Sunday, September 23, 2018
World News

0 694




Image From

The thrust of yesterday’s article assumed that Putin would send troops into Syria in support of the Assad government. Of course all Moscow committed to was air support.

Air support may buy Assad a bit of time, but it, in and of itself will not and cannot be a game changer. That can only happen with boots on the ground.  And in fact by bombing ISIS positions, (as opposed to saying they are bombing ISIS positions as the US- France and Turkey does), it is only likely to strengthen ISIS all the more.

It will act as a powerful recruitment campaign for new ISIS fighters. And it is likely that the Gulf States will react by increasing funding and Erdogan by increasing material and logistical support.

The only real game changer that can be made in the Levant would be the introduction of Russian troops.

It still holds true, that in the Levant war there can be no winner. All that can come about is a negotiated peace through Balkinization of the region, or for the area to fall into chaos as per Libya.  Russian troops in Syria will encourage a political agreement. Bombing will accomplish next to nothing.

Putin is only beginning his bombing campaign because Assad’s troops are tiring and his military position is eroding. Bombing alone will not change this. So the assumption is that if Moscow is serious about saving Assad, (which will encourage a political solution) it will have to sooner rather than later introduce troops.

Image From

There have been no new news articles on Red Pills because there has been no real news for a very long time. Pretty much everything that has been happening globally is an extension of analysis made in past articles.

For those who want to understand the macro picture around them all they need do is read those articles.

The Iran “nuclear” agreement with the US was a small piece of news. As Red Pill readers know the agreement had little to do with nuclear. It was mostly about creating a comprehensive agreement with Tehran on its position relative to Cold War 2, which Obama had previously declared against Russia and China.

Would Iran move into the Western camp or at least stay non- aligned in this Cold War that we are only in the very early stages of?

From a US standpoint it seems as if ruling elites are divided on Iran. The majority, as represented by all Republican presidential candidates as well as Hillary Clinton on the Democratic side favor a hot war with Iran.

Obama’s peace agreement was intended to make it more difficult for these people to start such a war after he leaves the White House. It is arguably the only truly peaceful thing Obama has done in his more than six years as US president.

Of course getting around the Iran agreement is as simple as Hillary’s statement to the Brookings Institution that she would support the deal UNTIL she determined that Tehran was in violation and then she would attack.

Ostensibly she would learn that Tehran was in “violation” of the agreement by using the same Intel operatives who determined that Saddam had WMD and that Assad used chemical weapons at Ghouta.

Until now Tehran has not become a part of the new Russia- China defense system for a host of reasons, most of them rooted in history.

And until now while both Putin and Khamenei, (Iran’s supreme leader) have helped Assad in Syria, there has been limited coordination as well as assistance.

This is all about to change. Obviously long in the planning, Moscow has finally decided to enter the fray, with Beijing as always now quietly taking its back.

Putin is making the very high-risk move of committing Russian troops to support Assad and the Syrian government. The downside for Russia could mean its soldiers being caught in a political, cultural, tribal and religious swamp in Syria and perhaps Iraq as they once had been in Afghanistan.

But apparently Geo Political strategists in Moscow believed that this gamble would be worth it. For starters it opens the door to Tehran for much closer cooperation, first within the Levant and then in a growing partnership with Russia and China.

This also puts the Hillary Clinton’s and Jeb Bush’s in the US on notice that an unprovoked attack against Iran, (based on Empire“Intel” that it is building a nuclear weapon) is likely to, as Obama loves to say have “consequences”.

Thirdly this throws Russia and China’s hat into the ring to let Washington- Ankara- Riyadh- Tel Aviv- Paris- London etc. understand that they are no longer going to have their way in the MENA, creating terrorist mercenary groups like ISIS and Al Nusra to informally prosecute the West’s regional agendas.

This gives Putin a massive propaganda advantage, which he is well availing himself of. Since none other than the Empire has defined ISIS as the most dastardly of evil “terrorists” as well as the fiction that the “terrorist” group Al Qaeda was behind 9/11, then fighting them in Syria is fighting terrorism by the West’s own standard.

This is the kind of simplistic rhetoric that Westerners particularly Americans understand.

“Are you for us or against us? Are you for terrorism or against it? If you are against it, then why are you not joining us in fighting the “terrorists” (who in reality we all know wink wink you created and support to this day)?”

It is calling the bluff of Obama. Hollande, Cameron, Erdogan. Salman, Netanyahu et al.

The creation of ISIS, Al Qaeda and Washington’s aggression that led to the wars in Afghanistan, Iraq, Syria, Libya and Yemen were not done accidentally either.

