Cookies

Notice: This website may or may not use or set cookies used by Google Ad-sense or other third party companies. If you do not wish to have cookies downloaded to your computer, please disable cookie use in your browser. Thank You.

Friday, May 22, 2015

7 Examples of Police State Technology that have arisen in 2014 to infringe on Our Rights



Things are not looking pretty for the land of the free.


The year 2014 has made it very clear that privacy is under threat, and the situation is not likely to improve. Mass surveillance – which became a national issue via the Edward Snowden leaks – is not subsiding or under reform; instead, is becoming more bold and complex with each passing day.

It would take several books to catalog the myriad ways in which the rights of The People have been casually infringed by various levels of government just in years since 9/11 and the introduction of the PATRIOT Act.

And not only are federal agencies like the NSA, Homeland Security and the FBI that are taking liberties with our… umm… liberties; it is local police, too. The rise of technology is rapidly fueling these agencies with data and “intelligence” with very little oversight and even less pause for reflection to use these powerful abilities wisely and yes, judiciously.

Here are just a few major areas where privacy is losing badly to surveillance technology in 2014. Not that anyone is paying attention, but they are worth reflecting upon soon – hopefully before it is too late to turn things back around:

1. Militarized Police and Weapons of War on American Streets:

True, this technology has been in use for several years now and has been demonstrated at protests such as those held outside of the G20 in Pittsburgh and, Toronto and other locales.

But the events in Ferguson really allowed this brand of crowd control to come of age. This and other key protests have seemingly justified a massive police response for just about anything now… but… you know, the first amendment is still respected and all.

The Daily Sheeple reported:

Ferguson police have stocked up on less-lethal ammunition in the last few months including “hornets nest” CS sting grenades, which shoot out dozens of rubber bullets and a powdered chemical agent upon detonation, tear gas, riot gear, plastic handcuffs and the like in the lead up to the decision which is expected to come any time now. St Louis County police have spent $172,669 on this stuff just since August.
The Pentagon’s 1033 surplus program, which hands out everything from MRAP armored vehicles, to bullet proof vests, assault rifles, and other military weapons to domestic law enforcement agencies, is one of the major reasons that ordinary police departments, including those in small towns, are gearing up as for battle… and that includes Ferguson:

The Department of Defense Excess Property Program (1033 Program) is authorized under federal law and managed through the Defense Logistics Agency’s Law Enforcement Support Office (LESO) in Ft. Belvoir, Va. The 1033 Program provides surplus DoD military equipment to state and local civilian law enforcement agencies for use in counter-narcotics and counter-terrorism operations, and to enhance officer safety.

The Missouri Department of Public Safety is the sponsoring state agency responsible for administration of the 1033 Program in Missouri.

2. Biometrics Comes of Age:

Fingerprints and iris scans are becoming normalized as identifiers on mobile phones, including the iPhone 5, computers and other platforms.

Increasingly, technology – including devices used by police – are utilizing other bodily features (in addition to fingerprints and eyes) to identify you, including ears, noses, heart rate (via electrocardiogram), blood vein matching, your scent or smell and even “butt biometrics” – no joke – which will allow smart car seats to identify the sitter based on their unique posture.

While these are surely being integrated into law enforcement devices, they are also becoming the mainstays of “wearables,” the new trendy technology that is collecting data on all of those using it to track health progress and etc.

Surveillance cameras have already been used to identify you by your walk for several years now, but advances have allowed technology to even identify the person wearing a camera, such as a police officer with a mounted body cam, by just 4 seconds of footage, revealing a ‘biometric fingerprint’ of the individual.

Of course, roadside blood draws have already entered the picture in law enforcement work, including numerous locales that have implemented mandatory policies during stops. This is sure to pick up. In Seattle, the National Highway Traffic Safety Administration (NHTSA) recently conducted a paid, voluntary survey of drivers, who received up to $60 to give blood and breath samples at a roadside stop in effort to study how many people drive impaired.

