The purpose of this thread is to archive The Official Government Documents you need to expose the agenda of tyranny, and the loss of National Sovereignty. This is a work in progress, and I encourage everyone to add their own pertinent links. I will update the list as new links are found and added
Operation Northwoods:
http://www.gwu.edu/~nsarchiv/news/20010430/northwoods.pdf
Proactive, Preemptive Operations Group (P2OG):
http://www.fas.org/irp/agency/dod/dsbbrief.ppt
Gulf of Tonkin Incident
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB132/tonkin_intercepts.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB132/snie.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB132/tonkin.pdf
9/11 Commission Report
http://www.9-11commission.gov/report/911Report.pdf
NIST 9/11 Analysis
http://wtc.nist.gov/pubs/NISTNCSTAR1Draft.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-1.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-2Draft.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-3Draft.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-4Draft.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-5Draft.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-6Draft.pdf
http://wtc.nist.gov/pubs/NISTNCSTAR1-7.pdf
USA PATRIOT act
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107
Total Information Awareness
http://www.information-retrieval.info/docs/tia-exec-summ_20may2003.pdf
Security and Prosperity Partnership
http://www.judicialwatch.org/archive/2007/mexico.agreement.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecI.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecII.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecIII.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecIV.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecV.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecVI.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecVII.pdf
http://www.judicialwatch.org/archive/2006/SPrison Planet ForumOIADocsSecVIII.pdf
MacCormack-Dickstein Committee (Attempted 1934 Nazi Coup of US)
http://www.flagrancy.net/salvage/HUAC1.pdf
http://www.flagrancy.net/salvage/HUAC2.pdf
http://www.flagrancy.net/salvage/HUAC3.pdf
Military Comissions Act of 2006
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=109_cong_bills&docid=f:s3930enr.txt.pdf
Protect America Act (Warrantless Wiretapping Authorization)
http://www.govtrack.us/data/us/bills.text/110/s/s1927.pdf
Presidential Decision Directive 51 (Martial Law)
http://www.whitehouse.gov/news/releases/2007/05/20070509-12.html
Operation TPAJAX (Overthrow of Mossadeq)
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/summary.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/1-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/2-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/3-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/4-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/5-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/6-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/7-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/8-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/9-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/10-Orig.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/appendix%20A.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/appendix%20B.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB28/appendix%20E.pdf
CIA's "Family Jewels"
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB222/family_jewels_full_ocr.pdf
CENTCOM's "Rapid Response Media Team"
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB219/iraq_media_01.pdf
Pastoral Crisis Intervention
http://www.infowars.com/images2/ps/pastor_fema_docs.pdf
Texas Department of Public Saftey's "Terrorisim, What the public Needs to Know"
http://www.infowars.com/images2/ps/txps_terror_pamphlet0.jpg
http://www.infowars.com/images2/ps/txps_terror_pamphlet1.jpg
http://www.infowars.com/images2/ps/txps_terror_pamphlet_back.jpg
http://www.infowars.com/images2/ps/txps_terror_pamphlet_cover.jpg
http://www.infowars.com/images2/ps/txps_terror_pamphlet_front.jpg
http://www.infowars.com/images2/ps/txps_terror_pamphlet_who.jpg
PNAC's "Rebuilding America's Defenses"
http://www.newamericancentury.org/RebuildingAmericasDefenses.pdf
Iran-Contra
http://www.fas.org/irp/offdocs/walsh/
http://www.usdoj.gov/oig/special/9712/
https://www.cia.gov/cia/reports/cocaine/report/index.html
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB210/1-Reagan%20Finding%209-19-83%20(IC%2000203).pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB210/2-NSPG%20minutes%206-25-84%20(IC%2000463).pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB210/3-Gates%20Memo%2012-14-84.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB210/7-North%20diagram%207-86%20(IC%2003086).pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB210/9-North%20notes%208-24-86.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB210/19-Bush%20Diary%2011-4-86.pdf.pdf
