Monday, May 01, 2006

"Blood is thicker than water"

In todays days, I think thicker the blood, more the clots. This is increasingly proving to be true for Indian families. A country where family relationships were once worshipped, today is telecasting prime news hours with stories of family feuds.The last few months there have been innumerable highlights on sibling relationships and how the forms of rivalry has gone from courtrooms to cold blooded attempts to murder. Starting with the Ambani feud , moving over to the Mafatlal split and now the Mahajan war. And each case has been worse than the previous one. And all this because we try to live together. Perosnally, I would love to live in a huge big family, like the ones which Ekta Kapoor makes TV soaps on. Where we have four generations living in the same house and all being nice to each other. It's great. But unfortunately lets get real, a situation like that can only be acted out not lived and thats one of the reasons her soaps do so well, because they take people into an imaginary world which we try to make our reality.

The Ambani feud, which started soon after the demise of the Late Dhirubhai Ambani and went to great ugly lengths, with each brother mud slinging the other publically. A family which at one point posed for perfect pictures was now tearing in the middle. Straight down the damn middle. And what for? To me it looks like power and greed from both brothers. Reliance as a company has enough money for them both and for next 5 generations to live in the Ambani grandeur. So what exactly was the problem? Egos? Mind clashes? The funny part is the whole world knows that the Reliance Group is the baby of Dhirubhai Ambani. He built it from scratch and every business has its skeletons. Now opening out those cupboards to put the skeletons in public view raises only one simple question to both brothers...Were you ignorant all these years? With all the business accumen the two brothers possess, the mother luckily intervened in time to amicably sort out the matter before any further dirty linen was publically washed, not that too much was left to speculation by then, but thankfully the war was only verbal!! Never can judge these days....
The Ambani chapter was just about resolved when Aparna(Ajay) and Atulya Mafatlal came up with their split. And this was one strange problem with a sister claiming to be a brother and then a hundred culture police speculating the sex change issue, wihch firstly was nobodies business besides Aparna's given the right to live ones life by ones own damn terms, whatever they may be. This time round though the mother was directly involved in the feud , filing a case of harrassment and inappropriate use of household valuables in the court against her son Atulya and daughter-in-law Sheetal. The dispute moved over to more serious matters gradually targetting the relationship between Aparna and Atulya, which at that stage was aldready strained. Aparna was accused of the sex change to Ajay to claim a right to her fathers property who had willed everything to the male heir, which was Atulya. I wonder what happened to the pyaar between bhai bhai or bhai behen whatever they choose to be. I have to mention the involvement of another character the daughter in law Sheetal, who was subjected to great deals of negative publicity and ultimately known to be the mastermind behind the feud. A family associated with quality suitings and exquisite dress material was washing dirty linen in public!!

Wednesday, January 11, 2006

HAARP Project
Latest Information on HAARP

Reprinted from Earthpulse Flashpoints, Newtext Number One.

HAARP continues to occupy a significant amount of our attention and has remained the focus of much of our current work. We have had the opportunity to speak out about this project in numerous radio and television programs. In addition, a number of news articles have begun to be published throughout the country on this very important subject. We are thankful to all of the media people which have granted us time to bring our work out in front of the citizenry. The issue has not slowed down in terms of general interest in the topic. The story has served as a catalyst for involvement in political and governmental affairs for many individuals.

We have received a number of articles and news clippings from across the country which has provided a good deal of material for use in this publication. One of the most interesting pieces of information arrived just after the book was published.

An article, "Behind the Russian SDI Offer: A Scientific, Technological, and Strategic Revolution", appeared in the magazine 21st Century in the summer of 1993. The article was based on a front page story appearing in a Soviet government newspaper, Izvestia, on April 2, 1993. The article disclosed a whole new area of science and invited the United States to participate in the joint development of this new technology in a "Star Wars" weapons program. The initiative indicated that the Russians were far ahead in many of the areas important to the development of this "Star Wars" technology. One of the key components of the Russian technology was their greater understanding of "nonlinear" processes involved in the generation, propagation and absorption of powerful pulses of electro-magnetic radiations.

What are "nonlinear" processes? This relates to the idea of a small input of additional energy creating a disproportionally larger output of energy. A research scientist, Al Zielinski, recently sent us the following example of nonlinear effects: Experiment #1:

Imagine we had an unlimited amount of dominoes and we lined them up from here to, let's say, Paris. Then we could tip the first domino with 10 grams; it will fall down and cause the second domino to tumble, too, etc. The first action of 10 grams will cause all the dominoes to tumble including the last domino in Paris.

From this experiment we should understand that it is not the 10 gram action that causes all the dominoes to tumble, but the 10 gram action just creates an imbalance of the first domino. It is the gravity, however, that causes the dominoes to fall. In other words: only a 10 gram action is required to trigger a gravitational activity of all our dominoes from here to Paris.

Experiment #2:

Imagine we had an unlimited amount of special dominoes of which only the first one we line up here is of normal size, and all the subsequent dominoes we line up again from here to Paris are of continuously increased size. By the time we reached Paris, the last domino block would be 1000 meters high and weigh millions of tons. Again we tip the first domino here with 10 grams, which will fall down causing all the subsequent dominoes to tumble. By the time the gravitational action reaches Paris, the last domino in Paris will smash the Eiffel Tower.

From this experiment we should understand that it is not the 10 gram action here that will smash the Eiffel Tower in Paris, but it is the gravitational energy that is picked up on the way to Paris that smashes the Eiffel Tower.

In other words: only a 10 gram action is required to trigger a non-linear gravitational activity which will cause the destruction of the Eiffel Tower.

With the above examples in mind imagine the nonlinear effects of 1 billion watts of effective radiated power being directed at the ionosphere by the HAARP transmitter. This is the first phase capability of the project. The second phase will increase the effective radiated power levels even further -- to 4.7 billion watts! In our book we point out that energy in certain frequencies when reaching the outermost portions of the ionosphere can be amplified up to 1000 times by natural processes. This phenomena has been recorded by scientists at UCLA who have observed the results of these power amplifications at a fraction of the power level which HAARP will transfer to this region. This is extremely important in considering what may occur with this level of energy. A serious environmental disaster may well be the result.

The earlier referenced article from 21st Century magazine goes on to describe the implications of the use of phased array antennas and their potentials at 1 billion watt power levels. This is the antena array HAARP uses and the level of power it is designed to broadcast. What the article describes is a system which can be used for knocking down missiles and aircraft by effecting their guidance systems and creating atmospheric disturbances which lead to them crashing. They also talk about the ability, at lower power levels, to be able to look down from the ionosphere and detect cruise missiles and other incoming objects utilizing what was described as an advanced form of radar. Again this is exactly what has been described in the HAARP patents.

Plasma is a term for an electrically conductive state of matter generated from a gas. It can be created by action of extreme heat, powerful electromagnetic fields and by high levels of focused radio frequency energy such as the energy created with the HAARP instrument. 21st Century magazine suggests that, "The term plasmoid refers to the fact that under certain conditions a plasma can develop a self-contained, self-stabilizing structure based on the magnetic and other effects of internal configurations of electric currents within the plasma." This particular concept is important when referring to the concept of "painting the ionosphere" which was described by the military in the HAARP documents. This is in fact what the military will do with HAARP for certain applications. These plasmas are much different than those described in fusion research in that they involve very low electron energies. What is known is that although they are "cool" by comparison to fusion plasmas they are remarkably long lived and strong when generated in certain gases. Those specific gases include nitrogen and oxygen, the major components of the earth's atmosphere!

