Cookies

Notice: This website may or may not use or set cookies used by Google Ad-sense or other third party companies. If you do not wish to have cookies downloaded to your computer, please disable cookie use in your browser. Thank You.

Friday, May 22, 2015

7 Examples of Police State Technology that have arisen in 2014 to infringe on Our Rights



Things are not looking pretty for the land of the free.


The year 2014 has made it very clear that privacy is under threat, and the situation is not likely to improve. Mass surveillance – which became a national issue via the Edward Snowden leaks – is not subsiding or under reform; instead, is becoming more bold and complex with each passing day.

It would take several books to catalog the myriad ways in which the rights of The People have been casually infringed by various levels of government just in years since 9/11 and the introduction of the PATRIOT Act.

And not only are federal agencies like the NSA, Homeland Security and the FBI that are taking liberties with our… umm… liberties; it is local police, too. The rise of technology is rapidly fueling these agencies with data and “intelligence” with very little oversight and even less pause for reflection to use these powerful abilities wisely and yes, judiciously.

Here are just a few major areas where privacy is losing badly to surveillance technology in 2014. Not that anyone is paying attention, but they are worth reflecting upon soon – hopefully before it is too late to turn things back around:

1. Militarized Police and Weapons of War on American Streets:

True, this technology has been in use for several years now and has been demonstrated at protests such as those held outside of the G20 in Pittsburgh and, Toronto and other locales.

But the events in Ferguson really allowed this brand of crowd control to come of age. This and other key protests have seemingly justified a massive police response for just about anything now… but… you know, the first amendment is still respected and all.

The Daily Sheeple reported:

Ferguson police have stocked up on less-lethal ammunition in the last few months including “hornets nest” CS sting grenades, which shoot out dozens of rubber bullets and a powdered chemical agent upon detonation, tear gas, riot gear, plastic handcuffs and the like in the lead up to the decision which is expected to come any time now. St Louis County police have spent $172,669 on this stuff just since August.
The Pentagon’s 1033 surplus program, which hands out everything from MRAP armored vehicles, to bullet proof vests, assault rifles, and other military weapons to domestic law enforcement agencies, is one of the major reasons that ordinary police departments, including those in small towns, are gearing up as for battle… and that includes Ferguson:

The Department of Defense Excess Property Program (1033 Program) is authorized under federal law and managed through the Defense Logistics Agency’s Law Enforcement Support Office (LESO) in Ft. Belvoir, Va. The 1033 Program provides surplus DoD military equipment to state and local civilian law enforcement agencies for use in counter-narcotics and counter-terrorism operations, and to enhance officer safety.

The Missouri Department of Public Safety is the sponsoring state agency responsible for administration of the 1033 Program in Missouri.

2. Biometrics Comes of Age:

Fingerprints and iris scans are becoming normalized as identifiers on mobile phones, including the iPhone 5, computers and other platforms.

Increasingly, technology – including devices used by police – are utilizing other bodily features (in addition to fingerprints and eyes) to identify you, including ears, noses, heart rate (via electrocardiogram), blood vein matching, your scent or smell and even “butt biometrics” – no joke – which will allow smart car seats to identify the sitter based on their unique posture.

While these are surely being integrated into law enforcement devices, they are also becoming the mainstays of “wearables,” the new trendy technology that is collecting data on all of those using it to track health progress and etc.

Surveillance cameras have already been used to identify you by your walk for several years now, but advances have allowed technology to even identify the person wearing a camera, such as a police officer with a mounted body cam, by just 4 seconds of footage, revealing a ‘biometric fingerprint’ of the individual.

Of course, roadside blood draws have already entered the picture in law enforcement work, including numerous locales that have implemented mandatory policies during stops. This is sure to pick up. In Seattle, the National Highway Traffic Safety Administration (NHTSA) recently conducted a paid, voluntary survey of drivers, who received up to $60 to give blood and breath samples at a roadside stop in effort to study how many people drive impaired.

3. Smart Phone Apps Know Everything About You:

Vocative published a long and unsettling list of apps for smart phones and other similar devices that all collect untold amounts of information about you every day.

Whether you realize it or not, permissions for apps routinely allow the collection and sharing of such information as your contact and address book, your text message, and audio recorded from your device’s microphone, your call log and much more.

Yes, this is really happening, so beware if you are using mobile apps including:

Anti-Virus Security, Viber, Facebook, 360 Security (Antivirus), Tango Messenger, WhatsApp Messenger, Skype, GO Launcher EX, WeChat, CM Security, Waze Social GPS Maps & Traffic, BBM, LINE Free Calls & Messages, Clean Master Phone Boost, BU Battery Saver, Google’s Chrome Browser, Twitter, Maps, Instagram, YouTube, Dolphin Browser, Castle Clash and Trivia Crack …and be sure to actually read over the privacy policy and Terms of Service before accepting or installing anything.

Considering that Angry Birds and Candy Crush were admittedly used to collect surveillance data for the NSA (also revealed in 2014), and law enforcement now regularly investigate persons of interest based upon social media posts and cell phone data, there is no telling how many of these apps may be drawing unwanted suspicion your way… whether you have anything to hide or not.

Need we remind you of all the telecom and internet firms who, according to the Edward Snowden leaks, shared data willingly with the NSA?

4. “StingRay” and “Dirtbox” Cell Phone Interceptors:
2014 is the year that much has come to light about the very secret and awfully quiet use of a data sweeping technology that has increasingly been used by agencies including the FBI, local law enforcement, and likely private, public and foreign intelligence agencies and even military units… though, due to extreme secrecy, it is just too difficult to know for sure.

Moreover, it emerged in 2014 that the FBI has been pressuring police departments to keep quiet about the use of StingRay, which it has also not been obtaining warrants before putting to use:

Not only are local police departments across the United States increasingly relying on so-called StingRay devices to conduct surveillance on cell phone users, but cops are being forced to keep quiet about the operations, new documents reveal.

Recent reports have indicated that law enforcement agencies from coast to coast have been turning to IMSI-catcher devices, like the StingRay sold by Florida’s Harris Corporation, to trick ordinary mobile phones into communicating device-specific International Mobile Subscriber Identity information to phony cell towers — a tactic that takes the approximate geolocation data of all the devices within range and records it for investigators. Recently, the Tallahassee Police Department in the state of Florida was found to have used their own “cell site simulator” at least 200 times to collect phone data without once asking for a warrant during a three-year span, and details about the use of StingRays by other law enforcement groups continue to emerge on the regular.

Although the majority of the December 2012 document is redacted, a paragraph from FBI special agent Laura Laughlin to Police of Chief Donald Ramsdell reveals that Tacoma officers were told they couldn’t discuss their use of IMSI-catchers with anyone… police in Tacoma were forced to sign a non-disclosure agreement, or NDA, with the Federal Bureau of Investigation before they could begin conducting surveillance on cell users with a Harris-sold StingRay.

It further emerged in 2014 that the Justice Department was overseeing the use of small Cessna aircraft using “dirtbox” technology to collect cell phone data over major urban centers across the nation to pinpoint suspects while scooping up information from thousands of cell phone users. Here’s what the Wall Street Journal revealed:

The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

5. Radar Sweeps of Residential Homes:

The Tenth Circuit Court of Appeals made a decision on the use of Doppler radar technology for use in the execution of an arrest warrant. 

The Washington Post considered:

The “grave” Fourth Amendment issues raised by use of a “Doppler radar device capable of detecting from outside the home the presence of human breathing and movement within”. But it is also fair to ask, who is watching the watchers for the use of this technology, anyway? Is this (and much more) being used frequently by authorities or private agencies to collect data in pursuit of investigations, including before the burden of “reasonable suspicion” has been met?
Is such a radar sweep a violation of the 4th Amendment and other rights if the police don’t already have “reasonable suspicion”? The possibilities are foggy… and a bit unnerving.

We don’t normally encounter this question because we normally understand the uses and limits of investigatory tools. If the officer looked through the window and didn’t see any other people, for example, we could intuitively factor that into the reasonable suspicion inquiry without having to think about burdens of proof. I’m less sure what we’re supposed to do when the government uses a suspicion-testing technological device with unknown capabilities. The opinion relies on the language from Buie that “the sweep lasts no longer than is necessary to dispel the reasonable suspicion of danger,” and thus asks whether there was evidence that the Doppler device “dispelled” the reasonable suspicion. But it’s not clear to me that this language from Buie applies here, as it was referring to evidence after reasonable suspicion was established and the entry was made rather than before.

