This Land is Our Land: New Zones of Influence

This Land is Our Land: New Zones of Influence

America Divided

Today, the United States mourns the losses of 9/11 victims as efforts to defund the police, homeland security, and the military are being vigorously pursued by protestors in the streets and in the back-rooms of government. Key Democrat-run cities are fast becoming terror hot-spots for radicalized groups claiming territory, setting up new laws, and subjecting US citizens to violent unrest. This Line of Effort combined with a Biden presidential campaign promise to enforce a policy to buyback legally owned assault rifles clearly outlines a DDR campaign to disarm and demobilize both American citizens and the official government of the United States. As it stands now, the country is being divided into Zones of Influence throughout the internet space and the physical realm where the rule of law is being tested.


What is a DDR campaign?

DDR stands for Disarmament Demobilization Reintegration. The historic applications of DDR first originated as post-conflict efforts to build peace by allowing armed combatants to turn over their weapons and rejoin society upon such proceedings as the signing of cease-fire agreements and other conflict terminating settlements. It was also designed to reintegrate ex-combatants into the local economy through education, training, and employment efforts. In recent years DDR has undergone a third shift since the Cold War allowing for the surrender of weapons to begin while armed combatants are still active. Usually with funding provided by the United Nations and implementation by the host nation, DDR programs exist throughout the terror afflicted Middle East and African continents. 

A recent study from Eidgenössische Technische Hochschule Zürich found that “monetization of DDR is creating a cottage industry for former fighters traveling across international borders rejoining armed groups as mercenaries.” The study also warned that “the dilemma of perceiving DDR and CVE [Countering Violent Extremism] through a narrow socio-economic lens… ignores the dynamics of well-educated and middle-income youth becoming radicalized and joining highly asymmetric and terrorist groups… which occurs in Europe and the United States.” Rand Corporation recently reported in a study that “America’s jihadists are made in the United States.” The study found that America’s jihadists do not reflect an immigration problem,” because “among foreign-born travelers, most arrived in the United States as children and spent roughly the same number of years there between their arrival and their attempt to join the jihad.”


From Ferguson to Palestine

A power player among the ACLU is American university professor, Marc Lamont Hill, a Distinguished Professor of African American Studies at Morehouse College who has also been employed at Columbia University and Temple University. Recently, the professor traveled abroad and stated that, “we came to Palestine to stand in love and revolutionary struggle… to a land that has been stolen by greed and destroyed by hate… and we resist the occupation… from Ferguson to Palestine, the struggle for freedom continues.” The ideologies of Marxism and radical Islam first fused in the Middle East during the 20th century. The BLM movement embodies that voice on American soil.

Heritage Foundation reported “watching all the usual progressive Big Money Boys pour resources into the Black Lives Matter network, the ACLU… wants to abolish the Department of Homeland Security.” Articles also confirm interests to Defund the Department of Defense. BLM and its affiliates recently raised over $1b that shows the potential for spending on armed conflict. Bloomberg reported that “Kamala Harris… supports a mandatory buyback of military-style assault weapons.” Upon receiving push-back, a propaganda piece from attempted to perform damage control by re-stating that the vice presidential candidate said, “upon being elected, I will give the US Congress 100 days to… pass reasonable gun safety laws. And if they fail to do it, I will take executive action” to buyback weapons.

The ACLU’s mobilization campaign is shaping up to provide freedom of movement for armed radical revolutionaries on the streets of the United States alongside government efforts to purge US citizens of their right to bear arms. In most official DDR campaigns implemented abroad, ex-combatants disarm on a volunteer basis. Many DDR programs fail because the removal of arms from one group while other factions remain provisioned often triggers a return to hostilities. The campaign promise by Harris guarantees a mandatory action not a volunteer effort that risks leaving many law-abiding US citizens at risk of harm by radicals during this time of crisis. Wave upon wave of violent protests causing private property damage to restaurants, shops, small businesses, and public spaces carried out with assaults on civilians are pushing boundaries of both society and law enforcement.

Generally, DDR programs apply to insurgent forces, but here in the US the Defund Movement migrates these tactics and applies them to national law enforcement to delegitimize their authority and break down morale. Psychologically, the buyback campaign is not only an attack on the constitutional right to carry, but on citizenship that guarantees access to other constitutional rights. This is because participants in DDR programs overseas are usually detained voluntarily in camps or held as criminals.


