Thursday, December 30, 2010

Laurie Manwell on Psychological Resistance to 9/11 Truth, on "9/11 In Context"


On this week's "9/11 In Context" show, which airs Thursday, December 30, at 3pm ET, I will interview Laurie Manwell, Ph.D. candidate in Applied Cognitive Sciences at the University of Guelph. We will discuss the results of her research into the many reasons for the intense psychological resistance to 9/11 truth, and her positive strategies to present our information in ways that minimize denial and negative reactions. Laurie has published on the subject in the Journal of 9/11 Studies and is the author of "In Denial of Democracy: Social Psychological Implications for Public Discourse on State Crimes Against Democracy Post-9/11" in the recent breakthrough issue of American Behavioral Scientist on "state crimes against democracy."
Listen live at:
or listen to the mp3 which is available at the same link right after the broadcast.
Click "Play" or click on "Download" under the show title ("Laurie Manwell ...").
A page of links to Laurie Manwell's writings is posted at the Resistance Radio Forum, http://www.resistradio.com/forum/4-show-links/96-laurie-manwell-resistan...

Tuesday, December 28, 2010

Laurie Manwell on Psychological Resistance to 9/11 Truth, on "9/11 In Context"


On this week's "9/11 In Context" show, which airs Thursday, December 30, at 3pm ET, I will interview Laurie Manwell, Ph.D. candidate in Applied Cognitive Sciences at the University of Guelph. We will discuss the results of her research into the many reasons for the intense psychological resistance to 9/11 truth, and her positive strategies to present our information in ways that minimize denial and negative reactions. Laurie has published on the subject in the Journal of 9/11 Studies and is the author of "In Denial of Democracy: Social Psychological Implications for Public Discourse on State Crimes Against Democracy Post-9/11" in the recent breakthrough issue of American Behavioral Scientist on "state crimes against democracy."
Listen live at:
or listen to the mp3 which is available at the same link right after the broadcast.
Click "Play" or click on "Download" under the show title ("Laurie Manwell ...").
A page of links to Laurie Manwell's writings is posted at the Resistance Radio Forum, http://www.resistradio.com/forum/4-show-links/96-laurie-manwell-resistan...
Don't miss the show! It is sure to be worthwhile.

Monday, December 27, 2010

Thursday, December 23, 2010

Pentagon C-Ring Exit Hole Mystery by azbadger

Note: This was originally posted on Scholars for 911 Truth, but since that site is down, I am reposting it here (it was originally posted in 2006). I owe much gratitude to Russell Pickering (of www.pentagonresearch.com site is now down, links active) for critiques, input, and encouragement.

Pentagon C Ring Exit Hole Mystery

Detailed below is a revised write up [from “A Boeing 757 did not hit the Pentagon”] regarding the unexplained Pentagon C-ring exit hole. I have received valuable feedback on my previous write up, from many 911 researchers. I have included numerous clarifications and details, and have directly addressed some of the main stream media explanations regarding the C-Ring Exit Hole
.
A great deal has been written about the damage to the Pentagon on 9/11. The focus of this discussion is on the mysterious, and officially unexplained, “C-Ring Exit Hole”. The C-ring exit hole is significant because it is not consistent with building damage from a Boeing 757 impact. The C-Ring exit hole carries a unique signature, which can only be explained by something other than a 757 impact. No explanation is offered for this hole in the Pentagon Building Performance Report http://fire.nist.gov/bfrlpubs/build03/PDF/b03017.pdf or the official 9-11 Commission Report
.
The exterior C-ring wall is the last wall (the third wall traveling into the Pentagon) that sustained significant damage during the Pentagon attack. On 9/11, a near perfectly round, nine foot diameter hole was cut in the C-Ring wall, known as the “C-Ring exit hole”. It is approximately 310 feet from the impact on the outer Pentagon wall (E-ring). The unique feature of this hole include: its circular shape, the clean cut hole in the wall with no visible damage to the wall immediately surrounding the hole, and steel rebar is cut by the forces which created the hole. For an overview of the hole, see this page: http://www.pentagonresearch.com/exit.html

From the impact on the E-ring wall, to the C-ring Exit hole, is an open office space with only support columns and ordinary construction interior walls. According to the Building Performance Report, there were intact (but damaged) support columns starting at roughly 160 feet into the building in the aircraft flight path, indicating that the fuselage of the aircraft had effectively been destroyed by this point. The C-ring wall was constructed of steel mesh and rebar reinforced brick, 8 inches thick. Details are shown here.http://www.pentagonresearch.com/065.html

The initial explanation offered was that nose cone/fuselage of the 757 aircraft punched all the way from the E-ring wall, to the C-ring wall, to create this exit hole, the “nose cone” theory.
The structural design of the 757 is based on the structural loads of a pressurized vessel (the cabin), and the structural and aerodynamic loads from the wings, control surfaces, and the fuel. The plane is made as light as possible, and not made to handle impact loads of any kind.

This “nose cone” theory was quickly discounted as there was no significant aircraft wreckage found at the C-ring wall, nor would an aircraft impact have cut a clean hole without disturbing any of the surrounding wall. There were also support columns still standing in the flight path of the aircraft.

Next, investigators from Purdue University proposed that fuel, airplane material, and momentum from the aircraft created this circular cut out by continuing into the building after the plane had been destroyed. This “circle of energy” concept seems improbable for a number of reasons:

1. The airplane materials included the plane and fuel in the fuselage and wings. This material would have been spread out over a non circular area which included the wings and fuselage.
2. There does not seem to be any historical precedent for this phenomenon to have occurred.
3. There were support columns that remained standing in the path between the impact point and the C-Ring exit hole that would have deflected parts of this “circle of energy”.
4. The impact of this material would have knocked the wall down, or caved it in due to the mesh and rebar reinforcement, not created a clean cut hole.

