Welcome to Shadow-Wars Prophecy & Conspiracy Site.

We Travel around the United States in our Antique Winnebago monitoring the airwaves and the internet, to bring you what we believe to be the truth. The powers behind the scene, better known as the Shadow Government.

Subjects of Interest on this site
 !!! HOME !!!
 Bible Prophecy Articles
 Politics Articles
 Eavesdropping Articles
 Electronic  Articles
  Climate & Weather Articles
 In The News Articles
 Survival Articles
 Stupid Government Pet Tricks
 Global Conspiracies
We encourage you to check out everything we say on this site. In fact we want you to the purpose of this site is not to convince you of anything . It is to get you to think about things and learn about things. and come to your own conclusions. If we wanted you to believe us without question we would be no better then the Shadow Government. The links below will help you find your own answers for yourself.
 Fox News
 CNN
 AP Wire
 Air America
 BBC
 Link TV
 Christian News Today
 Christian Headlines
 MSNBC
 Free Bible Software
 United Nations
 Congress
If You Are Interested In Advertising on Our Site. Or Becoming a SPONSOR. Please Feel Free to Contact US AT !!!

We Also WELCOME MOST Link Exchanges!!
Please take a moment to visit our list of recommended sites!!!
For the absolute best in Professional Quality Counter Surveillance Equipment and lots of useful information visit MES Innovations at.
 http://www.mesinnovations.com/
For all your Prepaid Cellular, Satellite TV, Web Hosting VOIP, Broad band, Cellular, and all your other communications needs visit our friends at Mountain Enterprises. http://www.tlc14u.com
Also we Highly recommend Alex Jones site for more of this type of INFORMATION!!
Also take a moment to visit any of these high other quality cellular ,web hosting, dish tv, web hosting sites.
Jessiecom
 http://jessiecom.tripod.com/index.html
Katcom
 http://katcom0.tripod.com/index.html#
or
 http://mtn-cellular.tripod.com/index.html
 http://mtn-enterprises.tripod.com/index.html
http://icemanzx20000.tripod.com/index.html
Coast to Coast am has Tons of stuff on lots of subjects. With Art Bell & George Noory!!
 Propaganda Matrix
 Above Top Secret
 American FREE Press
!!Article Related Links!!
 Early Warning
 Washington Post
 Fox on Able Danger

" WE REMEMBER "
  We at Shadow Wars are in constant search of the truth. We monitor Bible Prophecy, The Government, News, Overseas sources, Internet, Weather Conditions. You name it, we Watch it. We travel as much as possible to monitor local news and local frequencies, to bring the people of the world all the information at our disposal. 



See even Washington Post writers are starting to wake up.
Early Warning
William M. Arkin 
posted at
 http://blogs.washingtonpost.com/earlywarning/

Posted at 08:27 AM ET, 09/28/2005
Disabling Able Danger
In April 2000, Able Danger, only months old, was abruptly shut down. Caught violating Reagan administration Executive Orders and Defense Department and Army regulations restricting intelligence agencies from collecting information on United States "persons," the highly compartmented cell within the Army's Land Information Warfare Activity (LIWA) was halted in its effort to use data mining and link analysis to characterize the worldwide nature of the al Qaeda terrorist network. 

Anthony Shaffer, the whistle blower who went public in August, claims lawyers shut down the operation just at the point that it named and identified 9/11 hijacker Mohamed Atta. 

As I wrote yesterday, Shaffer is pretty lonely in his recollections. Of some 80 people interviewed by the Defense Department as part of its Able Danger internal investigation, the Pentagon says that three additional workers remember seeing either a chart with a photo or a reference to Mohamed Atta. 

The general in charge of the Special Operations Command, Gen. Bryan "Doug" Brown, also went on the record this weekend telling the St. Petersburg Times that he was "pretty sure" Able Danger did not identify Mohamed Atta before 9/11. 

Two Defense Department lawyers familiar with the case told me that there is no evidence that lawyers directed the destruction of information nor restricted any sharing of useful intelligence with the FBI, as Shaffer claims. 

The real story here is how another renegade intelligence effort subsisting on hyper secrecy ran afoul of regulations first implemented in the Ford administration when U.S. intelligence agencies were caught collecting information on community, religious and labor leaders, civil rights protestors, and anti-Vietnam war demonstrators. 

"What began as a force protection mission for DOD organizations, evolved, through mission creep, lack of clear rules, and the lack of meaningful oversight, into an abuse of … Constitutional rights…," William Dugan, Pentagon chief of intelligence oversight, said last week. He was describing the experiences of the 1960s and 1970s. 

Shaffer and others use words like "out-of-the-box" and "entrepreneurial" to describe the LIWA intelligence collection. The buzz words suggest, of course, that other intelligence efforts were in-the-box and boring, that only the LIWA and other compartmented workers were motivated and insightful enough to take chances, that if the lawyers and the bureaucrats and the Clintonistas and the other villains had just gotten out of the way, there would have been no 9/11. If only… 

But in 2000, the problem was also a pretty simple one: An off-the-books intelligence effort once again abused the "force protection" justification to collect information on Americans. Military commanders, mindful of the law and regulations, shut down the operation. 

When Able Danger approached LIWA in 1999 to help with the al Qaeda campaign plan, the organization was already involved in a number of highly classified counter-terrorism data mining efforts. LIWA's al Qaeda project collected 2.5 terabytes of "open source" information, Shaffer says, a ridiculously immense amount of data equivalent to 500 million pages of text or a pile of paper 30,000 miles high if it were all printed out -- court records, news databases, credit card and telephone records. "Anything we could get our hands on," says Shaffer. 

"Open source" here means unclassified information, that is, information that has not been collected and compiled by U.S. intelligence, for example, intelligence information derived from electronic eavesdropping or human agents that the United States classifies at birth. 

However, the open source label tends to hide the real problem the Able Danger sponsored effort ran into. 

"They were not only using advanced data mining technology, they were also looking at data that no one else was looking at," Shaffer says. 

According to military sources familiar with the Able Danger legal side, the effort stepped over the line when LIWA contractors purchased photographic collections of people entering and exiting mosques in the United States and overseas. One source says that LIWA contractors dealt with a questionable source of photographs in California, either a white supremacy group or some other anti-Islamic organization. 

"There are records of who goes where regarding visits to mosques," Shaffer told Government Security News. "That was the data that LIWA was buying off the Internet from information brokers." It was stuff no one else bothered to look at, says Shaffer. 

