CHAPTER XXI
Big Brother - Towards the Homeland
Security State
Defense of the Homeland is an integral part of the Administration's
“preemptive war doctrine, presented to Americans as “one piece of a
broader strategy [which] brings the battle to the enemy”.1
Self-defense is the cornerstone of the National Security doctrine.
The latter includes offensive military actions in foreign lands as
well as anti-terrorist operations in the American Homeland directed
against both “foreign” and “domestic” adversaries.
In the words of DHS Secretary Michael Chertoff:
While one key to defense is offense,
… we also need a ‘defense in depth’ as part of the strategic
whole. That means even as we pursue terrorists overseas, we work
at home to prevent infiltration by terrorists and their weapons;
to protect our people and places if infiltration occurs; and to
respond and recover if an attack is carried out. This is
embodied in our strategy of building multiple barriers to
terrorist attacks.2
The “Universal Adversary”
The “enemy” is no longer limited to “foreign Islamic terrorists” and
“Rogue States” as defined in earlier post 9/11 national security
statements, it also includes terrorist threats from within the US,
emanating from so-called “domestic conspirators”.
A July 2004 Report of the Homeland Security Council (HSC) entitled
Planning Scenarios describes in minute detail, the Bush
administration’s “preparations” in the case of a terrorist attack by
an enemy called the “Universal Adversary” (UA).3
“The perpetrator”
is identified in the “Planning Scenarios” as an abstract entity used
for the purposes of simulation. Yet upon more careful examination,
this Universal Adversary is by no means illusory.
It includes the
following categories of potential “conspirators”:
-
“foreign [Islamic] terrorists”
-
“domestic radical groups”,
[antiwar and civil rights groups]
-
“state sponsored adversaries”
[“Rogue States”, “unstable nations”]
-
“disgruntled employees” [labor
and union activists]
According to the Planning Scenarios
Report:
Because the attacks could be caused
by foreign terrorists; domestic radical groups; state sponsored
adversaries; or in some cases, disgruntled employees, the
perpetrator has been named, the Universal Adversary (UA). The
focus of the scenarios is on response capabilities and needs,
not threat-based prevention activities.4
The “domestic radical groups” and labor
activists, who question the legitimacy of the US-led war and civil
rights agendas, are now conveniently lumped together with foreign
Islamic terrorists, suggesting that the PATRIOT anti-terror laws
together with the Big Brother law enforcement apparatus are
eventually intended to be used against potential domestic
“adversaries”.
While the Universal Adversary is “make-believe”, the simulations
constitute a dress rehearsal of a real life emergency situation
which is intended to curb all forms of political and social dissent
in America: “The scenarios have been developed in a way that allows
them to be adapted to local conditions throughout the country.”5
Fifteen Distinct Scenarios
The scenarios cover the entire array of potential threats. Foreign
terrorists are described as working hand in glove with domestic
“conspirators”. Fifteen distinct “threat scenarios” are
contemplated, including, inter alia, a nuclear detonation (with a
small 10-Kiloton improvised nuclear device, anthrax attacks, a
biological disease outbreak including a pandemic influenza, not to
mention a biological plague outbreak. Various forms of chemical
weapons attacks are also envisaged including the use of toxic
industrial chemicals, and nerve gas. Radiological attacks through
the emission of a radioactive aerosol are also envisaged.6
What is revealing in these “doomsday scripts” is that they bear no
resemblance to the weaponry used by clandestine “terrorists”
operating in an urban area. In fact, in several cases, they
correspond to weapons systems which are part of the US arsenal of
WMD, used in US sponsored military operations. The description of
the nuclear device bears a canny resemblance to America’s tactical
nuclear weapon (“mini nuke”), which also has a 10-kiloton yield,
equivalent to two-thirds of a Hiroshima bomb.7 That Homeland
Security should actually envisage a make believe scenario of large
scale nuclear attacks by “domestic radical groups”’ and/or “foreign
terrorists” borders on the absurd.
With regard to the nerve gas attack scenario, in a cruel irony, it
is the same type of nerve gas (as well as mustard gas) used by the
US military against civilians in Fallujah in 2004-2005.
TEXT BOX 21.1
Intelligence Disclaimer
[published at the Outset of the Report]
While the intelligence picture developed as part of each
scenario generally reflects suspected terrorist
capabilities and known tradecraft, the Federal Bureau of
Investigation (FBI) is unaware of any credible
intelligence that indicates that such an attack is being
planned, or that the agents or devices in question are
in possession of any known terrorist group.
Source: Homeland Security Council, Planning Scenarios,
July 2004 |
Martial Law
The possibility of an emergency situation triggered by a Code Red
Alert has been announced time and again since September 11 2001,
with a view to preparing public opinion across America for martial
law, if and when it occurs. (See Chapter XX.) What the US public,
however, is not fully aware of, is that a Code Red Alert would
create conditions for the (“temporary”) suspension of the normal
functions of civilian government. According to the Federal Emergency
Management Agency (FEMA), Code Red would:
Increase or redirect personnel to
address critical emergency needs; Assign emergency response
personnel and pre-position and mobilize specially trained teams
or resources; Monitor, redirect, or constrain transportation
systems; and Close public and government facilities not critical
for continuity of essential operations, especially public
safety.8
Northern Command (NorthCom) would
intervene. Several functions of civilian administration would be
suspended, others would be transferred to the jurisdiction of the
Military. More generally, the procedure would disrupt government
offices, businesses, schools, public services, transportation, etc.
Secret Shadow Government
On September 11, 2001, a secret “Shadow government” under the
classified “Continuity of Operations Plan” (COOP) was installed.9
Known internally as “Continuity of Government” or COG, the secret
Shadow government—initially set up during the Cold War— would become
operational in the case of a Code Red Alert, leading to the
redeployment of key staff to secret locations.
