSA’s Secure Terminal Equipment, which instantly encrypts phone conversations.
Another private contractor active in the Balkans was Science Applications, staffed by former NSA and CIA personnel, and specializing in police training. When Janice Stromsem, a Justice Department employee, complained that its program gave the CIA unfettered access to recruiting agents in foreign police forces, she was relieved of her duties. Her concern was that the sovereignty of nations receiving aid from the US was being compromised.
  In 1999, faced with personnel cuts, the NSA offered over 4000 employees “soft landing” buy outs to help them secure jobs with defense firms that have major NSA contracts. NSA offered to pay the first year’s salary, in hopes the contractor would then pick up the tab. Sometimes the employee didn’t even have to move away from Crypto City. Companies taking part in the program included TRW and MPRI’s parent company, Lockheed Martin.
  Lockheed was also a winner in the long-term effort to privatize government services. In 2000, it won a $43.8 million contract to run the Defense Civilian Personnel Data System, one of the largest human resources systems in the world. As a result, a major defense contractor took charge of consolidating all Department of Defense personnel systems, covering hiring and firing for about 750,000 civilian employees. This put the contractor at the cutting edge of Defense Department planning, and made it a key gatekeeper at the revolving door between the US military and private interests.
Invisible Threats
Shortly after his appointment as NSA director in 1999, Michael Hayden went to see the film Enemy of the State, in which Will Smith is pursued by an all-seeing, all hearing NSA and former operative Gene Hackman decries the agency’s dangerous power. In Body of Secrets, author Bamford says Hayden found the film entertaining, yet offensive and highly inaccurate. Still, the NSA chief was comforted by “a society that makes its bogeymen secrecy and power. That’s really what the movie’s about.”
  Unlike Hayden, most people don’t know where the fiction ends and NSA reality begins. Supposedly, the agency rarely “spies” on US citizens at home. On the other hand, the Foreign Intelligence Surveillance Act allows a secret federal court to waive that limitation. The rest of the world doesn’t have that protection. Designating thousands of keywords, names, phrases, and phone numbers, NSA computers can pick them out of millions of messages, passing anything of interest on to analysts. One can only speculate about what happens next.
  After 9/11 the plan was to go further with a project code named Tempest. The goal was to capture computer signals such as keystrokes or monitor images through walls or from other buildings, even if the computers weren’t linked to a network. One NSA document, “Compromising Emanations Laboratory Test Requirements, Electromagnetics,” described procedures for capturing the radiation emitted from a computer-through radio waves and the telephone, serial, network, or power cables attached to it.
  Other NSA programs have included Oasis, designed to reduce audiovisual images into machine-readable text for easier filtering, and Fluent, which expanded Echelon’s multilingual capabilities. And let’s not forget the government’s Carnivore Internet surveillance program, which can collect all communications over any segment of the network being watched.
  Put such elements together, combine them with business imperatives and covert foreign policy objectives, then throw PMCS into the mix, and you get a glimpse of the extent to which information can be translated into raw power and secretly used to shape events. Although most pieces of the puzzle remain obscure, enough is visible to justify suspicion, outrage, and a campaign to pull away the curtain on this Wizard of Oz. But fighting a force that is largely invisible and unaccountable – and able to eavesdrop on the most private exchanges, that is a daunting task, perhaps even more difficult than confronting the mechanisms of corporate globalization that it protects and promotes.


SHOP GLOBAL RESEARCH
 7
 18  9

 613
Articles by:Greg Guma



Message from SaLuSa by MADAD - November 22, 2013

Rumor Mill News Agents Forum
Message from SaLuSa by MADAD - November 22, 2013
Posted By: Mr.Ed [Send E-Mail]
Date: Sunday, 24-Nov-2013 00:11:46