To have this material and energy “form up” into a circle so as to cause this hole seems extremely unlikely. This “circle of energy” theory seems to have also been discounted.

The National Geographic Channel aired a program “Seconds to Disaster” which depicted the events at the Pentagon on 9/11. This program aired most recently on May 24th 2006. They offered the following explanation for the C-Ring exit hole: secondary explosions from the impact and jet fuel, coupled with the geometry of the inside of the impacted Pentagon, allowed shock waves to cause this circular hole.
This “shock wave” concept also seems improbable for a number of reasons:

1. The interior section of the Pentagon where the 757 impacted was roughly 200 feet wide and deep with a significant hole from the 757 impact. Air is a compressible gas, and the forces required to knock down a mesh and rebar reinforced wall are substantial. Shock waves could certainly be present, but these shock waves would be in air, and would be spread throughout the interior section of the Pentagon. The hole in the C-Ring would require extremely localized forces; to have these shock waves form a clean cut circular hole, including cutting rebar, is extraordinarily remote.

2. Any forces impacting the wall from shock waves would be spread over some area of the wall. These forces would knock the wall down or crumple it if they were strong enough. These shock waves would also be influenced and deflected by the support columns. Once again, the clean cut hole defies the explanation of shock waves.

3. There does not seem to be any historical precedent for this to occur, as there are routinely secondary explosions during fires, but this clean cut circle phenomena has not been reported elsewhere.
Note: I asked to be put in contact with the authors of the “shock wave” theory, but the National Geographic Channel merely directed me to the Pentagon Building Performance Report and to Pentagon reconstruction website as sources for the program. Neither of these documents offers any explanation for the C-ring exit hole.
So what other possibilities could there be for a hole which has these unique characteristics. I have previous with experience in shape charge warheads, and anyone with this experience would immediately recognize the hole to match that caused by a shaped charge warhead or device.

The C-ring exit hole has these distinct features, which would have occurred if this wall was struck by some sort of shaped charge:

1. The hole is circular as the typical shaped charge warhead is round.
2. The hole is cleanly cut, in that the walls surrounding the hole do not appear to have suffered any visible forces as would be expected from the extremely localized and focused energy from the shaped charge warhead.
3. Windows are broken outside of the C-ring exit hole. Shock waves from the shaped charge high explosive are strong enough to break typical glass (but not a reinforced brick wall).
4. The wall beyond the C-ring (towards the interior of the Pentagon) is relatively undamaged, only some light charring. The force of the shaped charge warhead is extremely localized and focused and would have dissipated shortly after it breached the C-Ring wall.

What is a shape charge? In simple terms it is high explosives formed in a very specific geometry so that the explosive force is extremely focused. Some good general information is located here http://en.wikipedia.org/wiki/Shaped_charge .

 Look at the hole in reinforced concrete hole here http://www.raytheon.com/products/stellent/groups/public/documents/conten...
You can see how the wall is undamaged except for the hole; also note how the rebar is cut.

Beyond the similarities in the hole shown in this brochure, are there any other details about the Pentagon that raise more questions about the hole in the C-ring wall, yes. On Russell Pickering’s web site www.pentagonresearch.com he has identified mistakes in the classification of damage to the Pentagon near the C-Ring exit hole. In summary, the Pentagon Building Performance Report indicates gradual decreasing support column damage as you travel into the pentagon along the flight path, to where there is limited damage by the C-Ring exit hole, but this is incorrect, the column damage increases again near the C-Ring Exit hole. This would be consistent with a shape charge warhead detonating near or at the C-Ring exit hole. See the detailed write up here.http://www.pentagonresearch.com/094.html

Was the Pentagon Building Performance Report team allowed uncontrolled access to the site? Not even close, access was limited and they were escorted, see excerpts from the Pentagon Building Performance Report here. http://www.pentagonresearch.com/bps.htmlNote that the Building Performance Report team was not allowed to see this exit hole, the FBI provided a photo and description. Why would this team not be allowed uncontrolled access to assess building damage? It should be noted that this team never saw any damage to the Pentagon until all of the wreckage and debris were removed.

So how did a shaped charged warhead get this far into the Pentagon? One possible explanation is a multi stage shaped charge warhead device. I do not propose that the following device was used at the Pentagon, but one such multi stage device is described here.http://www.llnl.gov/str/Coll.html

A page or so into this site describes “a weapon called a PAM, or Penetration Augmented Munition”. “Although compact and lightweight (approximately 35 pounds, 33 inches long), it contains the power of four explosive charges and when deployed, can effectively destroy bridges, runways, roads, and tunnels”. It describes a technology where multiple shaped charges are used together, where the first charge creates a hole for a second, and so forth. The successive charges can be set off by separate sensors which detect the impact with a wall. If you were to design a “bunker buster” warhead where you had to penetrate multiple reinforced walls, this would be technology to utilize, to allow you to penetrate further into a multi walled structure than with a single shape charge warhead alone. Due to the lack of walls between the exterior E-ring wall and the C ring wall, it is likely that such a device would travel until it hit a support column. Hitting a support column at an angle could serve to deflect slightly the trajectory of the device. Following this theory, the last charge struck the C-ring wall and created the C-Ring exit hole. Having the device follow a deflect path would also explain how there were still support columns in the direct path of the aircraft to the C-Ring exit hole.