Federal agencies are required to establish “plans and procedures” as
well as “alternate facilities” in the case of a national emergency.
Moreover, the Continuity in Government Council (set up in Fall 2002)
envisages concrete provisions relating to issues of “succession”, in
the case of a terrorist attack resulting in the death of the
President or members of Congress.10
Code Red Alert would suspend civil liberties, including public
gatherings and/or citizens’ protests against the war or against the
Administration’s decision to declare martial law. Arrests could be
directed against domestic “radical groups” and labor activists”, as
defined in the 2005 National Security Council Emergency Scenarios
document.11
The emergency authorities would also have the authority to exert
tight censorship over the media and would no doubt paralyze the
alternative news media on the Internet.
Big Brother Citizens’ Corps
In turn, Code Red Alert would trigger the “civilian” Homeland
Emergency response system, which includes the DHS’ Ready.Gov
instructions, the Big Brother Citizen Corps, not to mention the
USAonWatch and the Department of Justice Neighborhood Watch Program.
The latter have a new post 9/11 mandate to “identify and report
suspicious activity in neighborhoods” across America. Moreover, the
DoJ Neighborhood Watch is involved in “ Terrorism Awareness
Education”.12
Under the Citizen Corps, which is a component of the USA Freedom
Corps, citizens are encouraged to participate in what could
potentially develop into a civilian militia:
Americans are responding to the evil
and horror of the terrorist attacks of September 11 with a
renewed commitment to doing good. … As part of that initiative,
we created Citizen Corps to help coordinate volunteer activities
that will make our communities safer, stronger, and better
prepared to respond to any emergency situation. …
We are asking cities and counties across
the country to create Citizen Corps Councils of their own design,
bringing together first responders, volunteer organizations, law
enforcement agencies, and community-serving institutions, such as
schools, hospitals, and houses of worship. Some Citizen Corps
Councils will feature local activities that reflect new and existing
national programs such as Neighborhood Watch, Community Emergency
Response Teams, Volunteers in Police Service, and the Medical
Reserve Corps. Some will include local programs that involve
partnerships with law enforcement agencies, hospitals, first
responders, and schools.
What all Citizen Corps Councils will have
in common is that our local leaders will be working to expand
opportunities for their community members to engage in volunteer
service that will support emergency preparation, prevention, and
response.13
The Conduct of Anti-Terrorist “Drills”
Preparations for Martial Law have been conducted in the form of
large scale anti-terrorist exercises. Shortly after the invasion of
Iraq, in May 2003, the Department of Homeland Security conducted a
major “drill” entitled “Top Officials Exercise 2” (TOPOFF 2).
Described as “the largest and most comprehensive terrorism response
and homeland security exercise ever conducted in the US”, TOPOFF 2
was based on Code Red assumptions involving a simulated terrorist
attack.14
The “national response capability” in TOPOFF 2 was organized as a
military style exercise by federal, State and local level
governments, including Canadian participants.
TEXT BOX 21.2
The Department of Homeland Security’s “Ready.Gov
Instructions”
Terrorists are working to obtain biological,
chemical, nuclear and radiological weapons, and the
threat of an attack is very real. Here at the Department
of Homeland Security, throughout the federal government,
and at organizations across America we are working hard
to strengthen our Nation’s security. Whenever possible,
we want to stop terrorist attacks before they happen.
All Americans should begin a process of learning about
potential threats so we are better prepared to react
during an attack. While there is no way to predict what
will happen, or what your personal circumstances will
be, there are simple things you can do now to prepare
yourself and your loved ones.
Source: Ready.Gov America, Overview:
http://www.ready.gov/overview.html
|
Various attack scenarios by presumed “foreign terrorists” using
“weapons of mass destruction were envisaged.15
TOPOFF 2 was conducted using the assumptions of a military exercise
pertaining to a theater war:
It assessed how responders, leaders,
and other authorities would react to the simulated release of
weapons of mass destruction (WMD) in two U. S. cities, Seattle,
WA and Chicago, IL. The exercise scenario depicted a fictitious,
foreign terrorist organization that detonated a simulated
radiological dispersal device (RDD or dirty bomb) in Seattle and
released the pneumonic plague in several Chicago metropolitan
area locations. There was also significant pre-exercise
intelligence play, a cyber-attack, and credible terrorism
threats against other locations.16
Two years later, in April 2005, during
Bush’s second term, The Department of Homeland Security carried out
larger and more comprehensive anti-terrorist exercise entitled
TOPOFF 3, involving more than 10,000 “top officials”from 275
government and private sector organizations. Both Britain and Canada
took part in the “drill”, which was described as “a multilayered
approach to improving North American security”.17
The stated objective of the TOPOFF 3 “Full Scale Exercise” was to
“prepare America” in the case of an actual bio-terrorism attack. The
assumptions regarding the “Universal Adversary” (contained in the
July 2004 Planned Scenarios document) and the roles of roles of both
“foreign” and “domestic” conspirators, was embodied into the TOPOFF
3 exercises:
We deliberately built the scenario
as a very complex WMD bio-terrorism attack in New Jersey, as
well as a kind of a dual-header in the state of Connecticut in
terms of a vehicle-borne improvised explosive device, and then a
simultaneous chemical attack.
The system in TOPOFF 3 across the board
was tested as never before, and this was deliberate. We wanted to
test the full range of our incident management processes and
protocols that spanned prevention, intelligence and
information-sharing, and then the more classic or traditional
response and recovery.