So what does all of this translate into? According to the article it is suggested that this technology can be used for modifying the ionosphere over very large areas for "over-the-horizons" telecommunications disruption, creating computer errors and perhaps even creating negative biological effects. What is known from other government documents, HAARP planning documents and International Red Cross documents is that all of this is possible with these new systems. What is also known now is that a single complex system can combine radar tracking with a speed-of-light means of destruction - the plasmoid. This is but one application of HAARP. The writers of the 21st Century article were not acquainted with the patents regarding HAARP or they would have recognized that the United States military was not interested in the Russian overture of cooperation because we already possessed the means to produce these effects. What also rings throughout the article brings us back to where we began our research into the HAARP system two years ago - to the ideas of Nikola Tesla. A New York Times article of December 8, 1915 says:

"Nikola Tesla, the inventor, has filed patent applications on the essential parts of a machine, possibilities which test a layman's imagination and promise a parallel of Thor's shooting thunderbolts from the sky to punish those who had angered the gods...Suffice it to say that the invention will go through space with a speed of 300 miles a second, a manless ship without propelling engine or wings sent by electricity to any desired point on the globe on its errand of destruction, if destruction its manipulator wishes to effect."

'It is not a time,' said Dr. Tesla yesterday, 'to go into the details of this thing. It is founded upon a principle that means great things in peace; it can be used for great things in war. But I repeat, this is no time to talk of such things.'

'It is perfectly practicable to transmit electrical energy without wires and produce destructive effects at a distance. I have already constructed a wireless transmitter which makes this possible, and have described it in my technical publications, among which I refer to my patent number 1,119,732 recently granted. With transmitters of this kind we are enabled to project electrical energy in any amount to any distance and apply it for innumerable purposes, both in war and peace. Through the universal adoption of this system, ideal conditions for the maintenance of law and order will be realized, for then the energy necessary to the enforcement of right and justice will be normally productive, yet potential, and in any moment available, for attack and defense. The power transmitted need not be necessarily destructive, for, if distance is made to depend upon it, its withdrawal or supply will bring about the same results as those now accomplished by force of arms.'

A second article also appeared in the New York Times, on September 22, 1940 and read:

"Nikola Tesla, one of the truly great inventors, who celebrated his eighty-fourth birthday on July 10, tells the writer that he stands ready to divulge to the United States government the secret of his 'teleforce', with which, he said, airplane motors would be melted at a distance of 250 miles, so that an invisible Chinese Wall of Defense would be built around the country..."

"This 'teleforce', he said, is based upon an entirely new principle of physics that 'no one has ever dreamed about', different from the principle embodied in his inventions relating to the transmission of electrical power from a distance, for which he has received a number of basic patents. This new type of force, Mr. Tesla said, would operate through a beam one one hundred-millionth of a square centimeter in diameter, and could be generated from a special plant that would cost no more than $2,000,000 and would take only about three months to construct."

"The beam, he states, involves four new inventions, two of which already have been tested. One of these is a method and apparatus for producing rays 'and other manifestations of energy' in free air, eliminating the necessity for a high vacuum; a second is a method and process for producing 'very great electrical force'; the third is a method for amplifying this force and the fourth is a new method for producing 'a tremendous electrical repelling force'. This would be the projector, or gun, of the system. The voltage for propelling the beam to its objective, according to the inventor, will attain a potential of 50,000,000 volts."

"With this enormous voltage, he said, microscopic electrical particles of matter will be catapulted on their mission of defensive destruction. He has been working on this invention, he added, for many years and has recently made a number of improvements in it."

As the ideas reverberate through my mind I cannot help but to feel that we again are walking down a darkened road of destruction. We are again on a path which may in fact lead to greater problems than those we seek to solve by tampering with the ionosphere.

In March 1996 the military begins to demonstrate the earth-penetrating-tomography applications of this technology --the idea of "x-raying" the earth with ELF waves generated by HAARP. These waves will pass through every living thing in the path and may have perceptible effects on people's health. This demonstration of this capability is critical for the military to gain the additional funding for the second phase of their project. That phase was originally estimated at $175 million dollars and will give the military power levels of 4.7 billion watts of effective radiated power.

Politically, things are only beginning to move as the opposition to this project continues to grow. Researchers, independent scientists and most importantly lay people all over the world are beginning to let their ideas be felt on this very important issue. Elsewhere in this microbook is an essay on creating political realities. We ask all of our readers to consider taking a step for change and activating some of the ideas contained in that essay.
Smart Dust

Ultimate Spy
by Peter Kupfer
SF Chronicle Staff Writer

Source: University of California
Department of Electrical Engineering and Computer Sciences


If Kristofer Pister has his way, we will never think about dust in quite the same way again. Pister is leading a team of researchers at the University of California at Berkeley that is developing tiny, electronic devices called "smart dust," designed to capture mountains of information about their surroundings while literally floating on air.

If the project is successful, clouds of smart dust could one day be used in an astonishing array of applications, from following enemy troop movements and hunting Scud missiles to detecting toxic chemicals in the environment and monitoring weather patterns around the globe.

The idea behind smart dust is to pack sophisticated sensors, tiny computers and wireless communicators onto minuscule "motes" of silicon light enough to remain suspended in air for hours at a time. As the motes drift on the wind, they can monitor the environment for light, sound, temperature, chemical composition and a wide range of other information, and beam that data back to a base station miles away.

Pister, an associate professor of electrical engineering and computer science at UC Berkeley, said he came up with the idea for smart dust eight years ago at a conference on future technology. "I realized that sensors, computers and communications were going to shrink down to ridiculously small sizes," he said. "So why not package them into a single, tiny device?"

Pister submitted a proposal to the federal Defense Advanced Research Projects Agency, a branch of the Defense Department, which agreed to provide about $1.2 million over three years to fund the project. Each mote of smart dust is composed of a number of microelectromechanical systems, or MEMS, wired together to form a simple computer.

MEMS are made using the same photolithographic techniques used to make computer chips. Once perfected, they are relatively easy and inexpensive to mass-produce. But unlike computer chips, which are solid, MEMS contain moving parts. Patterns are etched with light into a silicon wafer to create structures such as optical mirrors or tiny engines.

Each mote contains a solar cell to generate power, sensors that can be programmed to look for specific information, a tiny computer that can store the information and sort out which data is worth reporting, and a communicator that enables the mote to be "interrogated" by the base unit. Later versions may also contain a lilliputian lithium battery so the motes can operate at night.

While much of the technology used to develop smart dust already exists, the UC researchers are breaking new ground by integrating these systems into remarkably small, self-powered packages.

Pushing the Limits

"We are pushing the limits of miniaturization, integration and power management," said Brett Warneke, a graduate student in electrical engineering working on the project.

In one experiment to demonstrate the viability of the concept, researchers deployed a golf ball-sized device on Twin Peaks in San Francisco that measured weather conditions in the area - temperature, light, barometric pressure and humidity - and beamed that information back to a base station in Berkeley, more than 13 miles away.

So far, the smallest device the UC researchers have developed is 62 cubic millimeters - about the size of a pea - but Pister expects to shrink the devices to a nearly microscopic cubic millimeter by next summer. At that scale, they would be truly like dust: small enough to remain suspended in air, buoyed by the currents, sensing and communicating for hours.

One of the biggest hurdles the UC researchers face is building a mechanism that can survive on extremely low power but is still capable of sensing, sorting and sending vast amounts of information. For that reason, they have designed a computer operating system called Tiny OS that can function on a mere 512 bytes of RAM - about the amount of processing power found in a toaster.

The UC researchers are also experimenting with an ingenious optical communicator called a corner-cube reflector, which enables the motes to communicate while expending virtually no energy.

Pioneered at the University of California at Los Angeles, the reflector is essentially a tiny, hinged mirror that can flash millions of Morse code-like signals per second. When a smart mote is illuminated by a laser fired from the base station, the station can "read" the code reflected in the twitching mirror. The mirror itself is powered by electrostatic energy, the force that makes your socks cling together when they come out of the dryer.

Smart dust devices are now capable of communicating only with a single base station, but will eventually be able to share information with each other.

Such a system of "massively distributed intelligence" will vastly increase their ability to organize and communicate information.

"They will be able to do things collectively that they can't do individually, just like an ant colony," Warneke said. "An individual ant isn't very smart, but collectively, they are very smart."