This Land is Our Land

The struggle also continues online. A warning of cyberattacks was printed in 2018 in the book, The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities 1st Edition. The author, Rocky Termanini, warned that some technologies using the Internet of Things were speeding through commercialization ahead of the cyber security industry’s ability to mitigate threat. The pandemic created a perfect storm of on-boarding new users while cyberattacks were being carried out on everything from ships at sea heading for US coasts to hospitals confronting the challenges of COVID-19. Many cyberattacks have come in the form of DDoS attacks carried out by “the dragon ninjas of the Internet.” “When a high rise building implodes, it brings all the floors, one after another, to the ground. DDoS is a violent cyber implosion that brings any computing infrastructure down,” explains Termanini eerily describing a cyber 9/11 scenario.

New Lines of Effort are needed to strengthen homeland security, heal the wounded, and insulate the economy from conflict and degradation. New technologies and strategic partnerships can help streamline these efforts and maximize success while pooling resources. Established businesses and emerging companies working in line with security efforts can help stabilize the environment, targeting the tools and critical nodes currently being exploited.


Source |Source |Source | Source | Source | Source | Source | Source

US Mexico Border Crisis: Unintended Consequences of Porous Borders

US Mexico Border Crisis: Unintended Consequences of Porous Borders

Exploring Immigration Options

The US Mexico agreement to enable asylum seekers to stay in Mexico for the duration of their claims is moving forwards despite recent opposition from activists. Mexico will benefit from President Trump’s decision to allow 30,000 seasonal workers into the country. Senator Tom Cotton though critical of this decision that he says “forces Americans to compete for jobs against non-citizens who drag down wages,” recently laid out part of the new immigration system as a high-skilled merit based system designed to fill employment gaps in US labor markets. This is a smart plan that will bring urgently needed computer scientists, doctors, engineers, and other high-skilled professionals into the US and US based companies. This is an integral part of economic development that also requires the tightening of porous borders to minimize illicit trafficking threat. The senator said that triple the number of democrats from last month are now recognizing the crisis on the border.

Tightening porous borders and including immigration reform is trending globally. Upon Abu Bakr-Baghdadi’s interest in Southeast Asia, the new wing known as the Katibah Nusantara extension of ISIS recruited some 1,000 fighters in 2014 causing Asian countries to tighten border security from migrant fighters and illicit trafficking including weapons flows. “Weak border security allows for neighboring states to act as safe havens for terrorist organizations” and contributes to the “criminal industry in Southeast Asia [that] is worth upwards of US$100 billion.” In Nigeria where there are about 70% of West Africa’s illegal firearms according to a report from the UN Regional Center for Peace and Disarmament. Nigeria’s Minister of Interior, Lt Gen. (rtd) Abdulrahman Dambazau describes the crisis as a “relationship between the proliferation of small arms and light weapons, porous borders, and drug abuse on the one hand, and the escalation of terrorism, herders/farmers clashes, militancy and other violent crimes on the other hand.” The crisis in Venezuela has continued to dislodge people from their homes and jobs.

All of this chaos has been good for drug-trafficking cartels and other criminal organizations exploiting the US-Mexico border. CBP officials say caravan mixes of nationals from all regions including Asia, Africa, and Latin America are sent to some checkpoints as decoys for large trafficking operations elsewhere along miles and miles of undefended areas. Another 80 miles of wall construction is being funded with a transfer of $1.5 billion from the Pentagon approved by Acting Defense Secretary Patrick Shanahan.   

Source  | Source  | Source  | Source 

Military Spending Shows Where US Power Will Lead

Military Spending Shows Where US Power Will Lead

Defense Budget Maps US Influence

While the future of U.S. foreign policy and worldwide military involvement in the long-run may seem obscure and uncertain, if you know where and what to look for, you may be able to foresee the future as far as ten to twenty years ahead. Look no further than LOGCAP V, otherwise known as Logistics Civilian Augmentation Program-Phase 5, the U.S. government’s next multi-billion dollar contract award plan to get the military where it needs to go. If you follow these precursors, you can draw a pretty accurate picture of future U.S. involvement in the world. The way we look ahead is by figuring out where the federal government plans to spend the right amount of resources, then draw conclusions and perform analysis as to why.