But really for the first time in a
national-level exercise, we really got at a near simultaneous WMD
attack which is, of course, very, very stressful for the federal
folks, as well as our state, local and international partners.18
Building an Anti-Terrorist Consensus
within the US State System
The objective of the anti-terrorist “drills” is not to “defend
America” against Islamic terrorists. The drills contribute to
building a broad consensus among “top officials”, within federal,
State and municipal bodies, as well as within the business community
and civil society organizations (hospitals, schools, etc.) that the
outside enemy exists and that “the threat is real”. The exercises
are applied to sensitize and “educate” key decision-makers. The
simulated data, the various categories of “conspirators”, the types
of deadly weapons envisaged in the drills are part of a knowledge
base.
The nature of the adversaries and the dangers of the attacks
(ranging from nuclear detonations to nerve agents and anthrax)
become “talking points” among key decision makers involved in the
anti-terrorist drills. The conspirators including the “domestic
radical groups” and “disgruntled employees” are described as being
in possession of “weapons of mass destruction”.
In the drills,
precise data sources are simulated and used to identify potential
conspirators. The data sources “replicate actual terrorist networks
down to names, photos, and drivers license numbers.” The drills
create a carefully designed “reality model” which shapes the
behavior and understanding of key decision makers.
In this process, the “reality model” script of threats and
conspirators replaces the real world.
“We are moving forward in applying lessons learned to anticipate and
address all possible attack scenarios,” an FBI. spokeswoman said,
asking not to be named because her department was not the lead
author of the document. “With enhanced law enforcement and
intelligence community partnerships, we are able to better detect
terrorist plots and dismantle terrorist organizations.”19
These fabricated realities penetrate the inner-consciousness of key
decision makers. The reality model script molds the behavior of
public officials; it builds a “knowledge” and “understanding”,
namely a shared ignorance regarding the war on terrorism and the
“adversaries” who oppose the administration’s war and homeland
security agendas.
A world of fiction becomes reality. The drills “enable exercise
players to simulate intelligence gathering and analysis”, in
preparation of an actual emergency situation which, according to the
scenarios’ assumptions, would lead to mass arrests of presumed
terror suspects.
Fiction becomes fact.
Conversely fact becomes fiction. “Ignorance is strength”. The
“scenarios” require submission and conformity: for those key
decision-makers at the federal, State and municipal levels, the US
Government, namely the Bush Administration, is the unquestioned
guardian of the truth.
We are not dealing with a propaganda ploy directed towards the
broader American public. The TOPOFF anti-terror exercises as well as
the “Planning Scenarios” were barely mentioned in the media. The
propaganda in this case is targeted. It takes the form of “training”
and emergency preparedness. The consensus building process is
“internal”: it does not consists in a mass campaign. It is largely
addressed to key decision-makers within these various governmental
and non-governmental bodies.
TOPOFF 3 included 10,000 top officials in important decision-making
positions (federal and State officials, law enforcement, fire
departments, hospitals, etc), who may be called to act in the case
of an emergency situation. These individuals in turn have a mandate
to spread the word within their respective organizations— i.e., to
sensitize their coworkers and colleagues, as well as the people
working under their direct supervision. This consensus building
process thus reaches tens of thousands of people in positions of
authority.
In turn, the holding of these antiterrorist exercises supports the
National Security doctrine of “preemptive war”,—i.e., that America
has the legitimate right to self defense by intervening in foreign
lands and that America must defend itself against terrorists. The
TOPOFF exercises also sustain the myth of WMDs in the hands of
terrorists, being used against America, when in fact the US is the
largest producer of WMDs, with a defense budget of more than 400
billion dollars a year.
The objective is to sustain a consensus on the war and national
security agenda—and to lay the path for martial law—within the
governmental, nongovernmental and corporate business sectors.
Ultimately, the objective is to develop an acceptance for martial
law across the land, by “top officials”, their coworkers and
subordinates, from the federal to the local level. This acceptance
would necessarily entail, in the case of an emergency, the
suspension of civil liberties and the rights of citizens.
Officials will not give a specific figure, but they say the exercise
involved several thousand fake deaths and thousands more injuries.
This time, the sick and dying were only acting. But officials are
aware that someday there could well be a real attack. They say the
more they learn about how to coordinate prevention and response
efforts, the better job they will be able to do to minimize
casualties if and when that happens.20
The Anglo-American Homeland Defense
Initiative
TOPOFF 3 involved the participation of Canada’s Ministry of Public
Safety and Emergency Preparedness as well as Britain’s Home Office.
The anti-terrorist exercise, involving simulations of attacks by
Islamic terrorists were organized in terms of five separate “venues”
in three countries: 1. Interagency exercise; 2. Connecticut; 3. New
Jersey; 4. United Kingdom; 5. Canada.
The FSE [Full Scale Exercise] offers agencies and jurisdictions a
way to exercise a co-ordinated national and international response
to a large-scale, multipoint terrorist attack. It allows
participants to test plans and skills in a real-time, realistic
environment and gain the in-depth knowledge that only experience can
provide.
The TOPOFF 3 scenario will depict a complex terrorist campaign and
drive the exercise play through the homeland security system,
beginning in Connecticut and New Jersey, and leading to national and
international response.
Over the course of several days fire personnel will conduct search
and rescue, hospitals will treat the injured (played by role
players), subject-matter experts will analyze the effects of the
attack on public health, and top officials will deploy resources and
make the difficult decisions needed to save lives.
An internal Virtual News Network (VNN) and news website will provide
real-time reporting of the story like an actual TV network would.
The mock media will keep players up-to-date on unfolding events and
enable decision makers to face the challenge of dealing with the
real world media. Only participating agencies can view the VNN
broadcast.21
The UK labeled its exercise “Atlantic Blue”, whereas Canada
designated its component of TOPOFF 3 as “Triple Play”. While the
media briefly acknowledged the Canadian attack scenarios, the
details of Britain’s “Atlantic Blue”, held barely a month before the
reelection of Prime Minister Tony Blair, were neither revealed, nor
reviewed in the British press.