Researchers are exploring a number of methods for deploying smart dust. One involves the use of tiny, unmanned aircraft that would spray motes over an area like a miniature crop duster and relay the resulting information back to a base station. MLB Co., a Palo Alto firm that develops experimental aircraft, has already built such a plane - an 8-inch radio-controlled aircraft equipped with a video camera that can stay aloft for 18 minutes at a speed of 60 mph.

MLB's "micro air vehicle" could be useful in a battlefield situation where low clouds impeded satellite surveillance. The tiny, unmanned plane could soar undetected above the battlefield, disperse a swarm of smart dust and begin relaying a stream of data about the movement of enemy troops and equipment.

The UC researchers are also exploring ways to prolong the time smart dust remains airborne by adding "wings" like those on maple seeds. A cubic-millimeter-sized mote dropped at 30,000 feet would normally take five hours to reach the ground. By attaching wings, the researchers hope to extend that period two- or three-fold.

Other researchers are attaching tiny legs to the motes to create so-called microbots or smart insects. Instead of wafting aimlessly through the air like dust, microbots could be programmed to perform specific tasks, such as crawling through a collapsed building to search for warm bodies.

"Smart dust is like the brain, and we're building the body," said Richard Yeh, a graduate student researcher specializing in microrobotics who is working on the smart dust project.

Yeh and his colleagues have already developed the basic components of a smart insect - tiny, jointed members, which function as legs, and minuscule motors, the equivalent of muscles. All that remains is to connect the components to a mote of smart dust, a step Yeh expects to accomplish within weeks.

Although the smart dust research is supported by the Defense Department, its proponents see many nonmilitary applications for it, many for motes that would stay in one place.

Crunchless Cap'n Crunch

They could be used to detect fires and earthquakes, tailor the climate in office buildings to suit the preferences of individual workers, and monitor product quality from factory to consumer (a mote of smart dust could tell, for example, if a box of Cap'n Crunch had been exposed to high humidity, and lost its crunch, or if a crate filled with delicate electronic components had been dropped).

Like many other new technologies, smart dust clearly has the potential to be used for nefarious purposes. Foreign governments (or our own), terrorist organizations, criminals and industrial spies could use high-tech motes to spy.

"This is a technology of total surveillance," said Richard Sclove, founder of the Loka Institute, a nonprofit organization in Amherst, Mass., that studies the social implications of technology.

"I have no doubt that there will be plenty of benign and wonderful applications of this technology, but it's easier to imagine the lousy ones. The CIA and the National Security Administration would love to get their hands on this, and there's no way to control what they do with it."

While Pister acknowledges the possibility that smart dust could be misused, he says the potential benefits of the technology "far, far outweigh" any risks.

"You can find harmful effects in everything," added Yeh. "But the threat is small. If a rogue state wanted to use them to spy on us, they could do it, but not much more. They probably couldn't carry enough poison or gas to do much damage."

The specter of millions, or even billions, of electronic motes drifting around the globe has also raised concerns about the potential ill effects on the environment and health.

But Pister dismissed such concerns. "Even in my wildest imagination, I don't think we'll ever produce enough smart dust to bother anyone," he said. "Most of these materials are not environmentally harmful. Essentially they are made out of sand, and that's not toxic."

Potentially, the most dangerous element of a smart dust mote would be the lithium battery, Pister says, but its minuscule size would pose little risk.

"A small town throws away more batteries per year than we can distribute across the entire universe," he said. "It's really a question of trade-offs. If you can sprinkle a few ounces of battery over a rain forest and thereby get a better understanding of the ecology, that's a trade-off worth making."

And what if someone accidentally inhaled a mote of smart dust? "If by ill chance you did inhale one, it would be like inhaling a gnat. You'd cough it up post-haste. Unpleasant, but not very likely."

GATHERING DATA ON THE FLY

Researchers at the University of California are developing tiny, electronic devices called "smart dust" designed to capture information about their environment while literally floating on air. Each dust "mote" packs sensors, computers and wireless communicators onto a tiny silicon chip light enough to remain airborne for hours at a time. As the motes drift, they can monitor their surroundings and beam data back to a base station.

Researchers are exploring a number of methods for deploying "smart dust." One technique involves the use of tiny, unmanned aircraft that would spray motes over an area like a miniature crop duster and then relay the resulting information back to a base station..EARLY PROTOTYPE

Smart dust ``macro-mote'' made with readily available components.

To test their concept, researchers planted golf ball-sized smart dust devices at Twin Peaks and on Coit Tower. Using a modified laser pointer, the device beamed weather information back to Berkeley.

Potential Uses

Military uses include tracking enemy troop movements from above and detecting chemical warfare agents in the air. -- Monitoring weather conditions around the globe and detecting fires and earthquakes are among the nonmilitary uses. -- Stationary motes could be used to monitor the quality of products from factory to consumer..

Wednesday, January 04, 2006

NSA: The Eyes of Big Brother

The historical of the National Security Agency (NSA) presented here includes and depends on information reported in three books. The vast majority of data on the National Security Agency comes from James Bamford's book The Puzzle Palace [1982]; all quotations are taken from Bamford unless otherwise noted. As Tim Weiner says, this book is "The best -- the only -- history of the NSA." Material about NSA's secret funding comes entirely from Weiner's Blank Check [1990], which also provided budget estimates and supporting material for other sections. The CIA and the Cult of Intelligence by Victor Marchetti and John D. Marks [1980 edition, originally published 1974], provided background information and a glimpse of the NSA from within the intelligence community but outside the agency itself.

----------------------------------------------------------------------------
The oppressive atmosphere of Orwell's 1984 arises from the omnipresence of Big Brother, the symbol of the government's concern for the individual. Big Brother controls the language, outlawing words he dislikes and creating new words for his favorite concepts. He can see and hear nearly everything, public or private. Thus he enforces a rigid code of speech and action that erodes the potential for resistance and reduces the need for force. As Noam Chomsky says, propaganda is to democracy what violence is to totalitarianism. Control thoughts, and you can easily control behavior.

U.S. history affords a prime example in the era named after Senator Joseph McCarthy, though he had many supporters in his attack on freedom of thought and speech. Perhaps his most powerful friend was J. Edgar Hoover, who fed him material from Federal Bureau of Investigation (FBI) files (some of it true) which he used to attack individuals for their supposed political leanings. By the time of Watergate, the Central Intelligence Agency (CIA) had become at least as notorious as the FBI, due largely to its assassinations of foreign leaders and support for military coups around the world.

The Creation of the NSA

Budgetary authority for the National Security Agency (NSA) apparently comes from the Central Intelligence Act of 1949. This act provides the basis for the secret spending program known as the black budget by allowing any arm of the government to transfer money to the CIA "without regard to any provisions of the law," and allowing the CIA to spend its funds as it sees fit, with no need to account for them.

Congress passed the C.I.A. Act despite the fact that only the ranking members of the Senate and House Armed Services Committees knew anything about its contents; the remaining members of Congress were told that open discussion, or even clear explanation, of the bill would be counterproductive. There were complaints about the secrecy; but in the end the bill passed the House by a vote of 348-4, and the Senate by a majority voice vote.

The NSA's estimated $10 billion annual allocation (as of 1990) is funded entirely through the black budget. Thus Congress appropriates funds for the NSA not only without information on the agency's plans, but without even a clear idea of the amount it appropriates; and it receives no accounting of the uses to which the funds were put. This naturally precludes any debate about the direction or management of such agencies, effectively avoiding public oversight while spending public funds. (Weiner notes the analogy to "Taxation without representation.")

Watching and Listening

"The NSA has also spent a great deal of time and money spying on American citizens. For 21 years after its inception it tracked every telegram and telex in and out of the United States, and monitored the telephone conversations of the politically suspect." (Weiner, Blank Check)

Due to its unique ability to monitor communications within the U.S. without a warrant, which the FBI and CIA cannot legally do, NSA becomes the center of attempts to spy on U.S. citizens. Nominally this involves only communications in which at least one terminal is outside the U.S., but in practice target lists have often grown to include communications between U.S. citizens within the country. And political considerations have sometimes become important.