If something smaller than a 757 hit the Pentagon, a multi stage shape charge may have been part of the payload to increase the damage into the building, to better approximate the damage that would be envisioned by a larger 757. A shaped charge warhead would seem to be the only explanation that fits the evidence of a sudden increase in damage to the Pentagon near the C-Ring exit hole and the C-ring exit hole itself.
The only explanations offered by the “official” community, the “circle of energy” and the “shock wave theory”, have no precedent, and violate some basic common sense and physics. My proposal fits the classic shape charge damage seen from a typical shaped charge warhead. The first time I saw the C-Ring exit hole, a chill went down my spine because I knew that the only way to cut a clean hole in a reinforced brick wall (including cutting through rebar) is with a shaped charge warhead. With any type impact or wave, forces would have caused the wall to crumble or cave in, without cutting through rebar.

Many people have claimed that there is no evidence to doubt the official version of events on 9/11. I guess that really depends on your definition of evidence. With the C-Ring exit hole, we have a hole that is clearly out of place with a 757 impact, we have investigators that are not permitted to see the hole, and we have damage near the hole not accurately presented in an official report. What is your threshold for simply accepting a story from the government?

The C-ring Exit hole is but one small chapter in the unexplained events of 9/11. There are many other similar, unexplained events. Isn’t the fact that our Republic was forever altered by the events on 9/11 require an investigation that puts to rest all of these questions, no matter where it leads?

Wednesday, December 22, 2010

Senate passes the revised 9/11 health benefits bill

Justice Served

From Ted Barrett and Dana Bash, CNN
STORY HIGHLIGHTS
  • NEW: The Senate passes the revised bill, sending it to the House
  • Sen. Coburn says the agreement produced a better bill
  • The revised bill will be $2 billion smaller, Coburn says
  • The bill would provide free treatment for health issues from working at ground zero
Washington (CNN) -- The Senate on Wednesday passed a compromise version of a bill to provide free medical treatment to first responders of the September 11 terrorist attack.
The bill passed on a voice vote on what is expected to be the final day of the lame-duck session of Congress. It now goes to the House, which also is expected to approve it and send it to President Barack Obama to be signed into law.
Negotiations Wednesday morning involving Republican Sens. Tom Coburn of Oklahoma and Mike Enzi of Wyoming and Democratic Sens. Charles Schumer and Kirsten Gillibrand, both of New York, led to the deal that reduced the cost of the bill by $2 billion and made other changes sought by GOP opponents, according to statements by the participants.
"The Christmas Miracle we've been looking for has arrived," said the statement issued by Schumer and Gillibrand, adding: "We are pleased to announce that we crafted an agreement that will allow this legislation to pass the Senate, and the House, this afternoon. We thank our Republican friends for coming together to fulfill America's moral obligation to the heroes of 9/11."
Coburn, a conservative who led the opposition to the bill, said the agreement produced a better piece of legislation.
"Every American recognizes the heroism of the 9/11 first responders, but it is not compassionate to help one group while robbing future generations of opportunity," said Coburn, who had demanded that the cost of the bill be lowered and fully paid for. "I'm pleased this agreement strikes a fair balance and improves the bill the majority attempted to rush through at the last minute."
According to Coburn, the agreement reduces the overall cost of the bill by $2 billion to a total of $4.2 billion over a 10-year period. His statement said that $1.5 billion of the cost goes for health benefits and $2.7 billion will pay for compensation for health woes of emergency responders.
The agreement also caps attorneys' fees at 10 percent of any total compensation award, and prevents individuals from making multiple claims for benefits.
Democrats previously agreed to pay for the bill with fees collected on various services involving foreign countries and foreign visitors.
On Tuesday, Schumer said it appeared the bill would come up for a Senate vote once lawmakers voted on New START, a nuclear arms control pact with Russia that is one of Obama's top foreign policy priorities. The START vote was scheduled for Wednesday afternoon.
"It will be decision day in the Senate, and we will see once and for all who will keep their promise to never forget the heroes of 9/11," Schumer said.
The James Zadroga 9/11 Health Bill is named after a deceased New York Police Department detective who had worked in the toxic plume at ground zero.
The House earlier passed the previous version of the bill on a mostly partisan 268-160 vote.
According to the bill's supporters, it is funded by a procurement fee on some foreign countries that trade with the United States, the continuation of a fee on some travelers to the United States and a fee on visas for some companies. The version being negotiated by the senators Wednesday drops some of those funding sources.
On Tuesday, a group of 9/11 first responders joined lawmakers in Washington to urge the Senate to pass the health care bill.
"We continue to see our friends die on a day-to-day basis," said Glen Klein, a New York police officer who said he is sick with lung disease. "We're asking for the right to live."
In the years following the attacks, health experts have noted respiratory and mental health conditions, such as post-traumatic stress disorder, in those who engaged in ground zero rescue and cleanup efforts.
"Apparently we have some senators who would like to believe that when 343 fire officers and firefighters (and thousands of civilians and police officers) died on 9/11 ... that was the end of it," said Steve Cassidy, president of the Uniformed Firefighters Association.
"If that were true, we could move on."
The bill had been in legislative limbo since Thursday, when Senate Democrats failed to win a procedural vote to open debate on it.
But on Sunday, Democrats said they were hopeful they had pulled off "a Christmas miracle" by changing the bill enough to garner Republican support.
CNN's Tom Cohen contributed to this report.