In the US based exercise, more than 200 federal, state, local,
tribal, private sector, and international agencies and organizations
including volunteer groups were involved.
Shaping the Behavior of Senior
Officials
The “Top Officials exercises” (TOPOFF) prepare the Nation for an
emergency under Code Red assumptions. More specifically, they set
the stage within the various governmental bodies and organizations.
The exercises shape the behavior of “top officials” and private
sector decision-makers.
TEXT BOX 21.2
Anti-Terrorist Exercises for “Top Officials”
Connecticut: Simulated chemical attack on the New
London waterfront and a simulated mustard gas attack.
New Jersey: Simulated biological attack involving
“terrorists” spreading plague from an SUV in Union
County, eventually “killing” 8,694 and “sickening” some
40,000.22
The New Jersey Domestic Security Preparedness Task Force
will dissect how every state department performed during
exercise. And the Homeland Security Department will
analyze the performance of the more than 200 agencies
that participated in TopOff 3 and issue an “after
action” report.
“This is not over until we fully capture all of the
lessons learned,” said Robert Stephan, director of the
agency’s Incident Management Group. “This phase is …
showing us where we did well and where we need to make
improvement.”23
Canada: “Triple Play“ Nova Scotia and New Brunswick.
Coordinated by Canada’s Department of Public Safety and
Emergency Preparedness and the RCMP, eighteen Canadian
federal departments, as well as the provinces of New
Brunswick and Nova Scotia, took part in the mock terror
attack.
“Officials circulate word the ocean-going ship
Castlemaine, en route to Halifax, carries a container
holding chemicals for creating a weapon of mass
destruction—possibly like the deadly substance already
released in the United States and Britain. A meeting is
hastily called to devise a plan.”24
United Kingdom: “Atlantic Blue”. Operation Atlantic Blue
consisted of mock terrorist attacks by Al Qaeda using
dirty bombs and plane hijacks. Britain’s Home Office
officials collaborating with the Metropolitan Police are
said to have studied Al Qaeda’s strategies before
developing a series of ideas for mock attacks.25 |
According to official statements, an “actual terrorist attack” of
the type envisaged under TOPOFF 3 would inevitably lead to a Code
Red Alert. The latter in turn, would create conditions for the
(“temporary”) suspension of the normal functions of civilian
government.
The Role of the Military
What would be the involvement of the Military in an emergency
situation?
In theory, the Posse Comitatus Act of 1878 adopted in the wake of
the US civil war, prevents the military from intervening in civilian
police and judicial functions. This law has been central to the
functioning of constitutional government.
While the Posse Comitatus Act is still on the books, in practice the
legislation is no longer effective in preventing the militarization
of civilian institutions.26
Both the legislation inherited from the Clinton administration and
the post 9/11 PATRIOT Acts I and II have “blur[red] the line between
military and civilian roles”. They allow the military to intervene
in judicial and law enforcement activities even in the absence of an
emergency situation.
In 1996, legislation was passed which allows the Military to
intervene in the case of a national emergency (e.g., a terrorist
attack). In 1999, Clinton’s Defense Authorization Act (DAA) extended
those powers under the 1996 legislation, by creating an “exception”
to the Posse Comitatus Act, which henceforth permits the military to
be involved in civilian affairs “regardless of whether there is an
emergency”.27 This exception to the Posse Comitatus Act further
expands the controversial measure already adopted by Congress in
1996.
Under that new [1999] measure, which was proposed by the Defense
Department, the military would be authorized to deal with crimes
involving any chemical or biological weapons—or any other weapon of
mass destruction—regardless of whether there is an “emergency.” In
addition, the new proposal would lift requirements that the military
be reimbursed for the cost of its intervention, thus likely
increasing the number of requests for military assistance.
Under this new provision … Nojeim said, “the mere threat of an act
of terrorism would justify calling in military units. That
represents a loophole large enough to drive a battalion of army
tanks through.”
The defense authorization bill would also require the Pentagon to
develop a plan to assign military personnel to assist Customs and
the Immigration and Naturalization Service to “respond to threats to
national security posed by entry into the US of terrorists or drug
traffickers.”
“The mere threat of an act of terrorism would justify calling in
military units. That represents a loophole large enough to drive a
battalion of army tanks through.”28
The legal and ideological foundations of the “war on terrorism”,
therefore, were already laid under the Clinton Administration.
Despite this 1999 “exception” to the Posse Comitatus Act”, which
effectively invalidates it, this has not prevented both the Pentagon
and Homeland Security, from actively lobbying Congress for the
outright repeal of the 1878 legislation:
New rules are needed to clearly set
forth the boundaries for the use of federal military forces for
homeland security. The Posse Comitatus Act is inappropriate for
modern times and needs to be replaced by a completely new law. …
It is time to rescind the existing Posse Comitatus Act and
replace it with a new law. … The Posse Comitatus Act is an
artifact of a different conflict—between freedom and slavery or
between North and South, if you prefer. Today’s conflict is also
in a sense between freedom and slavery, but this time it is
between civilization and terrorism. New problems often need new
solutions, and a new set of rules is needed for this issue.
President Bush and Congress should initiate action to enact a
new law that would set forth in clear terms a statement of the
rules for using military forces for homeland security and for
enforcing the laws of the United States.29
The Posse Comitatus Act is viewed by
Homeland Security analysts as a “Legal Impediment to
Transformation”:
[The Posse Comitatus Act
constitutes] a formidable obstacle to our nation’s flexibility
and adaptability at a time when we face an unpredictable enemy
with the proven capability of causing unforeseen catastrophic
events. The difficulty in correctly interpreting and applying
the Act causes widespread confusion at the tactical,
operational, and strategic levels of our military. Given that
future events may call for the use of the military to assist
civil authorities, a review of the efficacy of the PCA is in
order.30
The ongoing militarization of civilian
justice and law enforcement is a bi-partisan project. Democrat
Senator Joseph Biden, a former Chairman of the powerful Senate
Foreign Relations Committee, has been waging in consultation with
his Republican counterparts, a battle for the outright repeal of the
Posse Comitatus Act since the mid-1990s.