During the Nixon administration, for example, various agencies (e.g., FBI, CIA, Secret Service) requested that the NSA provide all information it encountered showing that foreign governments were attempting to influence or controls activities of U.S. anti-war groups, as well as information on civil rights, draft resistance/evasion support groups, radical-related media activities, and so on, "where such individuals have some foreign connection," probably not that uncommon given the reception such groups usually receive at home. Clearly it would have been illegal for those agencies to gather such information themselves without warrants, but they presumably believed that the NSA was not similarly restricted when they included on their watch lists such as Nixonian bugaboos as Eldridge Cleaver, Abbie Hoffman, Jane Fonda, Joan Biaz, Dr. Benjamin Spock, and the Rev. ralph Abernathy. Presumably the name of Dr, Martin Luther King, Jr., was removed from the list the year Nixon was elected; certainly it was a targeted name before that time.

It is not feasible to determine in advance which telegrams and telephone calls will be among those the NSA is tasked with intercepting. Therefore, the NSA is normally reduced to recording all traffic on lines it is monitoring, and screening this traffic (by computer when possible) to catch targeted communications. This is called the "vacuum-cleaner approach."

Also basic to this method is the "watch list" of groups and individuals whose communications should be "targeted." When a target is added to the watch list, NSA's computers are told to extract communications to, from, or about the target; the agency can then examine the selected communications and determine whether they constitute intelligence data.

This list of targets usually expands to include all members of targeted groups plus individuals and groups with whom they communicate; thus it has a tendency to grow rapidly if not checked. Some requests seems a bit astonishing: during the presidency of Richard Nixon, a Quaker, J. Edgar Hoover requested "complete surveillance of all Quakers in the United States" because he thought they were shipping food and supplies to Southeast Asia.

Project Shamrock

Project Shamrock was initiated in 1945 by the Signal Security Agency (SSA), which eventually merged into the NSA. Until the project was terminated in 1975 to prevent investigation, Shamrock involved NSA (and its predecessors) in communications collection activities that would be illegal for agencies such as the CIA or FBI.

Under Shamrock, the international branches of RCA, ITT, and Western Union provided access by SSA, and its successor NSA, to certain telegrams sent by those companies. each company's counsel recommended against involvement on legal grounds; each company requested the written opinion of the Attorney General that it was not making itself liable to legal action. However, none of them received anything in writing from anyone in the government, and they all cooperated without it. (They did get a verbal assurance from the first Secretary of Defense, James Forrestal, who said he was speaking for the President; thus they may have been concerned at his resignation just over a year later, his hospitalization within a week suffering from depression, anxiety, and paranoia, and his suicide less than two months later.)

As Shamrock grew, and the NSA began to develop its own means of intercepting communications, the watch list approach became the accepted standard, since nothing less was effective or worthwhile. the intelligence community became aware that it could enter a name on the watch list more or less at will, and it would soon receive the requested material, marked classified, and gathered in within (or perhaps under cover of) the law.

The Huston Plan

The Huston Plan, formally known as "Domestic Intelligence Gathering Plan: Analysis and Strategy," was submitted in July 1970 to President Nixon. The goal of the plan was to relax some restrictions on intelligence gathering, apparently those of NSCID No. 6. Some parts of the intelligence community felt that these relaxations would assist their efforts. The proposals included:

  • allowing the NSA to monitor "communications of U.S. citizens using international facilities" (presumably facilities located in the U.S., since the NSA already had authority to monitor such communications if at least one terminal was outside U.S. territory) * intensifying "coverage of individuals and groups in the United States who pose a major threat to the internal security"
  • modifying restrictions "to permit selective use of [surreptitious entry] against other urgent and high priority internal security targets" as well as to procure "vitally needed foreign cryptographic material," which would have required the FBI to accept warrantless requests for such entries from other agencies ("Use of this technique is clearly illegal: it amounts to burglary. It is also highly risky and could result in great embarrassment if exposed. However, it is also the most fruitful tool and can produce the type of intelligence which cannot be obtained in any other fashion.") President Nixon approved this plan over the objection of J. Edgar Hoover and without the knowledge of Attorney General Mitchell. Hoover went to Mitchell, who had been left out of the entire process, and was consequently angry; Mitchell convinced Nixon to withdraw his approval 13 days after giving it.

Project Minaret

The size and complexity of the domestic watch list program became a problem, since it bordered on illegality. Project Minaret was established on July 1, 1969, to "privid[e] more restrictive control" on the domestic products, and "to restrict the knowledge that information is being collected and processed by the National Security Agency." The agency knew it was close to legal boundaries, and wanted to protect itself.

Minaret continued until the fall of 1973, when Attorney General Richardson became aware of the domestic watch list program and ordered such activities stopped. As the Watergate drama played out, Congress began to hear about the NSA's projects, and within two years formally inquiring about them.

Uncontrolled Activities

Like most intelligence agencies, the NSA uses words such as "interrupt" and "target" in a technical sense with a precise but often classified definition. This specialized language makes it difficult to legislate or oversee the activities involved. For instance, in NSA terms a conversation that is captured, decoded if necessary, and distributed to the requesting agency is not considered to be the product of eavesdropping unless one of the parties to the conversation is explicitly targeted. However, the NSA does not depend on semantic defences; it can also produce some legal arguments for exempting itself from normal requirements.

On the rare occasions when NSA officials have to testify before Congress, they have claimed a mandate broad enough to require a special legal situation. In 1975, the NSA found its activities under scrutiny by the Senate Intelligence Committee, chaired by Frank Church; the House Select Committee on the Intelligence Community, under Otis Pike; and the House Government Operations Subcommittee on Government Information and Individual Rights, led by Bella Abzug. The agency was notably consistent in responding to those committees.

When Lt. Gen. Lew Allen appeared before the Pike committee, he pointed out that it was the first time an NSA director had been required to testify in open session. Two days earlier, CIA director William Colby had testified that the NSA was not always able to separate the calls of U.S. citizens from the traffic it monitors. The general counsel of the NSA, Roy Banner, joined Allen as witness. he was asked if, in his opinion, the NSA could legally intercept overseas telephone calls from U.S. citizens despite the legal prohibition on wiretapping. He replied, "That is correct."

The top three officers of the NSA spoke with a single voice to the Church committee. When the committee's chief counsel said to Allen, "You believe you are consistent with the statutes, but there is not any statute that prohibits your interception of domestic communications." When deputy director Buffham was asked about the legality of domestic aspects of the Huston plan, he said, "Legality? That particular aspect didn't enter into the discussions." Counsel Banner responded at least three times to similar questions that the program had been legal at the time. (Testimony took place on Oct. 29, 1975; Project Shamrock and its watch lists were halted in mid-May of that year.)

The Abzug committee tried to get the story from the communications corporations that had cooperated in Project Shamrock. its hearings in late 1975 were unproductive because RCA and ITT informed the committee, two days before hearings began, that their executives would not appear without a subpoena; and a former FBI agent who had been cooperating was forbidden by his old employer from testifying. When the committee reconvened in early 1976, it issued subpoenas to three FBI special agents, plus one former agent; one NSA employee; and executives from international arms of RCA, ITT, and Western Union. President Ford prevented the five FBI/NSA people from testifying with a claim of executive privilege, and the Attorney general requested that the corporations refuse to comply with the subpoenas on the same grounds. Their testimony in spite of that request brought Project Shamrock to light less than a year after it was quickly terminated.

There may have been some legal basis for the NSA claims of extra-legal status. Despite having no statutory basis or charter, the NSA has considerable statutory protection: various statutes, such as the COMINT statute, 18 U.S.C. 798; Public Law 86-36; and special provisions of the 1968 Omnibus Crime Control and safe Streets Act, exempt it from normal scrutiny, even from within the government. Thus the agency may be right in interpreting the law to say that it can do anything not specifically prohibited by the President of the National Security Council.