LIWA purchased an open-source, six-month data run, Shaffer says, and analysts developed a set of eight data points common to 1993 World Trade Center bombers and associates. With advanced software, including facial recognition software able to track individuals from the collected photographs, Shaffer says contractors "made the link between [Mohammed] Atta and [Sheik Omar Abdel] Rahman, the first World Trade Center bomber." 

Thomas Gandy, Army Director of Counterintelligence and Human Intelligence, said at the September 1 Pentagon briefing that the problem with LIWA’s work was that "it was a gobbling up of a lot of data from a lot of sources and put (it) in one pile." Thus there was a "commingling of U.S. person data" with other data. The contractors and software specialists did not take precautions to tag data from different sources or to segregate information about wholly innocent Americans of Islamic faith from others who were not US persons. 

Gandy says "there was no perceived imminent threat" or "imminent crime going to occur" that might have justified retention of the gigantic database. Under the regulations, LIWA could have argued that it indeed was on to something and sought justification to continue, but the truth seems to be that while LIWA workers and contractor might have seen what there were doing as actual detective work to uncover terrorists, Able Danger and SOCOM saw the project mostly as an experiment to prove the usefulness of the technology.

So just months after LIWA began its seat-of-the-pants effort, it was directed to destroy its 2.5 terabytes. 

(Tomorrow: The Law Takes Hold) 

Note to readers: In my original posting, I used the spelling "Mohammed" that readers latched onto as some perhaps some kind of conspiracy on my part.  It was an error to spell Atta's name different than he did in his visa applications and on his Florida drivers license.  Though I hesitate to quote the 911 Commission's spelling as so many readers think that is a conspiracy as well. According to the Wikipedia entry, Atta used "several aliases and alternate spellings, including Mehan Atta, Mohammed Atta, Mohammad El Amir, Mohamed El Sayed, Muhammad Muhammad Al Amir Awag Al Sayyid Atta, and Muhammad Muhammad Al-Amir Awad Al Sayad.  The will that he allegedly wrote in 1996 gives his name as 'Mohamed Mohamed Elamir Awad Elsayed.'" 

I did a LexisNexis search of the last 90 days of news to check the prevailing spelling. There were 482 hits for "Mohammed Atta" and 528 for "Mohamed Atta." The Washington Post convention is Mohamed Atta.

By William M. Arkin | Permalink* | Comments (19) | TrackBack (2) 

Posted at 08:38 AM ET, 09/27/2005
The Secret History of Able Danger
Ever since Rep. Curt Weldon (R-PA) claimed in August that Pentagon analysts had identified 9/11 ringleader Mohammed Atta in early 2000, a secret intelligence operation code named Able Danger has become the latest fantasy of left and right wing conspiracy theorists.

The matter was to have come to a head last week when the Senate Judiciary Committee held a special Able Danger hearing. But the Pentagon declined to allow even unclassified testimony at the open hearing, arguing that the matter better rested with the Intelligence Committee.

Chairman Sen. Arlen Specter (R-PA) accused the Pentagon of "stonewalling," and all of a sudden, Weldon seemed vindicated in his claims that the Defense Department, and the 9/11 Commission, had something to hide.

The Pentagon is hiding something. But it’s not what Weldon thinks.

First, to debunk the myths:

As best as I can determine, having spent tens of hours talking to military sources involved with the issue, intelligence analysts did not identify anyone prior to 9/11, Mohammed Atta included, as a suspect in any upcoming terrorist attack. 
It is not even clear that a "Mohammed Atta" was identified, let alone that it is the same Atta who died on 9/11. 
No military lawyers prevented intelligence sleuths from passing useful information to the FBI. 
Able Danger itself was not an intelligence program.
As a representative of U.S. Special Operations Command said at a special Pentagon briefing arranged on September 1, Able Danger "was merely the name attributed to a 15-month planning effort" to begin building a war on terrorism.  This is the real story.

In early October 1999, three months after Osama bin Laden was added to the U.S. “ten most wanted” list as the mastermind behind the attacks on US embassies in Kenya and Tanzania, and more than a year after President Clinton signed a Presidential Directive laying out a renewed counter-terrorism program, the Chairman of the Joint Chiefs of Staff, Gen. Hugh Shelton, tasked U.S. Special Operations Command (SOCOM) to develop a "campaign plan" against transnational terrorism, specifically al Qaeda.  The code name assigned to the planning effort, and the name of the cell of about 10 planners in SOCOM was Able Danger.

Like most government activity associated with counter-terrorism in the late 1990's, Able Danger was a "compartmented" effort. After the 1998 embassy bombings, National Security Advisor Sandy Berger directed that a tightly compartmented process be put in place to keep all counter-terrorism military planning secret. Under “this” Polo Step compartment, the Navy was required to station a force of Tomahawk cruise missile-shooting submarines off the Pakistani coast at all times, and the U.S. Central Command (CENTCOM), regionally responsible for Afghanistan, worked with the Joint Chiefs to develop a set of 13 military options against Al Qaeda under a war plan called Infinite Resolve.

As the Able Danger cell began its work, its first questions were: What is al Qaeda? How big is it? Where is it?

As the 9/11 Commission said in its final report: "Despite the availability of information that al Qaeda was a global network … policymakers knew little about the organization. The reams of new information that the CIA’s Bin Laden unit had been developing since 1996 had not been pulled together and synthesized for the rest of the government."

Able Danger reached out to intelligence organizations that were not only involved in monitoring al Qaeda, but also those that were specialists in synthesizing new information.

One such organization was the new Land Information Warfare Activity (LIWA), a part of the Army Intelligence and Security Command (INSCOM). LIWA was organized in March 1995 to integrate "information warfare" into Army operations. On paper, that meant everything from manning new command centers in order to protect Army Internet connections from hackers to providing support for battlefield "psychological operations."

But LIWA, along with other information warfare organizations, was also developing offensive information warfare capabilities, including computer network attack and other cyber-related covert operations. And for that, there was a widespread recognition of the need for intelligence of much higher "granularity," or specificity, particularly about people, than had ever before been compiled on a large scale.

Starting in 1996, LIWA deployed teams to Bosnia.  They were part of a new vanguard of information warriors.  They required detailed information on factions and individuals: decision-maker identities, biases and inter-relationships, identification of critical communications and information links and nodes, demographic data, populace biases and pre-dispositions.  The goal was to harness this information to determine potential pressure points to leverage decision-maker/populace behaviors.

(Illustration: An information warfare "matrix" used by LIWA in Bosnia.  The field support team employed data mining and link analysis to build a picture of pressure points associated with the Bosnian leadership, the same kind of modeling it would later employ on al Qaeda for Able Danger.)
 