But for the average person, the potential for abuse is pretty clear here. One commenter noted:

Use of this technology on a home is a search. The police don’t know what or who is in the house – they use this technology to survey (i.e. search) the house to determine information that they can’t ascertain without the home owner’s permission.

6. Pre-crime “Threat Assessment” Database:

The 9-1-1 emergency infrastructure now carries a real time “threat assessment” database known as “Beware,” that gives police and first responders a color-coded threat level, with green signifying no threat, yellow identifying a valid threat and red urging immediate caution. The catch? The threat assessment is not just based on the obvious stuff like prior arrests and criminal history, but also compiles billions of consumer records and, yes, social media. In fact, the majority of police now use social media in their investigations… the Beware database just makes it instant and universal.

Even worse, the co-founder of the technology said it flags “offensive speech” in its threat assessment… you don’t even have to make an online threat to be considered a threat, you just have be considered “offensive”! And who decides that, anyway? Not you. You aren’t even allowed to know what has been entered in your privately-held records:

Your local police department is likely using numerous tools and applications that might determine how you get treated during a routine traffic stop, or in response to your neighbor’s call about loud music. One such application, Beware, has been sold to police departments since 2012. It can be accessed on any Internet-enabled device, including tablets, smartphones, laptop and desktop computers, while responders are in route to, or at the location of a call.

This app explores billions of records in social media postings, commercial and public databases for law enforcement needs, churning out “risk profiles” in real time.

‘Beware’ algorithm assigns a score and “threat rating” to a person — green, yellow or red – and sends that rating to a requesting officer. Worst of all, this information is not made available to the very person whose “threat rating” is being appraised. You have no ability to dispute being wrongly designated a high risk potential offender.

And it stands to reason that this concerning database is going to be used against more than just serious criminals. The potential for abuse and use against gun owners and those exercising political speech, including offensive or less than-responsible online rhetoric, is perhaps inevitable and unavoidable with this system, which has been in use for now for several years.

What’s worse? So-called “predictive policing” is just in its infancy… there are multiple platforms still finding a market, and their invasive capabilities are sure to grow in magnitude as the years go on. A federally-mandated network called FirstNet is being constructed, “using federal funding, are set to begin building a $7-billion nationwide first-responder wireless network” that will incorporate these emergency powers into every agency and locale across the country.

7. License Plate Scanning and Traffic Monitoring:

There are already issues for gun owners in Maryland, where concealed carry permits issued by other states are not recognized. Traffic cops there recently pulled over a licensed gun owner in good legal standing from Florida to search his vehicle for a specific firearm – his Kel-Tec .38 semi-automatic handgun – while he and his family were traveling through the state. As it turned out, the gun was locked in a safe at home in Florida, and the incident ended in a traffic warning for speeding. But what prompted the preemptive search, and how did police know this man was a concealed carry?

Likely the stop-and-search was the result of police work involving routine license scanning, traffic monitoring and database threat assessment using software like Beware, which has already been used in some 38 million emergency calls across the country.

Only a few days ago, the mainstream rehashed the fact that the EZ Pass and other toll road transponders are not just used for collecting toll information, but are used for traffic surveillance and police investigations as well.

Forbes’ privacy advocate Kashmir Hill wrote about an electronics tinkerer who “did an analysis of the many ways his car could be tracked and stumbled upon something rather interesting: his E-ZPass, which he obtained for the purpose of paying tolls, was being used to track his car in unexpected places, far away from any toll booths.“

Police subsequently copped to the use of this device in surveillance and tracking activities:

It’s part of Midtown in Motion, an initiative to feed information from lots of sensors into New York’s traffic management center. A spokesperson for the New York Department of Transportation, Scott Gastel, says the E-Z Pass readers are on highways across the city, and on streets in Manhattan, Brooklyn and Staten Island, and have been in use for years. The city uses the data from the readers to provide real-time traffic information, as for this tool… Notably, the fact that E-ZPasses will be used as a tracking device outside of toll payment, is not disclosed anywhere that I could see in the terms and conditions.

They are also used by toll companies themselves, as USA Today disclosed:

Warning to motorists: Don’t speed in the toll lanes. E-Z Pass is watching. Several states, including New York, Maryland and Pennsylvania, say they monitor speeds through the fast pass toll lanes and will suspend your E-Z Pass for multiple speeding violations.Years ago, a hacker explained how the California DOT and law enforcement were able to use toll transponders as an active homing beacon capable of zeroing in on a suspect or monitoring the total flow of traffic over a given period of time:

Each radio frequency id (RFID) transponder sends a unique identification code to scanners positioned at toll booths. A tolling authority computer matches this ID code with credit card and other payment information to collect the toll… [Even] an inexpensive RFID scanner [can be used] to read the ID code of any vehicle remotely, essentially turning the transponder into a homing beacon with a maximum range of about 100 yards.

“You can use it for tracking,” Lawson said. “Once you’ve seen the car, you can pick it out in a crowd.”

That is exactly what California’s 511 system does. Scanners placed throughout the highway network track the movement of motorists with toll transponders as a means of monitoring traffic flow. According to the California Department of Transportation, the system tracks individual ID codes, storing a movement history for each particular car in a database for 24 hours.

Additionally, both Homeland Security and the IRS were in the news this year regarding their use of data collected by both public and private agencies using license plate tracking systems:

The Department of Homeland Security wants a private company to provide a national license-plate tracking system that would give the agency access to vast amounts of information from commercial and law enforcement tag readers, according to a government proposal that does not specify what privacy safeguards would be put in place.

“It is important to note that this database would be run by a commercial enterprise, and the data would be collected and stored by the commercial enterprise, not the government,” she said.
Fox News carried further details:

In June 2012, the IRS awarded Vigilant a $1,188 contract for “access to nationwide data,” according to federal procurement records compiled by the news agency. The contract ended in May 2013, according to the records.

“Especially with the IRS, I don’t know why these agencies are getting access to this kind of information,” Lynch said. “These systems treat every single person in an area as if they’re under investigation for a crime — that is not the way our criminal justice system was set up or the way things work in a democratic society.”

[Source: By Mac Salvo]

Monday, May 18, 2015

The Baltimore (and other) Riots - They Were Planned




[Urban Man's comments: As I was watching the riots in Baltimore, and said out loud that it would be a short period of time before other riots in other large inner cities started up, and I was right, I wondered just how much of this was orchestrated by some entity behind the scenes? And why?]

The over all control of the catalyst of these riots is a no brainer. I know that the people rioting were the dredges of our society and have an issue with mainstream Amercia because of their perceptions of injustice, but when the sames social media sights and personalities, not to mention key rioting words, were used in Baltimore, then in Washington D.C., then Philly and New York, the deduction that these were derived riots canot be swept away.

If you add the facts that there was black leadership in Baltimore (Mayor, Police Chief and Chief Prosecutor) and that there were no facts produced in the wrongful death claim, a rational person would get the idea that the death of one Mr. Drug Addict Career Criminal Freddy Gray.

I was pleased to see Michael Snyder of The Economic Collapse post an article on the the Balitmore Riots and the unanswered questions:

12 unanswered questions about the Baltimore riots that they don’t want us to ask…

Why did the Baltimore riots seem like they were perfectly staged to be a television event? Images of police vehicles burning made for great television all over the planet, but why were there abandoned police vehicles sitting right in the middle of the riot zones without any police officers around them in the first place?

Why was the decision made ahead of time to set a curfew for Tuesday night and not for Monday night? And why are Baltimore police officers claiming that they were ordered to “stand down” and not intervene as dozens of shops, businesses and homes went up in flames? Yes, the anger over the death of Freddie Gray is very real.

Police brutality has been a major problem in Baltimore and much of the rest of the nation for many years. But could it be possible that the anger that the people of Baltimore are feeling is being channeled and manipulated for other purposes? The following are 12 unanswered questions about the Baltimore riots that they don’t want us to ask…

#1 Why are dozens of social media accounts that were linked to violence in Ferguson now trying to stir up violence in Baltimore?…

The data mining firm that found between 20 and 50 social media accounts in Baltimore linked to the violence in Ferguson, Mo. is now reporting a spike in message traffic in Washington D.C., Philadelphia and New York City, with “protesters” trying to get rides to Baltimore for Tuesday night.