The PATRIOT Legislation
In turn, the Bush administration’s PATRIOT Acts have set the
groundwork of the evolving Homeland Security State. In minute
detail, they go much further in setting the stage for the
militarization of civilian institutions.
The USA PATRIOT Act of 2001 entitled “Providing Appropriate Tools
Required to Intercept and Obstruct Terrorism Act of 2001” as well as
the “Domestic Security Enhancement Act of 2003,” (“PATRIOT Act II”),
create the conditions for the militarization of justice and police
functions.
Frank Morales describes the PATRIOT legislation as a
“Declaration of War on America”:
The “PATRIOT Act” is a repressive
“coordination” of the entities of force and deception, the
police, intelligence and the military. It broadens, centralizes
and combines the surveillance, arrest and harassment
capabilities of the police and intelligence apparatus. Homeland
defense is, in essence, a form of state terrorism directed
against the American people and democracy itself. It is the
Pentagon Inc. declaring war on America.
The “domestic war on terrorism” hinges
upon the Pentagon’s doctrine of homeland defense. Mountains of
repressive legislation are being enacted in the name of internal
security. So called “homeland security”, originally set within the
Pentagon’s “operations other than war”, is actually a case in which
the Pentagon has declared war on America. Shaping up as the new
battleground, this proliferating military “doctrine” seeks to
justify new roles and missions for the Pentagon within America. Vast
“legal” authority and funds to spy on the dissenting public,
reconfigured as terrorist threats, is being lavished upon the
defense, intelligence and law enforcement “community.”
All this is taking place amidst an increasingly perfected “fusion”
of the police and military functions both within the US and abroad,
where the phenomena is referred to as “peacekeeping”, or the
“poli-cization of the military”. Here in America, all distinction
between the military and police functions is about to be forever
expunged with the looming repeal of the Posse Comitatus Act.
In other words, the “New World Law and Order” based on the repeal of
the Posse Comitatus Act, requires a system of domestic and global
counterinsurgency led by the Pentagon.31
Even under a functioning civilian government, the PATRIOT Acts have
already instated several features of martial law. The extent to
which they are applied is at the discretion of the military
authorities.
The 2003 PATRIOT Act II goes very far in extending and enlarging the
“Big Brother functions” of control and surveillance of people. It
vastly expands the surveillance and counterinsurgency powers,
providing government access to personal bank accounts, information
on home computers, telephone wire tapping, credit card accounts,
etc.32
US Northern Command (NorthCom)
Northern Command (NorthCom) based at Peterson Air Force Base,
Colorado, was set up in April 2002 in the context of “the preemptive
war on terrorism”.
The creation of NorthCom is consistent with the de facto repeal of
the Posse Comitatus Act. In fact, the position of Homeland Defense
Command “in the event of a terrorist attack on US soil”, had already
been envisaged in early 1999 by Clinton’s Defense Secretary William
Cohen.33
Following the Bush Administration’s decision to create NorthCom, the
White House instructed Justice Department lawyers “to review the
Posse Comitatus law in light of new security requirements in the war
on terrorism.” The 1878 Act was said to “greatly restrict the
military’s ability to participate in domestic law enforce-ment”.34
The role of Northern Command defined in the Pentagon’s “Joint
Doctrine for Homeland Security” (JP-26), constitutes a blueprint on
how to defend the Homeland.
According to Frank Morales, “the scenario of a military takeover of
America is unfolding”. And Northern Command is the core military
entity in this takeover and militarization of civilian institutions.
A coup d’État could be triggered even in the case of a bogus terror
alert based on fabricated intelligence. Even in the case where it is
known and documented to senior military officials that the “outside
enemy” is fabricated, the military coup d’Etat characterized by
detailed command military/security provisions, would become
operational almost immediately.
NorthCom’s “Command Mission” encompasses a number of “non-military
functions” including “crisis management” and “domestic civil
support”. Under NorthCom jurisdiction, the latter would imply a
process of “military support to federal, state and local authorities
in the event of a terror attack”. The latter would include:
the preparation for, prevention of, deterrence of, preemption of,
defense against, and response to threats and aggression directed
towards US territory, sovereignty, domestic population, and
infrastructure; as well as crisis management, consequence
management, and other domestic civil support.35
NorthCom is said to have a “Creeping Civilian Mission”.36 Since its
inception, it has been building capabilities in domestic
intelligence and law enforcement. It is in permanent liaison with
the DHS and the Justice Department. It has several hundred FBI and
CIA officers stationed at its headquarters in Colorado.37 It is in
permanent liaison, through an advanced communications system, with
municipalities and domestic civilian law enforcement agencies around
the country.38 Moreover, the CIA, which has a unit operating out of
NorthCom, has extended its mandate to issues of “domestic
intelligence”.
In the case of a national emergency, Northern Command would deploy
its forces in the air, land and sea. Several functions of civilian
government would be transferred to NorthCom headquarters, which
already has structures which enable it to oversee and supervise
civilian institutions.
NorthCom’s “command structure” would be activated in the case of a
Code Red terror alert. In accordance with the provisions of the 1999
Defense Authorization Act (DAA), however, NorthCom does not require
a terror alert, an attack or a war-like situation to intervene in
the country’s civilian affairs.