Back at Ft. Belvoir, VA, the LIWA Advanced Concepts and Analysis division, and later the Army's Information Dominance Center (IDC) was employing new means for achieving "information dominance." With the explosion of electronic information and the ability to move vast quantities of data quickly, analysts were increasingly facing the same problem confronting forensic accountants, insurance fraud investigators, and bank examiners: Large amounts of data was increasingly available, but it needed to be put in relational form in order to develop patterns, and then sense needed to be made of the patterns to reveal what had already happened or was about to happen.

In academia, in government, in the information industry, even in marketing, hundreds of different technical approaches were being pursued, both classified and unclassified. One such effort immediately enlisted by the U.S. intelligence community and information targeteers was data mining, a capability to discover new patterns of indicators that identify events of interest when they cannot be directly observed. Data mining techniques applied to large "transaction" databases (travel or credit card records or telephone logs) could be used to uncover clandestine relationships or activities. 

Another method being developed was social network analysis. This analyzes the types and frequencies of interactions among people to determine formal and informal leadership hierarchies.

In the intelligence community, most of the early data mining and link analysis efforts involved monitoring terrorist financial transactions. For example, after Somalia disintegrated in 1991 and many Somalis migrated to the U.S. and Europe, they began to send money home via the "al-Barakaat" network of money remitters.  In October 1996, the FBI began to track connections between the al-Barakaat system and terrorist groups, and in the late 1990's, the intelligence community, using similar analysis to track money transfers, began to draw links between al-Barakaat and Osama bin Laden.

Inside the intelligence community, at LIWA and other organizations, data mining and link analysis was being conducted on elite and so-called “crony” networks in Bosnia (and later in Serbia during Kosovo operations), on international drug cartels, on corruption and contract killings in Russia, on weapons proliferation and sensitive trade with China, and on terrorist linkages in the Far East.

In December 1999, LIWA was approached by SOCOM to support Able Danger by conducting data mining and link analysis of the al Qaeda network. The project was initially focused on unclassified data mining using U.S. and foreign news databases, commercially available records of financial transactions, court records, licenses, travel records and phone books. The goal was to find links between potential or known terrorists. Analysts used "spiders" -- automated robots -- to go out on the Internet and collect whatever they could. "Anything we could get our hands on," says Lt. Col. Anthony Shaffer, the Army reserve whistle blower who was assigned to the LIWA effort.

Using the 1993 World Trade Center bombing and associated lists of suspect individuals as a starting point, LIWA began to compile databases of "associated" individuals, and then they began to "data mine" their mountains of collected records to find links between them.  What they ended up with—and what is still being hidden today—is the questionable (read: potentially illegal) collection and acquisition of information on American citizens before and after 9/11.

(Tomorrow: Overreach and how the data-mining project goes awry.)

By William M. Arkin | Permalink* | Comments (51) 

Posted at 06:00 AM ET, 09/26/2005
Great Games
Rita and Katrina will surely stoke the fires of those who want U.S. forces out of Iraq, as much as it will embolden those who argue that because U.S. military forces are at a breaking point in Iraq, the Army should be increased in size. But it's also good to remind ourselves that there is a lot more going on, and a fabulous worldwide military infrastructure to support not just operations in Iraq and Afghanistan, but other pockets of the American empire. I'm a close watcher of military exercises, one of the best ways to gauge what the military is really doing and thinking. Here are some of the latest.

Bright Star 05/06, the largest military exercise the U.S. conducts in the Middle East, began in western Egypt and the Mediterranean Sea September 10. Scheduled every two years (but canceled in 2003 because of the Iraq war), the current six week versions includes air, naval, amphibious and special operations field training by Egyptian and U.S. soldiers, with contingents from France, Germany, Greece, Italy, Jordan, Kuwait, Netherlands, Pakistan, Saudi Arabia, and the UK. Overall, some 16,000 military personnel are involved. Observers from "up to" 36 countries are also present during the war games, U.S. officials say. Paratroopers from Egypt, Germany, Jordan and the Netherlands jumped with the 82nd Airborne on September 15. The Pakistani press has also reported the presence of the Special Services Group (I thought they were busy hunting for Al Qaeda?).

While the U.S. is busy in Egypt fighting the last war, Russia and Uzbekistan conducted their first ever bilateral exercise last week. In July, after U.S. criticism of the bloody suppression of a rebellion in the Uzbek town of Andijan in May, Uzbekistan told the U.S. military it would have six months to vacate the "K2" base at Kharshi-Khanabad. K2 was one of the key Afghanistan staging bases for the CIA and special operations forces in the immediate aftermath of 9/11 and had up until this summer been a showcase for those who argue the value of peacetime military relations: if we hadn't been cozy with Uzbekistan and conducting exercises in the late 1990's, we wouldn't have been able to move so quickly, the argument goes. 

Military sources tell me that it is unlikely that K2 will be replaced with a new full-fledged base in Central Asia. But Tajikistan hinted last week that it could host some US military equipment and personnel, and U.S. Central Command (CENTCOM) commander Gen. John Abizaid, was in Ashgabat, Turkmenistan on August 23.

Another major U.S. base in the region, in Kyrgyzstan, is an obvious candidate for increased activity, but Kyrgyzstan has been under pressure from Russia and China who demand that it set a date for U.S. withdrawal from Manas. But the race is on: Russia has established its own military airbase in Kyrgyzstan and last year it also won approval to keep its 6,000 troop-strong 201st Division at a permanent base in Tajikistan. Of course the U.S. does have major bases in Afghanistan, and maintains a couple of important secret bases in Pakistan.

Though Pakistan gets to participate in varsity U.S. military exercises like Bright Star, there must be some anxiety at the flurry of "next war" military activity by the United States with India. Yesterday the U.S. and India began the nine-day naval exercise "Malabar 05" in the North Arabian Sea. The exercise, the eighth in the U.S.-Indian series, includes the aircraft carrier USS Nimitz and its battle group operating Indian Navy counterparts. The thrust of Malabar 05 is "counter-terrorism operations at sea," says Rear Admiral D.K. Joshi, the Indian Assistant Chief of Naval Staff. The exercise includes U.S. P-3C Orion P3C maritime reconnaissance aircraft operating from Dabolim in Goa (the U.S. is trying to sell some of the planes to the Indians).  Malabar 05 will be followed up by a joint Indo-U.S. special operations exercise in Guam in January 2006. 

The USS Safeguard meanwhile also began conducting the first-ever salvage exercise (SALVEX) with the Indian navy on September 12 in and off the waters of Cochin. And on September 13, India officials announced that a joint U.S.-Indian "Yudh Abhyas" exercise began at the Counter Insurgency and Jungle Warfare School near the Mizoram-Assam border town of Vairengte. It is the third exercise since U.S. soldiers started visiting the school for cooperative counter-terrorism work in April 2003. According to DOD documents, U.S. and Indian contingents will continue their anti-terrorism joint exercises January 16-31, 2006 at Choubatia in Uttar Pradesh. 