Understanding how the government operates, what it’s long-term objectives are and how decisions are made requires a unique insight one only gets from having been inside the system itself. After multiple delays since 2018, the results of the fifth phase was finally announced in April 2019, to the tune of $82 billion over the next decade. The U.S. Army Sustainment Command, headquartered in Rock Island Armory, Illinois oversees the LOGCAP program and awarded 3 of the 7 contracts to longtime contracting partner KBRwyle. Their history goes back to the early days of Operation Desert Storm and their engagement peaked in 2003 at the dawn of Operation Iraqi Freedom during LOGCAP III. The latter program mobilized the largest civilian workforce into warzones in Iraq and Afghanistan.

Awarded to KBR as a no-bid, cost-plus contract from the Bush administration, it was said that KBR received the contract because it was the only company large enough to handle a project of such unprecedented magnitude. Many argued that Vice President Dick Cheney’s company received the contract exclusively due to his connection to the company as Chief Executive. At any rate, LOGCAP’s 4th phase brought about change. With the Obama administration now in office, increased government oversight and competition were introduced. This opened the platform for companies such as DynCorp, CACI, TITAN and Flour Daniels to get involved.

LOGCAP V contracts will be capped at $82 billion spanning 10 years, said Jerome Jastrab, project manager, Acquisition Integration & Management Center, ASC headquarters.”

On October 20, 2017, the U.S. Army Contracting Command announced their intention to issue a Request for Proposal (RFP) for the Logistics Civil Augmentation Program (LOGCAP V) logistical support services in support of the U.S. Military worldwide. The full list of services provided by LOGCAP V includes, but is not limited to:

  • Setting the Theater
  • Supply Operations
  • Transportation Services
  • Engineering Services
  • Base Camp Services
  • Other Logistics and Sustainment Support Services
  • Minor Construction
  • Food Services
  • Laundry
  • Morale
  • Welfare and Recreation Services
  • Billeting
  • Facility Management

The U.S. Government (USG) intends to award a minimum of four, and up to six, Indefinite Delivery, Indefinite Quantity (IDIQ) contracts to offerors whose proposals are determined to be the most beneficial to the Government. The LOGCAP V basic IDIQ contracts will consist of an initial five-year ordering period and options for five additional one-year ordering periods.

The estimated maximum dollar amount is $82,000,000,000.00 for all awards for the 10 year contract terms.

By way of context, the previous LOGCAP programs had the following “estimated maximum dollar amount[s]”:

  • LOGCAP I (1992): $815 million
  • LOGCAP II (1997): $42 million
  • LOGCAP III (2001): $38.5 billion
  • LOGCAP IV (2008):  $150 billion

So, while LOGCAP V is slated to be smaller than the LOGCAP IV, the estimated maximum amount awarded remains far more than what was awarded in LOGCAPs I – III combined. The current breakdown for the LOGCAP V award is as follows:

PAE-Parsons Global Logistics Services, LLC is one of the award recipients and is hereby awarded Basic Contract W52P1J-19-D-0047 and the following task orders.

– SOUTHCOM Setting the Theater Task Order and associated Performance Task Order: $34,596,500.37


Fluor Intercontinental, Inc. is one of the award recipients and is hereby awarded Basic Contract W52P1J-19-D-0046 and the following task orders.

– AFRICOM Setting the Theater Task Order and associated Performance Task Order: $137,222,537.90


Vectrus Systems Corporation is one of the award recipients and is hereby awarded Basic Contract W52P1J-19-D-0045 and the following task orders.

– PACOM Setting the Theater Task Order and associated Performance Task Order: $349,187,574.26

– CENTCOM Setting the Theater Task Order and associated Performance Task Order: $1,033,582,366.79


Kellogg Brown & Root Services, Inc. is one of the award recipients and is hereby awarded Basic Contract W52P1J-19-D-0044 and the following task orders.

