When A Top Border Official Was Asked About ISIS At The Border He Gave A Shocking Answer

The Texas director of the Department of Public Safety is concerned that ISIS fighters will infiltrate the U.S. through the Mexico border, and that those from countries with a “known terrorist presence” already have tried.

At the annual Texas Border Coalition meeting in Laredo last week, DPS Director Steven McCraw responded to a question by an audience member asking if any suspected ISIS members had been captured at the Texas/Mexican border. 

McCraw responded: “Individuals that come across the Texas/Mexican border from countries with a known terrorism presence and the answer to that is yes. We have individuals that we’ve needed to debrief in Pashto/Dari. Not a lot of Pashto and Dari speakers around. But you can’t think about the last attack; you have to think of the next attack and where our vulnerabilities are. So, we’re concerned about that.”

Laredo NBC affiliate KGNS reports: “McCraw added that the DPS also has a contingency plan involving increasing security at ports of entry, should violence spillover from Mexico. The DPS also works alongside Border Patrol watching the border through the use of about 5,000 motion-detection cameras on the border.” 

As reported by Western Journalism, according to Judicial Watch ISIS is operating a training camp just south of the US/Mexican border, near El Paso, Texas. Sources, identified as a Mexican Army field grade officer and Mexican federal police inspector, told JW that the camp is about 8 miles south of the border, just west of Ciudad Juarez in an area called Anapra.

Texas Commission on Environmental Quality

Texas Commission on Environmental Quality

Additionally, Congressman Duncan Hunter, R-Calif., a member of the Armed Services Committee, told Fox News last October that at least 10 ISIS affiliated fighters were caught trying to cross the border into Texas, according to his source in the Border Patrol. The Obama Administration has denied that any known terrorists have been apprehended coming across the US/Mexican border.  

‘Minority Report’ Is 40 Years Ahead Of Schedule: The Fictional World Has Become Reality

“The Internet is watching us now. If they want to. They can see what sites you visit. In the future, television will be watching us, and customizing itself to what it knows about us. The thrilling thing is, that will make us feel we’re part of the medium. The scary thing is, we’ll lose our right to privacy. An ad will appear in the air around us, talking directly to us.”—Director Steven Spielberg, Minority Report

We are a scant 40 years away from the futuristic world that science fiction author Philip K. Dick envisioned for Minority Report, in which the government is all-seeing, all-knowing and all-powerful; and if you dare to step out of line, dark-clad police SWAT teams will crack a few skulls to bring the populace under control.

Unfortunately, as I point out in my book Battlefield America: The War on the American People, we may have already arrived at the year 2054.

Increasingly, the world around us resembles Dick’s dystopian police state in which the police combine widespread surveillance, behavior prediction technologies, data mining and precognitive technology to capture would-be criminals before they can do any damage. In other words, the government’s goal is to prevent crimes before they happen: precrime.

For John Anderton (played by Tom Cruise), Chief of the Department of Pre-Crime in Washington, DC, the technology that he relies on for his predictive policing proves to be fallible, identifying him as the next would-be criminal and targeting him for preemptive measures. Consequently, Anderton finds himself not only attempting to prove his innocence, but forced to take drastic measures in order to avoid capture in a surveillance state that uses biometric data and sophisticated computer networks to track its citizens.

Seemingly taking its cue from science fiction, technology has moved so fast in the short time since Minority Report premiered in 2002 that what once seemed futuristic no longer occupies the realm of science fiction. Incredibly, as the various nascent technologies employed and shared by the government and corporations alike—facial recognition, iris scanners, massive databases, behavior prediction software, and so on—are incorporated into a complex, interwoven cyber network aimed at tracking our movements, predicting our thoughts and controlling our behavior, Spielberg’s unnerving vision of the future is fast becoming our reality.

Examples abound.

FICTION: In Minority Report, police use holographic data screens, city-wide surveillance cameras, dimensional maps and database feeds to monitor the movements of its citizens.

REALITY CHECK: Microsoft, in a partnership with New York City, has developed a crime-fighting system that “will allow police to quickly collate and visualise vast amounts of data from cameras, licence plate readers, 911 calls, police databases and other sources. It will then display the information in real time, both visually and chronologically, allowing investigators to centralise information about crimes as they happen or are reported.”