Just because Russia- China and Iran are entering the fray in the Levant more directly, is unlikely to change regional policy goals for Washington.

The Americans and their vassals are going to have to appear as if they want peace in the region and that they oppose ISIS and Al Nusra, while of course continuing to support them.

And continuing to support them they will, no matter how many fake “bombing” missions of terrorist positions they will claim to make.

Washington’s response to Putin entering the war in Syria will be “fine let the Russians die there”. And in order to accomplish that the US and its vassals will redouble the arms they give, (through Turkey) to ISIS and Al Nusra, as well as expand the funding for them through their Gulf State bankers.

The challenge for Washington is that they are now going to have to soften their rhetoric against their very own “terrorists” in general and ISIS in particular. They will need to give them a propaganda makeover. Washington has begun to do that with Al Qaeda, (which it actively supports today in Yemen) anyway. Soon all of us who read and understand English and other Western languages will learn that ISIS was never all that bad after all.

Also as Tehran expands into the Levant militarily, (albeit with the help of an awakened bear to the north) sectarian polarization between Sunnis and Sh’ias will increase.

The war will act as a huge recruitment campaign among young Sunnis for ISIS, especially if the funding spigots from Riyadh and Qatar are opened even further.

Meanwhile the back room agreements between Washington and Tehran, that has ruled over Baghdad since the Americans withdrew in numbers from Iraq seems once again ready to collapse. Iraqi Prime Minister Haider al-Abadi has agreed to share intel with Russia on ISIS operations in his country.

That means that Tehran has given Haider a green light to cooperate with Moscow. That is directly against Washington’s regional interests, interests that Haider was supposed to represent as well.

It is a direct slap in Obama’s face.

How far and how deep Russia involves itself in the region remains to be seen. Of Russia’s population of 30 million Muslims, the largest group are Sunnis. For them Moscow is going to be on the wrong side of the Levant wars.

The people of Syria are caught between the devil and the deep blue sea. If Assad were to fall, (as Putin stated) Syria will become a failed state. On the other hand, is that worse than a war that will grow more widespread and ever more sectarian?

And to the degree that Putin lends Russian (Chinese) military support for regional Sh’ias and the West counters by supporting regional Sunnis, this will open a third front in Cold War 2.

The Levant will add to the fronts in the Ukraine (NATO expansion in Eastern Europe) as well as US naval expansion in the China and South China Seas, both of which are being met with a massive expansion of Russian and Chinese defense and counterattack capabilities.

There is a difference in Syria to the other two Cold War fronts which came about due to Washington’s aggression. Up until now the Levant and much of the rest of the region had been Washington’s de facto play ground, for the creation of terrorist assets as well as regional chaos. Except in Chechnya, American policies have only impacted Russia at the margins.

So Putin’s military entrance into the Levant is, (much more than the Crimea) an overtly aggressive move. And Washington and all its vassal states have been rocked back on their heels by it.

While it is possible that Putin won’t go too far militarily, usually actions like this have one or more specific goals. And one has to use whatever assets are necessary, (including time) in order to achieve them. That is why military incursions far from home tend to be like quicksand, easy to enter and hard to get out of. Be assured that Washington will use this principle in counterattacking.

Unlike the far more dangerous regions of Eastern Europe and the Eastern and Southeastern Pacific, there is a relatively easy outline for a Great Power peace accord in the Levant. That is because the goal of Washington in the region has long since been to Balkanize it into tiny hostile states mostly along sectarian lines.

At this point that would suit Russia, China and even Iran just fine. The question is how will this new map look? And that is what this war in the Levant is going to be about.

Any peace accord in the Levant however, is still a long way off. This war, as a new front in Cold War 2 is just beginning.

0 1369

By Ernest Stewart
“If you listen to the hysterics, you would think that the Statue of Liberty will shortly be under water and the polar bears are all drowning, and that we’re dying from pollution. It’s absolutely and utterly untrue.” ~~~ Rand Paul


Perhaps you’ve noticed over this last year, global warming deniers have been spouting phony facts and figures, saying global warming has been on a “hiatus” for the last few years. What that means is the enemy is now grasping at straws to let the polluters off the hook! The deniers are beginning to feel as Tom Lehrer said in “Send The Marines “Like a Christian scientist with appendicitis,” not a good feeling, indeed! These deniers come from two different camps. Those who know better and aren’t really deniers, but are being paid by the polluters to be deniers. The other group is Fox News viewers who are far too stupid to take the time for a little research, and like others to do the thinking for them, so they don’t have to do it for themselves! As Simon and Garfunkel explained in “The Boxer,” “Still a man hears what he wants to hear and disregards the rest!”