– EUCOM Setting the Theater Task Order and associated Performance Task Order: $183,304,831.67

– NORTHCOM Setting the Theater Task Order and associated Performance Task Order: $393,988,697.66

– Afghanistan Performance Task Order: $1,372,043,984.72

As predicted, companies who responded to the government’s Request For Proposal but did not receive an award began a protest, leading with contracting giant DynCorp, who filed the protest on the morning of April 25, 2019. It is unlikely that the proceedings will have any bearing on the outcome as the approval process goes through multiple phases and redundancies before a decision is reached. The projected transition date for LOGCAP V is September 2019.

The interesting allocation of funds to Afghanistan shows that the United States plans to maintain a presence there for at least another decade, even if only in an advisory role. While the Trump Administration has stated that the United States has no interest in fighting needless, long-term wars, the earmarking of $1.3 billion shows different plans to keep the region stable.

NORTHCOM and PACOM are support roles with similar budgets, asserting that they will have similar program life spans. EUROCOM is essentially a staging ground for the Middle East operations in order to push assets through Iraq, Afghanistan and until recently, Syria. In addition to this, a U.S. military presence also serves as a deterrent from Russian aggression toward Eastern Europe.

SOUTHCOM, which includes South America, is a curious bag, in that it received an inconspicuous $35 Million award designated to PAE-Parsons, a relatively new contractor whose strategic acquisition prior to the Request For Proposal allowed for this win. Since this is a Setting The Theater contract, it leads one to wonder how many bases and where are projected. A safe bet would be in Columbia near the Venezuelan border, possibly 2-3 small bases. The signals for military intervention in Venezuela are pretty clear, and this contract award solidifies it.

With ISIS nearly destroyed, the terrorist organization had no choice but to move outside the region. Flour Intercontinental received a sizable contract award for AFRICOM which is where most of the ISIS ‘fighters’ have fled. The $138 Million investment shows a solid level of U.S. commitment in the region for both humanitarian and military operations.

Given that these earmarks represent only a fraction of the $82B budget, there is good indication these Setting the Theater contracts will likely endure and transition into Operations & Maintenance contracts in the future.

Source  | Source  

Big Tech Wars: How Big Tech and Russian Intel Interfered in 2016 Election on Opposing Sides

Big Tech Wars: How Big Tech and Russian Intel Interfered in 2016 Election on Opposing Sides

Meet Googliath and His Friends in Social Media

The Mueller report finding President Trump innocent of collusion with the Russian Federation’s interference in the 2016 election provides a clear picture of the Russian influence operation but how has the cat and mouse game changed since. Russian intelligence during the 2016 campaign season was able to successfully use social media platforms to engage Trump supporters including Facebook and Twitter even while these social media companies in cooperation with Google were suppressing content and communications to secure Hillary Clinton’s presidency. Such influence operations by the left and DNC may have contributed to the Russian decision to interfere in the 2016 election. You know it’s bad when DC corruption proves too great even for the Russians. Essentially, the democrats failed twice. First on the influence operation to win the election and second, to blame the Russian conspiracy on their opponent, President Trump. Let’s reconstruct what happened, as the stakes have only gotten more dangerous for the 2020 election.

Washington Examiner previously released a detailed account of how the information space was being controlled by Google, Yahoo, and social media companies in the run up to the 2016 election. We know from the recent release of the Mueller Report how Russia countered this. Both psyops, the liberal’s and the Russian’s, illegally influenced the 2016 election. Former employees of Facebook acting as news “curators” reported having routinely suppressed news about conservatives in May 2016 and only permitting news on Facebook’s platform that showed competing liberal narratives on the same topic. Any news from Breitbart or Newsmax for example was countered with the alternate liberal narrative push of CNN, BBC, New York Times, and more. Other whistleblowers have come forward with similar work experiences at other big tech companies. The damage to the 2016 election was considered “incalculable” given the power social media giants have over network television bias that could only influence the vote by a 4-6 point advantage. For this reason, they have been termed the “gatekeepers” by Frank Foer writer at The Atlantic. In the case of the Mueller report however, the real gatekeepers turned out to be a foreign power, Russia. Russia who was also fighting ISIS in Syria and there remains many unanswered questions about the relationship between the Obama administration and ISIS.

Facebook and Twitter went on to hire the Council on American-Islamic Relations (CAIR) to make the social media platforms sharia-compliant. A CAIR official recently in 2019 posted this using one such platform.