3. Smart Phone Apps Know Everything About You:

Vocative published a long and unsettling list of apps for smart phones and other similar devices that all collect untold amounts of information about you every day.

Whether you realize it or not, permissions for apps routinely allow the collection and sharing of such information as your contact and address book, your text message, and audio recorded from your device’s microphone, your call log and much more.

Yes, this is really happening, so beware if you are using mobile apps including:

Anti-Virus Security, Viber, Facebook, 360 Security (Antivirus), Tango Messenger, WhatsApp Messenger, Skype, GO Launcher EX, WeChat, CM Security, Waze Social GPS Maps & Traffic, BBM, LINE Free Calls & Messages, Clean Master Phone Boost, BU Battery Saver, Google’s Chrome Browser, Twitter, Maps, Instagram, YouTube, Dolphin Browser, Castle Clash and Trivia Crack …and be sure to actually read over the privacy policy and Terms of Service before accepting or installing anything.

Considering that Angry Birds and Candy Crush were admittedly used to collect surveillance data for the NSA (also revealed in 2014), and law enforcement now regularly investigate persons of interest based upon social media posts and cell phone data, there is no telling how many of these apps may be drawing unwanted suspicion your way… whether you have anything to hide or not.

Need we remind you of all the telecom and internet firms who, according to the Edward Snowden leaks, shared data willingly with the NSA?

4. “StingRay” and “Dirtbox” Cell Phone Interceptors:
2014 is the year that much has come to light about the very secret and awfully quiet use of a data sweeping technology that has increasingly been used by agencies including the FBI, local law enforcement, and likely private, public and foreign intelligence agencies and even military units… though, due to extreme secrecy, it is just too difficult to know for sure.

Moreover, it emerged in 2014 that the FBI has been pressuring police departments to keep quiet about the use of StingRay, which it has also not been obtaining warrants before putting to use:

Not only are local police departments across the United States increasingly relying on so-called StingRay devices to conduct surveillance on cell phone users, but cops are being forced to keep quiet about the operations, new documents reveal.

Recent reports have indicated that law enforcement agencies from coast to coast have been turning to IMSI-catcher devices, like the StingRay sold by Florida’s Harris Corporation, to trick ordinary mobile phones into communicating device-specific International Mobile Subscriber Identity information to phony cell towers — a tactic that takes the approximate geolocation data of all the devices within range and records it for investigators. Recently, the Tallahassee Police Department in the state of Florida was found to have used their own “cell site simulator” at least 200 times to collect phone data without once asking for a warrant during a three-year span, and details about the use of StingRays by other law enforcement groups continue to emerge on the regular.

Although the majority of the December 2012 document is redacted, a paragraph from FBI special agent Laura Laughlin to Police of Chief Donald Ramsdell reveals that Tacoma officers were told they couldn’t discuss their use of IMSI-catchers with anyone… police in Tacoma were forced to sign a non-disclosure agreement, or NDA, with the Federal Bureau of Investigation before they could begin conducting surveillance on cell users with a Harris-sold StingRay.

It further emerged in 2014 that the Justice Department was overseeing the use of small Cessna aircraft using “dirtbox” technology to collect cell phone data over major urban centers across the nation to pinpoint suspects while scooping up information from thousands of cell phone users. Here’s what the Wall Street Journal revealed:

The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

5. Radar Sweeps of Residential Homes:

The Tenth Circuit Court of Appeals made a decision on the use of Doppler radar technology for use in the execution of an arrest warrant. 

The Washington Post considered:

The “grave” Fourth Amendment issues raised by use of a “Doppler radar device capable of detecting from outside the home the presence of human breathing and movement within”. But it is also fair to ask, who is watching the watchers for the use of this technology, anyway? Is this (and much more) being used frequently by authorities or private agencies to collect data in pursuit of investigations, including before the burden of “reasonable suspicion” has been met?
Is such a radar sweep a violation of the 4th Amendment and other rights if the police don’t already have “reasonable suspicion”? The possibilities are foggy… and a bit unnerving.