The firm, which asked to remain anonymous because it does government work, said some of the suspect social media accounts in Baltimore are sending messages to incite violence. While it is possible to spoof an account, to make it look like someone is one place and really is in another, that does not fully explain the high numbers.

#2 Who was behind the aggressive social media campaign to organize a “purge” that would start at the Mondawmin Mall at precisely 3 PM on Monday afternoon?…

The spark that ignited Monday’s pandemonium probably started with high school students on social media, who were discussing a “purge” — a reference to a film in which laws are suspended.

Many people knew “very early on” that there was “a lot of energy behind this purge movement,” Baltimore City Councilman Nick Mosby told CNN on Tuesday. “It was a metaphor for, ‘Let’s go out and make trouble.'”

#3 Even though authorities had “credible intelligence” that gangs would be specifically targeting police officers on Monday, why weren’t they more prepared? On Tuesday, the captain of the Baltimore police tried to make us believe that they weren’t prepared because they were only anticipating a confrontation with “high schoolers”…

Police Capt. John Kowalczyk said the relatively light initial police presence was because authorities were preparing for a protest of high schoolers. A heavy police presence and automatic weapons would not have been appropriate, he said. Kowalczyk said police made more than 200 arrests — only 34 of them juveniles.

#4 Where were the Baltimore police on Monday afternoon when the riots exploded? During the rioting, CNN legal analyst Jeffrey Toobin said that the “disappearance of the police for hours this afternoon is something that is going to haunt this city for decades”.

#5 Why are police officers in Baltimore claiming that they were instructed to “stand down” during the rioting on Monday afternoon?…

Police officers in Baltimore reportedly told journalists that they were ordered by Mayor Stephanie Rawlings-Blake not to stop looters during yesterday’s riots.

Rawlings-Blake, who waited 5 hours before even making a statement on the unrest, was already under intense critcism for saying that violent mobs were provided with “space” to “destroy” during riots which took place on Saturday.

One Baltimore shopkeeper said that he actually called the police 50 times asking for help and never got any assistance at all. Other business owners reported similar results. This is so similar to what we saw back during the Ferguson riots.

#6 Why was the decision made ahead of time to set a curfew on Tuesday night but not on Monday night?

#7 Why were so many police vehicles conveniently parked along the street in areas where the worst violence happened? After the destruction of a number of police vehicles on Saturday night, the Baltimore police had to know that they were prime targets. So why were there even more police vehicles available for rioters to destroy on Monday? And where were the cops that should have been protecting those vehicles?

#8 Why is an organization funded by George Soros stirring up emotions against the police in Baltimore?

#9 Why is CNN bringing on “commentators” that are promoting violence in Baltimore?…

Marc Lamont Hill, a Morehouse College professor and regular CNN commentator, embraced radical violence in the streets during an interview Monday on CNN.

“There shouldn’t be calm tonight,” Hill told CNN host Don Lemon as riots raged in the streets of Baltimore.

“Black people are dying in the streets. We’ve been dying in the streets for months, years, decades, centuries. I think there can be resistance to oppression.”

#10 Why did Baltimore Mayor Stephanie Rawlings-Blake initially tell reporters that a decision was made on Saturday to give “those who wished to destroy space to do that”?

#11 Why were rioters given hours to cause mayhem before a state of emergency was finally declared on Monday? Maryland Governor Larry Hogan seems to think that Mayor Rawlings-Blake waited far too long to declare a state of emergency. Just check out what he told one reporter…

I‘ve been in daily communication with the mayor and others in the city and our entire team has been involved from day one. Frankly, this was a Baltimore city situation. Baltimore city was in charge. When the mayor called me, which quite frankly we were glad that she finally did, instantly we signed the executive order. We already had our entire team prepared.

We were all in a command center and second floor of the state house in constant communication and we were trying to get in touch with the mayor for quite some time. She finally made that call and we immediately took action.

#12 Does the fact that the mayor of Baltimore has very close ties to the Obama administration have anything to do with how events unfolded during the riots? The following is from Infowars.com…

Rawlings-Blake was one of three mayors who provided broad input into President Obama’s Task Force on 21st Century Policing, which advocates the federalization of police departments across the country by forcing them to adhere to stricter federal requirements when they receive funding.

“The federal government can be a strong partner in our efforts in build better relationships between the police and community,” she said in written testimony before the task force.

That would explain her inaction to stop the rioting when it began: by allowing it to spiral out of control, the mayor and her friends at the Justice Dept. could use the unrest to justify the expansion of federal power into local law enforcement, which would also allow her to receive more funding.

And why did it take Barack Obama several days to publicly condemn the violence in Baltimore? Why didn’t he stand up and say something on Monday when the riots were at their peak?

Something doesn’t smell right about all of this. Much of the violence could have been prevented if things had been handled differently.

In the end, who is going to get hurt the most by all of this? It will be the African-American communities in the heart of Baltimore that are already suffering with extremely high levels of unemployment and poverty.

I wish that we could all just learn to come together and love one another. Over the past few days, I have seen a whole lot of “us vs. them” talk coming from all quarters. This kind of talk is only going to reinforce the cycle of mistrust and violence.

Sadly, I believe that this is just the beginning of what is coming to America.

Tuesday, May 12, 2015

What About This Jade HELM 15 Issue?



[From Urban Man: There is a lot of misinformation out there about military exercises (Jade Helm) and rumors about U.N. troops deployed to the U.S. for some nefarious activity or another. First of all, Jade Helm is an exercise that has been going on in various capacities for several years. Nothing to worry about here guys. No rehearsals for martial law, no taking over Wal-Marts, or anything like that. But thanks for the being suspicious. Being suspscious is good as long as you apply some critical thinking.]

The "U.N. Invasion" should simply be called the "U.N. Non-invasion". Jeez. The picture of rail cars transporting military vehicles could be an Army unit rail hauling to a training event or returning to their home base from a sea port of entry after an overseas deployment. This is a recent articles spining people up with B.S.

UN Medic Units Photographed On Truck On 'Due Course' To Texas - California Military  Train Stretched As Far As The Eye Can See!

While the story on Patriot News Wire tells us that United Nations medical vehicles have been spotted all across the southern portion of America in recent days, a reader of the website got a picture of one of these 'transportations' on I-10 in Mississippi, a highway that runs east to west and according to the photographer, on a due course to Texas.

Texas is one of the states listed as hostile in the upcoming Jade Helm 15 US Army 'exercise' that many are concerned will 'turn hot' and result in gun-confiscation and/or martial law.

The build-up of military vehicles in the southern regions is now undeniable and as we can see in the 1st video and image below from Dahboo77, a military train has just been photographed in southern California with heavy duty military equipment that stretches as far as the eye can see.

With government paid trolls and the ignorant lashing out on comment boards trying to downplay Jade Helm 15, such as several trolls outed here on ANP, they are largely striking out as US patriots drown out the trolls overused spewing of phrases such as 'time to take your meds'. These trolls haven't yet realized that Americans who have largely 'awoken' to what is REALLY going on here choose to believe what they are seeing with their own eyes rather than to believe more government lies and 'troll droppings'.

Phase 2 of Jade Helm 15 is emerging and that the UN is preparing for gun confiscation  in America



From Patriot News Wire: Breaking Jade Helm Update! United Nations Medical Vehicles Spotted Traveling Throughout The South!
While the Government continues to deny that ANYTHING out of the ordinary is going on in regard to Operation Jade Helm 15, and the laimstream media continues to mock anyone who is genuinely concerned, watchful citizens across the nation have been keeping their eyes and ears open, like true patriots and minutemen.

For the past week, people have been reporting seeing United Nations medical vehicles traveling throughout the Southern U.S. Finally, one curious and concerned citizen was able to get an actual picture of one.

[Article from: All News Pipeline]

Tuesday, May 5, 2015

US Government Preparing for Armageddon?



Here is an interesting article I read on Yahoo.


It looks like the Federal Government knows something we don't.  Apparently the US SPACE Command, which governs the nuclear missile capability, is moving back into protected bunkers.  The article below came out in Yahoo News.

There is some internet chatter about the U.S. developing EMP capable missile which would of course be used in a first strike or counter strike fashion.  And about how the Russians and Chinese are so concerned about these supposed EMP missile/weapon capability - meaning the capability to take out the other side's communications, radar, other early defense, and, retaliatory nuclear strike capability - that either side may decide to strike first before they lose any edge.