Indian and U.S. air force pilots also recently conducted a set of week-long flying exchanges between Misawa airbase in Japan and an Indian base, where U.S. pilots got to fly a Russian-made SU-30 fighter jet. The exchange visits are in preparation for a "Cope India" exercise scheduled for November. The bilateral training exercise will be the second in India in less than two years. Representatives from the Indian military also observed the U.S. "Cope Thunder" exercise in Alaska in June.

All of this comes at a time when India and Russia are preparing their first-ever joint army exercise involving their own paratrooper drop in Rajasthan's Aravali hills to destroy a "terrorist" base, scheduled for October. And India, China and Russia are also planning what Moscow describes as "the biggest military exercise in the world" in 2006, follow-on to the Russian-Chinese "Peace Mission 2005."

It's always about peace.

There will be a quiz on Friday.

Just when that Korea problem was all solved. Is it just me, or is some of the best military talent being assigned to the Pacific and Korea/China problem? Last week, the Pentagon announced the assignment of Army Gen. Burwell B. ("BB") Bell as commander of U.S. Forces Korea and combined U.S. and South Korean forces, as well as the assignment of Air Force Lt. Gen. Daniel P. Leaf, as deputy commander, U.S. Pacific Command. They join other top managers and war fighters already assigned to the Pacific theater.

Maybe I'll get a call back now. Longstanding "acting" Assistant Secretary of Defense for Public Affairs Larry Di Rita is finally going to get to do something he is actually interested in, as the White House announced this week that Dorrance Smith, former executive producer of ABC's This Week, assistant to former President Bush for media affairs, and former media adviser for the Coalition Provision Authority in Baghdad would become the new Pentagon spokesperson. In a April 25, 2005 op-ed in the Wall Street Journal, Smith said "Osama bin Laden, Abu Musab al-Zarqawi, and al Qaeda have a partner in Al- Jazeera and, by extension, most networks in the U.S." I guess someone in charge of winning the battle for hearts and minds will now have to work overtime with him at the podium.

This is also certain to win hearts and minds. Raytheon Missile Systems announced that it had delivered "a short-range millimeter wave directed energy non-lethal weapon to the Department of Defense's Full Spectrum Effects Platform (FSEP) program -- also known as Project Sheriff -- for the Office of Force Transformation (OFT)." For those who do read English, this will be the first ever anti-personnel microwave weapon to be deployed by the United States (or probably any other country).

The beam heats the skin to levels of excruciating pain, encouraging anyone who comes in contact with the beam to flee. Raytheon is incorporating the microwave weapon into a Stryker combat vehicle, ultimate destination Iraq. "The millimeter wave energy beam can help discriminate the threat and assess the intent of an aggressor with a temporary reversible effect whose safety has been established and demonstrated in more than 12 years of testing by the Air Force Research Laboratory with sponsorship from the Joint Non-Lethal Weapons Directorate," Raytheon says. In fact the whole program has been saved by the Iraq war; it was previously floundering because despite constant incantations that the weapon was safe, sane military commanders and leaders didn't want to be the first to employ it.

The experience of space cadets. DOD announced this week that the Office of the Under Secretary of Defense for Intelligence intends to award a "sole source" contract to Toffler Associates on Manchester, MA. The firm is the offspring of futurists Alvin and Heidi Toffler, authors of The Third Wave, War & Anti-War, and Future Shock. Sole source. I guess there isn't any other company that can provides recommendations "for the standup of a Defense Intelligence Human Capital management office to manage and administer the Defense Civilian Intelligence Personnel System (DCIPS)."

The Department of Homeland Security Red Cell.  Thanks to RH, DS, RA, RB, and GG for their contributions to uncover a list of "Red Cell" big-thinkers. 

Daniel S. Gressang IV, faculty, Joint Military Intelligence College 
Benjamin D. Goss, academic, 2004 Super Bowl Red Cell 
Dr. Colby Burke Jubenville, Sports Management, Middle Tennessee State      University, 2004 Super Bowl Red Cell 
Dr. Tim Kotnour, University of Central Florida 
Brennan McKernan, DHS Red Cell 
Brad Meltzer, Montgomery Country based Washington themed fiction book author 
Jon Nowick, DHS Director, Analytic Red Cell Program 
Dr. Jim Pearson, University of Central Florida 
Robert ("Bob") Rich, Dr. Randy Shumaker, University of Central Florida 
Brad Thor, military thriller author 
Andy Wright, DHS Program Manager, Analytic Red Cell Program
Others suggested "rock star" Jeff "Skunk" Baxter, late of the Doobie Brothers, who has also gotten into national security consulting and is one of the Pentagon "experts" on ballistic missile defense.

By William M. Arkin | Permalink* | Comments (10) 

Posted at 11:38 AM ET, 09/23/2005
Rita Shows New Rules Not Needed
Many readers have responded to my reporting on the issue of the military's domestic role this week, almost evenly split between those who believe something needs to be done to give the President more authority to respond to emergencies, and those who don't. A number of readers have lamented that Washington will likely do what it does best: reorganize. This from Gimlet: "Just as there was little need to overhaul intelligence agencies after 9/11 (there was a need to fire some people), there is no need to expand military authority now in support of civil emergency operations."

Rita is proving so far that we don't need a change in laws or a reorganization to adequately respond to disasters.

"Our armed forces have pre-positioned troops," the President said at the Pentagon Wednesday. "We have resources there to help the federal, state and local officials to respond swiftly and effectively."

That's the way it should be, local and state first, federal and military assisting.

In contrast with Katrina, Lt. Gen. Robert Clark, commander of the Fifth Army at Ft. Sam Houston in San Antonio, was put in charge of Joint Task Force Rita before the storm hit.

Thousands of National Guard troops have been on the move for days. Active duty military resources up to and including Air Force U-2s and reconnaissance satellites are in support.

It's such an orderly process, when you are prepared and paying attention, that is. "As directed by the secretary of defense and in accordance with the National Response Plan … [DOD] is supporting Homeland Security Department and FEMA disaster preparation efforts," the Pentagon said yesterday.

I am also struck by the irony of National Guard troops overextended in Iraq and Afghanistan while active duty troops are being "mobilized" here. Perhaps even more fundamental restructuring needs to take in the National Guard: Focus it more on State and domestic missions first. Guard units at the State level would organize around disaster response, civil affairs, engineering, transport and military police units, and once state and domestic needs were fulfilled, then "combat" units would be created. This might require the elimination of units likes field artillery and MLRS in the Guard, shifting the burden of specialized combat to the reserves and active military.