NSCID No. 6, NSA's secret charter, includes this important exemption (according to James Bamford's reconstruction):

"The special nature of Communications Intelligence activities requires that they be treated in all respects as being outside the framework of other or general intelligence activities. Orders, directives, policies, or recommendations of any authority of the Executive branch relating to the collection ... of intelligence shall not be applicable to Communications Intelligence activities, unless specifically so stated and issued by competent departmental or agency authority represented on the [U.S. Communications Intelligence] Board. Other National Security Council Intelligence Directives to the Director of Central Intelligence and related implementing directives issued by the Director of Central Intelligence shall be construed as non-applicable to Communications Intelligence unless the National Security Council has made its directive specifically applicable to COMINT."

The unchecked ability to intercept and read communications, including those of U.S. citizens within the country, would be dangerous even if carefully regulated by elected officials held to a public accounting.

When the method is available to officials whose names are often unknown even to Congress who work for unaccountable agencies like the NSA, it is very difficult for the intelligence community, the defense community, and the Executive to refrain form taking advantage of such easily obtained knowledge.

The lack of any effective oversight of the NSA makes it possible for the agency to initiate or expand operations without authorization from higher (or even other) authority. Periodic meetings of members of the intelligence community do not constitute true oversight or public control of government; and the same is true of the provision of secret briefings to a small number of senior members of the Congress, all chosen by the intelligence community and sworn to secrecy.

Oversight of such extensive communications capability is important enough; but NSA's capabilities are not necessarily limited to intercepting and decrypting communications. The NSA can also issue direct commands to military units involved in Signals Intelligence (SIGINT) operations, bypassing even the Joint Chiefs of Staff. Such orders are subject only to appeal to the Secretary of Defense, and provide the NSA with capabilities with which it could conceivably become involved in operations beyond the collection of intelligence. At least, it does not seem to be legally restrained from doing so.

It appears that the only effective restraint on the NSA is the direct authority of the President, the National Security Council (NSC), the Secretary of Defense, and the U.S. Intelligence Board. Since the agency was created and chartered in secret by the President and the NSC, it can presumably be modified in secret by the same authorities.

Nor is the NSA bereft of means of influence other branches of government, as Marchetti and Marks note:

"A side effect of the NSA's programs to intercept diplomatic and commercial messages is that rather frequently certain information is acquired about American citizens, including members of Congress and other federal officials, which can be highly embarrassing to those individuals. This type of intercept message is handled with even greater care than the NSA's normal product, which itself is so highly classified a special security clearance is needed to see it."

Complete control over a secret agency with at least 60,000 direct employees, a $10 billion budget, direct command of some military units, and the ability to read all communications would be an enormous weapon with which to maintain tyranny were it to arise. A President with a Napoleonic or Stalinistic delusion would find the perfect tool for the constant supervision of the individual by the state in the NSA; not unlike scenarios depicted in novels such as Orwell's 1984.

Senator Schweiker of the Church committee asked NSA director Allen if it were possible to use NSA's capabilities "to monitor domestic conversations within the United States if some person with malintent desired to do it," and was probably not surprised by Allen's "I suppose that such a thing is technically possible." Certainly Senator Church feared the possibility:

"That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology ...

I don't want to see this country ever go across the bridge. I know the capability that is there to make tyranny total in America, and we must see it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return..."
Did you Know?

  • In large cities, Americans are photographed on the average of 20 times a day.
  • Everything you charge is in a database that police, among others, can look at.
  • Supermarkets track what you purchase and sell the information to direct-mail marketing firms.
  • Your employer is allowed to read your E-Mail, and if you use your company's health insurance to purchase drugs, your employer has access to that information.
  • Government computers scan your E-Mail for subversive language.
  • Your cell phone calls can be intercepted, and your access numbers can be cribbed by eavesdroppers with police scanners.
  • You register your whereabouts every time you use an ATM, credit card, or use EZ PASS at a toll booth.
  • You are often being watched when you visit web sites. Servers know what you're looking at, what you download, and how long you stay on a page.
  • A political candidate found his career destroyed by a newspaper that published a list of all the videos he had ever rented.
  • Most "baby monitors" can be intercepted 100 feet outside the home.
  • Intelligence agencies now have "micro-bots" -- tiny, remote control, electronic "bugs" that literally can fly into your home and look around without your noticing.
  • Anyone with $100 can tap your phone.
  • a new technology called TEMPEST can intercept what you are typing on your keypad (from 100 feet away through a cement wall.)
  • the National Security Agency has a submarine that can intercept and decipher digital communications from the RF emissions of underwater phone cables.
Surprising lawsuits involving privacy in the workplace

Shoars vs. Epson
An employee was fired for refusing to participate in her supervisor's monitoring of employee e-mail. She sued for wrongful termination, relying on a California state law that prohibits electronic surveillance. The court held that the statute's protections did not extend to e-mail.

Bourke vs. Nissan Motors Corp
Nissan fired an employee for sending personal messages (some containing sexual content) through the company e-mail system. Bourke sued for wrongful termination, claiming invasion of privacy. The court denied his claim on the grounds that Bourque had no reasonable expectation that his E-mail was private.

Smythe vs. The Pillsbury Co.
A Pillsbury employee was fired after the company intercepted "inappropriate and unprofessional comments" that the employee had made to his supervisor over the company e-mail system. The Pillsbury Company had repeatedly assured its employees that all e-mail communications would remain confidential and privileged, and that it would not intercept e-mail or use it as grounds for termination.
Smythe was still fired and the court backed Pillsbury.

Huffcut vs. McDonald's
McDonald's employee Michael Huffcut began an extramarital affair with an assistant manager at a McDonald's in a neighboring town.The couple left messages of a sexual nature on each other's voice mail, which was part of a system linking a dozen franchises. A McDonald's manager retrieved the couple's messages and played them to Huffcut's wife and his boss. The multi-million dollar case is still in litigation.M

In Bohach vs. City of Reno
Reno police officers sent messages to one another over the Reno Police Department's message system. Faced with an internal affairs investigation based upon the contents of the messages, the officers filed suit. They alleged that the storage of the messages by the Department's computer network and the subsequent retrieval of those messages from the computer's files constituted, among other things, violations of the Electronic Communications Privacy Act. The officers were overruled.

Technology Law
E-mail's popularity poses workplace privacy problems


Electronic mail messages are fast becoming the communications vehicle of choice for much of corporate America.

E-mail is in use, in some capacity, in all Fortune 1000 companies, and it is expected that by the year 2000, 40 million e-mail users will be sending 60 billion e-mail messages a year.

While the efficiency and practicality of e-mail is a major benefit to most businesses, e-mail is not without its problems. For instance, can an employer legally monitor e-mail, and if so should it monitor e-mail? What impact does an employee's unscrupulous use of employer-provided e-mall have on the employer?

What role will e-mail messages play in litigation? These are just a few of the questions that all employers should consider.

The Federal Electronic Communications Privacy Act of 1986 generally prohibits the interception of electronic communications, including e-mail. However, three major exceptions to the ECPA may allow the interception of employee e-mail.

First, an employer can monitor employee e-mail where the employee has consented to monitoring. Consent can either be express, where the employee actually agrees to the monitoring, or implied, where the employee continues to use the employer's e-mail system after being expressly informed that the employer intends to monitor e-mail.

It also states that the provider of electronic communication services is free to monitor communications when the monitoring is a necessary incident of the rendition of services or the protection of the rights or property of the provider.

The Electronic Mail Association has interpreted this exception to allow an employer to monitor all e-mail transmitted via an employer-provided system. Note that this exception would not apply to situations in which the employer simply provides the employee access to a commercial e-mail service.