Combine these warnings with the Russians continually testing this nation's perimeter with their strategic bombers  and then you have a fear, probably a justified fear of a nuclear attack.  I hope not!
US aerospace command moving communications gear back to Cold War bunker

The US military command that scans North America's skies for enemy missiles and aircraft plans to move its communications gear to a Cold War-era mountain bunker, officers said.

The shift to the Cheyenne Mountain base in Colorado is designed to safeguard the command's sensitive sensors and servers from a potential electromagnetic pulse (EMP) attack, military officers said.

The Pentagon last week announced a $700 million contract with Raytheon Corporation to oversee the work for North American Aerospace Command (NORAD) and US Northern Command.

Admiral William Gortney, head of NORAD and Northern Command, said that "because of the very nature of the way that Cheyenne Mountain's built, it's EMP-hardened."

"And so, there's a lot of movement to put capability into Cheyenne Mountain and to be able to communicate in there," Gortney told reporters.

"My primary concern was... are we going to have the space inside the mountain for everybody who wants to move in there, and I'm not at liberty to discuss who's moving in there," he said.

The Cheyenne mountain bunker is a half-acre cavern carved into a mountain in the 1960s that was designed to withstand a Soviet nuclear attack. From inside the massive complex, airmen were poised to send warnings that could trigger the launch of nuclear missiles.

But in 2006, officials decided to move the headquarters of NORAD and US Northern Command from Cheyenne to Petersen Air Force base in Colorado Springs. The Cheyenne bunker was designated as an alternative command center if needed.

That move was touted a more efficient use of resources but had followed hundreds of millions of dollars worth of modernization work at Cheyenne carried out after the attacks of September 11, 2001.

Now the Pentagon is looking at shifting communications gear to the Cheyenne bunker, officials said.

"A lot of the back office communications is being moved there," said one defense official.

Officials said the military's dependence on computer networks and digital communications makes it much more vulnerable to an electromagnetic pulse, which can occur naturally or result from a high-altitude nuclear explosion.

Under the 10-year contract, Raytheon is supposed to deliver "sustainment" services to help the military perform "accurate, timely and unambiguous warning and attack assessment of air, missile and space threats" at the Cheyenne and Petersen bases.

Raytheon's contract also involves unspecified work at Vandenberg Air Force Base in California and Offutt Air Force Base in Nebraska.

[source: http://news.yahoo.com/us-aerospace-command-moving-comms-gear-back-cold-015320113.html]

Wednesday, April 29, 2015

Think Like a Green Beret: The PACE Plan



Sometimes you get lucky and your plan works just as you thought it would. Enjoy those days, because there will not be many of them. No matter how smart you are or how hard you work, on the battlefield, the enemy always gets a vote. The famous philosopher Mike Tyson once said, “Everyone has a plan ’till they get punched in the mouth.” The Green Berets know something about taking a punch, and they have a plan for that, too.

Exercise Robin Sage is a series of very bad days. The culmination of the Special Forces Qualification Course, Robin Sage starts with intense planning, and then your ODA goes into Pineland, where a team of professional role players and evaluators crushes those sweet plans contingency by contingency until you lose your plan B, followed by that alternative you never wanted to use until you are in emergency mode. That is the point at which you realize, when you plan for the worst thing that can possibly happen, and that thing happens, the situation can only improve.

SEAL math famously teaches, “Two is one and one is none.” Green Berets aren’t happy with those odds when failure can risk a life or jeopardize the mission.

Lacking the SEAL’s poetic nature, the Green Beret forgoes rhyming and uses the acronym PACE.

PACE describes a methodology originally used to build a communication plan. For an ODA in a denied area, communication is the only way to get resupplied, and most importantly, extracted. The loss of all communications normally initiates the escape-and-evasion plan. The no-comms plan universally sucks, and almost always means abandonment of the mission and unsupported escape and evasion. Nobody wants that. The PACE acronym stands for primary, alternate, contingency, and emergency.

Primary: The routine and most effective method of communication.

Alternate: Another common method of passing a message with minimal to no other impact. May be used along with the primary under normal circumstances to assure readiness.

Contingency: This method will normally not be as convenient or efficient as the first two methods, but is capable of passing traffic when necessary.

Emergency: This is a method of last resort that probably sucks in some very significant way and may incur significant delays.

The PACE method establishes four methods of communication between your team and higher. The genius of PACE is what engineers call ‘graceful degradation.’

When your primary radio fails, it is way too soon to worry; you still have A, C, and E. You transition through the plan and hopefully get extracted before you are forced to rely on E.

An example of a PACE plan would be:

Primary: Satellite radio
Alternate: High-frequency radio
Contingency: Satellite phone
Emergency: Survival radio on guard frequency to aircraft overhead

To be valid, each method must have independent equipment and power sources. This costs a lot of weight and is typically spread across the team so the loss of one man or rucksack doesn't compromise more than one method.

Well, if PACE is good for communications, it is good for everything else, formal and informal. If I have four ways to do something, I can be pretty cavalier about a single failure. But there are many instances where we just don’t have that many options. On a parachute infiltration, we have two parachutes and the option to stay on the plane. The failure of all three of those alternatives makes the emergency option for reaching the ground look pretty grim.

For water, chow, weapons, and everything else essential, PACE is a natural way of thinking:

Primary: M4 rifle
Alternate: Grenades
Contingency: Handgun
Emergency: I use my knife to get another gun or two from the enemy

When the Green Beret has a full set of PACE alternatives in any area, he is confident. As problems arise, he works through the degraded options, always looking at ways to regain the lost alternatives and move back up the chain. Things will go wrong, equipment will get lost or broken, teams might get separated during the mission or by enemy action. PACE lets you plan for the very worst while maintaining a positive mindset.

Green Beret survival training prepares them to improvise weapons and shelter while foraging food and water. This gives them a resilience that allows them to maintain morale in conditions that would break others. They live PACE everyday. The idea that you can handle the worst possible situation makes anything better seem like luxury.

You can use PACE to plan how to get to work or what to do if your girlfriend dumps you. What’s the worst thing that can happen? Have a series of plans for that.

Having thought out the options and requirements beforehand makes the execution of a plan much less stressful.

Think like a Green Beret. Use PACE. If you don’t have that many options, be cautious and try to develop more. If you get pushed down to emergency options, push back and recover. Make a plan and work it. As Elvis, The King himself, once said, “When things go wrong, don’t go with them.”

[Source: Article from: Mark Miller, posted on the Load Out Room,
http://loadoutroom.com/14734/think-like-a-green-beret-the-pace-plan/]

Urban Man

Wednesday, April 22, 2015

Survival Tip - Making Slugs from Bird Shot



Billy sent in an e-mail to Urban Survival Skills asking if we have ever heard of cut shells. Yes, Billy, I know them as "cut down shells" - where we would take a shot shell of bird shot and turn it into basically a slug round by cutting around the outer casing of the shot shell about half way between the end case and the crimped end. We would not cut completely through the case, nor have our cuts connect. (The video below, that I found on YouTube, has a good illustration on how we advise making the cut).

When the shot shell is fired the case separates creating an enclosed end of bird shot propelled down range like a slug. It will have the added benefit of once it hits a soft target, the bird shot sort of like fragments creating hundreds of fragments in a body.

We used to use them as expedient ballistic breaching rounds, to take out door hinges and locks.

This technique can be used by survivalists if they run out of slugs and have bird shot available, they would be able to make their own defensive slug rounds.



Urban Man says to use extreme caution if you decide to practice this. This is for educational purposes only.

Urban Man

Wednesday, April 15, 2015

Secret Iranian handbook calls for EMP attack on America






"Here is an article I recently read that makes chills run down my spine. Is our own government playing into the hands of these idiots. You be the judge and prepare."
                                                                                                              ~Urban Man~

WASHINGTON – A “secret” Iranian military handbook, American officials say, confirms that the Islamic Republic of Iran is including in its arsenal a plan to launch a nuclear electromagnetic pulse attack on the American national grid system. To carry out such an attack, from a high-altitude nuclear blast, would require Iran to have not only the missiles to launch such a device but also the technology to produce a nuclear explosion.

The revelation comes as the United States, along with the P5+1 countries that comprise the United Nations Security Council, is about to finalize negotiations over Iran’s nuclear development program. There have been concerns raised that Iran still has the intention of making nuclear bombs using the technology in that program, and the negotiations may not do enough to prevent it.