In the journal Climate Change journalists, Bala Rajaratnam, Joseph Romano, Michael Tsiang, Noah S. Diffenbaugh make it perfectly clear that the so called hiatus is pure bull sh*t! Here’s a brief synopsis…
The reported “hiatus” in the warming of the global climate system during this century has been the subject of intense scientific and public debate, with implications ranging from scientific understanding of the global climate sensitivity to the rate in which greenhouse gas emissions would need to be curbed in order to meet the United Nations global warming target. A number of scientific hypotheses have been put forward to explain the hiatus, including both physical climate processes and data artifacts. However, despite the intense focus on the hiatus in both the scientific and public arenas, rigorous statistical assessment of the uniqueness of the recent temperature time-series within the context of the long-term record has been limited. We apply a rigorous, comprehensive statistical analysis of global temperature data that goes beyond simple linear models to account for temporal dependence and selection effects. We use this framework to test whether the recent period has demonstrated i) a hiatus in the trend in global temperatures, ii) a temperature trend that is statistically distinct from trends prior to the hiatus period, iii) a “stalling” of the global mean temperature, and iv) a change in the distribution of the year-to-year temperature increases. We find compelling evidence that recent claims of a “hiatus” in global warming lack sound scientific basis. Our analysis reveals that there is no hiatus in the increase in the global mean temperature, no statistically significant difference in trends, no stalling of the global mean temperature, and no change in year-to-year temperature increases.
Yes the “hiatus” is just another version of the Big Lie, something the Rethuglicans have been using for years to get reelected — because the Sheeple will believe anything once it’s drilled into their tiny little heads. As old Joseph Goebbels made clear:
“If you tell a lie big enough and keep repeating it, people will eventually come to believe it.”
He then went on to explain:
“The lie can be maintained only for such time as the State can shield the people from the political, economic and/or military consequences of the lie. It thus becomes vitally important for the State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the State.”
And Joseph should know as he was Hitler’s spokes-weasel and head of propaganda. Like Obama’s spokes-weasel, James “Jay” Carney’s reassurance that Barry’s Trans-Pacific Partnership won’t steal millions of American jobs like NAFTA did. They know it’s a lie; but after a while, the Sheeple start to believe it, and defend it even in the unemployment line when their jobs go to a worker in Vietnam who’ll be happy to work for 10% of what they made. The only difference between the two lies is climate denial will someday get all of us killed!


0 1317



We call whatever follows the Late Modern Era “Post Modern”.

All we can be sure of, however, is that it’ll be based on a Post Mortem.


Arman Matthews


Part I of this article is a necessary introduction to Part 2 and a must read.  Otherwise, Part 2 will not stand alone.  The purpose of these two articles is not to provide a prophesy but rather to lay out the dynamics that drive social arrangements in human society to a breakdown of civil order.  Such an event is the natural way a healthy society self-corrects its social arrangements to regain a more user friendly civil order.  In so doing,  it’s hoped that the reader will gain some fresh analytical tools to aid in deconstructing propaganda from the Defense Department suggesting that the  eventual civil disorder on the horizon, in the U.S., will be caused by “self-radicalized” individuals intent on undermining our so-called Constitutional protections.  This claim serves only to give the Military a moral warrant,  in such a scenario, to assassinate U.S. citizens at will.  The absurdity of such a claim is made obvious by the simple fact that most of the population of the United States are already living in what has been declared a “Constitution Free Zone” by the Department of Homeland Security, and therefore the DHS itself, has become an enemy of the Constitutional protections guaranteed to all citizens of this country.   Presumably, we’re supposed to be too stupid to catch such lapses of logic.

                   *                  *                  *

Over millions of years, our central nervous system evolved an extremely sophisticated control system that, in effect, is a biocomputer. While the central nervous system used information to process energy, the biocomputer uses energy to process information, and instead of processing low entropy matter into energy for its organism; the biocomputer processes sensible data into information for its memory. In effect, nature flipped homeostasis from operating on the entropy equation in physics, to operating in reverse,  the information equation. Nature went high tech.