Third, the ECPA provides that the interception of electronic communication is lawful if it is for a legitimate business purpose. Courts have taken two separate approaches to this exception. Under the first approach, an employer may monitor e-mail where the employee has been informed of the monitoring and it is necessary to protect the employer's business interests.

The second approach examines the content of the intercepted communication. Under this approach an employer may intercept business related e-mails but not personal e-mails. An e-mail message is considered business related e-mail if it is a message in which the employer has a legal interest or the interception is necessarily to guard against the unauthorized use of the e-mail equipment.

A company will have a legal interest in an e-mail message when the message is either in pursuit of the employer's business or is a detriment to the employer's business.

An employer that wishes to leave open the opportunity of monitoring employee e-mail messages would be well advised to inform its employees that it reserves the right to monitor e-mail messages.

By informing employees, the employer will be in a stronger position to argue that its employees do not have a "reasonable expectation" of privacy in their e-mail messages and thus avoids having to rely on the court's own notion of what privacy expectation is reasonable.

Once it has been decided that the employer can lawfully monitor employee e-mail, the tougher question becomes whether it is in the employer's best interest to monitor. It might allow the employer to uncover inappropriate employee e-mail uses, but it also may scare them away from using the productivity enhancing tool.

The use or misuse of e-mail may also have a serious effect on litigation. While most e-mail users believe that once they have deleted an e-mail message it is gone forever, this is not the case.

Many high-tech firms have been formed for the sole purpose of recovering e-mail messages the sender thought had been erased. The founder of one such firm recently stated, "Don't put anything in e-mail that you would not want read over the loud speaker throughout the company." Sound advice.

An additional problem may arise with respect to attorney-client communications via e-mail. While there have yet to be any decisions on the effect of e-mail on the attorney-client privilege, at least one bar association has taken the position that e-mail may destroy it and has likened e-mail to cell phone calls.

It is clear that e-mail is here to stay. In order to use the tool effectively, corporate managers must be aware of the potential legal and practical problems accompanied by the use of e-mail. However, with proper planning and a good policy, e-mail can greatly enhance the productivity of most companies.

Steven Miller is an attorney with Vorys Sater Seymour and Pease specializing in employment and labor law. He can be reached at 464-6400.
If I could have just one wish,
I would wish to wake up everyday
to the sound of your breath on my neck,
the warmth of your lips on my cheek,
the touch of your fingers on my skin,
and the feel of your heart beating with mine...
Knowing that I could never find that feeling
with anyone other than you.
A special world for you and me
A special bond one cannot see
It wraps us up in its cocoon
And holds us fiercely in its womb.

Its fingers spread like fine spun gold
Gently nestling us to the fold
Like silken thread it holds us fast
Bonds like this are meant to last.

And though at times a thread may break
A new one forms in its wake
To bind us closer and keep us strong
In a special world, where we belong.

- Sheelagh Lennon

Tuesday, January 03, 2006

Weapons of Mass Destruction
Krasnoyarsk-26 / Zheleznogorsk - Russia

Mining and Chemical Combine
N 56°22' E 93°41'

Krasnoyarsk-26, currently Zheleznogorsk, was established in 1950 to produce plutonium for weapons. The facility’s original name was the Combine 815. At present it is known as the Mining and Chemical Combine.

Krasnoyarsk-26 is located on the Yenisei river approximately 50 km northeast of Krasnoyarsk. The production facility is located approximately 10 km north of the residential area. Facility workers are shuttled to work from the residential area by an electric train. Krasnoyarsk-26 has a population of 100,000. Of them 8,000 work at the nuclear complex. Several more thousand are employed by the Production Association of Applied Mechanics [NPO-PM] producing communication satellites.

The Krasnoyarsk-26 industrial production area (a fenced off area on the surface) is about 17 km2. The sanitary-protection area is 131 km2. The plutonium production complex comprises the reactor plant, the radiochemical plant, the reactor coolant preparation plant, the partially completed RT-2 radiochemical plant, and the engineering plant. A distinctive feature of the plutonium production complex in Krasnoyarsk-26 is that the reactor plant, radiochemical plant, laboratories, and storage facilities are located 200-250 m underground, in a multi-level system of underground tunnels inside a mountain, which include water supply and ventilation systems are located in the mountain. To the north-west of the underground complex are underground reprocessing waste injection wells (the Northern test site).

The Krasnoyarsk-26 reactor plant consisted of three graphite reactors (AD, ADE-1, and ADE-2). Two graphite-moderated, light-water-cooled reactors, similar to the U.S. plutonium production reactors at Hanford, WA, were installed more than 200 meters into a mountainside. Both reactors were cooled by water directly from the Yenisey River. The first went into operation on 25 August 1958, and the second in 1961, producing plutonium-239 for nuclear weapons. In 1964, a third reactor went into operation with a closed-loop cooling system, not directly discharging into the river. The AD and ADE-1 reactors, which started in 1958 and 1961, were shut down in 1992. The third reactor generates heat and electricity for the local populations and cannot be shutdown before a replacement source of power becomes available.

In 1964, a reprocessing plant began operation at Krasnoyarsk-26. (Between 1958 and 1964, irradiated fuel was reprocessed by the radiochemical plants in Chelyabinsk-65 and/or Tomsk-7). The major process flow of the radiochemical plant includes metal uranium dissolution in nitric acid, multi-stage extraction to separate uranium and plutonium, their decontamination from radioactive fission products and plutonium concentrate sorption. Plutonium dioxide – the final product of the Combine – was transferred to the chemical and metallurgical plants in Chelyabinsk-65 and/or Tomsk-7 for conversion to metal and fabrication into nuclear weapon components. Since October 1994, separated plutonium is stored on-site as plutonium dioxide.

The medium- and low-level waste is transported to Severny storage site for deep-well injection into geological formations. The Severny storage site has been used for deep-well injection of low-level waste since 1962 and for medium-level waste since 1967.

In 1972, the Soviet Union began the construction of a complex to store and reprocess fuel from light-water power reactors. The construction of the fuel storage facilities, which are located between the old underground complex and the waste injection wells, was completed in 1976.

The RT-2 Plant was intended to produce MOX-fuel elements and recovered uranium. The designed capacity of the plant is 1,500 tons of spent fuel per year, which means spent fuel reprocessing from the NPP of total 50–80 million kilowatts. The first facility of the plant is the spent nuclear fuel storage that was commissioned in 1985. The storage facility can receive and store 6,000 tons of spent fuel. The construction of the reprocessing plant itself started in 1984 but was halted in 1989 due to the lack of funding and public opposition. The RT-2 reprocessing plant will probably never be completed.

The facility is involved in various defense conversion programs, such as a silicon semiconductor project for production of polycrystal and monocrystal silicon and silicon wafers. In 1996 the mayor of Krasnoyarsk-26 described plans to convert nuclear production facility to a producer of TV sets, microwave ovens, greenhouses, and polyethylene film. The MCA produces electronic parts, alarm systems, data processing systems, as well as color TV assemblies licensed by Samsung.

The Russian Reactor Core Conversion project, directed by a Gore-Chernomyrdin signed agreement, is a high priority of the Administration. This project will stop Russian production of weapons grade plutonium and improve operational safety by converting the reactor core design configuration of the reactors at Seversk and Zheleznogorsk. Currently, each of the three reactors can produce up to a total of 1.5 metric tons of plutonium per year. These reactors also provide critically needed district heat and electricity to Seversk and Zheleznogorsk. Total project costs including the value of the uranium is estimated in October 1998 to be $310 million. Due to the financial situation in Russia, the DoD intends to request additional funding for the design of converting the cores; improvements in safety systems; and infrastructure and materials needed to assure the actual conversion of the reactors; acceptance testing; and, regulatory approval.