Can't be done because the size of the active military has so shrunk that it is dependent on the Guard for mobilization for the big one? Which big one are we talking about? I remember I had a conversation with a senior Defense Department official a few years back when pre-9/11 Rumsfeld cut back B-1 bomber units in the Air Force. I asked how the Pentagon saw generating a sustained long-range bombing campaign, say in a war with China, and he said, well Bill, if you want to have a traditional force structure capable of fighting China then we need a lot bigger military and even more heavy bombers. The bottom line is, we make choices about how to use limited resources even in these times of gargantuan military spending.

Maybe the preparations for Hurricane Rita won't provoke the big change, and maybe the Department of Homeland Security and FEMA will perform well enough to alleviate some of the criticism and take some of the heat off.

But something is still wrong with our post 9/11 domestic set-up, and the way we look at even purely civil "homeland security" preparedness (do we have to call it that?). The President isn't going to some FEMA command center or homeland security bunker to monitor Rita.  Tonight, he'll be arriving at Northern Command (NORTHCOM) headquarters in Colorado Springs. 
 

By William M. Arkin | Permalink* | Comments (18) 

Posted at 09:19 AM ET, 09/22/2005
DOD: No New Rules Needed
Weeks before hurricane Katrina hit the Gulf coast, the Pentagon drafted new policies regarding the use of the military in the United States.

The drafts -- marked "For Official Use Only" and "Pre-Decisional" and obtained by this Washington Post blogger -- should put to rest concerns that there is a need to modify or repeal the Posse Comitatus Act to give the President more flexibility to employ the armed forces in any emergency.

There is no such need.  The President already has all the flexibility he needs.  But you wouldn’t have known if from the cries for help this week.

First, Sen. John Warner (R.-VA) asked the Pentagon to review "the entire legal framework" governing the President's power to use active duty military forces in domestic roles.

Then Coast Guard Vice Adm. Thad Allen, the Katrina recovery commander, went on the record saying that "federalization without consultation" with state and local authorities may be needed in future disasters. "I'm talking about something you could do whether the state requests anything or not," he said.

Other Senate leaders have joined Warner in calling for a greater military role and changed standards. "The fear … of federal military usurping state and local authority and, in the worst case, martial law … has to give way to the reality of lives on the line," says Sen. Joseph Lieberman (D.-CT).

Warner, Allen, Lieberman, as well as Rumsfeld's spokesman Larry Di Rita, are all wrong. There is nothing that stands in the way of the military rendering emergency assistance, and what is more, if the President had wanted to fly in the 82nd Airborne even without State approval, he could have done so and the military could have taken his order without concern for its directives.

The problem with the response to Katrina was federal government incompetence and inattention, not any regulations or laws. Maybe these calls for changing the law are just a way of avoiding responsibility.

The two Defense Department documents, one a directive entitled Defense Support of Civil Authorities (PDF) and the other, an accompanying 190-page DoD Manual for Defense Support of Civil Authorities (PDF) are dated June 27.

They two documents make clear that the DOD's position is that the military can provide support to civil authorities, and even act as a lead agency in the face of a breakdown of civil command and control (the Allen scenario) in accordance with the National Response Plan and current law.

The policy drafts should also provide some comfort that Defense Department officials remain clear on the primacy of civilian authority and response. What is more, the new directives lay out strict "criteria" to assess whether the military should undertake civilian missions, specifically political and legal "appropriateness," "a clear end state," and no infringement on military readiness.

 On March 25, 2003, then Deputy Secretary of Defense Paul Wolfowitz appointed former Congressman Paul McHale as the first Assistant Secretary of Defense for Homeland Defense. McHale was charged with overseeing DOD homeland defense activities and developing policies for support to civil authorities. His draft policies will replace an earlier 1997 Military Assistance to Civil Authorities directive and the 1994 DoD Manual for Civil Emergencies. 

 The two new draft documents update and streamline other existing directives and manuals relevant to homeland defense and support to civil authorities in light of reorganizations since 9/11, but substantively make no real changes to the policy that DOD "shall cooperate" with civil authorities consistent with "applicable laws, Presidential Directives, Executive Orders, and DOD directives."

 On could argue that the Clinton era directive sets forth more rigorous criteria -- legality (compliance with laws), lethality (potential use of lethal force by or against DOD forces), risk (safety of DOD forces), cost (who pays and impact on DOD budget), appropriateness (whether the requested mission is in DOD’s interest to conduct), and readiness (impact on the DOD’s ability to perform its primary mission) -- but this as much reflects the previous administration's reluctance to use military force as it does some greater desire on the part of the military to take over today.

 The new draft manual makes clear the military's role: 

 "First responsibility for support to the local incident response is with the State in which the disaster occurs. When State resources and capabilities are overwhelmed, Governors may request Federal assistance under a Presidential disaster or emergency declaration. Federal assistance is initiated when a disaster is so severe that a State's ability to provide response is overcome. … The DoD Components shall not perform any function of civil government unless absolutely necessary on a temporary basis under conditions of Immediate Response. Any commander who is directed, or undertakes, to perform such functions shall facilitate the reestablishment of civil responsibility at the earliest time possible."

 The draft directive states that "Any DoD Component or military commander may provide immediate response … to save lives, prevent human suffering, or mitigate great property damage under imminently serious conditions." 

Immediate response is defined as: 

"Any form of immediate action taken by a DoD Component or military commander, under the authority of this Directive and any supplemental guidance prescribed by the Head of a DoD Component, to assist civil authorities or the public to save lives, prevent human suffering, or mitigate great property damage under imminently serious conditions. When such conditions exist and time does not permit approval from higher headquarters, local military commanders and responsible officials from the DoD Components and Agencies are authorized to take necessary action to respond to requests of civil authorities consistent with the Posse Comitatus Act (18 U.S.C. § 1385) … All such necessary action is referred to as 'Immediate Response.'" 

The draft Manual states that "When guidance cannot be obtained from higher headquarters on a timely basis, due to attack on the United States or other emergency circumstances, the DoD Components should apply DoD resources to DSCA [defense support of civil authorities] in the following order of priority: To save human life and mitigate human suffering, and to protect essential U.S. Government capabilities…"

The draft Manual does state that "The Secretary shall coordinate the Federal Government's resources utilized in response to or recovery from terrorist attacks, major disasters, or other emergencies" if and when any one of four conditions applies: 

 "A Federal department or agency acting under its own authority has requested the assistance of the Secretary; 
The resources of State and local authorities are overwhelmed and Federal assistance has been requested by the appropriate State and local authorities; 
More than one Federal department or agency has become substantially involved in responding to the incident; or 
The Secretary has been directed to assume responsibility for managing the domestic incident by the President."
I guess one could take the final condition as ominous, but the conditions and authorities of the President in his constitutional role to order the military into action in an emergency are not any different from the pre 9/11 policies.

