Archive for July, 2016

TBR News July 11, 2016

Jul 11 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 11, 2016: “It is interesting to read the Internet news sites and see the propaganda at work. The liberal media praises Hillary, though here campaign is bogged down under allegations of misconduct. They hate Trump and do their best to attack him at every opportunity. The Russians, on the other hand, are far more subtle and much more effective. RT began to report the killing of black citizens by the police some time ago. When we first read these, it occurred the reporting might be incorrect so a check on the Internet disclosed that this reporting was not correct. Then the liberal Guardian picked up the stories and began to highlight them and now we have seen the results in the Dallas attack. If these perceptions of anti-black violence by the police are not corrected, serious civic unrest before the election will most certainly happen.” Continue Reading »

No responses yet

TBR News July 10, 2016

Jul 10 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 9, 2016: “Returning from a long trip, we find our mailbox filled with interesting comments and several important contributions. The attached document is the most outstanding one. It runs to a total of 75 pages and we are publishing it in sections. A number of readers have expressed a desire to communicate with Dr. Harry von Johnston and we had someone search the Internet for a contact point. We were given a telephone number and told that this was a contact point and that it was found on the Internet. We have never met Dr. von Johnston and his postings are sent in via a European site. Here is the number: 706 782-4398. Read on!

Domestic Military Control in the United States

An important 2016 position paper

via Harry von Johnston, PhD

What is the role of the military?

While military forces may be the most visible sign of U.S. military involvement, especially in the early phases of an American domestic counterinsurgency, they should  play a supporting role to the political and economic initiatives designed to enhance the effectiveness legitimacy, and authority, of the sitting government.

Establishing a secure environment for these initiatives is normally a primary objective of military forces and can take many forms.

This can be a minimal requirement to support pro-sitting government supporters with advisors and equipment or it can mean a large scale- commitment of U.S. forces to carry out the preponderance of operations.

In addition to providing a secure environment, U.S. military forces may also be called upon to support infrastructure development, provide health services, conduct police functions, or directly target insurgent cells.

Given the wide range of potential military contributions, it is imperative that all military personnel understand how their actions and decisions must support the overall campaign design to de-legitimize the domestic insurgency in the eyes of the population. Significantly, successful counterinsurgencies are normally measured in years or even decades and require a unity of effort across the spectrum of U.S. agencies.

ARMY SPECIAL OPERATIONS FORCES

Within a joint force, ARSOF assets (less PSYOP and CA units) are ordinarily attached to and under OPCON of a designated joint special operations task force (JSOTF) commander.

The special operations command and control element (SOCCE) assists the JSOTF commander in fulfilling the supporting or supported commander responsibilities. A SOCCE is based on a special forces operational detachment-B and is augmented with a special communications package and personnel as required. It may include a ranger liaison officer, PSYOP and CA representatives, and special operations aviation personnel. The SOCCE is normally collocated at corps level and above, with smaller liaison teams operating at division level and below. The supported unit provides the SOCCE administrative and logistic support.

The SOCCE is the focal point for ARSOF coordination and synchronization with conventional forces. At corps level, the SOCCE coordinates with the corps operations center, fire support element, deep operations coordination cell, and battlefield coordination detachment to deconflict targets and operations. It provides ARSOF locations through personal coordination and provides overlays and other friendly order of battle data to the fire support element and battlefield coordination detachment. The SOCCE can exercise C2 of designated ARSOF units when the JSOTF commander determines the need.

………..

Internet usage for domestic control purposes

1 Internet access can be controlled or its use directed according to the server configuration, thus creating an excellent disinformation weapon.  In previous times, a national media report that was deemed to be offensive or problematical to the government could be censored, or removed at governmental request. Now, however, the government cannot control the present Internet in the same manner in which it has previously controlled the public media. The Internet permits uncensored and unfiltered versions of events, personalities and actions to be disseminated worldwide in seconds and the so-called “blogs,” chat rooms and websites are almost completely uncontrolled and uncontrollable. This unfortunate situation permits versions of events to find a far wider and far more instantaneous audience than the standard print and, to a lesser degree, the television mediums ever could.

  1. The Internet can be used to send coded messages that cannot be interdicted by any government or law-enforcement agency. If man has devised a code or protection program that is supposed to be unbreakable, it is axiomatic that another man can break it. Even the DoD’s algorithmic field codes were easily broken by the Russian GRU during the initial stages of the Iraqi war and it is now known that CIA/USIA codes were also broken, allowing hostile entities to read Top Secret messages. In unfortunately many cases, individual computer experts are more skilled than their counterparts in the government and while, indeed, their encryptions can be broken, they can only be done so by exerting a great deal of effort and when this happens, new encryptions and firewalls can be almost instantly reerected.