The Department of Energy’s (DOE) National Nuclear Security Administration (NNSA) has awarded a total of $466 million to US firms Washington Group International and Raytheon Technical Services to begin work to shut down the last three remaining weapons-grade plutonium production reactors in Russia. Secretary of Energy Spencer Abraham announced the contracts at a May 27, 2003, press conference with Russian Ambassador to the United States Yuri Ushakov at DOE Headquarters, Washington, DC. On March 12, 2003, in Vienna, Austria, Secretary Abraham and Russian Minister of Atomic Energy Alexander Rumyantsev signed an agreement to reduce the threat from weapons of mass destruction by stopping plutonium production at the Russian reactors. As part of the agreement, DOE, working with its partners in Russia, will provide replacement fossil-fuel facilities to produce energy for heat and electricity currently produced by the reactors serving the cities of Seversk and Zheleznogorsk.

The US will assist in building a new fossil fuel plant at Zheleznogorsk. Major work will include providing a cogeneration boiler, an extraction/condensing steam turbine, heating-only boilers, a fuel handling system, an ash removal system, environmental controls, and a hot water pipeline to connect the new plant with the district heating system. The estimated time of project completion is eight years, at which time the reactor will shut down.


Regional Context

Krasnoyarsk enjoyed one of the highest levels of capital investment in the Soviet era and still ranks in Russia's top five thanks to such investment. Krasnoyarsk Krai is one of the key regions of Russia. Rich with natural resources, it possesses highly developed industries playing leading roles in the economy of Russia, and having industry-oriented scientific and intellectual potential. The Krai is constantly ranked among the ten regions with the highest GDP (gross domestic product) in Russia. The Krai's contribution to the industrial production of the country in 1996 was 3.5 percent. In comparison with the slump in production common for Russia in recent years, the Krai has experienced smaller declines.

Located in the central part of Siberia, Krasnoyarsk Krai covers 2.34 million square kilometres, or 13.6 percent of entire Russia. To the north the Krai extends to the Tajmyr Peninsula on the Arctic Ocean; to the east, Irkutsk Oblast and Yakutia Republic; to the south, Tyva republic; and to the west, Tyumen Oblast. The Krai spans several climatic zones, from arctic to continental, and has arctic deserts, tundra and tundra forest - in the north, the taiga - in the central part, and the steppe and forest-steppe - in the south. The south has productive agricultural soils. The population of Krasnoyarsk Krai is only 3.5 million, which is about two percent of the population of Russia. Three fourth of the population is urban. The capital, and the largest city, Krasnoyarsk, located in the south, has about 900,000 residents. Other large cities are Norilsk, Yenisejsk, Achinsk, Igarka, and Dudinka.

The Krai's machine building industry satisfies domestic needs for machines and equipment and represents a diversified system of enterprises located in different cities throughout the Krai. The majority of them (80 percent) are located in the city of Krasnoyarsk. The Scientific-production Enterprise of Applied Mechanics is the largest producer of space apparatus in Russia. The metallurgical industry is closely tied with the mining industry, as many metallurgical enterprises are involved in mining, the most characteristic example is the Norilsk Mining-Metallurgical Plant that produces 80 percent of all nickel and 98 percent of all platinum in Russia. Chemical industry products are ranked the third in exports of the Krai. Chemical enterprises are mainly located in the central part of the Krai, particularly in Krasnoyarsk, Kansk, Achinsk, and Zelenogorsk. The largest are the ones in Krasnoyarsk (plants producing tires, synthetic rubber products, chemical fiber, medicines, varnishes and paints, and particularly "Yenisey" chemical plant), Kansky Biochemical Plant producing spirits, "Sibvolokno" plant in Zelenogorsk, and Zheleznogorsky Mining and Chemical Plant that processes radioactive materials.

Imagery Evaluation Report

As of 07 October 2000 the Space Imaging Carterra Archive had one image of this area, which about 8% cloud-covered.


Monday, January 02, 2006



This website is for all who know and love Pan Am. These pages hold many memories and show passion for this regal airline. The site features pictures and stories that will take you back to long forgotten memories. It will make you smile, maybe laugh, but also feel a void in your heart and deep felt sadness for a legend that has ended. This website is dedicated to all who visit, enjoy and remember.
Pan Am will always be "Queen of the Skies"

http://panamair.org/

Friday, December 30, 2005

Gmail Calculations

Gmail storage is currently rising at 1/1000 MB every 25 seconds. This means that:

* It takes a little over 6 hours 56 minutes to increase one MB
* Every day storage increases by 3.456 MB
* By next April 1st, Gmail users will have about 3300 MB
* It takes 289 days to increase 1 gigabyte
* By the turn of the next millenium, Gmail users will have 1,257,183 MB of storage, enough to store about 100 million emails
* Every .003125 seconds, Gmail users get one additional bit of storage, enough to store either a 1 or a 0

Wednesday, December 21, 2005


The Illuminati (or Moriah Conquering Wind as they prefer to call themselves these days) is a very secretive group of occult practitioners who have been around for thousands and thousands of years. It is not a boys' club or a group of adults parents trying to get some excitement in life; this is something much bigger than that. This is a very well structured organization consisting of people in extremely High Places. Those people are the Super Wealthy, who stand above the law. Many of them don't even appear on the list of the wealthiest people in the world - it's that secret.


THE ILLUMINATI AND THE BLACK NOBILITY


The word Illuminati means 1. People claiming to be unusually enlightened with regard to a subject. 2. Illuminati Any of various groups claiming special religious enlightenment. Latin illmit, from pl. of illmintus, past participle of illminre, to light up. Seeilluminate. These definitions are taken from "The American Heritage Dictionary of the English Language".

Those people are the top players on the International playground, basically belonging to the thirteen of the wealthiest families in the world, and they are the men who really rule the world from behind the scenes (yes, they are mostly men, with a few exceptions). They are the "Black Nobility", the Decision Makers, who make up the rules for presidents and governments to follow, and they are often held from public scrutiny, as their action can't stand being scrutinized. Their bloodlines go back thousands and thousands of years, and they are very careful with keeping those bloodlines pure from generation to generation. The only way to do so is by interbreeding.

Their power lies in the occult and in economy - money creates power. The Illuminati own all the International banks, the oil-businesses, the most powerful businesses of industry and trade, they infiltrate politics and they own most governments - or at least control them. An example of this is the American election for presidency. It is no secret that the candidate who gets the most sponsorship in form of money wins the election, as this gives the power to "un-create" the opposed candidate.

And who sponsors the "right" candidate? The Illuminati do. More often than not they sponsor both sides to have a game going. They decide who will be the next president, and they see to that their man wins, even if they have to cheat like they did in Florida when President George W Bush "won" over Al Gore. Most president campaigns are financed with drug money, which is understandable if you know that the Illuminati run the drug trade industry as well. Elections are really not necessary, but they let us vote so we can have a game, and by letting us, they pretend to follow the Constitution.

But is the President really running the game? Not the least. The power does not lie with the politicians, but with the Illuminati, whose top members are mostly International Bankers. The leading candidates for Presidency are carefully chosen from the occult bloodlines of the thirteen Illuminati families, and if we research all the Presidents of the United States from the beginning and up to now, we will see that almost all of them are of the same royal bloodline, and they are all "family"; related by ancestry and family trees. Royalty is equivalent to the Illuminati.

So what are the goals of the Illuminati? To create a One World Government and a New World Order, with them on top to rule the world into slavery and fascism. This is a very old goal of theirs, and to understand it fully, one must realize that this goal isn't of a kind that's supposed to be obtained within one lifetime - it has been a goal that slowly is to be accomplished over a long period of time. However, they have accomplished more in this direction during the last few decades than they have done in hundreds of years due to industrialization and the Information Technology Era. Their immediate task is to lower the living standard of the developed countries, like the United States and Europe, to a low enough level, so the government can more easily control us (you can see this happening). The living standard in the third world countries will increase to the low level that is planned for the developed countries, so that all levels out. To be able to accomplish a New World Order, the living standard must be similar all over the world. You can see this happen right now. The following article shows it clearly: Africa and Asia Push for 'New World Order'.