We don’t normally encounter this question because we normally understand the uses and limits of investigatory tools. If the officer looked through the window and didn’t see any other people, for example, we could intuitively factor that into the reasonable suspicion inquiry without having to think about burdens of proof. I’m less sure what we’re supposed to do when the government uses a suspicion-testing technological device with unknown capabilities. The opinion relies on the language from Buie that “the sweep lasts no longer than is necessary to dispel the reasonable suspicion of danger,” and thus asks whether there was evidence that the Doppler device “dispelled” the reasonable suspicion. But it’s not clear to me that this language from Buie applies here, as it was referring to evidence after reasonable suspicion was established and the entry was made rather than before.

But for the average person, the potential for abuse is pretty clear here. One commenter noted:

Use of this technology on a home is a search. The police don’t know what or who is in the house – they use this technology to survey (i.e. search) the house to determine information that they can’t ascertain without the home owner’s permission.

6. Pre-crime “Threat Assessment” Database:

The 9-1-1 emergency infrastructure now carries a real time “threat assessment” database known as “Beware,” that gives police and first responders a color-coded threat level, with green signifying no threat, yellow identifying a valid threat and red urging immediate caution. The catch? The threat assessment is not just based on the obvious stuff like prior arrests and criminal history, but also compiles billions of consumer records and, yes, social media. In fact, the majority of police now use social media in their investigations… the Beware database just makes it instant and universal.

Even worse, the co-founder of the technology said it flags “offensive speech” in its threat assessment… you don’t even have to make an online threat to be considered a threat, you just have be considered “offensive”! And who decides that, anyway? Not you. You aren’t even allowed to know what has been entered in your privately-held records:

Your local police department is likely using numerous tools and applications that might determine how you get treated during a routine traffic stop, or in response to your neighbor’s call about loud music. One such application, Beware, has been sold to police departments since 2012. It can be accessed on any Internet-enabled device, including tablets, smartphones, laptop and desktop computers, while responders are in route to, or at the location of a call.

This app explores billions of records in social media postings, commercial and public databases for law enforcement needs, churning out “risk profiles” in real time.

‘Beware’ algorithm assigns a score and “threat rating” to a person — green, yellow or red – and sends that rating to a requesting officer. Worst of all, this information is not made available to the very person whose “threat rating” is being appraised. You have no ability to dispute being wrongly designated a high risk potential offender.

And it stands to reason that this concerning database is going to be used against more than just serious criminals. The potential for abuse and use against gun owners and those exercising political speech, including offensive or less than-responsible online rhetoric, is perhaps inevitable and unavoidable with this system, which has been in use for now for several years.

What’s worse? So-called “predictive policing” is just in its infancy… there are multiple platforms still finding a market, and their invasive capabilities are sure to grow in magnitude as the years go on. A federally-mandated network called FirstNet is being constructed, “using federal funding, are set to begin building a $7-billion nationwide first-responder wireless network” that will incorporate these emergency powers into every agency and locale across the country.

7. License Plate Scanning and Traffic Monitoring:

There are already issues for gun owners in Maryland, where concealed carry permits issued by other states are not recognized. Traffic cops there recently pulled over a licensed gun owner in good legal standing from Florida to search his vehicle for a specific firearm – his Kel-Tec .38 semi-automatic handgun – while he and his family were traveling through the state. As it turned out, the gun was locked in a safe at home in Florida, and the incident ended in a traffic warning for speeding. But what prompted the preemptive search, and how did police know this man was a concealed carry?

Likely the stop-and-search was the result of police work involving routine license scanning, traffic monitoring and database threat assessment using software like Beware, which has already been used in some 38 million emergency calls across the country.

Only a few days ago, the mainstream rehashed the fact that the EZ Pass and other toll road transponders are not just used for collecting toll information, but are used for traffic surveillance and police investigations as well.