 computer-brainHomeostasis is the predisposition of an organism  or a cell to regulate its internal conditions, usually by a system of feedback controls so as to stabilize  health and functioning, regardless of the outside changing conditions . The process of homeostasis in the organism animates the system and so we say it is “alive”. By flipping the equation in the biocomputer, “Homeostasis” became the predisposition of a biocomputer to regulate its internal conditions, usually by a system of feedback controls, so as to stabilize cognition, regardless of changing conditions on the outside Analogously, the process by which homeostasis animates the biocomputer, we call “Consciousness”. Consciousness is the function of the biocomputer, as life is the function of the organism. While a properly running organic system is said to be “Healthy”, a properly running biocomputer is said to be “Cognitive”.   If the organism’s health receives an “insult” or is damaged in some way, it feels feedback in the form of pain or discomfort, by which it initiates a process of mending, or healing, itself back to a whole. If the animated biocomputer’s cognition receivers an insult or is torn in some way, it feels feedback in the form of uncertainty or uneasiness, by which it initiates a process of mending, or thinking itself back to a whole. Although “pain” and “uncertainty” are forms of negative feedback, they’re positive sensations, in the sense that we feel them. In other words, as long as we aren’t feeling pain or uncertainty, we assume we’re healthy and cognitive.

 How does the biocomputer compare to the solid-state artificial computer? Just as the body is animated when it’s alive, so the brain is animated when it’s conscious.  Biocomputer intelligence is only operative in an animated biocomputer. It is therefore an attribute of consciousness. An inanimate biocomputer has no intelligence. “Artificial Intelligence” is a myth. What’s called “Intelligence” in inanimate computers is imbedded programming in an operating system. So called “A.I.” only obeys commands, it can’t question the legitimacy of its commands or be given a problem and then question why it’s a problem in the first place and then decide its not a problem and not obey its commands. Biological Intelligence in the consciousness of the animated biocomputer is a general problem solver and can, by intention, direct its own information processing.  Biological Intelligence is autonomous and is capable of reprogramming itself and even installing a new operating system. A.I is an operating system is tethered to following commands. In order to get a biocomputer to operate like an inanimate computer with artificial intelligence, the biocomputer’s body must be enslaved and or its biocomputer must be “brain washed”.  The fact that artificial intelligence in an inanimate computer can usually beat a biological intelligence in an animate biocomputer at chess has nothing to do with intelligence per se or “intuition” (which is another mythical property of Artificial Intelligence). Chess consists of a finite universe of moves. The biological computer is not equipped to hold such a large number of possible moves in short term memory and so must move at some point by intuition. The inanimate computer doesn’t have such a problem because it is not operating consciously. Therefore, storage of such a large finite universe of moves is not a problem, and because of its speed of processing, it appears to be making decisions. In other words, chess for an inanimate computer with Artificial Intelligence is nothing more than an extremely complicated game of tic tac toe. Should both computers be matched in a game involving an infinity of possible moves and variables, the inanimate computers “intuition” would fail. Ultimately, the superiority of an animated biocomputer’s intelligence over an inanimate computer’s intelligence lies in the formers ability to be disobedient.


brain waves


 300px-Ai_integrationWhile an artificial intelligence can be the operating system for several other operating systems, they can be only modules of the central intelligence.  Artificial intelligence is good for the network of a robot.  However, Biological Intelligence requires an operating system that is shared by all biocomputers who occupy a certain space in addition to their own autonomous operating system (which is homeostasis).  That way all autonomous biocomputers can share a social operating system that facilitates interaction, exchange, commerce, and all other common activities unique to animated biocomputers sharing the same physical space. This is a natural necessity since the organisms that support them tend to survive by sharing the same physical space with other organisms of the same species.



In insects such as ants, bees, termites and so on, the social operating system is dominant and the individual operating system is basically programed by the social operating system. In more complex animals, herding animals, such as sheep, cows, horses, etc. still have a dominant social operating system, where as other animals such as lions, elephants, and apes the relation between the individual and the social is more balanced. Lions tend to have prides, with a few males and multiple females, yet male lions without prides will go off on their own. With humans, neither is dominate by nature. Humans can exhibit herd like behavior, or live in relative seclusion. Tribal behavior usual has social operating systems called “Mores”, but built into these systems is punishment for organisms whose biocomputers lead them to break the mores.

Primitive biocomputers had multiple “I”s. This made it easier for the social operating system to dominate the individual biocomputers. Primitive peoples would often hear voices talking to them and identify those voices with gods. As they consolidated their gods into one, so their self-development as biocomputers correspondingly centralized control of the animated biocomputer into one single super consistent self-programmer. Thus conscious directed, or volitional, programming became “I” actions, and social directed programming became “Me” actions. By this time in human development, a common biocomputer dysfunction is to display multiple “I”s and is considered a “sickness” and is called “schizophrenia”, or “multiple personality disorder.”