This goal has been planned away from the public's prying eyes, in secrecy within the Secret Societies. All Secret Societies with secret grades of initiation are owned and controlled by the Illuminati, and Freemasonry is maybe the best known. The persons who control the societies and the Illuminati are occultists and black magicians. Their God is Lucifer. "The Light Bearer", and by occult practices they manipulate and influence the masses. It doesn't matter if you and I believe in this or not, as long as they do. And they take it very seriously.

It's a thrilling thought, that this planet as a matter of fact is run with Black Magic - a planet where magic is not supposed to exist at all in any shape and form, except in the movies and in books, and if somebody tells you it does exist, he/she will most certainly be ridiculed. After people have watched movies like "Lord of the Rings" they wish there was more magic in their lives; little do they know ...

From the occult, mind control and Intelligence have developed. By taking over the Movie Industry, the Record companies, and by their control of the Fine Arts, they know how to influence the teenagers to dance to their own tune and accept their kind of reality. This makes sense if you look at what kind of "entertainment" we are enforced to enjoy.

The music the teenagers have to listen to is often totally without quality and lead them into "robotism", apathy, violence and drugs. It's also used for mind control, as we shall see later. Real quality music is rejected by the big record companies in favor for those with lack of talent. Since Black Sabbath in the beginning of the 70:s and the Rolling Stones before them, occultism and Satanism has been promoted through the music industry. Many groups followed on the same track and have always been Hard Sale and heavily promoted and distributed.

The same thing goes with Hollywood, which is also controlled and created by the Illuminati. The "E.T"-movies, Dooms Day films and catastrophe-movies all align with the purpose to influence us in certain directions. Occult movies have also been made popular. All to prepare for days to come ...

I told you above that the men who control the Illuminati are members of thirteen wealthy families. Who they are have been a well hidden secret, and the leadership has gone from man to man over generations. Nevertheless, no secrecy is kept forever, and sooner or later there will be leaks, so also in this case. Not many people know who these families are exactly, but quite recently this has become known, due to people from Illuminati who have left the Order and revealed the most remarkable data. So here are the names of the 13 families - the Secret Government

1. Astor
2. Bundy
3. Collins
4. DuPont
5. Freeman
6. Kennedy

7. Li (Chinese)
8. Onassis
9. Rockefeller

10. Rothschild

11. Russell

12. van Duyn
13. Merovingian (European
Royal Families)

The following families are also interconnected with those above:

1. Reynolds
2. Disney
3. Krupp
4. McDonald

Also, in addition to those four families, there are hundreds of others that are connected more distantly to the main 13 Illuminati bloodlines. Although significant, they are not mentioned here; they are considered less powerful and less pure by the 13 Elite Bloodlines.

All the families above can be studied in much more detail in Fritz Springmeier's excellent book: "Bloodlines of the Illuminati".





SECRET SOCIETIES

The Secret Societies have been present in the history of man for a very long time. It all started thousands of years ago with the "Brotherhood of the Snake", a secret society that refers to Satan (the Great Serpent) back in the Gar

den of Eden. The Illuminati consider Sata

n being to good God and the Old Testament God to be evil. Their opinion is that Satan gave man knowledge, while God tried to suppress the same. From this viewpoint Satanism was developed and is practiced within the secret societies up until this day.

There are different theories as of where the secret knowledge within the secret societies comes f

rom, and I am going to mention the two most common theories:

In the Sumerian Scriptures, which go back at least 6000 years, the stone tablets tell us about the Anunnaki "they who from heaven came". According to researchers like Zachariah Sitchin, David Icke and William Bramley, the Anunnaki were the Gods mentioned in the Old Testament of the Bible, and they were aliens who came from another planet and created humankind as a slave race to serve them. The Sumerian Scriptures tell us about Anu, who was the king of the Anunnaki, and Ea (or Enki),

who is equivalent to S

atan. He is told to be the one who gave the knowledge to man in the Garden of Eden, and created the first secret society, the above mentioned "The Brotherhood of the Snake". The Anunnaki is said to have come here to exploit the resources of the Earth; especially gold, as this was something they were lacking on their planet, and they urgently needed it as an important ingredient in their atmosphere. Thus Ea, who was a brilliant scientist, created homo sapiens as a hybrid betw

een a primitive earth life-form and the alien race.

(NOTE: If you, the r

eader, have a problem accepting the alien part of this agenda, feel free to exclude it from the picture for now, and please continue to read. You will most certainly find the evidence overwhelming on this website with- or without the alien involvement. The truth speaks for itself. However, if you still wa

nt to research the alien/interdimensional part of it all, I suggest you visit the Disclosure Project Website and watch The Disclosure Project Video. Approximately 500 government employees testify about the alien agenda and that the aliens are among us, and they are all willing to go to court to testify further, in

public. This video definitely convinced me, and many many others who were 100% sure the alien agenda was a piece of disinformation. Please continue to be skeptical while watching this video and exploring the website, but don't be skeptical beyond reason. The same goes for the information on this website of mine. The full testimonies of those 500+ governme

nt people are gathered in the book "The Disclosure Project", which can be ordered from their website. In the book are also actual classified documents, and tons of those can also be found at the Disclosure Project Website).



Enki (Ea) is sitting on the chair to the right

First homo sapiens were only meant for slave labor and couldn't breed. Later on this was changed. Although Ea didn't like how his created race was treated as an inferior race , he wanted to enlighten them by teaching them who they were and where they came from. He also wanted to tell them the well hidden truth that each individual is a spirit inhabiting a body and that after body death the spirit lives on and rein

carnates on Earth.

David Icke, who has researched the Illuminati for decades, claims that the top Illuminati bloodlines are shape shifting reptilians, aliens not from space, but from another dimension, and that THEY actually are the Anunnaki "Gods". According to him, they are the ones in charge of the secret societies. Those entities have the ability to shape shift into human form, and he says he has hun

dreds of witnesses who have seen them shape shift back into reptilian form.

The Christian viewpoint on this is that the Anunnaki in fact were the Giants that walked the Earth, which the Bible is talking about. Those Giants were the nephilim, who rebelled towards God and were cast down to Earth from Heaven, together with their master, Satan. Christians explain the shape shifting theory by saying that the aliens in fact are demons and the nephilim. They mean that the persons that have been seen shape shifting are merely demon possessed due to their black magic practices, and sometimes the demons "bleed through" and show themselves, either in reptilian form or as the "grey aliens". Maybe the different conclusions are just different interpretations of the same thing?


Whatever the truth is, there is definitely something going on. There are too many witnesses, and in the era of the Internet it is easier for people to communicate world wide. This may be the reason why we hear so much about this phenomenon now, where there once was silence. There is no Media cover-up on the Internet. On the other hand, we cannot take everybody that steps forward on the Internet seriously, as things like these also can create psychological chain reactions. Some people may "believe" they have experienced something that they actually haven't. This is not meant to be a religious web site, so I will not argue too much about these things; especially as I don't have the answers myself. On the contrary, this site has as one of i

ts' purposes to explain the world situation from an objective viewpoint - as objective as possible.

The truth is; in the background throughout all history there are secret societies. The original Brotherhood soon split up in cults, when certain people on top were in disagreement with each other. Different powers of control developed, where they fought against each other internally (which still is the case today), out of sight from an ignorant population. They invented the different religions and sects and cults so man would be busy doing something else instead of looking into what the Brotherhood actually was doing. They put themselves in charge of the churches to entrap people and to spread conflicts between different belief systems. Most wars throughout history have been religious wars.

Out of the original Brotherhood came Freemasonry, the Rosicrucians, The Knight Templars, Ordo Templi Orientis, Knights of Malta and more. Some people may object and say that Freemasonry, for example, is a charity organization and even a Christian society. Yes, that's what we're told and that is what most members of the secret society believe. The vast majority of people involved are good people, who are ignorant of what is practiced on the highest levels; unaware of that up there is Satanism and worship of the dark forces. They don't serve God, they serve Satan or Lucifer, and this is the key to what is happening in the world of today.