It’s also an issue on which WND has reported for a decade,  as long ago as 2005 when intelligence sources were quoted, saying, “Iran is not only covertly developing nuclear weapons, it is already testing ballistic missiles specifically designed to destroy America’s technical infrastructure, effectively neutralizing the world’s lone superpower.”

At that time, scientists, including President Reagan’s top science adviser, William R. Graham, said there was no other explanation for such tests than preparation for the deployment of electromagnetic pulse weapons – even one of which could knock out America’s critical electrical and technological infrastructure, effectively sending the continental U.S. back to the 19th century with a recovery time of months or years.

At the time, Sen. John Kyl, R-Ariz., warned, “A terrorist organization might have trouble putting a nuclear warhead ‘on target’ with a Scud, but it would be much easier to simply launch and detonate in the atmosphere. No need for the risk and difficulty of trying to smuggle a nuclear weapon over the border or hit a particular city. Just launch a cheap missile from a freighter in international waters – al-Qaida is believed to own about 80 such vessels – and make sure to get it a few miles in the air.”

In the latest development, the P5+1 countries – Great Britain, France, the United States, Russia and China plus Germany – have sought restrictions on Iran’s nuclear program to prevent that country from turning a program that reportedly is for medical and power production into a bomb factory.

Peter Vincent Pry, who is executive director of a congressional advisory group called the Task Force on National and Homeland Security, raised the alarm as the agreement is about to be finalized. He said U.S. military officials have confirmed such an Iranian plan.

“Iranian military documents describe such a scenario – including a recently translated Iranian military textbook that endorses nuclear EMP attack against the United States,” Pry wrote in a recent column in Israel’s main online media network, Aruz Sheva. “Iran with a small number of nuclear missiles can by EMP attack threaten the existence of modernity and be the death knell of Western principles of international law, humanism and freedom,” he said.

“For the first time in history, a failed state like Iran could destroy the most successful societies on Earth and convert an evolving benign world order into world chaos.”

WND could not immediately independently confirm the military documents cited by Pry. But WND reported in 2014 that there was developing considerable alarm among national security experts that Iran was intending to position its warships off the U.S. coast. Those experts confirmed there would be no warning and that the U.S. missile defense system would not be able to respond in time to prevent the high altitude nuclear explosion that could be launched from one of those ships.

“It shows they could put a weapon on a boat or freighter, and if Iran has ballistic missiles it could put it anywhere on the U.S. coast,” John Bolton, former U.S. ambassador to the United Nations and a senior fellow at the Washington-based American Enterprise Institute, said at the time. The Iranian Fars News Agency had announced that the fleet would undertake a three-month mission and would consist of a destroyer and a helicopter-carrying vessel.

This week’s revelation comes as Israel has just re-elected Benjamin Netanyahu as prime minister. He recently warned a joint session of Congress about reaching any nuclear agreement with Iran. According to sources, the textbook refers to an EMP attack on some 20 locations in the United States.

Pry pointed out that Iran, in fact, would not need an intercontinental missile to launch a high-altitude EMP attack that could knock out the U.S. national grid system and the other life-sustaining critical infrastructures that depend on the grid to function. He said Iran could deliver a nuclear attack from a ship just off the U.S. East Coast either by a missile or by launching into orbit around the Earth a satellite which, in effect, would be a nuclear device.

Critical infrastructures that depend on the already vulnerable U.S. national grid system include communications, water and food delivery systems, financial and banking systems, transportation, regulation of the nearly million miles of oil and natural gas pipelines that traverse the U.S. and the myriad of modern conveniences that function by automated control systems that often are located in remote areas of the country.

Pry said it would cost only about $2 billion to harden the grid from such an attack or a direct hit from solar flares – which could produce similar damage and is occurring now. He added that protection of the grid could include the installation of devices like geomagnetically induced current, or GICs, blockers. Pry’s warning about the Iranian military textbook coincided with a threat from Gen. Hassan Firouzabad, the Iranian armed forces chief of staff.

“We are ready for the decisive battle against the U.S. and the Zionist regime,” Firouzabad recently told the Iranian Fars News Agency. “Iran armed with nuclear missiles poses an unprecedented threat to global civilization,” Pry said.

In 2012, when Iran was reporting the successful testing of a variety of missiles, including those that could strike targets 1,250 miles away, WND reported that the rogue nation also was working on an intercontinental ballistic missiles under the guise of it is space program. One nuclear warhead detonated at high-altitude over the United States would black out the national electric grid and other life-sustaining critical infrastructures for months or years by means of an electromagnetic pulse, Pry said. He said the chaos could result in the deaths of 90 percent of the American population. Such an attack would not be exclusive to the United States.

Dr. Emily Landau, director of the Arms Control and Regional Security Program at Israel’s Institute for National Security Studies, said Iran also could target Israel.

Landau, who is an expert on Iran’s nuclear program, said Iran could very well be planning an EMP attack on Israel, based on statements from high-level Iranian officials. She said Iran already has the missiles but only needs the nuclear device to launch an EMP that would be capable of destroying Israel’s electrical grid.

“Iran doesn’t have a nuclear bomb yet, and hopefully it won’t have one, but if it does manage to build a bomb, an EMP attack is a real possibility,” Landau said.
Pry went so far as to say Iran is actively preparing for an EMP attack.

Tehran has undertaken offshore exercises using Scud missiles fired and positioned in such a way that they exploded in the atmosphere, exactly the method you would use for an EMP attack, he said. “(Iran) could even marshal a major Islamic invasion of Israel, massacring the Jews and ushering in the era of the 12th imam, the Islamic messiah, whose arrival Iran’s leadership believes is imminent,” Pry said.

WND also reported at the time that a 2004 report by a congressional commission found “several potential adversaries have or can acquire the capability to attack the United States with a high-altitude nuclear weapons-generated electromagnetic pulse (EMP). A determined adversary can achieve an EMP attack capability without having a high level of sophistication.”

“EMP is one of a small number of threats that can hold our society at risk of catastrophic consequences,” the report said. “EMP will cover the wide geographic region within line of sight to the nuclear weapon. It has the capability to produce significant damage to critical infrastructures and thus to the very fabric of U.S. society, as well as to the ability of the United States and Western nations to project influence and military power.”

Some individual states have adopted various requirements to minimize the damage from such an attack, but federal legislation has not yet succeeded in setting those standards. It’s the SHIELD Act, from Rep. Trent Franks, that has been introduced several times.

The Shield Act stands for Secure High-voltage Infrastructure for Electricity from Lethal Damage. It calls on industry and government to develop, promulgate and implement standards and processes that are necessary to address the electric grid’s current vulnerabilities and shortcomings that would be affected by an EMP.

[source: Posted By F. Michael Maloof On 03/19/2015 @ 9:48 pm In Front Page,Politics,U.S.,World | No Comments]

P.S. Here is an interesting video to watch regarding Iran and its nuclear intentions.





Urban Man

Thursday, April 9, 2015

How To Survive In The West- An Al-Qaida Training Manual



One the precept for military operations is to understand your enemy. Know his Techniques, Tactical and Procedures or what the military calls "TTP's".   It also gives you the advantage when you can also learn of your adversary’s strategic plans and goals.
 
Al-Qaida has published a guide for radical Muslims living in the west, called "How to Survive in the West".  It is advertised as "A guide for the Muslims who are living in a majority non Muslim land, or a country where the rulers are harsh towards the believers. It will explain to you the different scenarios you may get into and how to react. It will teach you how to be a secret Agent who lives a double life, something Muslims will have to do to survive in the coming years."

This book was apparently written by an al-Qaida operative who states he has been involved in the global Jihad for 10+ years.   The prologue states "Being an undercover agent requires knowledge and skills. In this book, you will be taught these skills. You will be taught; how to live a double-life, how to keep your secret life private, how to survive in a threatening land, how you can arm and strengthen the Muslims when the time for Jihad comes to your country, and neighborhood.  In simple terms, from this guide book - you will learn how to become a Sleeper-cell which activates at the right time when the Ummah needs you."

The subjects covered in this book include:


Chapter 1: Hiding the Extremist identity
Chapter 2: Breaking Allegiance
Chapter 3: Earning Money
Chapter 4: Internet Privacy
Chapter 5: Training
Chapter 6: Primitive Weapons and Survival Techniques
Chapter 7: Modern Weapons
Chapter 8: Bomb Making
Chapter 9: Transporting Weapons
Chapter 10: What happens when you are spied on and get raided and Sting Operations
Chapter 11: The Jihad Begins/War in Protests/ Guerrilla warfare
Chapter 12: Escaping for Safety

Urban Survival Skills has received a copy of this 71 page eBook and we are offering it to readers free of charge in order to recognize extremist Islamic operations or even prepare counter measures against these extremist attacks by a potential enemy that may precipitate some sort of collapse or societal chaos with attacks across this country.