Once self-control was achieved through consolidation of “I”s and the biocomputer became relatively autonomous, mores weakened. However, the need for social operating systems still existed more than ever. Human behavior had become a mix between “I” driven actions deriving from conscious volition of animated biocomputers, and “Me” driven actions derived from social programming.  No human can escape this dual nature and so human behavior becomes a dialectic between the two. Multiple biocomputers that share a common space must have a common operating system to solve common problems. The common operating system not only facilitates mutual interactions, transactions, commerce, and norms but also limits the inferences that can be drawn, the problems that can be solved and even the statements that can be made about such problems that make sense.   Insofar as humans share a common operating system, they must play by the rules or the system won’t work.

Since biocomputers achieved autonomy, their common history has consisted of changes in social operating systems over the ages. We tend to map our history like geological eras, or archeological eras, where in find certain commonalities between shared operating systems over centuries, with certain variations downloaded progressively over the years, until there is a major shift, which we sometimes called a “Paradigm Shift”, in which a completely fresh social operating system takes hold and a new era begins.  For instance, our own era can be broken down into early Modern times, or “Modernity 1.0”, Middle Modern Times or “Modernity 2.0”, and late Modern times, or “Modernity 3.0. This has era of the Modern social operating system has about run its course after a period of around 600 years.

In Part 2 we will attempt to understand the dynamic that drives the continual change of social operating systems over the millennia and why it is happening now.




To be continued









2 1729

Arman Matthews



Jade Helm is a part of a larger military scheme that was included in the 2014 NDAA Budget. (The NDAA Budget is the National Defense Authorization Act that funds the US military). This operation covering Jade Helm is the largest one for involving military operations. Sit rep Phase 0 is about identifying potential threats.  Its funding is found in the following part of the budget:

Section 1074—Pilot Program for the Human Terrain System. This section would require the Secretary of the Army to conduct. a pilot program to utilize Human Terrain System assets in the U.S. Pacific Command area of responsibility to support Phase 0 shaping operations and to support the theater security cooperation plans of the geographic combatant commander.  

Phase 0 gets disproportionately the most funding.  In combat operations there’s usually 5 phases of combat. However, Phase 0 operations is relatively new.   The NDAA 2014 Budget provides for increasing the budget for phase 0 operation.   Here are some of the corporations participating:


List of Corbs good Phase 0 operation involves employing infiltration techniques to identify who’ll be a problem before fighting even begins. This is why special ops dressed as civilians will be moving around in local populations. The cover story, Mark Lastoria, Army Special Operation Command spokesman gave the press and public meetings is that some Special Ops will be testing to see if they’ll be identified. The Psy-Op twist is that it is they who’ll be doing the identifying. They’ll be looking for individuals and groups who they assess as possible “non-state actors”.  By “non-state actors” the Military includes people who support social unrest but are not participating in any disturbance. This falls under their definition of “Terrorist”. It was on these grounds Anwar al-Awlaki an American citizen noncombatant was targeted and murdered by a U.S. Drone. Another U.S. drone also murdered his son two weeks later

Identifying “terrorists” for later elimination is a primary objective of the opening “tickling phase” of a war. “Tickling” is a CIA concept that consists of using military force to excite the enemy and prompt him to respond.  This was the rational behind the CIA’s demented tactic of using predator missiles to murder en mass innocent Pakistani citizens and therefore provoke retaliation by their relatives.  By extracting these so-called “Terrorists” the Army thinks they’re severely limiting organized resistance.  In so far as appropriations that included JADE HELM were approved in the NDAA budget at a Phase 0  sit rep, this is what JADE Helm is all about. It also bears an insidious Psy-ops twist:  First, by extracting these trumped up “terrorist”, they hope to generate mutual distrust within hostile organizations.  Second, people who show up to protest will be added to the extraction list. As we’ve mentioned Lastoria story is that that the “exercise” is for overseas, but zero phase requires the operation occur at a specific place and due to the nature of Net Centric warfare the place must be specific to where the ops takes place? So we’re talking about U.S. soil.

(Phase 1) – the run-up to hostilities – Deter. The intent of this phase is to deter
undesirable adversary action by demonstrating the capabilities and resolve of the joint force. It includes activities to prepare forces and set conditions for deployment and employment of forces in the event that deterrence is not successful.

(Phase 2) – the onset of military action – Seize Initiative. Joint Force Capabilities seek to seize the initiative through the application of appropriate JFC’s

(Phase 3) – major combat – Dominate. The dominate phase focuses on breaking the enemy’s will for organized resistance or, in non combat situations, control of the operational environment.