The Center for Law and Military Operations, based in
Charlottesville, Virginia has published a “useful” Handbook entitled
“Domestic Operational Law for Judge Advocates,” which prepares for
new “law enforcement” missions for the Military. According to Frank
Morales, the Handbook:
attempts to solidify, from a legal
standpoint, Pentagon penetration of America and it’s ‘operations
other than war,’ essentially providing the US corporate elite
with lawful justification for its class war against the American
people, specifically those that resist the “new world law and
order” agenda.39
In other words, “the ‘war on terrorism’
is the cover for the war on dissent”.40
North-American Integration
The jurisdiction of the Northern Command now extends from Mexico to
Alaska. Under bi-national agreements signed with Canada and Mexico,
Northern Command can intervene and deploy its forces and military
arsenal on land, air and sea in Canada (extending into its Northern
territories), throughout Mexico and in parts of the Caribbean.41
Taken together, the existing legislation grants the military
extensive rights to intervene in any “emergency situation”, and, in
practice, without the prior approval of the Commander in Chief.
Upon the creation of Northern Command in April 2002, Defense
Secretary Donald Rumsfeld announced unilaterally that NorthCom would
have jurisdiction over the entire North American region.
Canada and Mexico were presented with a fait accompli. The “War on
Terrorism” was the main justification of this restructuring of the
North-American defense structures.
US Northern Command’s jurisdiction as outlined by the US Department
of Defense includes, in addition to the continental US, all of
Canada, Mexico, as well as portions of the Caribbean, contiguous
waters in the Atlantic and Pacific oceans up to 500 miles off the
Mexican, US and Canadian coastlines as well as the Canadian Arctic.
NorthCom’s stated mandate is to “provide a necessary focus for
[continental] aerospace, land and sea defenses, and critical support
for [the] nation’s civil authorities in times of national need.”42
Defense Secretary Donald Rumsfeld is said to have boasted that:
NorthCom—with all of North America
as its geographic command—”is part of the greatest
transformation of the Unified Command Plan [UCP] since its
inception in 1947.”43
Following Canada’s refusal to join
NorthCom, a high-level so-called “consultative” Bi-National Planning
Group (BPG), operating out of the Peterson Airforce base in
Colorado, was set up in late 2002, with a mandate to “prepare
contingency plans to respond to [land and sea] threats and attacks,
and other major emergencies in Canada or the United States”.44
Following consultations between Washington and Ottawa, bi-national
“military contingency plans” were established, which could be
activated in the case of a terror attack or “threat”.
Under the so-called Civil Assistance Plan (CAP), NorthCom is to
assist civilian governmental bodies such as municipalities in both
the US and Canada. Military commanders would “provide bi-national
military assistance to civil authorities”. In other words, it would
respond “to national requests for military in the event of a threat,
attack, or civil emergency in the US or Canada”.45
In the case of a Code Red Alert, these “requests” (e.g., from a
Canadian municipality) could result in the deployment of US troops
or Special Forces inside Canadian territory. In fact, with an
integrated command structure, Canadian and US servicemen would be
integrated into the same bi-national military operations.
What these initiatives suggest is that the Bush administration is
using the “War on Terrorism” as a pretext to exert military as well
as political control over Canada and Mexico.
In this regard, Canada’s National Security Policy is a copy and
paste version of US National Security doctrine, which commits Canada
to “regular national and international exercises involving civilian
and military resources to assess the adequacy of the national system
against various emergency scenarios.” Moreover, under the 1999
Canada-US Chemical, Biological, Radiological and Nuclear (CBRN)
Guidelines and Smart Border Accord, Canada has committed itself to
“engage with the US in joint counter-terrorism training activities,
including exercises.”46
Consolidating the Big Brother Data
Banks
In the wake of September 11, the Bush Administration established its
proposed Big Brother data bank: the Total Information Awareness
Program (TIAP).
TIAP was operated by the Information Awareness Office (IAO), which
had a mandate “to gather as much information as possible about
everyone, in a centralized location, for easy perusal by the United
States government.”47
This would include medical records,
credit card and banking information, educational and employment
data, records concerning travel and the use of the Internet, email,
telephone and fax. TIAP was operated in the offices of the Defense
Advanced Research Projects Agency (DARPA), a division of the
Pentagon in Northern Virginia.48
Ironically, when it was first set up, TIAP was headed by a man with
a criminal record, former National Security Adviser Admiral John
Pointdexter.
Pointdexter, who was indicted on criminal charges for his role in
the Iran-Contra scandal during the Reagan Administration,
subsequently resigned as TIAP Director and the program was
“officially” discontinued.49
While the Information Awareness Office (IAO) no longer exists in
name, the initiative of creating a single giant “Big Brother data
bank” encompassing information from a number of State agencies, has
by no means been abandoned. Several US Government bodies including
Homeland Security, the CIA and the FBI, respectively oversee their
own data banks, which are fully operational. They also collaborate
in the controversial Multistate Anti-Terrorism Information Exchange
(MATRIX). The latter is defined as “a crime-fighting database” used
by law enforcement agencies, the US Justice Department and Homeland
Security.50
The National Intelligence Reform Act of 2004, sets the framework for
establishing a centralized “Information Sharing Network” which will
coordinate data from “all available sources”. The proposed network
would bring together the data banks of various government agencies
under a single governmental umbrella.51 This integration of Big
Brother data banks also includes tax records, immigration data as
well as confidential information on travelers.
Similar procedures have been implemented in Canada. In December
2001, in response to the 9/11 attacks, the Canadian government
reached an agreement with the Head of Homeland Security Tom Ridge,
entitled the “Canada-US Smart Border Declaration.” Shrouded in
secrecy, this agreement essentially hands over to the Homeland
Security Department, confidential information on Canadian citizens
and residents.