FICTION: No matter where people go in the world of Minority Report, one’s biometric data precedes them, allowing corporations to tap into their government profile and target them for advertising based on their highly individual characteristics. So fine-tuned is the process that it goes way beyond gender and lifestyle to mood detection, so that while Anderton flees through a subway station and then later a mall, the stores and billboards call out to him with advertising geared at his interests and moods. Eventually, in an effort to outwit the identification scanners, Anderton opts for surgery to have his eyeballs replaced.

REALITY CHECK: Google is working on context-based advertising that will use environmental sensors in your cell phone, laptop, etc., to deliver “targeted ads tailored to fit with what you’re seeing and hearing in the real world.” However, long before Google set their sights on context advertising, facial and iris recognition machines were being employed, ostensibly to detect criminals, streamline security checkpoints processes, and facilitate everyday activities. For example, in preparing to introduce such technology in the United States, the American biometrics firm Global Rainmakers Inc. (GRI) turned the city of Leon, Mexico, into a virtual police state by installing iris scanners, which can scan the irises of 30-50 people per minute, throughout the city.

Police departments around the country have begun using the Mobile Offender Recognition and Information System, or MORIS, a physical iPhone add-on that allows police officers patrolling the streets to scan the irises and faces of suspected criminals and match them against government databases. In fact, in 2014, the FBI launched a nationwide database of iris scans for use by law enforcement agencies in their efforts to track criminals.

Corporations, as well, are beginning to implement eye-tracking technology in their tablets, smartphones, and computers. It will allow companies to track which words and phrases the user tends to re-read, hover on, or avoid, which can give insight into what she is thinking. This will allow advertisers to expand on the information they glean from tracking users’ clicks, searches, and online purchases, expanding into the realm of trying to guess what a user is thinking based upon their eye movements, and advertise accordingly. This information as it is shared by the corporate elite with the police will come in handy for police agencies as well, some of which are working on developing predictive analysis of “blink rates, pupil dilation, and deception.”

In ideal conditions, facial-recognition software is accurate 99.7 percent of the time. We are right around the corner from billboards capable of identifying passersby, and IBM has already been working on creating real world advertisements that react to people based upon RFID chips embedded in licenses and credit cards.

FICTION: In Minority Report, John Anderton’s Pre-Crime division utilizes psychic mutant humans to determine when a crime will take place next.

REALITY CHECK: While no psychic mutants are powering the government’s predictive policing efforts, the end result remains the same: a world in which crimes are prevented through the use of sophisticated data mining, surveillance, community policing and precrime. For instance, police in major American cities have been test-driving a tool that allows them to identify individuals—or groups of individuals—most likely to commit a crime in a given community. Those individuals are then put on notice that their movements and activities will be closely monitored, and any criminal activity (by them or their associates) will result in harsh penalties.  In other words, you are guilty before you are given any chance to prove you are innocent.

The Department of Homeland Security is also working on its Future Attribute Screening Technology, or FAST, which will utilize a number of personal factors such as “ethnicity, gender, breathing, and heart rate to ‘detect cues indicative of mal-intent.’”

FICTION: In Minority Report, government agents use “sick sticks” to subdue criminal suspects using less-lethal methods.

REALITY CHECK: A variety of less-lethal weapons have been developed in the years since Minority Report hit theaters. In 2007, the Department of Homeland Security granted a contract to Intelligent Optical Systems, Inc., for an “LED Incapacitator,” a flashlight-like device that emits a dazzling array of pulsating lights, incapacitating its target by causing nausea and vomiting. Raytheon has created an “Assault Intervention Device” which is basically a heat ray that causes an unbearable burning sensation on its victim’s skin. The Long Range Acoustic Device, which emits painful noises in order to disperse crowds, has been seen at the London Olympics and G20 protests in Pittsburgh.

FICTION: A hacker captures visions from the “precog” Agatha’s mind and plays them for John Anderton.

REALITY CHECK: While still in its infancy, technology that seeks to translate human thoughts into computer actions is slowly becoming a reality. Jack Gallant, a neuroscientist at UC Berkeley, and his research team have created primitive software capable of translating the thoughts of viewers into reconstructed visual images. A company named Emotiv is developing technology which will be capable of reading a user’s thoughts and using them as inputs for operating machinery, like voice recognition but with brain signals. Similar devices are being created to translate thoughts into speech.