3.The Internet can be utilized to steal and disseminate highly damaging, sensitive government or business data. Although highly sensitive official websites are routinely put under strict control, it seems that intruders always seem to succeed in breaking into them. Once this has happened, highly sensitive, and even damaging, information can, and has, been removed and put out on the Internet without any form of control

4.The Internet permits anti-government groups or individuals with few resources to offset the efforts of far larger, and far better funded, government and its national media sources. This is known as the ‘David and Goliath’ syndrome and is a subject of constant concern to all government agencies. Hitherto secure systems can be broken into, information can be extracted or the site (s) can be infected with malicious viruses and destroyed. All it takes to do this is a relatively inexpensive computer, programs that unfortunately are available to individuals seeking them. The best and most effective manner to deal with this kind of threat is the dummy site, designed to lure potential dissidents into joining with it. Skillful questioning of new members has been known to develop important leads to be followed up by conventional law enforcement methods.

5.The Internet can be used to create serious disruptions of governmental agencies and the business communities. It is known that certain dissidents, either as individuals or as groups, have developed devastating computer viruses. These viruses, which are capable of destroying large banks of computer information, both governmental or business. These rumors are very persistent and it is strongly believed that they exist as a dormant entity that can lie concealed in a target system until activated by some kind of a trigger mechanism.

  1. The Internet can serve as an excellent tool for organizing groups of anti-government individuals. (Redacted)
  2. The Internet can be used to expose government actions and military operations in advance of said actions. The immense proliferation of Internet sites has made it possible for adverse elements to break into hitherto secure systems, extract highly sensitive information and either supply it to foreign intelligence agencies such as the Russian SVR or the Israeli Mossad or simply to either publish it or mail it out. A discussion of foreign-based official U.S. computer hacking can be found elsewhere and this study deals solely with ad hoc domestic dissidents.
  3. The Internet is capable of hiding the identities of those launching attacks on the actions and personnel of various government agencies. (Redacted)

9.The Internet can materially assist an underfunded, anti-government group to raise money for continued operations. The use of such firms as PayPal facilitate the relatively secure transfer of money. Again, although it is possible to pressure such firms officially, if one agrees to cooperate, it is only a matter of time that this information will be leaked. We have once had excellent cooperation from SBC, ATT and AOL in conducting overview of millions of system users but lawsuits and Internet activists have published this information, rendering this valuable cooperation null and void.

10.The Internet can be utilized to locate and publicize the personnel of government agencies. It is routine practice in the CIA to have the DoS Passport Division issue official U.S. passports to our operatives working outside the country in names other than their own. The discovery of the real names of the passport holders could result in this material being maliciously posted on the Internet and this could not only subject the agent to serious compromise in the country they are operating in but can also subject them to local exposure and often contempt and harassment.The Internet is capable of limiting the risk of identification of the members of anti-government groups. The FBI, which is responsible for overview and action against counter-terrorism inside the United States. With the advent of the Internet, identification and penetration of anti-government groups has proven to be nearly impossible. The main cause of this failure is due almost entirely to the Internet which has proven a haven for dissidents of all kinds. Given that all domestic telephone calls and all Internet email is readily available to various domestic law enforcement agencies, it is still a monumental task to track and identify possible activists and other anti-government individuals or groups. We have assisted in setting up dummy anti-government sites, peopled them with professionals and provided them with almost-believable information to post for the purpose of establishing importance and also in disseminating disinformation. Persons viewing these sites can readily be identified and tracked, Further, we have an ongoing relationship with several information sites, such as Google, and whenever any viewer seeks information on subjects we deem as potentially negative, this information is automatically forwarded to the concerned agency.

  1. The Internet, while impossible to control, is also an excellent recruiting ground for sympathetic or easily-convinced “bloggers” who will quickly disseminate official dissemination for pay or public acclaim. It is invaluable to distract the public from questioning various governmental actions, both domestic and foreign. For this reason, our organization, and others, have “disinformation” centers that prepare information of a sensational nature which is then released to paid sources who, in turn, disseminate it onto the Internet. The purpose of this is to create a cloaking movement that will point the curious into innocuous areas. As a case in point, it was imperative to prevent the public sector from looking too deeply into the origins of the 9/11 attacks. To prevent exposure of the actions of members of the top levels of government in this attack, many stories were released, over a long period, to the public through wholly-controlled sites. Claims of devious plots, mystery methodologies, and often laughable conclusions have proven to be extraordinarily effective in constructive diversion. The collapse of the WTC buildings have been attributed to Thermite bombs, clouds of plasmoid gas and other nonsense but a very gullible American public has easily swallowed all of the fictions. As another example, the DoD has always under-declared its casualty rates in Iraq and Afghanistan because a full accounting could easily lead to public discomfiture and resulting action.