If you are a reader of Urban Survival Skills and would like a copy of this eBook, please send an e-mail to urbansurvivalman@gmail.com, with the subject line "Request copy of How to Survive in the West".   I will, as soon as I'm able, send you copy via reply e-mail with the attached PDF eBook.
Prepare well my friends.

Urban Man

Thursday, April 2, 2015

Simple Home Tests to Determine Whether Your Bullion Is Real or Fake


"Here is a very informative article from one of my readers. Jerrell asked if I would post it in efforts to help readers identify whether or not your precious metals are real. Jerrell is from Money Metals Exchange. Money Metals Exchange, is the national precious metals dealer that was just voted #1 in the U.S., partly because they publish a large amount of high-quality content."                                                                                                                                                -Urban Man


Simple Home Tests to Determine Whether Your Bullion Is Real or Fake


Just about all bullion investors worry about counterfeits. Those concerns are magnified when someone is buying for the first time. Stories about fake coins from Asia and gold bars drilled and filled with Tungsten have been in the headlines recently. But the truth is, counterfeiting is just about as old as the concept of money itself.

Fortunately, making phony coins or bars isn't easy. The equipment involved is significant – it takes far more than a color printer and the right paper. And making fakes good enough to pass a few simple tests is darn near impossible.

Some testing equipment, such as mass spectrometers and sonogram machines, are expensive and impractical for the typical person to use.

However, here are some lower budget ways you can determine whether or not the bullion you hold is genuine:
Size and Weight

Gold and silver are extraordinarily dense metals – much denser than just about any base metal (even lead and mercury in the case of gold). That means just about all fakes that weigh correctly will be too large in diameter and/or thickness. Or they will be underweight in order to achieve the right diameter and thickness. Simply comparing the diameter and thickness of the coin in question with others known to be genuine could be enough to put you at ease.

If not, an inexpensive set of calipers and a jeweler's scale are a good way of checking. Every coin or round is produced with close tolerances in terms of diameter, thickness, and weight. You can find these dimensions on the “Specifications” tab on our coin and round product pages.

Investors might also consider Fisch Testers. Genuine coins will be both small enough in diameter and thin enough to fit through a slot in the tool, while remaining heavy enough to tip the tool on its 
fulcrum. Simple and very effective.


Sound or “Ping” Testing

Authentic gold and silver coins chime when struck and the difference is notable versus base metals.

Base metal coins will sound duller and their ring will be shorter -- much like the difference between clinking crystal versus glass champagne flutes.

Try balancing the coin on your fingertip and strike it with another coin. This video provides a good demonstration.

Investors with an iPhone can also install the CoinTrust application and test a short list of the most popular gold and silver coins by gently spinning them on a hard surface with the phone’s microphone positioned nearby.

Android users can install the Bullion Test app. Choose the coin from a drop down list, press the microphone button, then balance the coin on your fingertip and strike it with a fingernail or another coin. Results are instant and accurate.

Magnetism

The above video on ping testing also references another simple technique for using a magnet to identify fakes. Gold and silver are non-magnetic. Placing a strong magnet on a coin and tipping it to watch whether the magnet slides off, as it should, or sticks, like it would to a counterfeit, requires only an inexpensive magnet and a few seconds. (Note that some base metals used in counterfeiting are also non-magnetic, so we suggest doing this in conjunction with some other techniques listed.)

Thermal Conductivity Testing for Silver

Silver is one of the best conductors of thermal energy found in nature. That makes it easy to test silver bullion using nothing more than an ice cube. Place an ice cube on top of a silver bar, coin, or round, and you should see it begin melting almost instantly as heat is quickly transferred. Holding a coin or round between fingers or in the palm of your hand makes the results even more noticeable as the silver rapidly cools to your touch.

Acid Testing


Investors can purchase inexpensive acid test kits for gold and silver. Watching the color change in a drop of acid can reveal whether or not a sample is genuine. However, acids should be handled carefully. Your items can be permanently discolored.

Since bullion coins, rounds, and bars are valued for their metal content, not their beauty, discoloration is unlikely to reduce the value of your bullion by more than a small amount. But it’s still wise to use acid testing sparingly and with caution.


A Word about Tungsten Fakes

Some of the hardest to detect counterfeit gold products involve tungsten. Tungsten’s density is close to that of gold, and it is relatively inexpensive. Here are some of the best ways to avoid problems:
Avoid large gold bars. 10-ounce and larger gold bars are among the easiest to tamper with as they can be drilled, filled with tungsten, and then plugged again with gold. This is more difficult with units 1 oz and smaller. Tungsten is extraordinarily hard whereas gold is soft. This means tungsten is very difficult to use in minting or fabricating small items. It is brittle, and stamping it with a design will result in coins with less detail unless it has been plated with a thick layer of gold.

Ring testing as outlined above should still offer defense against tungsten fakes.

If the deal is too good to be true, it probably is. Never buy gold bullion below its melt value unless you know and trust its origins.

Buy silver. No metal shares a similar density to silver, making it even more difficult to make good counterfeits than with gold. Plus, the financial incentive is lower.

Recently some of the more prominent mints and refiners have begun employing technology to mark products with seals that assure authenticity. For example, Sunshine Minting rounds and bars carry a seal that reads “VALID” when viewed using their proprietary lens and oriented correctly.

Investors can expect this sort of technology to be more widely used in the coming years. (Note: the lens carries a cost of around $20.00 and needs to be purchased separately from the metal itself.)

As mentioned above, the best defense against fake bullion is to buy from a reputable dealer. Money Metals Exchange sources products directly from well-regarded mints and refiners and employs good quality controls. That is why we can confidently stand behind every product we sell – guaranteeing authenticity, weight, and purity.

Clint Siegner is a Director at Money Metals Exchange, perhaps the nation's fastest-growing dealer of low-premium precious metals coins, rounds, and bars. Siegner, a graduate of Linfield College in Oregon, puts his experience in business management along with his passion for personal liberty, limited government, and honest money into the development of Money Metals' brand and reach. This includes writing extensively on the bullion markets and their intersection with policy and world affairs.


"Urban Man says buyer beware!"

Urban Man

Tuesday, March 17, 2015

The Coming Collapse





"Here is an interesting article I just read. You read it and you be the judge.- Urban Man"

Crash in September?

Very possible say's Bob Rinear. Most people, prepper advisers or financial analysts know that a collapse is coming. Most won't go on record predicting a specific time frame. Well, Mr. Rinear comes as close as I've seen with is article below. But in any event, it's hard to prep and prep hard day by day, week by week and month b month. It is helpful to get "spun up" in a controlled manner to have a date to be finished or at least situated for. This article does that,...gives us until September of this year to be ready.

"Crash in September?"
 
If you've been reading us for any length of time you know that I've mentioned that we might see some interesting events in the September/October time frame. That has prompted people to ask “why then?” which is a very good question. But the reasons for my observations will cause some people to question my sanity. That’s okay, it’s been done a million times before.

Let me lay out some ground work before we get into some pretty interesting discussion.

Every one of you lives through cycles, and most of them we don’t even pay attention to, they’re just “the way it is”. For instance you know with NO doubt that when you go to bed tonight, that tomorrow the sun will rise. It has for billions of years and will continue to for billions more.
That’s a cycle. You also have no problem declaring that as sure as the sun will rise, your winter will be followed by spring, which is followed by summer and then autumn will appear. That’s a never ending cycle as the earth makes its travels around the sun.

Then there’s the cycle of the zodiac. As the earth circles around the sun, the stars we observe in the night sky change. As the seasons progress it appears as though we’re traveling through the different constellations, again this is a cycle as it looks like the sun passes through the 12 star signs. Then there’s the 26000 year cycle of how the earth (which spins like a top) wobbles on its axis, only to return to where it started.

In economics, there’s many many “cycles” that have been observed, from the typical “boom/bust” to the longer wave theories. Take for instance the “Kondratieff wave”. It was developed by a Russian economist named Nikolai Kondratiev, and as Wikipedia has noted, his economic theories got him into so much trouble with the Russian government that he was eventually executed because of them. 