What is more, the new DOD directives exactly mirror the National Response Plan, which says on pages 42-43 (thanks KG): 

"Imminently serious conditions resulting from any civil emergency may require immediate action to save lives, prevent human suffering, or mitigate property damage. When such conditions exist and time does not permit approval from higher headquarters, local military commanders and responsible officials from DOD components and agencies are authorized by DOD directive and pre-approval by the Secretary of Defense, subject to any supplemental direction that may be provided by their DOD component, to take necessary action to respond to requests of civil authorities consistent with the Posse Comitatus Act (18 U.S.C. § 1385). All such necessary action is referred to as 'Immediate Response.'"

Maybe readers will see something in these two documents that I don't see. But now we have Hurricane Rita to test my interpretation. 

I doubt that we will see the President or other Congressional leaders claiming this time that the military can't respond quickly and appropriately. That's because this time they are paying attention.

By William M. Arkin | Permalink* | Comments (23) 

Posted at 07:21 AM ET, 09/21/2005
Today in DC: Commandos in the Streets?
Today, somewhere in the DC metropolitan area, the military is conducting a highly classified Granite Shadow "demonstration." 

Granite Shadow is yet another new Top Secret and compartmented operation related to the military’s extra-legal powers regarding weapons of mass destruction. It allows for emergency military operations in the United States without civilian supervision or control. 

A spokesman at the Joint Force Headquarters-National Capital Region (JFHQ-NCR) confirmed the existence of Granite Shadow to me yesterday, but all he would say is that Granite Shadow is the unclassified name for a classified plan.

That classified plan, I believe, after extensive research and after making a couple of assumptions, is CONPLAN 0400, formally titled Counter-Proliferation of Weapons of Mass Destruction. Concept Plan (CONPLAN) 0400 is a long-standing contingency plan of the Chairman of the Joint Chiefs of Staff (CJCS) that serves as the umbrella for military efforts to counter the spread of weapons of mass destruction. It has extensively been updated and revised since 9/11.

The CJCS plan lays out national policy and priorities for dealing with WMD threats in peacetime and crisis -- from far away offensive strikes and special operations against foreign WMD infrastructure and capabilities, to missile defenses and "consequence management" at home if offensive efforts fail.

All of the military planning incorporates the technical capabilities of the intelligence agencies and non-military organizations such as the national laboratories of the Department of Energy. And finally, CONPLAN 0400 directs regional combatant commanders to customize counter-proliferation plans for each of their own areas of operations. 

When that "area of operations" is the United States, things become particularly sensitive. 

That's where Granite Shadow comes in. U.S. Northern Command (NORTHCOM), the military's new homeland security command, is preparing its draft version of CONPLAN 0400 for military operations in the United States, and the resulting Granite Shadow plan has been classified above Top Secret by adding a Special Category (SPECAT) compartment restricting access.

The sensitivities, according to military sources, include deployment of "special mission units" (the so-called Delta Force, SEAL teams, Rangers, and other special units of Joint Special Operations Command) in Washington, DC and other domestic hot spots. NORTHCOM has worked closely with U.S. Special Operations Command (SOCOM), as well as the secret branches of non-military agencies and departments to enforce "unity of command" over any post 9/11 efforts.

Further, Granite Shadow posits domestic military operations, including intelligence collection and surveillance, unique rules of engagement regarding the use of lethal force, the use of experimental non-lethal weapons, and federal and military control of incident locations that are highly controversial and might border on the illegal.

Granite Shadow is the twin to Power Geyser, a program I first revealed to The New York Times in January. The JFHQ spokesman confirms that Granite Shadow and Power Geyser are two different unclassified names for two different classified plans.

In the case of Power Geyser, the classified plan is CJCS CONPLAN 0300, whose entire title is classified. According the military documents, the unclassified title is "Counter-Terrorism Special Operations Support to Civil Agencies in the event of a domestic incident." It is another Top Secret/SPECAT plan directing the same special mission units to provide weapons of mass destruction recovery and "render safe" in either a terrorist incident or in the case of a stolen (or lost) nuclear weapon. Render safe refers to the ability of explosive ordnance disposal experts to isolate and disarm any type of biological, chemical, nuclear or radiological weapon.

The obvious question is why there is a need for two plans. My guess is that Power Geyser and CONPLAN 0300 refers to operations in support of a civil agency "lead" (most likely the Attorney General for a WMD attack) while Granite Shadow and CONPLAN 0400 lays out contingencies where the military is in the lead.  I'll wait to be corrected by someone in the know.

Both plans seem to live behind a veil of extraordinary secrecy because military forces operating under them have already been given a series of ''special authorities'' by the President and the secretary of defense. These special authorities include, presumably, military roles in civilian law enforcement and abrogation of State's powers in a declared or perceived emergency.

In January, when The New York Times reported on the Power Geyser name from my Code Names website, the Pentagon argued that "It would be irresponsible … to comment on any classified program that may or may not exist."

I can't see how the Defense Department can continue this line of argument post-Katrina. We see the human cost of a system of contingency planning done in complete secret, with a lack of any debate as to what should be the federal government's priorities, emphasis, and rules.

As the Granite Shadow commandos and their federal brethren go through their paces today, some inside the system will lament that I have "compromised" their work. But the very fact that nothing in my writing damages the Granite Shadow effort should demonstrate that we can have a discussion of contingency planning priorities in the United States, and debate extraordinary special authorities granted to those in uniform, without compromising the details of the plans themselves.

There's still time. The full-scale exercise of Granite Shadow's capabilities and procedures doesn’t start until April 2006.

A note to readers: Today begins a weekly feature of Early Warning, namely code name of the week. This will endeavor to discuss some secret program of the government, sometimes with an argument that the secrecy is excessive, sometime with far more questions than answers.

By William M. Arkin | Permalink* | Comments (98) 

Posted at 07:55 AM ET, 09/20/2005
Rumsfeld to Katrina: "Thanks"
Virginia Sen. John Warner (R.-VA) asked Donald Rumsfeld last week to conduct a "thorough review" of presidential authority to use the armed forces to "restore public order" in an emergency like Katrina. His letter (PDF) unleashed a torrent of speculation that lawmakers will soon modify or even repeal the Posse Comitatus Act, to some a thread-thin security blanket between civilian rule and martial law. 