http://www.presidency.ucsb.edu/PS157/assignment%20files%20public/TOWER%20EXCERPTS.htm
COINTELPRO
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIa.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIb.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportfindings.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIca.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIcb.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIcc.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIcd.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIce.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIc.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIId.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIe.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIf.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIg.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIh.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIi.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIj.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIk.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIl.htm
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIm.htm
Project Minaret/Shamrock (Domestic Surveillance)
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIj.htm
http://www.fas.org/irp/program/process/docs/98-14-01-2en.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/surv01.pdf
Echelon
http://www.fas.org/irp/program/process/rapport_echelon_en.pdf
http://www.nsa.gov/sigint/sigin00003.cfm
http://www.fas.org/irp/offdocs/eo12139.htm
NSA Wiretapping
http://news.findlaw.com/hdocs/docs/nsa/dojnsa11906wp.pdf
http://www.fas.org/sgp/crs/intel/m010506.pdf
http://www.pbs.org/wgbh/pages/frontline/homefront/etc/kleindoc.pdf
http://blog.wired.com/images/nsadocs1_f.jpg
http://blog.wired.com/images/nsadocs2_f.jpg
http://childedlaw.org/publiclaw/pdf/gonzalesanswers.pdf
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB178/surv15.pdf
Alberto Gonzales Torture Memo
http://www.washingtonpost.com/wp-srv/politics/documents/cheney/torture_memo_aug2002.pdf
The Constitutionalist:
Maybe a sticky before it gets lost in the back pages? Sane?
Maybe a sticky before it gets lost in the back pages? Sane?
michaelr:
Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq http://www.whitehouse.gov/news/releases/2007/07/20070717-3.html
Don' protest the war or you may loose your property.
Executive Order: Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq http://www.whitehouse.gov/news/releases/2007/07/20070717-3.html
Don' protest the war or you may loose your property.
xego:
Great Post Apprentice
here is my submission on the Bush Family connection to the Nazis, there are links here to a pdf that has the documents from the national archives plus useful commentary from John Buchanan
http://www.debatecomics.org/bushfamilyfortune/
Great Post Apprentice
here is my submission on the Bush Family connection to the Nazis, there are links here to a pdf that has the documents from the national archives plus useful commentary from John Buchanan
http://www.debatecomics.org/bushfamilyfortune/
Moldavite:
ok there are 2 parts to this first document..... and I *think* i have links to both of them.. (you know how it is with gov docs, they sometimes just dissappear)
http://www.hlswatch.com/sitedocs/cyberstorm.pdf
http://cryptome.org/cyberstorm.pdf
if they are the same I am sorry..
for me the real curiosity for me was the 'Adversary' chart
Freedom not Bombs <--this is obviously targeted at the peaceful hippie free food group you may even be familier with "Food Not Bombs" which has been added to the domestic terrorist watch list.
and
Auggie Jones <--is this a vague reference to the #1 radio talk show host "Alex Jones" ?
anyway... I'm pretty sure the links are to both of the docs...
and then there is this
http://media.govtech.net/Digital_Publications_Art/Documents/CYBERCRIME_Public_and_Private_Entities_Face_Challenges_in_Addressing_Cyber_Threats.pdf
heres some highlights
Cybercrime refers to criminal activities that specifically target a computer
or network for damage or infiltration. For example, it can be a crime to
access (“hack into”) a computer without authorization or to distribute
viruses. Cybercrime also includes the use of computers as tools to conduct
criminal activity such as fraud, identity theft, and copyright infringement.
Computers significantly multiply the criminal’s power and reach in committing such crimes
To protect networks and information against cybercrime, organizations
and individuals implement cybersecurity techniques such as access
controls (passwords) and firewalls. In addition, they use monitoring
devices or intrusion detection systems to detect incidents that could potentially be criminal intrusions
A key component of cybercrime investigations is the gathering and
examination of electronic evidence that can be useful for prosecution.