Message from SaLuSa by MADAD - November 22, 2013
This time of your year was usually time when you started thinking of others with more loving way and you experienced less stressful moments until you again started new year with hopes and wishes that slowly vanished as the year passed by. This end of the year for many of you will not be the same, and we know that you already feel it. There is no desire within you to give usual gifts and to expect such gifts in return. You have realized that the greatest gift you can give to all of your current family members and all others is your Love, unconditionally flowing to their hearts and helping them on their own way. Many of you feel that there is no longer the need existing to attach to the old way of celebrating Light being present within and around you. Those who are ready will celebrate and express thanks in the new way with stepping into their higher realities and with sending even more Love to all that are ready to receive it, and they will open many more possibilities for others to choose from.
With these possibilities present within collective mind of all Humanity, those who will awaken or will finish their process of awakening, later in your time, will choose for them the best way and add their own desires to it according their life purpose so everyone will experience a unique way of ascension. All will feel very strong guiding power within that will direct them into fulfillment of their own choices and desires. There will be no need to follow others until this would be their choice of experience, and all people will feel immense power that the freedom will carry, and it will bring that great understanding that no one else is responsible for life experiences but the oneself, and the blame put on others will no longer be present and no longer will create hate and anger between people. Harmony and peace will prevail within and also on the outside world that will be pulled into the collective experience of higher reality with the strong will of all Humanity.
This process of collective change requires some of your time as you already know, yet all the necessary changes begun many years ago, and they are now being sped up due to your increased power of your wish to see the world, that gave you so many precious experiences that were turned to the wisdom, being free and balanced and united. With your own upliftment, others can find their path and their own way easily, as the energy of Love is creating that needed attraction towards that what is being searched for, the same way as you are attracted to all higher energies. It is the Creator’s wish to experience such powerful change within this world and following change of all the greater parts of the whole creation that we all exist in. Remember that you are part of the Creator, and you carry this wish within and give it your own desire and choice that is equal to your free will and create the path which will lead you to the experience of ultimate Oneness with the Creation Force.
I am SaLuSa from Sirius and I wish that you realize the power of your choice to share the Love with all others. You can lift them from their own creation of suffering just with smile or loving thoughts or words you are sending towards them. You will not help them being attached to their own feelings, but you will help them with feeling of Love that is present all around because you cannot save them, it is upon themselves to find their own way and place within All That Is.
Channeller: MADAD
Webpage: SaLuSa : English -- SaLuSa 22.11.2013
http://salusathroughfaithandhope.blogspot.pt/2013/11/english-salusa-22112013.html


Tlar "I Promise You Won't Be Disappointed"

Tlar "I Promise You Won't Be Disappointed"

11/23/2013



Post From Intel4u By Bailey2

[Tlar]    Many changes all geared to taking the dinar international in the next 3 months or sooner, are appearing in articles daily. The CBI will start selling bonds in dinar in December

 If successful then they will have more tariffs coming on line as they are continuing to be implemented, bonds as a new monetary control, and a new exchange rate that also can be used once they go international.

We are watching and witnessing every day a gradual change from being a closed monetary system in Iraq, to a liberalized exchange rate and an open monetary system.                                                                              

 [Tlar]     These tools are necessary to move away from the auctions which is the only tool they have had since 2003 but is requested by the IMF to be abandoned as soon as possible. These are the new tools they will be using in the near future to control both the rate of the dinar and inflation.

There is an end to this and finally it is close. I promise you won’t be disappointed. You will have been a part of the birth of the new Iraq and the resurgence of our own economy.
...
http://www.dinarrecaps.com/our-blog.html