Jinan Shbat, the national outreach manager for CAIR tweeted, “You should burn in hell along with Israel” in response to the Emirati cycling team during a training event in Israel. CAIR is affiliated with Hamas, Muslim Brotherhood, and the United Arab Emirates designated CAIR as a terrorist entity in 2014. The organization boasts having groomed 200 Muslims to run for office in the 2020 US election.

Facebook, Twitter, and YouTube have long been used as recruiting platforms for ISIS, al-Qaeda, and other terrorist organizations sporting radical Islamic propaganda and using private messaging tools to recruit, radicalize, and administrate active cells between western countries and conflicts in the Middle East, and attacks globally in some cases over a period of years with no interruption from social media companies. Though these companies have publicly declared to be making their platforms safer and more secure, the role of CAIR demonstrates the exact opposite.

Facebook employees do not appear immune from the influence operations themselves. Facebook’s Chief Operating Officer Sheryl Sandberg wrote, “I want HRC to win badly” in an email to Clinton’s campaign chairman John Podesta included in the leaked documents by WikiLeaks. It appears one of the Podesta brothers was offered immunity in the Russian investigation that found democrats and top levels of the FBI responsible for the fake dossier generated in the effort to impeach President Trump. Sandberg who contributed financially to Clinton’s campaign also wrote about working to elect “the first woman president” from an official executive Facebook position.

Google employees were also wooed into the progressive movement to interfere in the political process. A study conducted by the Campaign for Accountability revealed that “250 people shuttled from government service to Google or vice versa during the Obama administration” forming “deep links” between Google and the Obama administration. 31 Google executives were integrated into White House positions including federal advisory boards and 22 for White House officials were integrated into Google. This directly influenced the employee experience. A former Google employee recalls his experience at the company where he was directly exposed to political doctrine carefully crafted with appealing recreational enticements on the company’s dime:

“I get such a kick out of thinking about the incredible stuff I got to do while at Google (watch Barack Obama/Al Gore/Hillary Clinton/Colin
Powell/Malcolm Gladwell/Jimmy Carter speak, go to a trapeze class, hear John Legend play in Charlie’s cafe, go to a chocolate truffle making class, ski on Google’s dime year after year in Tahoe, to name just a few),”

Google also provided the Clinton campaign with tangible assets such as the use of company jets and financial contributions. Yet, its employees do not boast of high paying salaries, but rather their ability to impact society. A common slogan championing the employee experience goes, “People don’t work at Google for the money. They work at Google because they want to change the world!” Indeed, Google employees have changed the world. A recent joint military operation of Iran’s regime used Google’s facial recognition technology with Chinese support to capture CIA assets inside Iran. The mission was a success for Iran’s government. A classic maneuver in the indoctrination process is to separate the subject from outside influences that might impose competing ideology. The Google environment pressures a life of isolation according to former employees, “my experience was that the people who spent all their time at Google were the ones that ended up on the sexier projects or in charge of things.” Sexier projects like interfering in a presidential election. Employees with more world experience found themselves challenged by Google’s management to weed them out in favor of younger candidates. Another former Google employee described, “but the old-timers certainly felt like they had to have tough interviews, and in many cases tough equated to things like trivia questions or brain teasers, neither of which are completely relevant to what people were being interviewed for.”

Automation is also displacing human elements in the content curating processes at Google, Facebook, Twitter, and Amazon. These companies hired the cyber company Fire-Eye which had previously bought out Mandiant to the build means and methods of controlling the content and accounts on their platforms. Mandiant which was also hired to investigate the Russian matter and found no collusion between the Russian intelligence operation and President Trump further developed content policing capabilities. Following the 2016 election result, it was anticipated by Patrick Hynes that “social media companies would double down on their support for Democrats in the 2020 election.” With the help of Fire-Eye, these companies in the name of safeguarding the platforms from foreign influence, began to use machine learning, tracking and monitoring of IPs, ISPs, keywords, and other triggers to locate fake accounts, remove users, and control the information presented on their platforms. Hynes also predicted “the social media companies will engage in full-scale censorship with the approval or rejection of advertising content in the next presidential election.” This has also contributed to the growing blacklist of banned users.