Tuesday, December 21, 2010

Guilliani Admits There Were Fires Over 2000 Degrees Fahrenheit Underground At WTC On 9/11

What video are you wanting released?


From the OP....
"Why have the 9-11 Pentagon tapes been scealed and why did the U.S. government never release any credible footage clearly showing that an airplane actually hit the Pentagon? We call on the Obama administration to release the 9-11 Pentagon tapes now."
I don't really see any point in continuing to say release the videos! What are they hiding?! Because they already told us.
Here's the deal with the 85 videos....
Judicial Watch supposedly got the crappy video released that is supposed to show the plane impact. They got most of the press but actually it was a guy named Scott Bingham that did a FOIA that got it released. He was asking for any and all videos showing the plane impact at the pentagon. He had a website called www.flight77.info. It's no longer any good because he got tired of being harassed by "9-11 truthers". But using the wayback machine you can still see his FOIA request response letters.......
Yes. They have 85 videos but only ONE showed the actual impact. That is why the rest have not been released. There are no other videos showing the impact at the pentagon.
In Summary:
•She determined that the FBI had 85 videotapes that might be relevant. Of those, 56 "of these videotapes did not show either the Pentagon building, the Pentagon crash site, or the impact of Flight 77 into the Pentagon on September 11."
•Of the 29 remaining videotapes, 16 "did not show the Pentagon crash site and did not show the impact of Flight 77 into the Pentagon."
•Of the 13 remaining tapes which showed the Pentagon crash site, 12 "only showed after the impact of Flight 77."
•The videotape taken from the Citgo gas station did not show the impact.
•No videotapes were located from the Sheraton Hotel, though she located a videotape from the Doubletree Hotel.
Flight77.info's FOIA Release: Doubletree Hotel 9/11 <---I don't see a flyover
http://www.youtube.com/watch?v=H285_DWX_bQ
September 11 Pentagon Video <--there it is, that's as good as it's going to get
http://www.youtube.com/watch?v=TAaP4Z3zls8&feature=channel
Pentagon Citgo Video from 9/11 http://www.youtube.com/watch?v=eA9XI5imNcE
If they have anything they could have a video of the plane ......
"•Of the 29 remaining videotapes, 16 "did not show the Pentagon crash site and did not show the impact of Flight 77 into the Pentagon."
So yea, I suppose we could demand they release every video they have but all you are going to see if anything is a passenger jet--at least according to the witnesses. They have already told us there is no other video of the impact at the pentagon. We could accuse them of lying but I don't know what the point of that would be.
No Witness at the pentagon (and there were lots) said anything hit the pentagon except for a plane. There were plane parts recovered and they were from a passenger jet. The c130 pilot saw the passenger jet. No one saw this passenger jet fly over the pentagon.
Typical pentagon witness, lots say the same thing.... http://www.dailymotion.com/video/x1ihc1_pentagon-eyewitness-isabel-james...
another witness-there were lots...Is that really a "pretty" lawn?
http://www.youtube.com/watch?v=ISwWfCGyjzQ