FICTION: In Minority Report, tiny sensory-guided spider robots converge on John Anderton, scan his biometric data and feed it into a central government database.

REALITY CHECK: An agency with the Department of Defense is working on turning insects into living UAVs, or “cybugs.” By expanding upon the insects’ natural abilities (e.g., bees’ olfactory abilities being utilized for bomb detection, etc.), government agents hope to use these spy bugs to surreptitiously gather vast quantities of information. Researchers eventually hope to outfit June beetles with tiny backpacks complete with various detection devices, microphones, and cameras. These devices could be powered by the very energy produced by the bugs beating their wings, or the heat they give off while in flight. There have already been reported sightings of dragonfly-like robotic drones monitoring protesters aerially in Washington, DC, as early as 2007.

FICTION: In Minority Report, Anderton flees his pursuers in a car whose movements are tracked by the police through the use of onboard computers. All around him, autonomous, driver-less vehicles zip through the city, moving people to their destinations based upon simple voice commands.

REALITY CHECK: Congress is now requiring that all new cars come equipped with event data recorders that can record and transmit data from onboard computers. Similarly, insurance companies are offering discounts to drivers who agree to have tracking bugs installed. Google has also created self-driving cars which have already surpassed 300,000 miles of road testing. It is anticipated that self-driving cars could be on American roads within the next 20 years, if not sooner.

These are but a few of the technological devices now in the hands of those who control the corporate police state. Fiction, in essence, has become fact—albeit, a rather frightening one.

The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by WesternJournalism.com.

Forget The New World Order; Here’s Who Really Runs The World

(ANTIMEDIA) For decades, extreme ideologies on both the left and the right have clashed over the conspiratorial concept of a shadowy secret government pulling the strings on the world’s heads of state and captains of industry.

The phrase New World Order is largely derided as a sophomoric conspiracy theory entertained by minds that lack the sophistication necessary to understand the nuances of geopolitics. But it turns out the core idea — one of deep and overarching collusion between Wall Street and government with a globalist agenda — is operational in what a number of insiders call the “Deep State.”

In the past couple of years, the term has gained traction across a wide swath of ideologies. Former Republican congressional aide Mike Lofgren says it is the nexus of Wall Street and the national security state — a relationship where elected and unelected figures join forces to consolidate power and serve vested interests. Calling it “the big story of our time,” Lofgren says the deep state represents the failure of our visible constitutional government and the cross-fertilization of corporatism with the globalist war on terror.

“It is a hybrid of national security and law enforcement agencies: the Department of Defense, the Department of State, the Department of Homeland Security, the Central Intelligence Agency and the Justice Department. I also include the Department of the Treasury because of its jurisdiction over financial flows, its enforcement of international sanctions and its organic symbiosis with Wall Street,” he explained.

Even parts of the judiciary, namely the Foreign Intelligence Surveillance Court, belong to the deep state.

How does the deep state operate?

A complex web of revolving doors between the military-industrial-complex, Wall Street, and Silicon Valley consolidates the interests of defense contracts, banksters, military actions, and both foreign and domestic surveillance intelligence.

According to Mike Lofgren and many other insiders, this is not a conspiracy theory. The deep state hides in plain sight and goes far beyond the military-industrial complex President Dwight D. Eisenhower warned about in his farewell speech over fifty years ago.

While most citizens are at least passively aware of the surveillance state and collusion between the government and the corporate heads of Wall Street, few people are aware of how much the intelligence functions of the government have been outsourced to privatized groups that are not subject to oversight or accountability. According to Lofgren, 70% of our intelligence budget goes to contractors.

Moreover, while Wall Street and the federal government suck money out of the economy, relegating tens of millions of people to food stamps and incarcerating more people than China — a totalitarian state with four times more people than us — the deep state has, since 9/11, built the equivalent of three Pentagons, a bloated state apparatus that keeps defense contractors, intelligence contractors, and privatized non-accountable citizens marching in stride.

After years of serving in Congress, Lofgren’s moment of truth regarding this matter came in 2001. He observed the government appropriating an enormous amount of money that was ostensibly meant to go to Afghanistan but instead went to the Persian Gulf region. This, he says, “disenchanted” him from the groupthink, which, he says, keeps all of Washington’s minions in lockstep.