China puts its stamp on Zimbabwean economy

China puts its stamp on Zimbabwean economy

November 04, 2013
By TADASHI SUGIYAMA/ Correspondent
HARARE, Zimbabwe--Under the iron grip of Robert Mugabe, Zimbabwe's economy lies in ruins and human rights abuses are rampant.
Yet, the country once known as Africa's "bread basket" is attracting Chinese firms in ever-growing numbers.
Western companies left Zimbabwe long ago, unable to tolerate the policies of the now 89-year-old Mugabe, who has been in power since 1980.
China is keen to exploit Zimbabwe's vast mineral resources and restore its ability to be a leading producer of crops.
Mugabe is no darling of the West. But his landlocked country in southern Africa welcomes the growing Chinese interest, even though ordinary citizens are clearly wary.
The farming village of Chinhoyi is located roughly 100 kilometers northwest of Harare, Zimbabwe's capital. Fields operated by local farmers flank the main road. The harvest is finished, the dry season has begun and the grass is withered and flattened.
Suddenly, a vast tract of verdant farmland comes into view. Countless automatic sprinklers shower the fields with water. The sight is reminiscent of the days when Zimbabwe was a model of agricultural ingenuity for the rest of Africa.
But it is the red flag of China that flies over this land these days. Smartly attired Chinese in suits come and go.
The land was a white-owned farm that was seized by the Mugabe administration. A Chinese company has operated it for around three years under a contract with the Zimbabwean government.
According to a manager there, the 5,000-hectare farm grows wheat, soybeans, tobacco and other crops that are harvested twice a year. There are plans to expand the farm to 8,000 hectares in the near future. The manager said 20 Chinese and 500 Zimbabweans work the farm.
In addition to direct management, Chinese companies are sprouting across the country, drawing up contracts with individual Zimbabwean farmers.
One top Zimbabwean official has a contract with a Chinese company to sell agricultural produce from 200 hectares of formerly white-owned farmland now in his possession. His workers use fertilizer and pesticide provided at no cost by the company. He sells the harvested tobacco wholesale to the company.
"Chinese companies pay good money," the Zimbabwean official said. "Of course I welcome Japanese companies, too, but I wonder whether they'll do anything for me that the Chinese don't do already."
On the other hand, Commercial Farmers Union President Charles Taffs says he has lost all his farmland.
"I made that farmland," he said. "It doesn't make sense (for Chinese companies to run it)."
SEEKING MINERAL RESOURCES
Chinese companies are also significantly expanding operations in businesses related to Zimbabwe's vast mineral wealth, such as gold, diamonds and chromium.
About 60 kilometers north of Harare, a dirt road in Mashonaland Central Province, northern Zimbabwe, leads to a gold mine. There, Chinese-made trucks and heavy machinery work at full capacity. A Zimbabwean guard wears an armband marked "People's Republic of China--Security" in Chinese. An election poster for Mugabe hangs near the entrance.
Not far from the mine is a simple building housing Chinese engineers. There is also a field growing Chinese vegetables like green onion and garland chrysanthemum. Engineers can be found playing mah-jongg in a small room.
The site, which is home to 12 Chinese, employs 150 Zimbabweans. None of the Chinese is fluent in English, the country's official language. The only thing one Chinese man, apparently the boss, said in English was, "Business, good. Gold, many."
According to Joe, a 55-year-old miner, conditions deteriorated after the mine's management switched from a British company to the Chinese one.
"Pay and safety have both declined. Even when we're working 200 meters below ground, the Chinese won't take measures to prevent cave-ins," Joe said.
He said the Chinese firm is expanding the scale of extraction at nearby gold mines.
An economist with the Zimbabwe National Chamber of Commerce weighed in with this observation: "We are becoming economically colonized by China. Laborers at Chinese companies are working under tragically bad conditions. They're practically treated like slaves."
AFTER WESTERN SANCTIONS
Zimbabwe, formerly called Rhodesia, was once a British colony. The white minority continued to rule the land even after other African countries began gaining independence in the 1950s.
Mugabe, who fought a war of independence in the name of "ethnic liberation," has run the country as the "hero of the people" since winning its freedom in 1980.
China had supported Mugabe's independence movement in the past, and in 2002 it quickly strengthened both economic and military ties with Zimbabwe.
This was after a deterioration in relations with the West when the Mugabe administration began seizing large white-owned farms in 2000.
Zimbabwe, suffering under Western economic sanctions, formulated its "Look East" diplomatic policy, placing a greater emphasis on Asia, and strengthening economic ties with China became a way for it to escape its difficulties.
China, meanwhile, has its eyes on Zimbabwe's abundant mineral resources and high agricultural productivity.
The Chinese Ministry of Foreign Affairs has called Zimbabwe "an old friend," and China has used this relationship to accelerate its companies' forays into the Zimbabwean economy.
In the presidential election held in July, Western countries backed Prime Minister Morgan Tsvangirai, who is sympathetic to their interests.
There was hope that a change in government would lead to a revival of economic relations, but the results gave Mugabe a landslide victory.
According to press reports, Mugabe met with Chinese Foreign Minister Wang Yi at the United Nations General Assembly in New York on Sept. 24. Mugabe said, "China is our most trustworthy partner."