Monday, December 20, 2010

Monitoring America


Monitoring America



Monday, December 20, 2010; 1:40 AM


Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators.
The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.
The government's goal is to have every state and local law enforcement agency in the country feed information to Washington to buttress the work of the FBI, which is in charge of terrorism investigations in the United States.
Other democracies - Britain and Israel, to name two - are well acquainted with such domestic security measures. But for the United States, the sum of these new activities represents a new level of governmental scrutiny.
This localized intelligence apparatus is part of a larger Top Secret America created since the attacks. In July, The Washington Post described an alternative geography of the United States, one that has grown so large, unwieldy and secretive that no one knows how much money it costs, how many people it employs or how many programs exist within it.
Today's story, along with related material on The Post's Web site, examines how Top Secret America plays out at the local level. It describes a web of 4,058 federal, state and local organizations, each with its own counterterrorism responsibilities and jurisdictions. At least 935 of these organizations have been created since the 2001 attacks or became involved in counterterrorism for the first time after 9/11.
The months-long investigation, based on nearly 100 interviews and 1,000 documents, found that:
* Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into the hands of law enforcement agencies in America.
* The FBI is building a database with the names and certain personal information, such as employment history, of thousands of U.S. citizens and residents whom a local police officer or a fellow citizen believed to be acting suspiciously. It is accessible to an increasing number of local law enforcement and military criminal investigators, increasing concerns that it could somehow end up in the public domain.
* Seeking to learn more about Islam and terrorism, some law enforcement agencies have hired as trainers self-described experts whose extremist views on Islam and terrorism are considered inaccurate and counterproductive by the FBI and U.S. intelligence agencies.
* The Department of Homeland Security sends its state and local partners intelligence reports with little meaningful guidance, and state reports have sometimes inappropriately reported on lawful meetings.
The need to identify U.S.-born or naturalized citizens who are planning violent attacks is more urgent than ever, U.S. intelligence officials say. This month's FBI sting operation involving a Baltimore construction worker who allegedly planned to bomb a Maryland military recruiting station is the latest example. It followed a similar arrest of a Somali-born naturalized U.S. citizen allegedly seeking to detonate a bomb near a Christmas tree lighting ceremony in Portland, Ore. There have been nearly two dozen other cases just this year.
"The old view that 'if we fight the terrorists abroad, we won't have to fight them here' is just that - the old view," Homeland Security Secretary Janet Napolitano told police and firefighters recently.
The Obama administration heralds this local approach as a much-needed evolution in the way the country confronts terrorism.
However, just as at the federal level, the effectiveness of these programs, as well as their cost, is difficult to determine. The Department of Homeland Security, for example, does not know how much money it spends each year on what are known as state fusion centers, which bring together and analyze information from various agencies within a state.
The total cost of the localized system is also hard to gauge. The DHS has given $31 billion in grants since 2003 to state and local governments for homeland security and to improve their ability to find and protect against terrorists, including $3.8 billion in 2010. At least four other federal departments also contribute to local efforts. But the bulk of the spending every year comes from state and local budgets that are too disparately recorded to aggregate into an overall total.
The Post findings paint a picture of a country at a crossroads, where long-standing privacy principles are under challenge by these new efforts to keep the nation safe.
The public face of this pivotal effort is Napolitano, the former governor of Arizona, which years ago built one of the strongest state intelligence organizations outside of New York to try to stop illegal immigration and drug importation.
Napolitano has taken her "See Something, Say Something" campaign far beyond the traffic signs that ask drivers coming into the nation's capital for "Terror Tips" and to "Report Suspicious Activity."
She recently enlisted the help of Wal-Mart, Amtrak, major sports leagues, hotel chains and metro riders. In her speeches, she compares the undertaking to the Cold War fight against communists.
"This represents a shift for our country," she told New York City police officers and firefighters on the eve of the 9/11 anniversary this fall. "In a sense, this harkens back to when we drew on the tradition of civil defense and preparedness that predated today's concerns."
----
From Afghanistan to Tennessee
On a recent night in Memphis, a patrol car rolled slowly through a parking lot in a run-down section of town. The military-grade infrared camera on its hood moved robotically from left to right, snapping digital images of one license plate after another and analyzing each almost instantly.
Suddenly, a red light flashed on the car's screen along with the word "warrant."
"Got a live one! Let's do it," an officer called out.
The streets of Memphis are a world away from the streets of Kabul, yet these days, the same types of technologies and techniques are being used in both places to identify and collect information about suspected criminals and terrorists.
The examples go far beyond Memphis.
* Hand-held, wireless fingerprint scanners were carried by U.S. troops during the insurgency in Iraq to register residents of entire neighborhoods. L-1 Identity Solutions is selling the same type of equipment to police departments to check motorists' identities.
* In Arizona, the Maricopa County Sheriff's Facial Recognition Unit, using a type of equipment prevalent in war zones, records 9,000 biometric digital mug shots a month.
* U.S. Customs and Border Protection flies General Atomics' Predator drones along the Mexican and Canadian borders - the same kind of aircraft, equipped with real-time, full-motion video cameras, that has been used in wars in Kosovo, Iraq and Afghanistan to track the enemy.
The special operations units deployed overseas to kill the al-Qaeda leadership drove technological advances that are now expanding in use across the United States. On the front lines, those advances allowed the rapid fusing of biometric identification, captured computer records and cellphone numbers so troops could launch the next surprise raid.
Here at home, it's the DHS that is enamored with collecting photos, video images and other personal information about U.S. residents in the hopes of teasing out terrorists.
The DHS helped Memphis buy surveillance cameras that monitor residents near high-crime housing projects, problematic street corners, and bridges and other critical infrastructure. It helped pay for license plate readers and defrayed some of the cost of setting up Memphis's crime-analysis center. All together it has given Memphis $11 million since 2003 in homeland security grants, most of which the city has used to fight crime.
"We have got things now we didn't have before," said Memphis Police Department Director Larry Godwin, who has produced record numbers of arrests using all this new analysis and technology. "Some of them we can talk about. Some of them we can't."