Forbes’ privacy advocate Kashmir Hill wrote about an electronics tinkerer who “did an analysis of the many ways his car could be tracked and stumbled upon something rather interesting: his E-ZPass, which he obtained for the purpose of paying tolls, was being used to track his car in unexpected places, far away from any toll booths.“

Police subsequently copped to the use of this device in surveillance and tracking activities:

It’s part of Midtown in Motion, an initiative to feed information from lots of sensors into New York’s traffic management center. A spokesperson for the New York Department of Transportation, Scott Gastel, says the E-Z Pass readers are on highways across the city, and on streets in Manhattan, Brooklyn and Staten Island, and have been in use for years. The city uses the data from the readers to provide real-time traffic information, as for this tool… Notably, the fact that E-ZPasses will be used as a tracking device outside of toll payment, is not disclosed anywhere that I could see in the terms and conditions.

They are also used by toll companies themselves, as USA Today disclosed:

Warning to motorists: Don’t speed in the toll lanes. E-Z Pass is watching. Several states, including New York, Maryland and Pennsylvania, say they monitor speeds through the fast pass toll lanes and will suspend your E-Z Pass for multiple speeding violations.Years ago, a hacker explained how the California DOT and law enforcement were able to use toll transponders as an active homing beacon capable of zeroing in on a suspect or monitoring the total flow of traffic over a given period of time:

Each radio frequency id (RFID) transponder sends a unique identification code to scanners positioned at toll booths. A tolling authority computer matches this ID code with credit card and other payment information to collect the toll… [Even] an inexpensive RFID scanner [can be used] to read the ID code of any vehicle remotely, essentially turning the transponder into a homing beacon with a maximum range of about 100 yards.

“You can use it for tracking,” Lawson said. “Once you’ve seen the car, you can pick it out in a crowd.”

That is exactly what California’s 511 system does. Scanners placed throughout the highway network track the movement of motorists with toll transponders as a means of monitoring traffic flow. According to the California Department of Transportation, the system tracks individual ID codes, storing a movement history for each particular car in a database for 24 hours.

Additionally, both Homeland Security and the IRS were in the news this year regarding their use of data collected by both public and private agencies using license plate tracking systems:

The Department of Homeland Security wants a private company to provide a national license-plate tracking system that would give the agency access to vast amounts of information from commercial and law enforcement tag readers, according to a government proposal that does not specify what privacy safeguards would be put in place.

“It is important to note that this database would be run by a commercial enterprise, and the data would be collected and stored by the commercial enterprise, not the government,” she said.
Fox News carried further details:

In June 2012, the IRS awarded Vigilant a $1,188 contract for “access to nationwide data,” according to federal procurement records compiled by the news agency. The contract ended in May 2013, according to the records.

“Especially with the IRS, I don’t know why these agencies are getting access to this kind of information,” Lynch said. “These systems treat every single person in an area as if they’re under investigation for a crime — that is not the way our criminal justice system was set up or the way things work in a democratic society.”

[Source: By Mac Salvo]

Monday, May 18, 2015

The Baltimore (and other) Riots - They Were Planned




[Urban Man's comments: As I was watching the riots in Baltimore, and said out loud that it would be a short period of time before other riots in other large inner cities started up, and I was right, I wondered just how much of this was orchestrated by some entity behind the scenes? And why?]

The over all control of the catalyst of these riots is a no brainer. I know that the people rioting were the dredges of our society and have an issue with mainstream Amercia because of their perceptions of injustice, but when the sames social media sights and personalities, not to mention key rioting words, were used in Baltimore, then in Washington D.C., then Philly and New York, the deduction that these were derived riots canot be swept away.

If you add the facts that there was black leadership in Baltimore (Mayor, Police Chief and Chief Prosecutor) and that there were no facts produced in the wrongful death claim, a rational person would get the idea that the death of one Mr. Drug Addict Career Criminal Freddy Gray.

I was pleased to see Michael Snyder of The Economic Collapse post an article on the the Balitmore Riots and the unanswered questions:

12 unanswered questions about the Baltimore riots that they don’t want us to ask…

Why did the Baltimore riots seem like they were perfectly staged to be a television event? Images of police vehicles burning made for great television all over the planet, but why were there abandoned police vehicles sitting right in the middle of the riot zones without any police officers around them in the first place?