In the name of national security, or something like it, Google recently blacklisted The Western Journal. A recently leaked document from the company details part of the process:

“The beginning of the workflow starts when a website is placed on a watchlist which is used for monitoring of sites to determine if they violate the Good Neighbor Policy. This watchlist is maintained and stored by Ares with access restricted to policy & enforcement specialists working on the Good Neighbor Policy. Access to the listing can also be shared at the discretion of counsel and legal investigations on a need to know basis to enforce or enrich the policy violations.”

Ares, the god of war, program in tandem with the Good Neighbor Policy, symbolizing the political language of non-interference historically pertaining to policy on Cuba, is in part how the deviation has occurred from debugging Russian influence on the platform to neutralizing political opponents inside the U.S. The company has also tried other means to impose its influence such as sponsoring the Conservative Political Action Conference (CPAC). When convincing employees under Google’s Senior Director of U.S. Public Policy, Adam Kovacevich coached, “I want to be clear that we don’t agree with those things, right?… We abhor and rebuke the offensive things that are said at the conference. Those things obviously don’t align with Google’s values and our approach.” Employees of Google claimed CPAC promoted “hate” and “ethno-nationalism” both branded terms of the progressive movement and possible psychological programming. Google has taken up other democrat agenda holy wars such as open borders that promote human trafficking. The company spent $417m on lobbying against a bill to penalize tech companies that promote sex trafficking.

Jochum Shore & Trossevin PC, republican lobbyists, represented another attempt to use conservatives to fight conservative issues as part of Google’s role on capitol hill. “If we want policymakers to help us when we have a bad bill or a regulation pending, we have to build relationships with them ahead of time. I think part of our work in the DC office and across all of our team is building relationships not just with the people in power but also with the people who influence them” is the official statement of the company and sex trafficking represents a “bad bill.” There automated AI and immense drone-like employee power can capture any unwanted content and win Hillary Clinton the popular vote but nothing in the warlord’s arsenal, Ares, that curbs sex trafficking. This trafficking industry is also used to smuggle other illicit items of terrorism across open and under-defended borders such as narcotics and weapons related materials, terror finance, and Transnational Organized Crime. It is as much a digital war as it is a global ground war and involves state-level patrons of big tech.

As it stands now, the information space is being divided up into spheres of influence as the 2020 election draws near. Both Google and Twitter recently announced deals made with the Trump Administration. However, Facebook, Amazon and others remain in the cradle of corruption. Their boastful support for terrorism and assistance to foreign military operations should be met with sanctions and other criminal charges. Universities and many other non-profits parading as educational or charitable institutions that have associated with radicalization programs should be ineligible for grant funding from the U.S. and also hit with sanctions for supporting terrorism globally. With issues such as stability in the Middle East, border security and immigration, and ongoing relations with China and Russia central to demands on both sides, and the information war armed with cyber weapons, the stage is set for a winner takes all scenario.

Source  | Source  |  SourceSource   |  Source  | Source  |  Source  |  Source  |  Source  |  Source Source

Democrats Demand Redacted Version of Mueller Report

Democrats Demand Redacted Version of Mueller Report


“No evidence of collusion between the Trump Campaign and the Russian government”
April 18, 2019

The two-year saga known as ‘The Mueller Report’ has come to a disappointing, albeit predictable end for Democrats on the morning of April 18 when Attorney General William Barr announced in a press conference that there was “No evidence of collusion between the Trump Campaign and the Russian government”, and the Russia-investigation is thereby concluded. This useless investigation came at the expense of taxpayers, footing the bill for millions of dollars at the request of Congressional Democrats. While this confirms what the right already knew, blood-thirsty Democrats are not happy with the answer. The 448-page report was released to the public in a redacted version, but congressional democrats are demanding to see the classified version, while also demanding a public hearing from Robert Mueller, the report’s author in order to scrutinize his findings.

The redactions were categorized into four (4) classes:

-Investigative Technique (IT)

-Personal Privacy (PP)

-Harm to Ongoing Matter (HOM)

-Grand Jury (GJ)

To Democrat’s further disappointment, the first two categories, Investigative Techniques and Personal Privacy will yield no desirable results as those categories have no bearing on the Trump campaign and are used by the office of the Special Counsel. Consequently, the only bit of dirt they can hope to find would have to be in redactions classified under the HOM and Grand Jury classifications.