13.The Internet can be utilized to create an atmosphere of fear or of compliancy in furtherance of official policy. This is a particular ploy that worked very effectively during the two Bush administrations. A constant, on-going threat of vague “terrorist” actions inside the United States was material in gaining, and keeping, public support for the actions of the aforesaid administration. However, it must be noted, that threats must occasionally be proven to be true or too many “duds” tend to dull the public sense and, if continued, will lead to disillusion and anger. ……..

. (to be continued) Continue Reading »

No responses yet

TBR News July 9, 2016

Jul 09 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 9, 2016: “Returning from a long trip, we find our mailbox filled with interesting comments and several important contributions. The attached document is the most outstanding one. It runs to a total of 75 pages and we are publishing it in sections. A number of readers have expressed a desire to communicate with Dr. Harry von Johnston and we had someone search the Internet for a contact point. We were given a telephone number and told that this was a contact point and that it was found on the Internet. We have never met Dr. von Johnston and his postings are sent in via a European site. Here is the number: 706 782-4398. Read on!

Domestic Military Control in the United States

An important 2016 position paper

via Harry von Johnston, PhD

Domestic insurgencies date to the earliest forms of government and will continue to exist as long as the governed harbor grievances against authority that they believe cannot be resolved by peaceful means.

What is a domestic insurgency?

The Department of Defense (DOD) defines domestic insurgency as “an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict.” Simply put, a domestic insurgency is a struggle between a non-ruling group and their ruling authority. Domestic insurgents use political resources, to include the increased use of the media and international opinion, as well as violence to destroy the political legitimacy of the ruling authority and build their own political legitimacy and power. Examples of this type of warfare range from the American Revolution to the previous situation in Iraq. The conflict itself can range from acts of terrorism to the more conventional use of the media to sway public opinion. Whatever form the insurgency takes, it serves an ideology or political goal.

Current motivating factors for potential domestic insurgency in America

Some of the motivating factors in the current politico/sociological situation are:

Massive and continuing unemployment in all levels of American business and industry. Only those who are technically proficient, i.e. in fields of computer science, are employable. Another point of contention is the huge influx of illegal foreign immigrants and the perception that these prevent Americans from obtaining work and also are perceived as draining the national welfare rolls. Also, a growing functional illiteracy in the American public, which has sharply diminished the reading of newspapers and increased the popularity of the Internet with its brief “sound bites.”

A growing public perception of both disinterest and corruption on the part of National and State legislators has caused massive disillusionment on the part of the people. The recent revelations that the American (and foreign) public is closely watched and spied upon by governmental organs at the behest of the President has created a very volatile and very negative attitude towards any and all official programs.

An insurgency is defined as an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict. It is a protracted politico-military struggle designed to weaken government control and legitimacy while increasing insurgent control. Political power is the central issue in an insurgency.

Each insurgency has its own unique characteristics based on its strategic objectives, its operational environment, available resources, operational method, and tactics For example, an insurgency may be based on mass mobilization through political action or the FOCO theory. Insurgencies frequently seek to overthrow the existing social order and reallocate power within the country.

The goal of an insurgency is to mobilize human and material resources in order to form an alternative to the state. This alternative is called the counterstate. The counterstate may have much of the infrastructure possessed by the state itself, but this must normally be hidden, since it is illegal. Thus the counterstate is often referred to by the term “clandestine infrastructure.” As the insurgents gain confidence and power, the clandestine infrastructure may become more open, as observed historically in communist regions during the Chinese Revolution, in South Vietnam after the North Vietnamese 1972 Easter Offensive, and in Colombia in the summer of 1998.

Successful mobilization provides active and passive support for the insurgency’s programs, operations, and goals. At the national level, mobilization grows out of dissatisfaction by some elite members with existing political, economic, or social conditions. At the regional level, members of an elite have become marginalized (that is, they have become psychologically alienated from the system), and have established links with followers by bringing them into the counterstate. At the local, district and province-levels, local movement representatives called the cadre address local grievances and do recruiting. The cadre gives credit to the insurgent movement for all local solutions. Loyalty to the insurgent movement is normally won through deeds but may occur through appeal to abstract principles. Promises to end hunger or eliminate poverty may appeal to a segment of the population, while appeals to eliminate a foreign presence or establish a government based on religious or political ideology may appeal to others. Nonetheless, these promises and appeals are associated with tangible solutions and deeds.

What are the root causes of a domestic insurgency?

For a domestic insurgency to flourish, a majority of the population must either support or remain indifferent to insurgent ideals and practices. There must be a powerful reason that drives a portion of the populace to armed opposition against the existing government. Grievances may have a number of causes, such the lack of economic opportunity, restrictions on basic liberties, government corruption, ethnic or religious tensions, excessivly large number of illegal immigrants, especially those from Central America who clog national welfare rolls and are perceived to take jobs from entry-level Americans,or an unassimilitable religious and ethnic minority such as the Muslims who are seen to harbor domestic terrorists. It is through this line of thought or ideal that insurgents attempt to mobilize the population.