Groupthink — an unconscious assimilation of the views of your superiors and peers — also works to keep Silicon Valley funneling technology and information into the federal surveillance state. Lofgren believes the NSA and CIA could not do what they do without Silicon Valley. It has developed a de facto partnership with NSA surveillance activities, as facilitated by a FISA court order.

Now, Lofgren notes, these CEOs want to complain about foreign market share and the damage this collusion has wrought on both the domestic and international reputation of their brands. Under the pretense of pseudo-libertarianism, they helmed a commercial tech sector that is every bit as intrusive as the NSA. Meanwhile, rigging of the DMCA intellectual property laws — so that the government can imprison and fine citizens who jailbreak devices — behooves Wall Street. It’s no surprise that the government has upheld the draconian legislation for 15 years.

It is also unsurprising that the growth of the corporatocracy aids the deep state. The revolving door between government and Wall Street money allows top firms to offer premium jobs to senior government officials and military yes-men. This, says Philip Giraldi, a former counter-terrorism specialist and military intelligence officer for the CIA, explains how the Clintons left the White House nearly broke but soon amassed $100 million. It also explains how former general and CIA Director David Petraeus, who has no experience in finance, became a partner at the KKR private equity firm, and how former Acting CIA Director Michael Morell became Senior Counselor at Beacon Global Strategies.

Wall Street is the ultimate foundation for the deep state because the incredible amount of money it generates can provide these cushy jobs to those in the government after they retire. Nepotism reigns supreme as the revolving door between Wall Street and government facilitates a great deal of our domestic strife:

“Bank bailouts, tax breaks, and resistance to legislation that would regulate Wall Street, political donors, and lobbyists. The senior government officials, ex-generals, and high level intelligence operatives who participate find themselves with multi-million dollar homes in which to spend their retirement years, cushioned by a tidy pile of investments,” said Giraldi.

How did the deep state come to be?

Some say it is the evolutionary hybrid offspring of the military-industrial complex, while others say it came into being with the Federal Reserve Act, even before the First World War. At this time, Woodrow Wilson remarked,

“We have come to be one of the worst ruled, one of the most completely controlled and dominated governments in the civilized world, no longer a government by conviction and the vote of the majority, but a government by the opinion and duress of a small group of dominant men.”

This quasi-secret cabal pulling the strings in Washington and much of America’s foreign policy is maintained by a corporatist ideology that thrives on deregulation, outsourcing, deindustrialization, and financialization. American exceptionalism, or the great “Washington Consensus,” yields perpetual war and economic imperialism abroad while consolidating the interests of the oligarchy here at home.

Mike Lofgren says this government within a government operates off tax dollars but is not constrained by the constitution, nor are its machinations derailed by political shifts in the White House. In this world — where the deep state functions with impunity — it doesn’t matter who is president so long as he or she perpetuates the war on terror, which serves this interconnected web of corporate special interests and disingenuous geopolitical objectives.

“As long as appropriations bills get passed on time, promotion lists get confirmed, black (i.e., secret) budgets get rubber stamped, special tax subsidies for certain corporations are approved without controversy, as long as too many awkward questions are not asked, the gears of the hybrid state will mesh noiselessly,” according to Mike Lofgren in an interview with Bill Moyers.

Interestingly, according to Philip Giraldi, the ever-militaristic Turkey has its own deep state, which uses overt criminality to keep the money flowing. By comparison, the U.S. deep state relies on a symbiotic relationship between banksters, lobbyists, and defense contractors, a mutant hybrid that also owns the Fourth Estate and Washington think tanks.

Is there hope for the future?

Perhaps. At present, discord and unrest continues to build. Various groups, establishments, organizations, and portions of the populace from all corners of the political spectrum, including Silicon Valley, Occupy, the Tea Party, Anonymous, WikiLeaks, anarchists and libertarians from both the left and right, the Electronic Frontier Foundation, and whistleblowers like Edward Snowden and others are beginning to vigorously question and reject the labyrinth of power wielded by the deep state.

Can these groups — can we, the people — overcome the divide and conquer tactics used to quell dissent? The future of freedom may depend on it.

This article (Forget the New World Order, Here’s Who Really Runs the World) is free and open source. You have permission to republish this article under a Creative Commons license with attribution to Jake Anderson and theAntiMedia.org.

The views expressed in this opinion article are solely those of their author and are not necessarily either shared or endorsed by WesternJournalism.com.