The back story?  Warner, the long-standing chairman of the Senate Armed Services Committee, is either confusing the President's inadequate response with legal handcuffs that don't actually exist, or he's playing the oldest Washington game in the book: asking the Defense Department to do something it already wants to do.  I'm betting the latter. 

Nothing in law prevents the President from employing the military in a Katrina-like emergency if state and local government really breaks down.  In fact, the 130-year-old Posse Comitatus Act more symbolizes the military's subordination to civil authority than it actually restricts what the military can do.

And Warner, of all people, should be well aware that long before Katrina, the military began rewriting its policies, manuals, and war plans associated with what it now calls "defense support of civil authorities."   Post 9/11 military contingency planning for "emergency" and "immediate" response by the Pentagon is already in the process of marginalizing any previously perceived legal constraints (more on this later this week.).

"The military" for its part, if there is such a monolith, also has no greater interest in taking on nation building here than it does overseas. You know the mantra: The military exists to fight and win the nation's wars, yadda, yadda.   It isn't the uniformed military that's confused about its position in society.  But there is a growing cadre of mostly civilian homeland security zealots in and around the Pentagon, and they, I think, are the problem.

A little background: The Posse Comitatus Act (18 USC 1385) provides that “Whoever, except in cases and under circumstances expressly authorized by the Constitution or Act of Congress, willfully uses any part of the Army or the Air Force as a posse Comitatus [Latin for "power of the county"] or otherwise to execute the laws shall be fined … or imprisoned not more than two years, or both.”   The PCA generally prohibits federal military personnel from interdicting vehicles, vessels and aircraft; conducting surveillance, searches, pursuit and seizures; or making arrests on behalf of civilian law enforcement authorities.  The PCA applies to all of the federal uniformed services by statute or DOD policy.  It does not apply to the U.S. Coast Guard.

The law finds its origins in local sheriff use of federal troops to enforce law on the western frontier (particularly the Fugitive Slave Act of 1850) and military deployments to the south during reconstruction to maintain law and order.  Questions about military influence in the voting process in the election of 1876 led to passage of the Act in 1878.  It thus restricted the right of US marshals and local sheriffs to conscript military personnel into their posses.

Explicit constitutional or statutory authority must be invoked before federal military forces can be utilized in domestic law enforcement, but the list of exceptions is vast: an extremely broadly defined Insurrection Act, missions in protection of the president, foreign VIPs, and in continuity of government, protection of public lands, execution of quarantine and certain health laws, removal of persons unlawfully on Indian lands, actions taken in support of the neutrality laws, execution of certain civil rights warrants, and actions in support of certain customs laws.

Furthermore, the statute, my military friends say, does not limit the president's constitutional power to direct actions that might otherwise be prohibited. This includes protection of military personnel, equipment, assets, and bases, and use of the military under special authorities in situations in response to incidents involving weapons of mass destruction or nuclear materials. 

What is more, actions that are taken "under the inherent right of the U.S. Government, a sovereign national entity under the U.S. Constitution, to ensure the preservation of public order and to carry out governmental operations within its territorial limits, or otherwise in accordance with applicable law, by force, if necessary" are not restricted. 

No wonder the meager restrictions of Posse Comitatus are such an emotional issue.  In that regard, Sen. Warner did something extremely useful in his letter, which is to prod Rumsfeld, as he also did after 9/11, to redouble the Defense Department's efforts to "better publicize the existing statutory limits on the use of the armed forces for such purposes," to point out that "there is still a potential element of confusion about what the Department can and cannot do under present law with the regular armed forces." 

The problem here is that Donald Rumsfeld and his ever growing Industry of Military Complexes devoted to homeland security and counter-terrorism seem to be intentionally bad mouthing Posse Comitatus and connecting it to Katrina in order to earn themselves greater operational flexibility in the United States. 

Last week Pentagon spokesman Lawrence Di Rita was Rumsfeld's front man in this effort: According to a September 17 Associated Press story, the Secretary "is reviewing a wide range of possible changes in the way the military could be used in domestic emergencies," Di Rita said Friday.  He said these included "possible changes in the relationship between federal and state military authorities."  Di Rita called the Posse Comitatus Act "very archaic," and stated that it limited the Pentagon's flexibility in responding.

Contrast his statement with the thoughts of cooler headed Sen. Lindsey Graham (R-SC), who is also a lawyer in the Air Force reserve.  "I am not comfortable with suspending local laws and state laws and allowing American military people to come into any community, arrest people and seize property, unless there is a very good reason," Graham told FOX News Sunday.  "The Posse Comitatus Act goes back to the 1880's in our history, and it's a prohibition against the federal military coming in and taking over a local community or a state and becoming law enforcement officers," he added.  Graham said we might have to look at the laws to make sure the military "can provide assistance" when needed.  "But we should not allow the federal government, willy-nilly, to take over state and local functions in terms of law enforcement."

So either Di Rita doesn’t understand the true restrictions and intent of the law, in which case his statement is incompetent, or he's part of the set-up, in which case he should win an Oscar.

Even before Katrina, contingency planners at the U.S. Northern Command (NORTHCOM), the military's new homeland security command in Colorado Springs, were given marching orders by Rumsfeld to plan for the worst possible contingency domestically. The resulting plan, currently in draft and called CONPLAN 2002 (watch this space), is predicated on a scenario in which the Defense Department would have to take "the lead" from the Department of Homeland Security, civil agencies, and the States, that is, to act without civil authority.

I think we call that martial law. 

By William M. Arkin | Permalink* | Comments (30) 

Posted at 07:30 AM ET, 09/19/2005
The Pressure Cooker at Homeland Security
As FEMA recovers from Katrina, and the military gets ready to take over responsibility for everything, the Department of Homeland Security (DHS) squeaks by, wasting our money and squandering its time. 
 

DHS likes to say that it is thinking out of the box in getting inside the minds of terrorists. Its main vehicle to do so is its so called "Red Cell," a group of consultants established "to complement traditional intelligence-based threat projections by taking an 'out of the box' approach that is achieved by drawing on the talents of a broad range of individuals, such as best-selling authors, academics, the military, and pop musicians." 

A year ago, the Red Cell published a "For Official Use Only" report How Terrorists Might Exploit a Hurricane and published here for the first time, to respond to a DHS request "to speculate on possible terrorist exploitation of a high category hurricane." 
 

The only reason I can imagine why the four page report is stamped "For Official Use Only" and carries the warning that "any release, dissemination, or sharing of this document, or any information contained herein, is not authorized" is to hide the fact of how inane the analysis is. 