Using cyberforensic tools and techniques,
cybercrime investigators and
examiners gather and analyze electronic evidence. If available,
cyberforensic laboratories may be used to extract the electronic evidence
and present it in a court-admissible format. The evidence could entail
analysis of terabytes of information on multiple electronic devices, the
electronic path taken by a fraudulent e-mail, pornographic images stored
on a hard drive, or data stored on a mutilated but later reconstructed CD-
ROM. The ability to gather electronic evidence and the assurance that
cyberforensic procedures do not compromise the evidence gathered can
be key to building a case and prosecuting cybercriminals.
The annual loss due to computer crime was estimated to be $67.2 billion for U.S. organizations
estimated losses associated with particular crimes include
$49.3 billion in 2006 for identity theft
$1 billion annually due to phishing
according to the U.S.-China Economic and
Security Review Commission report, Chinese military strategists write
openly about exploiting the vulnerabilities created by the U.S. military’s
reliance on advanced technologies and the extensive infrastructure used
The Secret Service
official stated that the service is expanding its Electronic Crimes Special
Agent Program and will have approximately 770 trained and active agents
by the end of fiscal year 2007
150 million U.S. citizens are connected to the Internet
Approximately 88 percent of all e-mail processed at service centers is classified as “junk.”
From September 2006 to March 2007, Postini collected over 60 billion pieces of spam totaling 537.7 terabytes of data.
Between July and December 2006, spam constituted 59 percent of all e-mail monitored.
Through 2005, hackers most frequently targeted the telecommunications and health care sectors,
where almost 80 percent of all e-mail traffic was spam.
Between July and December 2006, an average of 63,912 active, bot-infected computers per day
were observed, an 11 percent increase from the previous reporting period.
Between July and December 2006, 166,248 unique phishing messages detected, a 6 percent
increase over the first 6 months of 2006.
An average of 904 unique phishing messages per day was reported for the second half of 2006.
During the same period, over 1.5 billion phishing messages were blocked.
During 2006, U.S.-based businesses were the most targeted organizations of phishing e-mails,
accounting for 71.37 percent of all phishing e-mail. In addition, more than 55 percent of the world’s
phishing attacks fabricate company Web sites that are hosted in the United States.
Between January and June 2006, approximately 2 million of the 4 million computers cleaned by
the malicious software removal tool had at least one backdoor Trojan horse.
43,000 new variants of malware were found in the same period.
In 2005, close to 40 percent of the financial services and banking industry sector suffered the most
Trojan horse attacks.
Director of Central Intelligence (1996) "Hackers, terrorists, or other nations could use information
warfare techniques as part of a coordinated attack to
seriously disrupt electric power distribution, air traffic
control, or financial sectors. "
DOD officials stated that its information network, representing
approximately 20 percent of the entire Internet, receives approximately 6
million probes/scans a day. Further, representatives from DOD stated that
between January 2005 and July 2006, the agency initiated 92 cybercrime
cases, the majority of which involved intrusions or malicious activities
directed against its information network.
ok there are 2 parts to this first document..... and I *think* i have links to both of them.. (you know how it is with gov docs, they sometimes just dissappear)
http://www.hlswatch.com/sitedocs/cyberstorm.pdf
http://cryptome.org/cyberstorm.pdf
if they are the same I am sorry..
for me the real curiosity for me was the 'Adversary' chart
Freedom not Bombs <--this is obviously targeted at the peaceful hippie free food group you may even be familier with "Food Not Bombs" which has been added to the domestic terrorist watch list.
and
Auggie Jones <--is this a vague reference to the #1 radio talk show host "Alex Jones" ?
anyway... I'm pretty sure the links are to both of the docs...
and then there is this
http://media.govtech.net/Digital_Publications_Art/Documents/CYBERCRIME_Public_and_Private_Entities_Face_Challenges_in_Addressing_Cyber_Threats.pdf
heres some highlights
Cybercrime refers to criminal activities that specifically target a computer
or network for damage or infiltration. For example, it can be a crime to
access (“hack into”) a computer without authorization or to distribute
viruses. Cybercrime also includes the use of computers as tools to conduct
criminal activity such as fraud, identity theft, and copyright infringement.