(Phase 4) – “post-conflict” stabilization – Stabilize. The stabilize phase is required when there is no fully functional, legitimate civil governing authority present. The joint force may be required to perform limited local governance, integrating the efforts of other supporting/ contributing multinational, IGO, NGO, or USG department and agency participants until legitimate local entities are functioning.

(Phase 5) – the shift to civilian control – Enable Civil Authority. This phase is
predominantly characterized by joint force support to legitimate civil governance in theater. The goal is for the joint force to enable the viability of the civil authority and its provision of essential services to the largest number of people in the region.

Within the last three years or so, the military has been operating/training on civilian soil.  A lot of it has involved flying helicopter gun ships into large cities and firing blanks with machine guns.  It’s reported that there’s a quick turnover rate of participants engaged in these operations. That means the military has already trained a lot of people. It follows that there must be something they’re planning on in the not too distant future.

Now what would worry the government about civil unrest to this degree?  Why would the Federal Government have to be breaking into its own citizens homes and taking mom or dad away in the middle of the night like the CIA Death Squads did in Iran, after the U.S. installed a puppet Shah?   What could possibly be a legitimate reason for such extremes?  There’s no Constitutionally legitimate reason.  One can imagine a scenario in which the monetary system collapses and everyone’s money becomes worthless. There would be people very upset with the system and the danger of civil disturbances and instability would spike.   This is possible, but it implies a foreknowledge on the part of the Federal government beyond our keen to speculate.  However, in 2008 after the economic meltdown, the U.S. government made no secret of its intent to plant armed troops on American soil and the Pentagon announced that 20,000 uniformed troops would be stationed inside the U.S. by 2011, to help bolster domestic security and assist state and local authorities in responding to terrorist attacks.  At the time, Paul McHale, then-assistant defense secretary for homeland defense, said that this sevenfold increase in domestic troop strength marked a “fundamental change in military culture” that “would have been extraordinary to the point of unbelievable” prior to the events of September 11, 2001.  That same year the U.S. Army War College Strategic Studies Institute warned the U.S. government that it was being too complacent to domestic threats and encouraged the Department of Defense to play a more active role in homeland security.  “Widespread civil violence inside the United States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and human security,”  Lieutenant Colonel Nathan Freir wrote and went on to say that the “DOD might be forced by circumstances to put its broad resources at the disposal of civil authorities to contain and reverse violent threats to domestic tranquility.  Under the most extreme circumstances, this might include use of military force against hostile groups inside the United States.”

In an article in the New York Times, titled “US Defense Department organizing covert operations against the general public”, November 19th, 2014, Thomas Gaist reported that the Department of Defense is developing domestic espionage and covert operations targeting “the general public” in coordination with the intelligence establishment and police agencies. Gaist’s analysis showed that the “military and its investigative agencies have almost as many undercover agents working inside the United States as the FBI…While most of them are involved in internal policing of service members and defense contractors, a growing number are focused in part, on part of joint federal task forces that include military intelligence and law enforcement specialist.”

Phase 0 is where the fabled “Red List” comes into play with the information provided from JADE, the artificial intelligence, operating banks of the DOD’s super quantum computers. It will provide the whereabouts of each individual defined as a non-state actor/”terrorist”, with a little flag on its holographic projection of the battle space.  The victims will, of course, be identified as “militants” in the corporate media. The story from the military will be that the victims demonstrated willingness to take-up arms and resist the authority of the Federal Government.  For now, these future victims are still just simple folk facing a low-level invasion, and haven’t yet made a conscious decision to resist.  This is how the war against terrorism works. Probably the best thing to do, for any community, having to put up with this two month imposition, is simply see nothing, say nothing, write nothing, and just go about living normal lives.  Eventually, the boys will pick up their toys and go home claiming to have had a nice exercise.

The function of “Terrorism” for the Late Modern Imperial State is analogous to the function of the “Devil” for the Papacy in the Middle Ages.  A “non-state actor” has an operational role akin to “Heretic” with the Catholic Church. “Heresy” comes from the Latin meaning “To chose”.  Just as “Satan” empowered the empire of the Roman Church, so “Terrorism” empowers the empire of the United States Inc.  One need not do devilish things to be in the employ of Satan, it’s only necessary to speak heretical things.  In a similar manner, for the America Inc. empire, whoever says things that allegedly causes social instability, is a “terrorist.”  Civilians who resist invasion, as well, are classified as “terrorists”, just as those who resisted Papal troops were enemies of God.  It’s the nature of pys-war (psychological warfare) that each small operation builds upon the previous one like an inverted pyramid, so all the building blocks rest upon one original faulty foundation stone.  In the case of the global war on terror, everything rests upon the U.S. government’s use of the vague, ambiguous and ill-defined word “terrorism”, just as everything rested on the Papacy’s use of the vague, ambiguous and ill defined word “Devil.”