"Terrorists are unlikely to exploit a hurricane," the report’s summary begins. It took "experts" to conclude this? And why go on for four pages if that’s what they came up with? 

I guess there are two reasons. First, I suppose that the 35 experts who took the taxpayer's money, drank the taxpayer's coffee and ate the taxpayer's donuts as they toiled away in their Booz Allen Hamilton conference room, felt obligated to report back something. 

Second, I guess they felt they needed to warn federal and local law enforcement agencies. "It is conceivable that a terrorist group like al-Qaida, if it had plans in place for an attack elsewhere in the region or country, might attempt to time such an attack to a hurricane," the Red Cell concludes. 

But they then contradict themselves, saying "The participants assessed that a splinter terrorist cell or a lone actor, rather than an established terrorist group, would be more likely to exploit a hurricane on site. This could include persons pursuing a political agenda, religious extremists, or other disgruntled individuals." Those who would promiscuously reference Al Qaeda of course aren't pursuing a political agenda. 

The brilliant out-of-the-box thinkers put forth a number of silly recommendations: "maintain nationwide security and emergency preparedness … observe and report casing of critical infrastructure by unfamiliar vehicles … report missing personnel and equipment … increased security procedures [at evacuation centers] …" 
 

How about this one? "Increase patrols and vigilance of staff at key transportation and evacuation points (for instance, bridges and tunnels), including watching for unattended vehicles at these locations."  Boy, I hope someone has reported all of the unattended vehicles in Louisiana and Mississippi.

And finally, "increased security procedures at shelters" … and "ensure that food and other emergency relief supplies are secure." 

Increased security procedures at shelters? Ensure that food and other emergency relief supplies are secure? How about assuring that food and relief supplies are even delivered?

 Supposedly, the Red Cellers are issuing a dozen or so of these reports a year. I couldn't find a list of them and I would sure like to know how much they cost. But since 2003 (thanks MS for providing help on this), the DHS has issued alerts on: 

Chemical, Biological, Radiological and Nuclear (CBRN) materials available to Al-Qaeda and other terrorist groups. 
Ricin Delivered by Mail. 
Potential Terrorist use of Official Identification, Uniforms or Vehicles. 
Potential Threat to Ferryboats. 
Potential for Terrorist Use of Rental Vehicles: Indicators for the Car, Truck and Limousine Rental Company in the U.S. 
Potential Terrorist use of Self Storage Facilities in the U.S. 
Compressed Gas Cylinders as Components of Improvised Explosive Devices (IEDs) to destroy buildings. 
Potential Terrorist Exploitation of heating, ventilation, and air conditioning systems. 
Potential Terrorist Use of Emergency Vehicles to Circumvent Security Procedures. 
Terrorist Interest in Concentrated Hydrogen Peroxide. 
Potential Terrorist Use of Helicopters in the U.S. 
Potential vehicle-borne improvised explosive device (VBIED) vulnerability. 
Improvised chemical device threat involving toxic chemical materials and delivery methods at public venues. 
Terrorism attacks against American shopping centers, malls and fast-food restaurants using chemical and biological agents, backpack bombs and firearms. 
Targeting U.S. passenger trains, possibly using operatives who have a Western appearance.
 And my favorite:  The "For Official Use Only" report about Potential Terrorist Use of Pressure Cookers. I always suspected that my mother was up to no good. 

There are just so many warnings about so many areas covering so much of the day-to-day life of America. The cumulative effect is to provide no useful warning at all. 
 

The 2005 DHS Appropriations Bill contains $18.8 million for "the establishment of physical and cyber target risk analysis teams using analytic ‘red cell’ and operational ‘red team’ procedures to evaluate protective measures … in the protection of key assets and critical infrastructure." So maybe Congress should, uh, look into this waste of time and money. 

I'd love to publicize the names of those individuals participating in the Red Cell effort. John Mintz did a profile of the Red Cell program, "Homeland Security Employs Imagination," for the Post last year, noting that the participants had to sign a nondisclosure agreement. I’m all about disclosure here. I’ll send a free, signed Code Names book to anyone who can provide a list of Red Cell government consultants. 
 
 
 
 

By William M. Arkin | Permalink* | Comments (33) 

Posted at 12:09 PM ET, 09/16/2005
Documents Library
Natural Disasters Perfunctory Concerns
September 15, 2005
 Comprehensive Homeland Security Exercise Schedule (Exclusive to Early Warning) (PDF)

Michael Brown Was Set Up: It's All in the Numbers
September 14, 2005
Homeland Security Presidential Directive 8 (PDF)
National Planning Scenarios (For Official Use Only, Exclusive to Early Warning) (PDF)
National Response Plan (PDF)
National Preparedness Guidance (PDF)

By Michael Corones | Permalink* | Email a Comment 

Posted at 08:05 AM ET, 09/16/2005
A broader role for the armed forces?
Amidst all of President Bush's proposals last night was one decree that the Commander-in-Chief can implement without Congressional or public intervention: "It is now clear that a challenge on this scale requires greater federal authority and a broader role for the armed forces -- the institution of our government most capable of massive logistical operations on a moment's notice."

The President has hit upon a seemingly no-brainer solution: Rely more on the one institution in our society that is most respected and competent.

The President’s plan is both wrong-headed and dangerous. 

I for one don't want to live in a society where "a moment’s notice" justifies military action that either preempts or usurps civil authority. 

What is more, nothing about what happened in New Orleans justifies such a radical move to give the military what bureaucrats call "a lead role" in responding to emergencies.

In the wake of Katrina, the military was standing by awaiting orders, as it should be.  The White House and the federal government were for their part either on vacation or out to lunch. The problem wasn’t the lack of resources available. It was leadership, decisiveness, foresight. The problem was commanding and mobilizing the resources, civil and military. 

The President's plan is also wrong-headed in that it lets the Department of Homeland Security off the hook. If such a department hadn't been set up after 9/11, I might reluctantly conclude that the military is the only institution that could do the job in such a large scale catastrophe. 

But it does exist, and it needs to be held accountable and redirected to safeguard the American people and respond to emergencies. A well run FEMA with the right marching orders (people first, fabulous weapons of mass destruction Hollywood scenarios as time permits) can quickly call upon military resources, as it could have in Katrina. 

The change that is needed is for the White House and Congress to admit that they over compensated for the shock of 9/11 by focusing too much on WMD and terrorism at the cost of basic domestic preparedness.

This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information, go to: http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted material from this site for purpose of your own that go beyond 'fair use', you must obtain permission from the copyright owner. 
http://www.tlc14u.comhttp://mtn-enterprises.tripod.com/index.htmlhttp://www.mesinnovations.com/