It also provides US authorities with access to the tax records of
Canadians. Under the ongoing US-Canada integration in military
command structures, “Homeland Security” and intelligence, Canadian
data banks would eventually be integrated into those of the US.
Canada Customs and Revenue has already assembled confidential
information on travelers, which it shares with its US counterparts.
In early 2004, Ottawa announced under the pretext of combating
terrorism that “US border agents will soon have access to the
immigration and tax records of Canadian residents”.
Moreover, under Canada’s controversial Bill C-7, the Public Safety
Act of 2004, Canadian police, intelligence and immigration
authorities are not only authorized to collect personal data, they
also have the authority to share it with their US counterparts.52
What these developments suggest is that the process of bi-national
integration is not only occurring in the military command structures
but also in the areas of immigration, police and intelligence. The
question is what will be left over within Canada’s jurisdiction as a
sovereign nation, once this ongoing process of bi-national
integration—including the sharing and/or merger of data banks—is
completed.
America at a Critical Crossroads
As outlined in Chapter XX, the coded terror alerts and “terror
events” are part of a disinformation campaign carried out by the
CIA, the Pentagon, the State Department and Homeland Security.
US intelligence is not only involved in creating phony terror
warnings, it is also behind the terror groups, providing them with
covert support.
Meanwhile, the militarization of civilian institutions is not only
contemplated, it has become a talking point on network television;
it is openly debated as a “solution” to “protecting American
democracy” which is said to be threatened by “Islamic terrorists”.
The implications of a Code Red Alert are rarely the object of
serious debate. Through media disinformation, citizens are being
prepared and gradually conditioned for the unthinkable.
Bipartisan Consensus
A large section of US public opinion thought that a change in
direction might occur if the Democrats had won the 2004 presidential
elections.
Yet the Democrats are not opposed to the illegal occupation of Iraq
and Afghanistan. Nor are they opposed to the militarization of
civilian institutions, as evidenced by their 1996 initiative to
repeal the Posse Comitatus Act. Moreover, their perspective and
understanding of 9/11 and the “war on terrorism” is broadly similar
to that of the Republicans.
This ongoing militarization of America is not a Republican project.
The “war on terrorism” is part of a bipartisan agenda. Furthermore,
successive US Administrations since Jimmy Carter have supported the
Islamic brigades and have used them in covert intelligence
operations.
While there are substantive differences between Republicans and
Democrats, Bush’s National Security doctrine is a continuation of
that formulated under the Clinton Administration in the mid-1990s,
which was based on a “strategy of containment of Rogue States”.
In 2003, the Democrats released their own militarization blueprint,
entitled “Progressive Internationalism: A Democratic National
Security Strategy”. The latter called for “the bold exercise of
American power, not to dominate but to shape alliances and
international institutions that share a common commitment to liberal
values.”53
The militarization of America is a project of the US corporate
elites, with significant divisions within the corporate
establishment on how it is to be achieved.
The corporate establishment and its associated think tanks and
semi-secret societies (The Bildeberg, Council on Foreign Relations,
Trilateral Commission, etc.), however, is by no means monolithic.
Influential voices within the elites would prefer a “softer” police
state apparatus, a “democratic dictatorship” which retains the
external appearances of a functioning democracy.
The Democrats’ “Progressive Internationalism” is viewed by these
sectors as a more effective way of imposing the US economic and
military agenda worldwide. For instance, the Kerry-Edwards ticket in
the 2004 presidential elections was supported by billionaire George
Soros, who had waged a scathing denunciation of George W. Bush and
the Neocons.
While the US Congress and the bipartisan consensus constitutes the
façade, the Military (and its Intelligence counterparts) are, from
the point of view of the corporate elites, mere foreign policy
“pawns”, to use Henry Kissinger’s expression, acting on behalf of
dominant business interests.
The Wall Street financial establishment, the military-industrial
complex, led by Lockheed Martin, the big five weapons and aerospace
defense contractors, the Texas oil giants and energy conglomerates,
the construction and engineering and public utility companies not to
mention the biotechnology conglomerates, are indelibly behind this
militarization of America.
The “war on terrorism” is a war of conquest, which supports American
and British) economic and strategic interests. Its underpinnings are
supported by both Democrats and Republicans.
Under the legislation put into place by both parties since the
1990s, a Coup d’État could be triggered in the wake of a Code Red
Alert.
If emergency measures are maintained, the militarization of civilian
institutions will become entrenched, leading to the suspension of
civil liberties and the outright repression of the antiwar movement.
It would make any form of reversal back to civilian forms of
government much more difficult to achieve.
Ye t it should be understood that a step-by-step militarization of
civilian institutions, as distinct from an outright Military Coup
d’État, would essentially lead America in the same direction, while
maintaining all the appearances of a “functioning democracy”.
In this regard, the contours of a functioning Police State under the
façade of Constitutional government have already been defined:
-
the Big Brother surveillance
apparatus, through the establishment of consolidated data
banks on citizens
-
the militarization of justice
and law enforcement;
-
the disinformation and
propaganda network;
-
the covert support to terrorist
organizations
-
political assassinations,
torture manuals and concentration camps
-
extensive war crimes and the
blatant violation of international law
Notes
1. Transcript of the complete March
2005 speech of Homeland Secretary Michael Chertoff at
http://www.dhs.gov/dhspublic/display?theme=42&content=4392
2. Ibid.
3. Homeland Security Council (HSC), Planning Scenarios, July
2004,
http://www.globalsecurity.org/security/library/report/2004/hsc-planning-scenarios-jul04_exec-sum.pdf