Why was the decision made ahead of time to set a curfew for Tuesday night and not for Monday night? And why are Baltimore police officers claiming that they were ordered to “stand down” and not intervene as dozens of shops, businesses and homes went up in flames? Yes, the anger over the death of Freddie Gray is very real.

Police brutality has been a major problem in Baltimore and much of the rest of the nation for many years. But could it be possible that the anger that the people of Baltimore are feeling is being channeled and manipulated for other purposes? The following are 12 unanswered questions about the Baltimore riots that they don’t want us to ask…

#1 Why are dozens of social media accounts that were linked to violence in Ferguson now trying to stir up violence in Baltimore?…

The data mining firm that found between 20 and 50 social media accounts in Baltimore linked to the violence in Ferguson, Mo. is now reporting a spike in message traffic in Washington D.C., Philadelphia and New York City, with “protesters” trying to get rides to Baltimore for Tuesday night.

The firm, which asked to remain anonymous because it does government work, said some of the suspect social media accounts in Baltimore are sending messages to incite violence. While it is possible to spoof an account, to make it look like someone is one place and really is in another, that does not fully explain the high numbers.

#2 Who was behind the aggressive social media campaign to organize a “purge” that would start at the Mondawmin Mall at precisely 3 PM on Monday afternoon?…

The spark that ignited Monday’s pandemonium probably started with high school students on social media, who were discussing a “purge” — a reference to a film in which laws are suspended.

Many people knew “very early on” that there was “a lot of energy behind this purge movement,” Baltimore City Councilman Nick Mosby told CNN on Tuesday. “It was a metaphor for, ‘Let’s go out and make trouble.'”

#3 Even though authorities had “credible intelligence” that gangs would be specifically targeting police officers on Monday, why weren’t they more prepared? On Tuesday, the captain of the Baltimore police tried to make us believe that they weren’t prepared because they were only anticipating a confrontation with “high schoolers”…

Police Capt. John Kowalczyk said the relatively light initial police presence was because authorities were preparing for a protest of high schoolers. A heavy police presence and automatic weapons would not have been appropriate, he said. Kowalczyk said police made more than 200 arrests — only 34 of them juveniles.

#4 Where were the Baltimore police on Monday afternoon when the riots exploded? During the rioting, CNN legal analyst Jeffrey Toobin said that the “disappearance of the police for hours this afternoon is something that is going to haunt this city for decades”.

#5 Why are police officers in Baltimore claiming that they were instructed to “stand down” during the rioting on Monday afternoon?…

Police officers in Baltimore reportedly told journalists that they were ordered by Mayor Stephanie Rawlings-Blake not to stop looters during yesterday’s riots.

Rawlings-Blake, who waited 5 hours before even making a statement on the unrest, was already under intense critcism for saying that violent mobs were provided with “space” to “destroy” during riots which took place on Saturday.

One Baltimore shopkeeper said that he actually called the police 50 times asking for help and never got any assistance at all. Other business owners reported similar results. This is so similar to what we saw back during the Ferguson riots.

#6 Why was the decision made ahead of time to set a curfew on Tuesday night but not on Monday night?

#7 Why were so many police vehicles conveniently parked along the street in areas where the worst violence happened? After the destruction of a number of police vehicles on Saturday night, the Baltimore police had to know that they were prime targets. So why were there even more police vehicles available for rioters to destroy on Monday? And where were the cops that should have been protecting those vehicles?

#8 Why is an organization funded by George Soros stirring up emotions against the police in Baltimore?

#9 Why is CNN bringing on “commentators” that are promoting violence in Baltimore?…

Marc Lamont Hill, a Morehouse College professor and regular CNN commentator, embraced radical violence in the streets during an interview Monday on CNN.

“There shouldn’t be calm tonight,” Hill told CNN host Don Lemon as riots raged in the streets of Baltimore.