This is how it works….

Kondratiev’s analysis described how international capitalism had gone through many such “great depressions” and as such were a normal part of the international mercantile credit system. The long term business cycles that he identified through meticulous research are now called “Kondratieff” cycles or “K” waves.

The K wave is a 60 year cycle (+/- a year or so) with internal phases that are sometimes characterized as seasons: spring, summer, autumn and winter:

Spring: a new factor of production, good economic times, rising inflation

Summer: hubristic ‘peak’ war followed by societal doubts and double digit inflation

Autumn: the financial fix of inflation leads to a credit boom which creates a false plateau of prosperity that ends in a speculative bubble

Winter: excess capacity worked off by massive debt repudiation, commodity deflation & economic depression. A ‘trough’ war breaks psychology of doom.

Well according to K wave theorists, we’re in the winter phase, something that should last until about 2020, with a serious depression hitting before then.

Of course there are many other examples of “waves” or cycles, including Elliot waves, Kress cycles, Proprietary cycles, energy wave cycles, etc. But there’s another one that’s making headlines lately and it’s called the “Shemitah” which is based on Biblical interpretation.

The basic idea is this…when God told Moses how things had to work, there was a “rest period” on the 7th year of the cycle. So you’d sow and reap for 6 years then let the ground lay “fallow” or dormant on the 7th year. It also corresponded with the dismissal of debt. Every 7th year on the last day of they cycle month of Tishri, all debts had to be discharged, which tended to lead to economic upheavals. In fact the last day of the cycle has it’s own name called Elul which is the 29th day.

Well, the Shemitah years get a lot of press simply because they’re very interesting. I personally don’t believe in random coincidence, I believe in synchronicity which I can best describe as “coincidence with a purpose”. Well, when you look at the years that correspond with the Shemitah, you do indeed see some incredible correlations. Almost every major economic “shaking” has landed in a Shemitah year cycle, with the bulk of the big events clustered around a 3 week period at the end of a Shemitah cycle year.

So what have we seen happen in Shemitah cycle years? Well the biggest stock market crashes on record happened during them. On September 17th, 2001 (which was Elul 29 on the Jewish calendar), we witnessed the greatest one day stock market crash in U.S. history up to that time.

At the end of the next Shemitah year in 2008, another horrifying stock market crash took place.

On September 29th, 2008 the Dow plummeted 777 points, which still today remains the greatest one day stock market crash of all time. (Barring “flash crashes” of course) Oh and guess what? It landed on Elul 29, the last day of the calendar. But it wasn't just 2001 and 08 that gets interesting. 

The market crash of 30/31, was another “record” time for the period. The recession/market melts of 1973, 1980, 1987, 1994 and 2001 come to mind. All of them were Shemitah years. The mind boggling event of 9/11 was at the last week of a shemitah year in the month of Tishri. That’s quite the coincidence.

I could go on an on about the Shemitah because frankly there’s simply too many events to ignore the fact that because of or in spite of, things tend to happen in those years. For instance this year Elul 29 will fall on September 13th, but that’s a Sunday right? Right. 

However that means the market stops trading on 9/11 ( we've seen a total halt to all trading on 9/11 once before) however the Globex global markets do trade on Sunday evening the 13th. Wait it gets even stranger….On Sept 13th, the Biblical Elul 29 we also get a Solar eclipse. The last time that happened where a solar event landed on Elul 28 at the end of a cycle we got the 1987 “Black Monday” the following days.

So am I saying I think something really wicked could happen this Sept/October because it falls on a Shemitah cycle and Tishri month? Not exactly. When you look at markets you have to have an “assemblage of information” to make your decisions. Just like when we enter a trade we want a stock with 1) a reason it might want to go up 2) a defined level it must cross to prove it wants up and 3) a flat to rising market to help it. Well when looking at the big picture, we also have to line up more than one thing. So consider the following….

This September is indeed the end of the Shemitah cycle and Tishri is the last month of that cycle. Things do tend to happen on or around those dates. We have a Solar eclipse scheduled to happen on that very same day. Interesting. Then we add in the Kondratieff cycle which says we’ll be in the “winter” of the big cycle, often leading to recessions/depressions, etc.

The Kress cycle says that the end of 2014 – the 2017 period, should cause shaking. The Armstrong cycle suggests trouble as it peaks in October of 2015 and leads to massive trouble by 2020. The Elliot wave cycle suggests a period of turmoil.

All these interesting cycles suggest some trouble on the way. While you can’t place 100% confidence in ANY humanistic cycle, when you add up how many of them point to troubles, you should at least take note. But it isn't simply moon cycles or K cycles or Shemitah’s that have me pondering some autumn troubles. We've got global Geo-political issues that are coming front and center too.

The IMF is going to re-balance it’s weightings of the SDR’s this September. We know that China wants in in the worst way. If they get the Yuan included in the basket, it will be one more shot to the stomach of the US dollar, a currency no one seems to want to trade in any more.

The Greeks got an extension of their economic woes put off until June where we’re going to have to endure more back and forth bickering with the European Union. Could that ultimately lead to a Greek exit around September?

I’m on record saying the Fed’s will indeed raise rates this year. While largely symbolic, there will be reaction to it. If it doesn't happen in June, the next likely time slot would be September. Interesting? Maybe. What about Ukraine? There are some who believe that NATO might make a push to get closer to Russia’s borders before the harsh winter season sets in. The month of September has been mentioned a few times. Will Russia sit back and let NATO arms park on their doorstep? Not likely.

Here’s the bottom line folks. We all know this economy is held together with Duct tape, hollow promises, derivatives and printed money. We also know it is going to end one day. We know the world is a very dangerous place with major tensions over Ukraine, Syria and Iran. We know that any number of things could be the “one” that causes a great shaking. From where I sit, the most logical time for something to happen would be the 90 days from August through October. Will it? I have no idea. We could go through the period with nary a hiccup. Or we could see a massive crash. I just find it all worthy of note, and take my guess that we “very well could” see an event in that time period.

Urban Man


Tuesday, February 17, 2015

Chapter 29: Expanding Knowledge Through Reading





Taking the advice from my Survivalist friends, I have been reading several good books on prepping and survival. Although most are fiction, they are written in such as way that the scenarios can actually take place or are taken from real events.

I recently read Liberators from James Wesley Rawles and found it to be riveting.

What I Learned From Rawles' "Liberators"

James Wesley, Rawles (really have no idea why the comma is before his last name) is the pre-eminscent author of Survival Prepper Books. His series of "Patriots", "Survivors", "Founders", "Expatriates", and the latest, "Liberators", are all educational as well as entertaining. If you simply read these books to get ideas on how to prepare, they are worth it.

This is what I have learned or think I have learned from the latest book "Liberators". I won't go into the story line so I won’t ruin it for some of you who haven't read it.

Precious Metals. I need more "junk silver". I has a decent amount of one ounce Silver rounds and a few ounces of Gold, but minimal junk silver. Junk Silver is older U.S. coinage which contain some percentage of silver. Some of these may have a collectible or numismatic value greater than the value of the silver content. But the idea for preppers is to have some on hand in order to purchase goods, material and services when fiat currency is in free fall or no longer accepted at all. These "junk silver" coins are:

Dollars:

Morgan (1878–1921) -- 90-percent silver
Peace (1921–1928 and 1934–1935) -- 90-percent silver

Half-Dollars:

Liberty Head "Barber" (1892–1915) -- 90-percent silver
Walking Liberty (1916–1947) -- 90-percent silver
Franklin (1948–1963) -- 90-percent silver
Kennedy (1964) -- 90-percent silver
Kennedy (1965–1970) -- 40-percent silver

Quarters:

Liberty Head "Barber" (1892–1916) -- 90-percent silver
Standing Liberty (1916–1930) -- 90-percent silver
Washington (1932, 1934–1964) -- 90-percent silver

Dimes:

Liberty Head "Barber" (1892–1916) -- 90-percent silver
Winged Liberty Head "Mercury" (1916–1945) -- 90-percent silver
Roosevelt (1946–1964) -- 90-percent silver

Nickels:

Jefferson "Wartime" (1942 (partial)-1945) -- 35-percent silver

Manuals and Books on digits. 

I have a decent amount of books on thumb drives and can be opened and viewed on a computer,..e.g..laptop, pda, tablet, nook or kindle. I am lacking military manuals. I have some, but since many are free for downloading, I am going to secure many of these onto thumb drives. 