These actions establish several truths. For one, this highlights the toxicity of the Democratic party, which is bent on impeaching President Trump on any grounds possible to further their own socialist agenda, despite the success of the Trump administration and sweeping up-trend of the U.S. economy. Second, this clears the administration of any and all wrongdoing, which will further unite the GOP and rally support for the President in 2020.

“…the White House fully cooperated with the Special Counsel’s investigation, providing unfettered access to campaign and White House documents, directing senior aids to testify freely, and asserting no privilege claims.”


April 18, 2019

In addition to finding no evidence of collusion with Russia or any other foreign government, the special counsel found no evidence of any form of obstruction that would in any way hinder the investigation, “…the President took no act that in fact deprived the Special Counsel of the documents or witnesses necessary to complete his investigation.” as stated by AG William Barr.

What’s even more interesting is that AG Barr suggested there was possible ‘spying’ on the Trump campaign in 2016 by the FBI, which was weaponized by Democrats. This begs the question; are Democrats demanding the redacted version to see who among them is implicated? Further probing this issue proves only one thing; the coup conspiracy against President Trump may be far more than just a theory. Here’s my prediction and hope for the ensuing events: Congressional Democrats will sacrifice the necessary people within their own party with the proper clearances in order to leak classified information to the public, hoping to damage the Trump administration in some manner. When this happens, I hope the Director of National Intelligence (DNI) gets involved and revokes all those clearances and investigates every Democrat involved, files FISA warrants on the grounds of conspiracy to breach national security and  prosecutes them to the fullest extent of the law and removes them from office.

Narco-America: How Cartels are Influencing U.S. Border Policy with Psyop Tactics

Narco-America: How Cartels are Influencing U.S. Border Policy with Psyop Tactics

Officials Resign as Public Pressure Intensifies

Kirstjen Nielsen’s resignation from her post as Secretary of Homeland Security announced yesterday by President Trump on Twitter to be replaced by Customs and Border Protection Commissioner Kevin McAleenan comes at a pivotal time in the border and humanitarian crisis. For months now, wave on wave of migrant caravans driven by cartels trafficking in humans have assaulted the US-Mexico border taking advantage of vulnerabilities while they can, probing for weaknesses and testing US response. They have made a deliberate show of retaliation against tighter US policy aimed at intimidating authorities and inciting public pressure. Ongoing arrests of illegal migrants in the US is no doubt damaging the cartel’s bottom line that relies on open borders to conduct global illicit trafficking in humans, narcotics, weapons, and other illicit commodities. Other invested interests include organized crime, gangs, and terrorist organizations as well as their state sponsors. The trafficking war is being fought in part using psychological operations, or psyops.

“Cartels have effectively adapted propaganda into their illicit business blurring the lines between criminality, insurgency, and terrorism further raising the national security importance of this topic.” America Y. Guevara

Psychological warfare “involves the planned use of propaganda and other psychological operations to influence the opinions, emotions, attitudes, and behavior of opposition groups,” according to Rand Corporation. In a 2012 research paper, America Y. Guevara states  “cartels have effectively adapted propaganda into their illicit business blurring the lines between criminality, insurgency, and terrorism further raising the national security importance of this topic.” She goes on to describe the global establishment of narco-culture. Narco-culture glorifies the underground markets trafficking in humans, narcotics, weapons, and other restricted sales items, portrays participants as sympathetic victims should they be apprehended and prosecuted, and champions political figures fighting for aligned causes while shaming and smearing opposition. The psyop tactics of cartels utilize “strategy advocating neoliberal policies in both the United States and Mexico,” according to Guevara.

Spinning trafficking threats into legitimate human rights concerns for migrant refugees suppresses public awareness on other aspects of global trafficking such as supply chain and logistics and promotes democrat agendas for open borders, legalized drugs, and restricted gun rights that serve the interests of both progressives and criminal organizations. Last week, Kirstjen Nielsen discussed child recycling rings being used by traffickers at the US Mexico border while flooded with migrant groups posing as parents and children not their own to gain access into the US. The media responded with headlines, “These Are Families” reporting on ICE arrests of 280 illegal migrants working at CVE Technology Group in the Allen, TX.  Joined by countless journalists and democratic politicians spinning the news to push for open borders with the legalization of migrants inside the U.S.. One such contributor responsible for the quote was senior staff attorney for the organization, RAICES, which provides legal services to migrants, Farheen Siddiqi, also a member of National Association of Muslim Lawyers. The fundamental breakdown in the left and right schools of thought is that the left doesn’t see illegal immigration as a crime because it’s not of ‘serious enough nature’. Justifications from both illegal immigrants and the left are as many as one can concoct, but what is discussed here are the parameters of influence that benefit criminal organizations including Drug-Trafficking Organizations (DTOs), Transnational Organized Crime (TOC), and interest groups with ties to terrorism. What took the killing of journalists in Mexico for cartels to claim the territory of the media can be done in the U.S. with a few well paid PR firms.