“Black people are dying in the streets. We’ve been dying in the streets for months, years, decades, centuries. I think there can be resistance to oppression.”

#10 Why did Baltimore Mayor Stephanie Rawlings-Blake initially tell reporters that a decision was made on Saturday to give “those who wished to destroy space to do that”?

#11 Why were rioters given hours to cause mayhem before a state of emergency was finally declared on Monday? Maryland Governor Larry Hogan seems to think that Mayor Rawlings-Blake waited far too long to declare a state of emergency. Just check out what he told one reporter…

I‘ve been in daily communication with the mayor and others in the city and our entire team has been involved from day one. Frankly, this was a Baltimore city situation. Baltimore city was in charge. When the mayor called me, which quite frankly we were glad that she finally did, instantly we signed the executive order. We already had our entire team prepared.

We were all in a command center and second floor of the state house in constant communication and we were trying to get in touch with the mayor for quite some time. She finally made that call and we immediately took action.

#12 Does the fact that the mayor of Baltimore has very close ties to the Obama administration have anything to do with how events unfolded during the riots? The following is from Infowars.com…

Rawlings-Blake was one of three mayors who provided broad input into President Obama’s Task Force on 21st Century Policing, which advocates the federalization of police departments across the country by forcing them to adhere to stricter federal requirements when they receive funding.

“The federal government can be a strong partner in our efforts in build better relationships between the police and community,” she said in written testimony before the task force.

That would explain her inaction to stop the rioting when it began: by allowing it to spiral out of control, the mayor and her friends at the Justice Dept. could use the unrest to justify the expansion of federal power into local law enforcement, which would also allow her to receive more funding.

And why did it take Barack Obama several days to publicly condemn the violence in Baltimore? Why didn’t he stand up and say something on Monday when the riots were at their peak?

Something doesn’t smell right about all of this. Much of the violence could have been prevented if things had been handled differently.

In the end, who is going to get hurt the most by all of this? It will be the African-American communities in the heart of Baltimore that are already suffering with extremely high levels of unemployment and poverty.

I wish that we could all just learn to come together and love one another. Over the past few days, I have seen a whole lot of “us vs. them” talk coming from all quarters. This kind of talk is only going to reinforce the cycle of mistrust and violence.

Sadly, I believe that this is just the beginning of what is coming to America.

Tuesday, May 12, 2015

What About This Jade HELM 15 Issue?



[From Urban Man: There is a lot of misinformation out there about military exercises (Jade Helm) and rumors about U.N. troops deployed to the U.S. for some nefarious activity or another. First of all, Jade Helm is an exercise that has been going on in various capacities for several years. Nothing to worry about here guys. No rehearsals for martial law, no taking over Wal-Marts, or anything like that. But thanks for the being suspicious. Being suspscious is good as long as you apply some critical thinking.]

The "U.N. Invasion" should simply be called the "U.N. Non-invasion". Jeez. The picture of rail cars transporting military vehicles could be an Army unit rail hauling to a training event or returning to their home base from a sea port of entry after an overseas deployment. This is a recent articles spining people up with B.S.

UN Medic Units Photographed On Truck On 'Due Course' To Texas - California Military  Train Stretched As Far As The Eye Can See!

While the story on Patriot News Wire tells us that United Nations medical vehicles have been spotted all across the southern portion of America in recent days, a reader of the website got a picture of one of these 'transportations' on I-10 in Mississippi, a highway that runs east to west and according to the photographer, on a due course to Texas.

Texas is one of the states listed as hostile in the upcoming Jade Helm 15 US Army 'exercise' that many are concerned will 'turn hot' and result in gun-confiscation and/or martial law.

The build-up of military vehicles in the southern regions is now undeniable and as we can see in the 1st video and image below from Dahboo77, a military train has just been photographed in southern California with heavy duty military equipment that stretches as far as the eye can see.