Computers significantly multiply the criminal’s power and reach in committing such crimes
To protect networks and information against cybercrime, organizations
and individuals implement cybersecurity techniques such as access
controls (passwords) and firewalls. In addition, they use monitoring
devices or intrusion detection systems to detect incidents that could potentially be criminal intrusions
A key component of cybercrime investigations is the gathering and
examination of electronic evidence that can be useful for prosecution.
Using cyberforensic tools and techniques,
cybercrime investigators and
examiners gather and analyze electronic evidence. If available,
cyberforensic laboratories may be used to extract the electronic evidence
and present it in a court-admissible format. The evidence could entail
analysis of terabytes of information on multiple electronic devices, the
electronic path taken by a fraudulent e-mail, pornographic images stored
on a hard drive, or data stored on a mutilated but later reconstructed CD-
ROM. The ability to gather electronic evidence and the assurance that
cyberforensic procedures do not compromise the evidence gathered can
be key to building a case and prosecuting cybercriminals.
The annual loss due to computer crime was estimated to be $67.2 billion for U.S. organizations
estimated losses associated with particular crimes include
$49.3 billion in 2006 for identity theft
$1 billion annually due to phishing
according to the U.S.-China Economic and
Security Review Commission report, Chinese military strategists write
openly about exploiting the vulnerabilities created by the U.S. military’s
reliance on advanced technologies and the extensive infrastructure used
The Secret Service
official stated that the service is expanding its Electronic Crimes Special
Agent Program and will have approximately 770 trained and active agents
by the end of fiscal year 2007
150 million U.S. citizens are connected to the Internet
Approximately 88 percent of all e-mail processed at service centers is classified as “junk.”
From September 2006 to March 2007, Postini collected over 60 billion pieces of spam totaling 537.7 terabytes of data.
Between July and December 2006, spam constituted 59 percent of all e-mail monitored.
Through 2005, hackers most frequently targeted the telecommunications and health care sectors,
where almost 80 percent of all e-mail traffic was spam.
Between July and December 2006, an average of 63,912 active, bot-infected computers per day
were observed, an 11 percent increase from the previous reporting period.
Between July and December 2006, 166,248 unique phishing messages detected, a 6 percent
increase over the first 6 months of 2006.
An average of 904 unique phishing messages per day was reported for the second half of 2006.
During the same period, over 1.5 billion phishing messages were blocked.
During 2006, U.S.-based businesses were the most targeted organizations of phishing e-mails,
accounting for 71.37 percent of all phishing e-mail. In addition, more than 55 percent of the world’s
phishing attacks fabricate company Web sites that are hosted in the United States.
Between January and June 2006, approximately 2 million of the 4 million computers cleaned by
the malicious software removal tool had at least one backdoor Trojan horse.
43,000 new variants of malware were found in the same period.
In 2005, close to 40 percent of the financial services and banking industry sector suffered the most
Trojan horse attacks.
Director of Central Intelligence (1996) "Hackers, terrorists, or other nations could use information
warfare techniques as part of a coordinated attack to
seriously disrupt electric power distribution, air traffic
control, or financial sectors. "
DOD officials stated that its information network, representing
approximately 20 percent of the entire Internet, receives approximately 6
million probes/scans a day. Further, representatives from DOD stated that
between January 2005 and July 2006, the agency initiated 92 cybercrime
cases, the majority of which involved intrusions or malicious activities
directed against its information network.
Navigation
[0] Message Index
[#] Next page
No comments:
Post a Comment