Alert: Federal Gov’t Admits Shocking Blunder That Will Impact Millions Of Americans

The federal government has now admitted that over 5 million fingerprints were stolen in a massive data breach. That’s up from the 1 million admitted previously.

The data breach was reported as far back as July and at the time it was said that as many as 1 million finger prints were stolen from the Office of Personnel Management in Washington. But now, new estimates have placed that number at five times the original estimate.

In a statement, OPM and the Defense Department say that they have discovered that far more fingerprints were taken than previously thought.

“The subset of individuals whose fingerprints have been stolen has increased from a total of approximately 1.1 million to approximately 5.6 million,” OPM said on Wednesday. “This does not increase the overall estimate of 21.5 million individuals impacted by the incident. An interagency team will continue to analyze and refine the data as it prepares to mail notification letters to impacted individuals.”

According to Republican Nebraska Sen. Ben Sasse, the timing of this statement is suspect. He thinks that the White House orchestrated the release of this information to coincide with the Pope’s visit in order to ensure that the media would not pay much attention to the news.

“Today’s blatant news dump is the clearest sign yet that the administration still acts like the OPM hack is a PR crisis instead of a national security threat,” Sen. Sasse said. “The American people have no reason to believe that they’ve heard the full story and every reason to believe that Washington assumes they are too stupid or preoccupied to care about cyber security.”

Sasse has also said that OPM’s dithering is emboldening the hackers.

Without established deterrents, foreign governments and cyber crime rings have gotten “bolder and bolder” with their attacks on the U.S., Sasse said in July.

Whatever the motivations of the timing of the announcement, OPM insists that the fingerprint data is “of limited use” to the hackers. But the agency promised to review those uses.

“Therefore, an interagency working group with expertise in this area–including the FBI, DHS, DOD, and other members of the Intelligence Community–will review the potential ways adversaries could misuse fingerprint data now and in the future,” OPM said in a statement.

With each new piece of news about the various data breaches suffered by the federal government, including the loss of Social Security and IRS info of millions of Americans, this hack seems to only get worse.

Already one head has rolled over the data breach. OPM head Katherine Archuleta resigned after the hack was revealed to the public.

Flying Is About To Become Much More Of A Hassle For Residents Of These 4 States

Image for representational purposes only.

Residents of four states and one American territory may find getting through security checkpoints at US airports more challenging if the Department of Homeland Security goes forward with its plan to enforce REAL ID requirements in 2016.

Under the provisions of the REAL ID Act passed in 2005 in response to the 9/11 Commission’s findings, states are required to meet certain federal standards with their driver’s licenses in order for them to be a valid form of identification for airline travel. If drivers licenses do not meet those standards, travelers must provide a second form of ID: passport, birth certificate, etc. to verify their identify.

So far, 46 states have implemented the requirements of the REAL ID Act; however, New York, New Hampshire, Minnesota, Louisiana, and American Samoa have not. 

States that have refused to implement the REAL ID Act requirements cite privacy and sovereignty concerns.

New Hampshire’s Concord-Monitor reports: “Under REAL ID, states must share all license data including digital photos, into a single database, raising concerns that the licenses would effectively become a national ID card.” A bill to implement the law’s requirements was killed in committee last year. 

In Louisiana, Gov. Bobby Jindal veto a bill to implement REAL ID last year, as well. “The Eagle Form, the Louisiana Family Forum and the Tea Party of Louisiana have asked for a veto due to concerns about whether it will compromise Louisiana’s sovereignty over what is fundamentally a state method of identification,” the governor said in his veto message.

According to the Times-Picayune, “Marjorie Esman, executive director of the ACLU and ACLU Foundation of Louisiana, joined forces with the Tea Party and other groups to oppose the 2014 legislation to implement the Real ID law in Louisiana.”

“‘REAL ID creates a national ID card that has nothing to do with the ability to drive and everything to do with government snooping on innocent people,’ Esman said in an email… ‘We don’t need that, and never have. If it were so essential to national security, it would have been enforced years ago.’”

Some of the requirements for a REAL ID card include:

  • Full legal name
  • Signature
  • Date of birth
  • Gender
  • Unique, identifying number
  • Principal residence address
  • Front-facing photograph of the applicant.

The cards must also include specific security features intended to prevent fraud or duplication, and must present data in a common, machine-readable format (bar codes, smart card technology, etc.).

h/t: Time