One of the biggest advocates of Memphis's data revolution is John Harvey, the police department's technology specialist, whose computer systems are the civilian equivalent of the fancier special ops equipment used by the military.
Harvey collects any information he can pry out of government and industry. When officers were wasting time knocking on the wrong doors to serve warrants, he persuaded the local utility company to give him a daily update of the names and addresses of customers.
When he wanted more information about phones captured at crime scenes, he programmed a way to store all emergency 911 calls, which often include names and addresses to associate with phone numbers. He created another program to upload new crime reports every five minutes and mine them for the phone numbers of victims, suspects, witnesses and anyone else listed on them.
Now, instead of having to decide which license plate numbers to type into a computer console in the patrol car, an officer can simply drive around, and the automatic license plate reader on his hood captures the numbers on every vehicle nearby. If the officer pulls over a driver, instead of having to wait 20 minutes for someone back at the office to manually check records, he can use a hand-held device to instantly call up a mug shot, a Social Security number, the status of the driver's license and any outstanding warrants.
The computer in the cruiser can tell an officer even more about who owns the vehicle, the owner's name and address and criminal history, and who else with a criminal history might live at the same address.
Take a recent case of two officers with the hood-mounted camera equipment who stopped a man driving on a suspended license. One handcuffed him, and the other checked his own PDA. Based on the information that came up, the man was ordered downtown to pay a fine and released as the officers drove off to stop another car.
That wasn't the end of it, though.
A record of that stop - and the details of every other arrest made that night, and every summons written - was automatically transferred to the Memphis Real Time Crime Center, a command center with three walls of streaming surveillance video and analysis capabilities that rival those of an Army command center.
There, the information would be geocoded on a map to produce a visual rendering of crime patterns. This information would help the crime intelligence analysts predict trends so the department could figure out what neighborhoods to swarm with officers and surveillance cameras.
But that was still not the end of it, because the fingerprints from the crime records would also go to the FBI's data campus in Clarksburg, W.Va. There, fingerprints from across the United States are stored, along with others collected by American authorities from prisoners in Saudi Arabia and Yemen, Iraq and Afghanistan.
There are 96 million sets of fingerprints in Clarksburg, a volume that government officials view not as daunting but as an opportunity.
This year for the first time, the FBI, the DHS and the Defense Department are able to search each other's fingerprint databases, said Myra Gray, head of the Defense Department's Biometrics Identity Management Agency, speaking to an industry group recently. "Hopefully in the not-too-distant future," she said, "our relationship with these federal agencies - along with state and local agencies - will be completely symbiotic."
----
The FBI's 'suspicious' files
At the same time that the FBI is expanding its West Virginia database, it is building a vast repository controlled by people who work in a top-secret vault on the fourth floor of the J. Edgar Hoover FBI Building in Washington. This one stores the profiles of tens of thousands of Americans and legal residents who are not accused of any crime. What they have done is appear to be acting suspiciously to a town sheriff, a traffic cop or even a neighbor.
If the new Nationwide Suspicious Activity Reporting Initiative, or SAR, works as intended, the Guardian database may someday hold files forwarded by all police departments across the country in America's continuing search for terrorists within its borders.
The effectiveness of this database depends, in fact, on collecting the identities of people who are not known criminals or terrorists - and on being able to quickly compile in-depth profiles of them.
"If we want to get to the point where we connect the dots, the dots have to be there," said Richard A. McFeely, special agent in charge of the FBI's Baltimore office.
In response to concerns that information in the database could be improperly used or released, FBI officials say anyone with access has been trained in privacy rules and the penalties for breaking them.
But not everyone is convinced. "It opens a door for all kinds of abuses," said Michael German, a former FBI agent who now leads the American Civil Liberties Union's campaign on national security and privacy matters. "How do we know there are enough controls?"
The government defines a suspicious activity as "observed behavior reasonably indicative of pre-operational planning related to terrorism or other criminal activity" related to terrorism.
State intelligence analysts and FBI investigators use the reports to determine whether a person is buying fertilizer to make a bomb or to plant tomatoes; whether she is plotting to poison a city's drinking water or studying for a metallurgy test; whether, as happened on a Sunday morning in late September, the man snapping a picture of a ferry in the Newport Beach harbor in Southern California simply liked the way it looked or was plotting to blow it up.
Suspicious Activity Report N03821 says a local law enforcement officer observed "a suspicious subject . . . taking photographs of the Orange County Sheriff Department Fire Boat and the Balboa Ferry with a cellular phone camera." The confidential report, marked "For Official Use Only," noted that the subject next made a phone call, walked to his car and returned five minutes later to take more pictures. He was then met by another person, both of whom stood and "observed the boat traffic in the harbor." Next another adult with two small children joined them, and then they all boarded the ferry and crossed the channel.
All of this information was forwarded to the Los Angeles fusion center for further investigation after the local officer ran information about the vehicle and its owner through several crime databases and found nothing.
Authorities would not say what happened to it from there, but there are several paths a suspicious activity report can take:
At the fusion center, an officer would decide to either dismiss the suspicious activity as harmless or forward the report to the nearest FBI terrorism unit for further investigation.
At that unit, it would immediately be entered into the Guardian database, at which point one of three things could happen:
The FBI could collect more information, find no connection to terrorism and mark the file closed, though leaving it in the database.
It could find a possible connection and turn it into a full-fledged case.
Or, as most often happens, it could make no specific determination, which would mean that Suspicious Activity Report N03821 would sit in limbo for as long as five years, during which time many other pieces of information about the man photographing a boat on a Sunday morning could be added to his file: employment, financial and residential histories; multiple phone numbers; audio files; video from the dashboard-mounted camera in the police cruiser at the harbor where he took pictures; and anything else in government or commercial databases "that adds value," as the FBI agent in charge of the database described it.
That could soon include biometric data, if it existed; the FBI is working on a way to attach such information to files. Meanwhile, the bureau will also soon have software that allows local agencies to map all suspicious incidents in their jurisdiction.