Counterinsurgency

What is counterinsurgency?—DOD defines counterinsurgency as “those military, paramilitary, political, economic, psychological, and civic actions taken by a government to defeat insurgency. Also called “COIN” The United States government intends to use a wide breadth of national capabilitie to defeat any domestic insurgencies through a variety of means. The Central Intelligence Agency (CIA) and Department of Justice (DOJ) and the Department of Homeland Security (DHS) use special teams to generate strategic objectives and assist the sitting government. The military will support those efforts by employing conventional forces, in combination with Special Operations Forces (SOF), in a variety of activities aimed at enhancing security and/or alleviating causes of unrest.

(to be continued) Continue Reading »

No responses yet

TBR News July 8, 2016

Jul 08 2016 Published by under Uncategorized

 

The Voice of the White House

Washington, D.C. July 6, 2016: “We are out of the country on business and will return July 9.” Continue Reading »

No responses yet

TBR News July 7, 2016

Jul 06 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 6, 2016: “We are out of the country on business and will return July 9.” Continue Reading »

No responses yet

TBR News July 6, 2016

Jul 06 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 6, 2016: “We are out of the country on business and will return July 9.” Continue Reading »

No responses yet

TBR News July 5, 2016

Jul 05 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 5, 2016: “The attacks against Sunni Muslim targets in Saudi Arabia are interesting in the extreme. The Sunni Saudis are well-known to have set the radical Sunni IS up in the hopes of establishing a religious hegemony and the US is also well-known to have its CIA supply the training of IS using US- supplied weapons. IS is failing but now the world is expected to believe the Sunni IS is attacking their own religious holy sites? And it is also rather peculiar that while the Western-hating IS has attacked targets in France and Turkey but have not attempted to do this in either the UK or the US. Perhaps the IS people don’t have a good travel agent.” Continue Reading »

No responses yet

TBR News July 4, 2016

Jul 04 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 4, 2016: “On a Trump commentary about Hillary Clinton, there was a red Star of David with while text. Immediately a shrill cry of ‘Antisemitism!’ went up and the star became a red circle. Inside the Beltway, it has long been known that Hillary Rodham Clinton’s family background was Jewish. Her ancestors came from Lodz in Poland and went to England. The family moved to the United States, changed their name to an English one and became Methodists. Hillary’s brother married the daughter of Barbara Boxer and the Boxers are Jewish. Media pictures exist showing the brother in a beanie, stomping on wine glasses. Her daughter married a Jewish man. Hillary is well-known as an intelligent but thoroughly dishonest person and very vicious and pro-Israel. Her election would be a disaster for the United States both economically and politically.” Continue Reading »

No responses yet

TBR News July 3, 2016

Jul 03 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 3, 2016: “I have also learned from a source in the Chase Manhattan bank that his people are scared literally shitless over the news, gleaned from a very competent German intelligence service, that a group, totally off the screen, not Muslim and probably American-based, have managed to crack the entrance information into the electronic, international banking wire and transfer system. These are:

 

  • SWIFT (Bruxelles)

Society for Worldwide Interbank Financial Transactions

 

  • CHAPS (London)

Clearing House Automated Payments System

 

  • CHIPS (New York) – Private Sector

Clearing House Interbank Payments System

 

  • FEDWIRE (New York) – US Government

Fedwire Funds Service

 

If, as the German reports have rumored, someone or some group successfully sabotages these systems, the world of international banking and the entire country would suffer a terrible blow that would take months, if not years, to recover from. Billions of dollars in bank transfers would vanish instantly and replicating the data, if the attackers know what they are doing, would take eons to try to replace. For instance, the BofA transfers $200.000,000 to a bank in Germany and in a nano second, the transfer vanishes. No money is sent and none received. I do not know if this operation is connected with other very disruptive activities that our Brave Defenders of Liberty are trying to track but the Germans seem to feel that the elements involved are not Arabs or Russians but Americans because of the idiomatic English in the messages they have decoded.” Continue Reading »

No responses yet

TBR News July 2, 2016

Jul 02 2016 Published by under Uncategorized

The Voice of the White House

Washington, D.C. July 2, 2016: “Shades of the George W. Bush elections, the Austrian courts have overturned the results of their last presidential elections because of what are diplomatically referred to as “irregularities.” If the right wing gets into power there, more problems for the EU. This US-supported entity, like Nato, is in the process of breaking up and there is consternation in the US, especially in high official circles and the financial world. US control is slipping. A plan to admit 10,000 Muslim refugees into the US is about to be neutralized and it is always important to remember that when a ruling entity is threatened, minorities suffer.” Continue Reading »

No responses yet

« Prev - Next »