With government paid trolls and the ignorant lashing out on comment boards trying to downplay Jade Helm 15, such as several trolls outed here on ANP, they are largely striking out as US patriots drown out the trolls overused spewing of phrases such as 'time to take your meds'. These trolls haven't yet realized that Americans who have largely 'awoken' to what is REALLY going on here choose to believe what they are seeing with their own eyes rather than to believe more government lies and 'troll droppings'.

Phase 2 of Jade Helm 15 is emerging and that the UN is preparing for gun confiscation  in America



From Patriot News Wire: Breaking Jade Helm Update! United Nations Medical Vehicles Spotted Traveling Throughout The South!
While the Government continues to deny that ANYTHING out of the ordinary is going on in regard to Operation Jade Helm 15, and the laimstream media continues to mock anyone who is genuinely concerned, watchful citizens across the nation have been keeping their eyes and ears open, like true patriots and minutemen.

For the past week, people have been reporting seeing United Nations medical vehicles traveling throughout the Southern U.S. Finally, one curious and concerned citizen was able to get an actual picture of one.

[Article from: All News Pipeline]

Tuesday, May 5, 2015

US Government Preparing for Armageddon?



Here is an interesting article I read on Yahoo.


It looks like the Federal Government knows something we don't.  Apparently the US SPACE Command, which governs the nuclear missile capability, is moving back into protected bunkers.  The article below came out in Yahoo News.

There is some internet chatter about the U.S. developing EMP capable missile which would of course be used in a first strike or counter strike fashion.  And about how the Russians and Chinese are so concerned about these supposed EMP missile/weapon capability - meaning the capability to take out the other side's communications, radar, other early defense, and, retaliatory nuclear strike capability - that either side may decide to strike first before they lose any edge.

Combine these warnings with the Russians continually testing this nation's perimeter with their strategic bombers  and then you have a fear, probably a justified fear of a nuclear attack.  I hope not!
US aerospace command moving communications gear back to Cold War bunker

The US military command that scans North America's skies for enemy missiles and aircraft plans to move its communications gear to a Cold War-era mountain bunker, officers said.

The shift to the Cheyenne Mountain base in Colorado is designed to safeguard the command's sensitive sensors and servers from a potential electromagnetic pulse (EMP) attack, military officers said.

The Pentagon last week announced a $700 million contract with Raytheon Corporation to oversee the work for North American Aerospace Command (NORAD) and US Northern Command.

Admiral William Gortney, head of NORAD and Northern Command, said that "because of the very nature of the way that Cheyenne Mountain's built, it's EMP-hardened."

"And so, there's a lot of movement to put capability into Cheyenne Mountain and to be able to communicate in there," Gortney told reporters.

"My primary concern was... are we going to have the space inside the mountain for everybody who wants to move in there, and I'm not at liberty to discuss who's moving in there," he said.

The Cheyenne mountain bunker is a half-acre cavern carved into a mountain in the 1960s that was designed to withstand a Soviet nuclear attack. From inside the massive complex, airmen were poised to send warnings that could trigger the launch of nuclear missiles.

But in 2006, officials decided to move the headquarters of NORAD and US Northern Command from Cheyenne to Petersen Air Force base in Colorado Springs. The Cheyenne bunker was designated as an alternative command center if needed.

That move was touted a more efficient use of resources but had followed hundreds of millions of dollars worth of modernization work at Cheyenne carried out after the attacks of September 11, 2001.

Now the Pentagon is looking at shifting communications gear to the Cheyenne bunker, officials said.

"A lot of the back office communications is being moved there," said one defense official.

Officials said the military's dependence on computer networks and digital communications makes it much more vulnerable to an electromagnetic pulse, which can occur naturally or result from a high-altitude nuclear explosion.

Under the 10-year contract, Raytheon is supposed to deliver "sustainment" services to help the military perform "accurate, timely and unambiguous warning and attack assessment of air, missile and space threats" at the Cheyenne and Petersen bases.

Raytheon's contract also involves unspecified work at Vandenberg Air Force Base in California and Offutt Air Force Base in Nebraska.

[source: http://news.yahoo.com/us-aerospace-command-moving-comms-gear-back-cold-015320113.html]