In 2008 the DOD also initiated the Minerva Initiative. It partnered with universities in a variety of projects “to improve DOD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of strategic importance in the world to the US.”  While the idea of the DOD being interested in “culture” may sound something like a joke, there was big money in it for the universities.   So, Cornell University, for instance, led a study, managed by the US Air Force Office of Scientific Research.  Its aim was to develop a model “of the dynamics of social movement mobilization and contagions.” The Pentagon and Cornell hoped they would be able to determine “the critical mass (tipping point)” of social contagions by studying “digital traces” for instance “the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey. “The study and program looks at Twitter and Face book posts and conversations in order “to identify individuals mobilized in a social contagion and when they become mobilized.” Note here the use of the word “contagions”. This word suggests an infection or virus. By talking about social movements as if they’re diseases, the DOD is putting a spin on the conclusion in advance of the research. This tweaking of the conclusion in advance of the research could be done in like manner had the Papacy asked a university to help it develop a model of the dynamics of social movements and the spread of evil. The idea is that any social movement challenging Imperial authority is a “disease” is no different than claiming its the work of the devil. “Terrorism” like “Evil” can be contagious and spread, so it must be stamped out before an epidemic occurs.   The DOD’s Minerva Initiative funded another project in 2012 to determine “Who Does Not Become a Terrorist, and Why?” In this study, the DOD conflates peaceful activists with “supporters of political violence”. We read the following: “In every context we find many individuals who share the demographic, family, cultural, and/or socioeconomic background of those who decide to engage in terrorism, and yet refrained themselves from taking up armed militancy, even though they were sympathetic to the end goals of armed groups. The field of terrorism studies has not, until recently, attempted to look at this control group. This project is not about terrorists, but about supporters of political violence.”  Okay, what’s the difference between this and saying that people who support the works of the devil are committing sin just as much as the ones who actually do the devils work? Once again, the DOD’s pseudo scientific objectivity can’t hide the fact that its manner of framing the problem insures the desired spin in the results of its “research”.

The DOD’s choice of words clearly reflects a military in denial of the imperial role it presumes. Hence, it feigns objectivity by carefully selecting a language that its spinners trust gives the appearance of “science.”   However, the imperial aim, for which the DOD serves as enforcer, has an authoritarian, monocultural agenda.  This absurd paradox is underscored by its Marvel Comics mottoes like “Masters of the Human Domain”.  Frank Lloyd Wright once remarked that some people are schooled but not educated and other people are educated but not schooled.  Of course, some people are both, but once one reads the DOD literature regarding how Special Ops are supposed to “Master the Human Domain”, it’s abundantly clear that none of their commanders are educated and few are schooled beyond what one might pick up at San Quentin after a few years.  Thus the DOD boasts that its Special Ops will display their cultural sensitivity by approaching healthy social dialog by intellectuals as a “Contest of wills” between it and the other participants.  In any such contest they crow, they’ll surely dominate by being the first to murder all the other contestants.  It doesn’t matter how many stars and bars, medals and fringe they wear on their neatly pressed brown apparel, anyone who sees the process of democracy as a war to be won by any means necessary, bears the low grade mentality of a thug.  Of course these “Masters of the human domain” have an excuse for murdering the present participants in an ongoing social dialog that students of humanity have carried on for thousands of years: “They’ll be extracted”, they say, “because they’re provoking ‘social instability.’”  It’s a grave misfortune that these dimwits have never realized that in civilized society’s ongoing democratic dialog, it’s the cause of social instability that’s always at issue!  The joke is, no dialog over the causes of social instability is ever resolved by assassinating the participants in the dialog.  Like tickling, it only insures the wholesale slaughter of more and more innocent people, the very people from which the Military itself has sprung.   Certainly the only real terrorist in the whole human domain thing is the Department of Defense; otherwise the word “terrorism” has absolutely no meaning.  Instead of doing the appropriate job of a military in a free democracy, or a democratic republic, i.e. support the Constitution while the dialog of a free people proceeds to weed out the causes of their nations social instability.  On the contrary, the U.S. Department of Defense assumes the preposterous posture of enforcer of social instability, on behalf of its corporate criminal sponsors, by eliminating the dialog, while all the while pretending its doing a noble thing.  All things being equal, the DOD alone will some day stand atop the rubble and ruins of what once was a pretty cool planet.