The Defense Department is also interested in the database. It recently transferred 100 reports of suspicious behavior into the Guardian system, and over time it expects to add thousands more as it connects 8,000 military law enforcement personnel to an FBI portal that will allow them to send and review reports about people suspected of casing U.S. bases or targeting American personnel.
And the DHS has created a separate way for state and local authorities, private citizens, and businesses to submit suspicious activity reports to the FBI and to the department for analysis.
As of December, there were 161,948 suspicious activity files in the classified Guardian database, mostly leads from FBI headquarters and state field offices. Two years ago, the bureau set up an unclassified section of the database so state and local agencies could send in suspicious incident reports and review those submitted by their counterparts in other states. Some 890 state and local agencies have sent in 7,197 reports so far.
Of those, 103 have become full investigations that have resulted in at least five arrests, the FBI said. There have been no convictions yet. An additional 365 reports have added information to ongoing cases.
But most remain in the uncertain middle, which is why within the FBI and other intelligence agencies there is much debate about the effectiveness of the bottom-up SAR approach, as well as concern over the privacy implications of retaining so much information on U.S. citizens and residents who have not been charged with anything.
The vast majority of terrorism leads in the United States originate from confidential FBI sources and from the bureau's collaboration with federal intelligence agencies, which mainly work overseas. Occasionally a stop by a local police officer has sparked an investigation. Evidence comes from targeted FBI surveillance and undercover operations, not from information and analysis generated by state fusion centers about people acting suspiciously.
"It's really resource-inefficient," said Philip Mudd, a 20-year CIA counterterrorism expert and a top FBI national security official until he retired nine months ago. "If I were to have a dialogue with the country about this . . . it would be about not only how we chase the unknowns, but do you want to do suspicious activity reports across the country? . . . Anyone who is not at least suspected of doing something criminal should not be in a database."
Charles Allen, a longtime senior CIA official who then led the DHS's intelligence office until 2009, said some senior people in the intelligence community are skeptical that SARs are an effective way to find terrorists. "It's more likely that other kinds of more focused efforts by local police will gain you the information that you need about extremist activities," he said.
The DHS can point to some successes: Last year the Colorado fusion center turned up information on Najibullah Zazi, an Afghan-born U.S. resident planning to bomb the New York subway system. In 2007, a Florida fusion center provided the vehicle ownership history used to identify and arrest an Egyptian student who later pleaded guilty to providing material support to terrorism, in this case transporting explosives.
"Ninety-nine percent doesn't pan out or lead to anything" said Richard Lambert Jr., the special agent in charge of the FBI's Knoxville office. "But we're happy to wade through these things."
----
Expert training?
Ramon Montijo has taught classes on terrorism and Islam to law enforcement officers all over the country.
"Alabama, Colorado, Vermont," said Montijo, a former Army Special Forces sergeant and Los Angeles Police Department investigator who is now a private security consultant. "California, Texas and Missouri," he continued.
What he tells them is always the same, he said: Most Muslims in the United States want to impose sharia law here.
"They want to make this world Islamic. The Islamic flag will fly over the White House - not on my watch!" he said. "My job is to wake up the public, and first, the first responders."
With so many local agencies around the country being asked to help catch terrorists, it often falls to sheriffs or state troopers to try to understand the world of terrorism. They aren't FBI agents, who have years of on-the-job and classroom training.
Instead, they are often people like Lacy Craig, who was a police dispatcher before she became an intelligence analyst at Idaho's fusion center, or the detectives in Minnesota, Michigan and Arkansas who can talk at length about the lineage of gangs or the signs of a crystal meth addict.
Now each of them is a go-to person on terrorism as well.
"The CIA used to train analysts forever before they graduated to be a real analyst," said Allen, the former top CIA and DHS official. "Today we take former law enforcement officers and we call them intelligence officers, and that's not right, because they have not received any training on intelligence analysis."
State fusion center officials say their analysts are getting better with time. "There was a time when law enforcement didn't know much about drugs. This is no different," said Steven W. Hewitt, who runs the Tennessee fusion center, considered one of the best in the country. "Are we experts at the level of [the National Counterterrorism Center]? No. Are we developing an expertise? Absolutely."
But how they do that is usually left up to the local police departments themselves. In their desire to learn more about terrorism, many departments are hiring their own trainers. Some are self-described experts whose extremist views are considered inaccurate and harmful by the FBI and others in the intelligence community
Like Montijo, Walid Shoebat, a onetime Muslim who converted to Christianity, also lectures to local police. He too believes that most Muslims seek to impose sharia law in the United States. To prevent this, he said in an interview, he warns officers that "you need to look at the entire pool of Muslims in a community."
When Shoebat spoke to the first annual South Dakota Fusion Center Conference in Sioux Falls this June, he told them to monitor Muslim student groups and local mosques and, if possible, tap their phones. "You can find out a lot of information that way," he said.
A book expanding on what Shoebat and Montijo believe has just been published by the Center for Security Policy, a Washington-based neoconservative think tank. "Shariah: The Threat to America" describes what its authors call a "stealth jihad" that must be thwarted before it's too late.
The book's co-authors include such notables as former CIA director R. James Woolsey and former deputy undersecretary of defense for intelligence Lt. Gen. William G. Boykin, along with the center's director, a longtime activist. They write that most mosques in the United States already have been radicalized, that most Muslim social organizations are fronts for violent jihadists and that Muslims who practice sharia law seek to impose it in this country.
Frank Gaffney Jr., director of the center, said his team has spoken widely, including to many law enforcement forums.
"Members of our team have been involved in training programs for several years now, many of which have been focused on local law enforcement intelligence, homeland security, state police, National Guard units and the like," Gaffney said. "We're seeing a considerable ramping-up of interest in getting this kind of training."
Government terrorism experts call the views expressed in the center's book inaccurate and counterproductive. They say the DHS should increase its training of local police, using teachers who have evidence-based viewpoints.
DHS spokeswoman Amy Kudwa said the department does not maintain a list of terrorism experts but is working on guidelines for local authorities wrestling with the topic.
