Israel and US Introduce Tech “Solutions” to Destroy Political Activists

If you’re interested in the backstory on Jeffrey Epstein—a story largely ignored by the corporate media—read Whitney Webb’s How the CIA, Mossad and “the Epstein Network” are Exploiting Mass Shootings to Create an Orwellian Nightmare. 

The subhead reads: “Following another catastrophic mass shooting or crisis event, Orwellian ‘solutions’ are set to be foisted on a frightened American public by the very network connected, not only to Jeffrey Epstein, but to a litany of crimes and a frightening history of plans to crush internal dissent in the United States.”

Webb mentions convicted felon Oliver North:

Perhaps most disturbing of all, whatever technological solution is adopted by the Trump administration [to address mass shootings], it is set to use a controversial database first developed as part of a secretive U.S. government program that involved notorious Iran-Contra figures like Oliver North as a means of tracking and flagging potential American dissidents for increased surveillance and detention in the event of a vaguely defined “national emergency.” 

North and associates used PROMIS (Prosecutors Management Information Systems) software to build this database. The software has a rather colorful past. “The PROMIS software was created by INSLAW Inc., a company owned by a former NSA intelligence officer named William Hamilton,” writes Ed Encho. 

The software was modified for espionage purposes to include a ‘back door’ that could be used for spying on those that it was sold to… It is important to keep in mind the period when PROMIS was stolen in the early 1980’s and the fact that the technology boom was still years in the future which should give one an idea to just how far advanced and therefore how important that it was to those who would use it in order to promote a sinister agenda.

Richard Fricker writes for WIRED:

Designed as case-management software for federal prosecutors, PROMIS has the ability to combine disparate databases, and to track people by their involvement with the legal system. Hamilton and others now claim that the DOJ has modified PROMIS to monitor intelligence operations, agents and targets, instead of legal cases.

North’s “sinister agenda,” in addition to covertly working with the Nicaraguan Contras to overthrow the Sandinista government, included Rex-84, a classified plan to round-up and intern political dissidents. This was exposed by the Miami Herald in 1987. 

One of Lt. Col. Oliver North’s first National Security Council assignments involved helping the government’s chief crisis-management agency update its secret wartime contingency plans, according to sources familiar with North’s work.

The sources, one present and two former government officials, said that until 1984 North collaborated with the Federal Emergency Management Agency in revising two crisis- management contingency documents and staging national emergency simulations.

During the hearings on Iran-Contra in 1987, then Rep. Jack Brooks questioned North directly on Rex-84. 

[Congressman Jack] Brooks: Colonel North, in your work at the N.S.C. were you not assigned, at one time, to work on plans for the continuity of government in the event of a major disaster?

Brendan Sullivan [North’s counsel, agitatedly]: Mr. Chairman?

[Senator Daniel] Inouye: I believe that question touches upon a highly sensitive and classified area so may I request that you not touch upon that?

Brooks: I was particularly concerned, Mr. Chairman, because I read in Miami papers, and several others, that there had been a plan developed, by that same agency, a contingency plan in the event of emergency, that would suspend the American constitution. And I was deeply concerned about it and wondered if that was an area in which he had worked. I believe that it was and I wanted to get his confirmation.

Inouye: May I most respectfully request that that matter not be touched upon at this stage. If we wish to get into this, I’m certain arrangements can be made for an executive session.

The “highly sensitive and classified” plan to identify and target political activists is not a new or innovative concept. It began in earnest with the FBI’s cross-referenced “ADEX” list in the 1960s.

The FBI, then known as the General Intelligence Division (GID), began indexing names shortly after the First World War. The “reserve Index” of this voluminous list (more than 10 million people were indexed by 1939) set aside people who would be “arrested and held” in case of a national emergency. The system was tweaked with the “Custodial Detention List” (also known as the “Alien Enemy Control” list) used to round-up Japanese-Americans during the Second World War. 

Since that time, the government has combined its numerous lists of potential detainees and whittled it down slightly to eight million people. The revised list is codenamed Main Core. The government has added names to this list since the 1980s when North was plotting his Continuity of Government plan to suspend the Constitution. 

Michael Snyder writes:

It turns out that the U.S. government is not just gathering information on all of us.  The truth is that the U.S. government has used this information to create a list of threats to national security that the government would potentially watch, question or even detain during a national crisis.  If you have ever been publicly critical of the government, there is a very good chance that you are on that list.

 Christopher Ketchum of Radar Magazine writes: 

There exists a database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic, might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.” He and other sources tell Radar that the database is sometimes referred to by the code name Main Core. One knowledgeable source claims that 8 million Americans are now listed in Main Core as potentially suspect. In the event of a national emergency, these people could be subject to everything from heightened surveillance and tracking to direct questioning and possibly even detention.

Whitney Webb has done an exemplary job of connecting the dots on the Epstein case. She painstakingly links the efforts of US and Israeli intelligence to track and target political activists (in the case of Israel, Palestinians). 