Rand Corporation according to a recent study shows the decision to “[shift] from drug trafficking to human trafficking [is] because profits are higher, humans are easier to move and store, and there are fewer risks.” Out of an estimated 25 million cargo containers that enter U.S. ports each year, it is estimated that less than 10% are inspected by U.S. Customs and Border Protection. Senior Financial Crimes Intelligence Specialist, IBM Red Cell, Steven D’Alfonso states, “the increased globalization of trade, communication and logistics has helped TCO evolve into sophisticated organizations not unlike a multinational corporation. The same policies like open borders that serve the globalization of trade also serve transnational organized crime. However, global crime networks span between the diplomatic spheres of western countries to realms of countries hostile to the U.S. and where U.S. presence is underutilized. Derek Maltz, former head of the DEA’s Special Operations Division explains that the same cartels from Mexico and other Latin American countries that have infiltrated every major city in the U.S. are also operating in over 50 other countries including the West Africa drug trade that supplies funding to terrorist groups.

“Hezbollah laid the groundwork for the effective use of information warfare, which is the ability to gain an advantage over an adversary through the management of information.” Colin P. Clarke, Adjunct Political Scientist; Affiliate Faculty, Pardee RAND Graduate School

Some law enforcement personnel recommend relabeling cartels from DTO and TOC to terrorist organizations to change the way law enforcement, military, and the courts will be able to challenge their use of force, infiltration, and information warfare. Regardless, the deployment of cartel organized psyops pose new problems for many US and multinational companies across several industries and law enforcement agencies that require new technology to protect public and private sector interests. Archival Institute is working to achieve develop new systems that will lead to more intelligent borders, immigration and visa processes, transportation logistics, and FCC standards to secure the U.S. and allied partners from infiltration and exploitation.

Key logistical components for “these global networks rely on Mexican drug cartel tunnels have increasingly become more advanced with the addition of ventilation, lighting, high ceilings, medical facilities, dormitories and other high-tech features. The engineering features in these tunnels are believed to be the work of Hezbollah, which has created a vast network of tunnels in Lebanon to protect its members from Israeli airstrikes,” explains D’Alfonso.  According to Colin P. Clarke, Adjunct Political Scientist; Affiliate Faculty, Pardee RAND Graduate School, Hezbollah also “laid the groundwork for the effective use of information warfare, which is the ability to gain an advantage over an adversary through the management of information.” An al-Qaeda recruiting video from 2009 boasted that the best way to smuggle biological weapons into the U.S. was through these tunnels. In an article written by Colonel (Ret.) Ken Allard and former dean of the National War College, the video tells recruits that four pounds of anthrax in a suitcase will kill 330,000 Americans within a single hour. Cartels and their affiliates have spent decades forging this gauntlet into the U.S. in the absence of border security scaled to meet the level of threat by employing the use of force with propaganda to control and dominate the information space. Topics important for TOCs and DTOs are increasingly infiltrating all types of media, research, and entertainment even the arts, government elections and reform items, and disrupting corporate practices on multiple sides.

DTOs and TOC invest in the latest technology in communications, transportation, and defense and often have superior technology to most military and law enforcement operations. Illicit trafficking continues to utilize asymmetric and urban warfare and combines with terrorist operations also blurring the psychological warfare objectives applied throughout the information space and theater of operation. This will continue to drive technology solutions, interagency action, and military assistance. Archival Institute is working to develop more intelligent borders, immigration and visa processes, transportation logistics, and FCC standards to secure the U.S. and allied partners from infiltration and exploitation.

Source  | Source  | Source  | Source  | Source  | Source  | Source  | Source

Pin It on Pinterest