So far, the department has trained 1,391 local law enforcement officers in analyzing public information and 400 in analytic thinking and writing skills. Kudwa said the department also offers counterterrorism training through the Federal Emergency Management Agency, which this year enrolled 94 people in a course called "Advanced Criminal Intelligence Analysis to Prevent Terrorism."
----
A lack of useful information
The DHS also provides local agencies a daily flow of information bulletins.
These reports are meant to inform agencies about possible terror threats. But some officials say they deliver a never-ending stream of information that is vague, alarmist and often useless. "It's like a garage in your house you keep throwing junk into until you can't park your car in it," says Michael Downing, deputy chief of counterterrorism and special operations for the Los Angeles Police Department.
A review of nearly 1,000 DHS reports dating back to 2003 and labeled "For Official Use Only" underscores Downing's description. Typical is one from May 24, 2010, titled "Infrastructure Protection Note: Evolving Threats to the Homeland."
It tells officials to operate "under the premise that other operatives are in the country and could advance plotting with little or no warning." Its list of vulnerable facilities seems to include just about everything: "Commercial Facilities, Government Facilities, Banking and Financial and Transportation . . ."
Bart R. Johnson, who heads the DHS's intelligence and analysis office, defended such reports, saying that threat reporting has "grown and matured and become more focused." The bulletins can't be more specific, he said, because they must be written at the unclassified level.
Recently, the International Association of Chiefs of Police agreed that the information they were receiving had become "more timely and relevant" over the past year.
Downing, however, said the reports would be more helpful if they at least assessed threats within a specific state's boundaries.
States have tried to do that on their own, but with mixed, and at times problematic, results.
In 2009, for instance, after the DHS and the FBI sent out several ambiguous reports about threats to mass-transit systems and sports and entertainment venues, the New Jersey Regional Operations Intelligence Center's Threat Analysis Program added its own information. "New Jersey has a large mass-transit infrastructure," its report warned, and "an NFL stadium and NHL/NBA arenas, a soccer stadium, and several concert venues that attract large crowds."
In Virginia, the state's fusion center published a terrorism threat assessment in 2009 naming historically black colleges as potential hubs for terrorism.
From 2005 to 2007, the Maryland State Police went even further, infiltrating and labeling as terrorists local groups devoted to human rights, antiwar causes and bike lanes.
And in Pennsylvania this year, a local contractor hired to write intelligence bulletins filled them with information about lawful meetings as varied as Pennsylvania Tea Party Patriots Coalition gatherings, antiwar protests and an event at which environmental activists dressed up as Santa Claus and handed out coal-filled stockings.
----
'We have our own terrorists'
Even if the information were better, it might not make a difference for the simplest of reasons: In many cities and towns across the country, there is just not enough terrorism-related work to do.
In Utah on one recent day, one of five intelligence analysts in the state's fusion center was writing a report about the rise in teenage overdoses of an over-the-counter drug. Another was making sure the visiting president of Senegal had a safe trip. Another had just helped a small town track down two people who were selling magazine subscriptions and pocketing the money themselves.
In the Colorado Information Analysis Center, some investigators were following terrorism leads. Others were looking into illegal Craigslist postings and online "World of Warcraft" gamers.
The vast majority of fusion centers across the country have transformed themselves into analytical hubs for all crimes and are using federal grants, handed out in the name of homeland security, to combat everyday offenses.
This is happening because, after 9/11, local law enforcement groups did what every agency and private company did in Top Secret America: They followed the money.
The DHS helped the Memphis Police Department, for example, purchase 90 surveillance cameras, including 13 that monitor bridges and a causeway. It helped buy the fancy screens on the walls of the Real Time Crime Center, as well as radios, robotic surveillance equipment, a mobile command center and three bomb-sniffing dogs. All came in the name of port security and protection to critical infrastructure.
Since there hasn't been a solid terrorism case in Memphis yet, the equipment's greatest value has been to help drive down city crime. Where the mobile surveillance cameras are set up, criminals scatter, said Lt. Mark Rewalt, who, on a recent Saturday night, scanned the city from an altitude of 1,000 feet.
Flying in a police helicopter, Rewalt pointed out some of the cameras the DHS has funded. They are all over the city, in mall parking lots, in housing projects, at popular street hang-outs. "Cameras are what's happening now," he marveled.
Meanwhile, another post-9/11 unit in Tennessee has had even less terrorism-related work to do.
The Tennessee National Guard 45th Weapons of Mass Destruction Civil Support Team, one of at least 50 such units around the country, was created to respond to what officials still believe is the inevitable release of chemical, biological or radiological material by terrorists.
The unit's 22 hazardous-materials personnel have the best emergency equipment in the state. A fleet of navy-blue vehicles - command, response, detection and tactical operations trucks - is kept polished and ready to roll in a garage at the armory in Smyrna.
The unit practices WMD scenarios constantly. But in real life, the crew uses the equipment very little: twice a year at NASCAR races in nearby Bristol to patrol for suspicious packages. Other than that, said Capt. Matt Hayes, several times a year they respond to hoaxes.
The fact that there has not been much terrorism to worry about is not evident on the Tennessee fusion center's Web site. Click on the incident map, and the state appears to be under attack.
Red icons of explosions dot Tennessee, along with blinking exclamation marks and flashing skulls. The map is labeled: "Terrorism Events and Other Suspicious Activity.
But if you roll over the icons, the explanations that pop up have nothing to do with major terrorist plots: "Johnson City police are investigating three 'bottle bombs' found at homes over the past three days," one description read recently. ". . . The explosives were made from plastic bottles with something inside that reacted chemically and caused the bottles to burst."
Another told a similar story: "The Scott County Courthouse is currently under evacuation after a bomb threat was called in Friday morning. Update: Authorities completed their sweep . . . and have called off the evacuation."
Nine years after 9/11, this map is part of the alternative geography that is Top Secret America, where millions of people are assigned to help stop terrorism. Memphis Police Director Godwin is one of them, and he has his own version of what that means in a city where there have been 86 murders so far this year.
"We have our own terrorists, and they are taking lives every day," Godwin said. "No, we don't have suicide bombers - not yet. But you need to remain vigilant and realize how vulnerable you can be if you let up."
Staff researcher Julie Tate contributed to this story.* Technologies and techniques honed for use on the battlefields of Iraq and Afghanistan have migrated into th