Israel, like the CIA, has spent a lot of time and money underwriting tech startups. The objective is to create a surveillance system focused on “pre-crime,” that is to say using social media, the internet, email, cellphone tracking, and other data to form a profile of potential enemies of the state and their political behavior—for instance, organizing a boycott of Israel or revealing the manifest crimes of the United States government.

Israeli and US tech companies, Webb writes, are “marketing themselves as ‘technological’ solutions to mass shootings while also doubling as covert tools for mass data collection and extraction, the end result is a massive surveillance system so complete and so dystopian that even George Orwell himself could not have predicted it.”

Following another catastrophic mass shooting or crisis event, aggressive efforts will likely follow to foist these “solutions” on a frightened American public by the very network connected, not only to Jeffrey Epstein, but to a litany of crimes and a frightening history of plans to crush internal dissent and would-be dissenters in the United States.

creatdive commons by-sa_RGB-350x122

7 thoughts on “Israel and US Introduce Tech “Solutions” to Destroy Political Activists

  1. K.N’s cataloging of some efforts by western govts., notably the U.S. and Israel, to compile a watch list of not only dissident citizens but the merely disgruntled is a well done effort. Some computer savant types have said that development of this surveillance methodology has been the real mission of the CIA from day one in delivering such a working system to secure the international elites and their international operations from revolution and other nasty surprises on a world wide basis. The fact that one part of the civilian population is willing to do this for some scraps from the big table says a lot about the aggregate morality of our species. Noted in this article is the reference to what has become the Continuity of Government Act (COG). Much of which is considered State Secrets, so that even Congress, as the legislative branch and not having the necessary security clearances, does not know what the entire Act comprises. When the COG act was declared to be in effect on the morning of the 9/11/2001 event buy one of its principle authors, Dick Cheney, we can be assured by what has taken place in the intern timeline that the Constitution of the USA has been suspended either in whole or part(s). Otherwise the high majority of those comprising the current U.S. Federal government could be easily held to be in contempt of the Constitution and declared treasonous. COG relies on a declaration of a state of emergency to be in effect or it ends under sunset provisions. Every president since the morning of 9/11 has extended this state of emergency since. Americans should demand to know exactly what is the state of their republic as regards to their constitution as prerequisite to the next federal election cycle. If none of the candidates, especially incumbents, are willing to answer the question then they are unfit for office. Myself if I voted I would just vote against every incumbent as a message sent.

    1. Most of Whitney Webb’s articles are summaries of what is already known by most of us for DECADES. She is like Stephen Lendman, Jason Ditz and others who simply rehash old material without adding any reporting. Then pretend its “breaking”. Compiling everyone else’s work on the internet and declaring it new. Why cover old known ground if you dont add any new material? Why doesnt she do a deep dive into William Barr? Or Wexner? Filks actually doing some of this great work are over at Trunews (whom she uses for her only original analysis, but wont source them as the source cause they’re a Xtian station.
      That being the case, she misses some of the most important points and items. The Roy Cohn story (done extensively by Vanity Fair and Espquire for ex) and the Promis saga is VERY outdated, and there were several intermediary software more important that updated those packages to where we are now. Do we really have to keep rehashing the same stuff without any new revelation? You saw this all through the 2010s when every 6 mos or so, someone would blast on the scene w/ the (endlessly repeated) “discovery” that it was the US-Israel who were arming Al Qaeda! And they were arming the rebels!!!
      Do we really have to keep reinventing the wheel? Seems so.

  2. Those who believe they have the power to suspend the Constitution, will be “suspended” by their necks from the end of a rope.

    I said a 2 weeks ago that Epstein will fake his death and boom, two days later he dies?

    Epstein is not stupid, his untimely death (and not Suicide) will cause leaks that no one can patch.
    I bet the first place his pics and videos go to is Wikileaks, then to the Independent News sites where it will spread like wild fire!
    Smarts would never let it go to the MSM or anti Trump/Reps sites where it would lay dormant.

    Sure his BlackBook has names,….so what,…………..So What?!
    Names don’t mean anything if connected to nothing.
    And if you ask an Elite about their name in Epsteins book they’ll just say too,
    “So What!”

    At first it was “Suicide”, a whole lot of bullshit around that!
    Then it was “Murder” more bullshit.
    Now 2 weeks of all that and not “ONE FAKE DEATH” conspiracy?!
    A “Whisked away to another but secret location” would have been more believable!

    Time will tell, when Nothing happens to the Elite, then Epstein is not dead!
    All of Politics is a stage and the politicians merely
    players,……………………………..and guess who’s getting Played?

    Now watch all the death conspiracy theories pop up out of no where and many will
    be generated by the Deep State to add to the confusion!

    I predicted his fake death 1 day after he was sent to the hospital for fake suicide.
    a few days later he dies, that’s more than about a month ago, I’m not going to keep changing the date on my prediction, it is what it is!
    For the CLUELESS just go back two days before he “Died” and that’s when I made the prediction.

  4. The old system described has long been tremendously upgraded by hardware backdoors in every one of your computers etc. …bw@H@H@H@H@H@ … your CPU is working for us.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.