I am just going to re-dedicated myself to storing more as those 16 and 32 gb thumb drive can contain a lot! I need to store some more thumb drives even the very small ones, no bigger than a finger nail, that are easy to conceal. You never know when you need to conceal digital information through hostile people at check points.Some of the books and manuals I'm going to download (already have started) are:

FM 1-02, OPERATIONAL TERMS AND GRAPHICS
FM 2-0, INTELLIGENCE OPERATIONS
FM 2-19.4, BRIGADE COMBAT TEAM INTELLIGENCE OPERATIONS
FM 2-22.2, COUNTERINTELLIGENCE
FM 2-22.3, HUMAN INTELLIGENCE COLLECTOR OPERATIONS
FM 2-91.4 3/20/2008 INTELLIGENCE SUPPORT TO URBAN OPERATIONS
FM 2-91.6 10/10/2007 SOLDIER SURVEILLANCE AND RECONNAISSANCE FUNDAMENTALS
FM 3-05.70 5/17/2002 SURVIVAL
FM 3-11.4 6/2/2003 MULTISERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR NUCLEAR, BIOLOGICAL, AND CHEMICAL (NBC) PROTECTION
FM 3-11.5 4/4/2006 MULTISERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR DECONTAMINATION
FM 3-11.9 1/10/2005 POTENTIAL MILITARY CHEMICAL/BIOLOGICAL AGENTS AND COMPOUNDS
FM 3-22.9 8/12/2008 RIFLE MARKSMANSHIP, M16-/M4-SERIES WEAPONS
FM 3-24.2 4/21/2009 TACTICS IN COUNTERINSURGENCY
FM 3-34.214 7/11/2007 EXPLOSIVES AND DEMOLITIONS
FM 3-75 5/23/2012 RANGER OPERATIONS
FM 3-90-2 3/22/2013 RECONNAISSANCE, SECURITY, AND TACTICAL ENABLING TASKS
FM 4-25.11 12/23/2002 FIRST AID
FM 6-02.53 8/5/2009 TACTICAL RADIO OPERATIONS
FM 21-10 6/21/2000 FIELD HYGIENE AND SANITATION
TC 2-22.7 2/18/2011 GEOSPATIAL INTELLIGENCE HANDBOOK
TC 2-22.82 3/21/2011 BIOMETRICS-ENABLED INTELLIGENCE
TC 3-22.10 9/30/2013 SNIPER TRAINING AND OPERATIONS
FM 31-21, GUERILLA WARFARE
ST 31-91B, ARMY SPECIAL FORCES MEDICAL HANDBOOK

Caches. I've got to plan to have better cache material on hand and to upgrade the one Bug Out support cache I have emplaced. A roll of thick mil plastic, some pre-cut section of PVC with caps ought to do. I have many surplus GI ammunition cans on hand and I'll be on the lookout for more if they are cheap, but it push comes to Crunch, I'll be okay with what I have.

I have been getting some food grade feed buckets that contains some type of livestock feed from a friend of mine. It's been about 6 months since I last talked to him, so I'll make a mental not to drop him an e-mail and see if he has any more buckets to give away. These can be used for caches as well, but my biggest use is to storage. 

Plus, I have several 3 to 5 day food buckets ready, full of diverse food items, coffee, rice, beans, honey, peanut butter, hard crackers, bullion cubes, etc. So I don't have to unpack bulk storage items during movement. Besides these buckets work well as seats or small tables and the contents can be emptied to collect water in.


Gear. I need to up my cold weather gear. I have the sleeping bags, ground cloths, long underwear, gloves, hats, neck gaiters but I am lacking in heavier coats and tentage. During a significant enough collapse, you may face a long movement in order to get somewhere safe.

Safes places on your bug out route will likely be remote areas that don't offer much shelter. Cold camps,e.g. without a fire, will possibly be the norm and un-survivalable without decent cold weather clothing.

Ethics. Rawles, based on his pretty deep Christian beliefs, infuses his novels and characters with this belief. Makes for interesting ethical dilemmas. How you treat any refugees who are in need. How you feel about killing - about killing people who would kill you if they had the chance; or killing people who needed killing, but you could avoid killing.

What about lying? Is it okay to lie, perhaps imparting a cover story, to authorities?

Basically, the questions of ethics has to be raised within any survival group to find out what individuals beliefs are and what the group norms and procedures will be. Certainly, these may change after the onset of any collapse and the degree and type of threats facing the groups, but this needs to be an area of concern for any group. And it's not simply all having the same religion.

I have many deeply Christian friends, and I would venture that the spread of acceptable ethics are pretty wide between these individuals.

Anyway, while I enjoy the Rawles' novels and the series of novels from A. American (the Home series) and Joe Nobody (the Holding Their Own series), I always read the book from the perspective of placing myself in the character's positions and scenarios and think what would I have done.

It turned out to be a good exercise as I was able to develop the list above on where I should get better in my preps.


Monday, February 9, 2015

Civil Unrest Coming Soon to a Neighborhood Near You




Economist: Financial Collapse Will Cause Civil Unrest to Erupt in America by 2016
 
Rampant corruption combined with economic woes to spark "revolution".  Economist Martin Armstrong is predicting that rising resentment against the status quo as a result of economic inequality is likely to cause a serious political uprising before 2016.
 
“It looks more and more like a serious political uprising will erupt by 2016 once the economy turns down. That is the magic ingredient. Turn the economy down and you get civil unrest and revolution,” writes Armstrong.
 
In making the forecast, the economist cites the case of 90-year-old World War 2 veteran Arnold Abbott, who is being targeted by authorities in Fort Lauderdale for defying a newly passed city ordinance that criminalizes feeding the homeless, an example says Armstrong of how “laws in the USA have simply gone nuts.”
 
Armstrong, who correctly predicted the 1987 Black Monday crash as well as the 1998 Russian financial collapse, asserts that the downfall of the system will be its inability to gauge the anger that Americans currently feel towards their government.
 
“You just cannot make up this stuff. And the Democrats cannot figure out that the people are getting pissed-off at who is ever in office? And what about the police?” asks Armstrong. “Is this just turning into thugs with badges who just enforce whatever law some nut-job politician writes? What if they passed a Herod type law to curb population and decree that everyone must kill their first-born. When does reason ever return to the police force these days? They no longer protect the people – they protect the politicians against the people.”
 
As we reported back in August, the U.S. Army is preparing for civil unrest in the United States. A 132-page document entitled U.S. Army Techniques Publication 3-39.33: Civil Disturbances outlines how troops may be required to deal with “unruly and violent crowds” where it is “necessary to quell riots and restore public order.”
 
Riots which rocked Ferguson, Missouri earlier this year and threaten to reignite should Officer Darren Wilson be acquitted illustrate how single events can spark sustained social unrest.
 
However, more widespread dislocation is only likely to occur in the aftermath of an economic collapse which impacts a huge number of Americans. As we have seen in numerous countries across Europe, including in Belgium just today, crippling austerity measures combined with anemic economic growth have set the stage for violent unrest.
 
In a February 2013 article entitled Why the Banking Elite Want Riots in America, we outlined why the political class is perfectly content to engineer and exploit social unrest as a means of paving the way for the IMF to engage in its tried and tested method of asset stripping and looting a nation.
 

With polls showing some 74% of Americans are already angry or dissatisfied with the government, further economic hardship could prove to be the straw that breaks the camel’s back. 

[source: Paul Johnson, InfoWars.com]

Urban Man reply:  I believe this article hits it on the head. Just look how people reacted on "black Friday" sales at the local shopping malls.

Urban Man

Tuesday, February 3, 2015

This Is Where WWIII Will Start, Says An Expert? You Decide!


Dooms Day Clock is 3 Minutes Before Midnight

The Doomsday clock is now just 3 minutes from midnight - should the rise of conflicts across the Middle East and Ukraine serve as a warning sign that something much more dangerous is approaching?
 
According to Jim Rickards, the CIA's Asymmetric Warfare Adviser, the answer is yes.
 
In a startling interview he reveals that all 16 U.S. Intelligence Agencies have begun to prepare for World War III.
 
Making matters worse, his colleagues believe it could begin within the next 6 months.
 
However, the ground zero location for this global conflict is what makes his interview a must-see for every American.
Take a few moments to watch it below and decide for yourself.
[source: Monday Morning Staff Reports]

 



Urban Man