4. Ibid.
5. Ibid.
6. Ibid.
7. Reuven Pedatzur,“The US removes the Nuclear Brakes”, Haaretz,
26 May 2005.
8. Federal Emergency Management Agency (FEMA),
http://www.fema.gov/pdf/areyouready/security.pdf
9. Washington Post, 28 February 2002.
10. See the Continuity in Government website at
http://www.continuityof-government.org/home.html
11. National Security Council, op cit.
12. See
wwwUSAonWatch.org
13. Citizen Corps, Guide for Local Officials, President Bush’s
introductory remarks,
http://www.citizencorps.gov/pdf/council.pdf
14. For full text, see Department of Homeland Security,“Summary
Conclusions From National Exercise”, Office of the Press
Secretary, December 19, 2003,
http://www.dhs.gov/dhspublic/display?content=2693. The first
TOPOFF 1 exercise was conducted on a small scale in May 2000
under the Clinton Administration. It consisted in a simulated
aerosol plague attack in a Denver, Colorado, concert hall. Wall
Street Journal, 2 May 2003.
15. See Department of Homeland Security, TOPOFF 2 Summary
Report, Washington, December 19, 2003 at
http://www.dhs.gov/interweb/assetlibrary/T2_Report_Final_Public.doc
16. Ibid.
17. Department of Homeland Security spokesperson at Press
Conference, April, 2005, complete transcript at
http://www.allamericanpatriots.com/m-news+article+storyid-9058.html
18. Ibid.
19. New York Times, 26 February 2005.
20. Voice of America, 8 April 2005.
21. Department of Homeland Security,
http://www.dhs.gov/dhspublic/inter-app/editorial/editorial_0588.xml
22. Asbury Park Press, New Jersey, 9 April 2005
http://www.app.com/apps/pbcs.dll/article?AID=/20050409/NEWS03/504090432/1007
23. New Jersey Ledger, 9 April 2005.
24. Jim Bronskill,“Plague, explosions and mystery cargo: Terror
drill looks ahead to next 9/11, Cnews (Canoe Network), 8 April
2005.
25. US Federal News, 28 March 2005.
26. Frank Morales,“Homeland Defense” and the Militarization of
America, Centre for Research on Globalization, 15 September
2003,
http://globalresearch.ca/arti-cles/MOR309A.html
27. See American Civil Liberties Union (ACLU), “Congress Moves
to Expand Military Involvement in Law Enforcement”, 14 September
1999,
http://www.aclu.org/NationalSecurity/NationalSecurity.cfm?ID=8683&c=24
28. Ibid.
29. John R. Brinkerhoff, “The Posse Comitatus Act and Homeland
Security”, Homeland Security Journal, February 2002,
http://www.homelandsecurity.org/journal/Articles/brinkerhoffpossecomitatus.htm
John R. Brinkerhoff is former associate director for national
preparedness of the Federal Emergency Management Agency (FEMA).
30. Donald J. Currier, “The Posse Comitatus Act: A Harmless
Relic from the Post-Reconstruction Era or a Legal Impediment to
Transformation?” Army War College Strategic Studies Institute,
Carlisle Barracks, Pa., September 2003.
31. Frank Morales,“Homeland Defense: The Pentagon Declares War
on America”, Centre for Research on Globalization, December
2003,
http://globalresearch.ca/articles/MOR312A.html
32. For further details, see bibliography and analysis of
www.Ratical.org at
http://www.ratical.org/ratville/CAH/USAPA2.html#DSEAanalysis
33. Lynne Wilson,“The Law of Posse Comitatus: Police and
military powers once statutorily divided are swiftly merging”,
Covert Action Quarterly, Fall 2002.
34. National Journal, Government Record, 22 July 2002.
35. Global Security website: “Northern Command”,
http://www.globalsecurity.org/military/agency/dod/northcom.htm
36. David Isenberg, Asian Times, 5 December 2003.
37. National Journal, 1 May 2004.
38. David Isenberg, op cit.
39. Frank Morales, “Homeland Defense and the Militarization of
America”, op cit.
40. Ibid.
41. See The Global Security Website: “Northern Command”,
http://www.globalsecurity.org/military/agency/dod/northcom.htm
42. “Canada-US Relations-Defense Partnership”, Canadian American
Strategic Review (CASR), July 2003,
http://www.sfu.ca/casr/ft-lagasse1.htm
43. Ibid.
44. Text of the Canada US Security Cooperation Agreement,
Canadian Embassy, Washington,
http://www.canadianembassy.org/defence/text-en.asp
45.See Canada, National Defense, The Bi-National Planning Group
www.forces.gc.ca/site/Newsroom/view_news_e.asp?id=1528
46. Department of Homeland Security, “Fact Sheet: TOPOFF 3
Exercising International Preparedness”, Washington, 28 March
2005.
47. See Source Watch, Center for Media Democracy, at
http://www.source-watch.org/index.php?title=Total_Information_Awareness
48. See Washington Post, 11 Nov 2002.
49. See Admiral John Pointdexter’s PowerPoint presentation at
http://www.darpa.mil/darpatech2002/presentations/iao_pdf/slides/poindexteriao.pdf
50 See The Multistate Anti-Terroism In formation eXchange
(MATRIX) website at
http://www.matrix-at.org/
51. Deseret Morning News, 29, 2004.
52. House of Commons, Text of the C-7 Public Safety Act, Ottawa,
2002,
http://www.parl.gc.ca/37/3/parlbus/chambus/house/bills/government/C-7/C-7_3/C-7TOCE.html
, see also Transcripts of the House of Commons,
http://www.parl.gc.ca/common/bills_ls.asp?Parl=37&Ses=3&ls=c7
53. Mark Hand,“‘It’s Time to Get Over It’ John Kerry Tells
Antiwar Movement to Move On”, Press Action, 9 Feb 2004.
Back to Contents
Back to Big Brother Loves You
|