Part 1  JADE HELM The Empires New Clothes



                                                                          Twisted Facts

Arman Matthews

The apologists for the Department of Defense claim that Jade Helm 15 is an extension of what the military has been doing for a long time.  This is, for the most part, true.  However, it differs in that it covers close to 20% of the country and lasts two months, and it focuses on mostly rural and small town populations.  We established, in Part 1, that the army’s explanations regarding what Jade Helm is all about are lies, and from this we inferred that the true nature of the operation must be a secret. This has now been reinforced by the news, from the Washington Post, that “Embedded reporters won’t be permitted at any point during the exercise.”  This is very peculiar since the same reporters have accompanied Special Forces in overseas operations.  So the question arises, if this is a routine exercise, why is its nature of the operation secret?

One could argue that prepping for Net centric warfare in the United States is reason enough to keep the actual operation secret.  If Net centric warfare conducted by special forces is being practiced and programmed into an artificial intelligence driven by quantum computers, we can conclude that this would only be done because the military sees a real possibility for social unrest and even rebellion on the horizon.  Since, standard practice for a military invasion is to first scope out the terrain and for JADE to be at the helm, it must be able to project that battle space, a major part of this exercise would be to upload enormous amounts of data into JADE”S memory.  This type of operation would certainly be kept a secret.  While this could be glossed over as speclation, there’s another detail missing from the military’s narrative that is not speculation.

spokes man miltIn an effort to quell the uproar caused by the Army’s blundering  JADE Helm public relations fiasco,  the Military has published a JADE Helm “Fact Sheet”.  Anyone who’s done a modicum of research on the matter would be apt to rename  this “Fact Sheet” the “Twisted Fact Sheet.”  While we’ve already exposed many of these “twisted facts” in our previous two articles, there’s one twisted fact that needs to be addressed.  The Military even thought it was such an important point that they mentioned it twice in their list of twelve facts:  “We must remember that our military has conducted unconventional warfare exercises like JADE HELM for over 40 years.”  The reference to “ over 40 years”, however, reveals more unmentioned information buried within this otherwise innocuous claim that JADE HELM is just the same old same old.

The unmentioned information regarding the 40 years of exercises like Jade Helm is that they were all based on a master plan devloped between 1968 and 1972. It is called the Department of Defense Civil Disturbance Plan 55-2. It’s code-name is “Operation Garden Plot”.   1974 was exactly 40 years ago and “over 40 years” takes us to the early ’70s.  As a reaction to the anti-establishment urban rebellions of the ‘60s and ‘70s, regarding civil rights and the Viet Nam war, the Pentagon ordered a directorate of military planers to draw up a series of blueprints addressing instances of civil disturbance that the military might have to put down. The United States Air Force then drew up an implementation plan for Civil Disturbance Plan 55-2.  It goes into detail over every aspect of military “suppression” of “rebellion against the authority of the United States”, including who pays, who bills and how to secure “loans” to cover the costs “attributable to GARDEN PLOT.”  Ominously, under “Resources Employed Without Presidential Directive”, the document states that when the “immediate employment of military resources is required in cases of sudden and unexpected civil disturbances or other emergencies endangering life or federal property, or disrupting the normal processes of Government, expenses incurred will be financed as a mission responsibility of the DOD component employing the military resources.”  In other words, in certain situations the military can take actionwithout a Presidential directive.

According to the plan, the military will attempt “to suppress rebellion whenever the President considers that unlawful obstructions, combinations, or assemblages, or rebellion against the authority of the United States, makes it impractical to enforce the laws of the United States in any state or territory by the ordinary course of judicial proceedings.”  A caveat is thrown in here to justify military intervention. In such a case, the military would be intervening to protect the constitutional guarantees of the people.  Thus, by a linguistic slight of hand, a military intervention in a civilian rebellion regarding the abrogation of their Constitutional rights, is justified because it’s being done to protect their constitutional rights!

The United States Army Training and Doctrine Command (TRADOC), “provides training programs and doctrine for civil disturbance operations to military services.”  The US Army Force Command (FORSCOM), “organizes, trains, and maintains in readiness Army forces for civil disturbance operations”, while the Director of Military Support (DOMS), “conducts, on a no-notice basis, exercises which direct headquarters of uniformed services, appropriate CONUS command, and other DOD components, having GARDEN PLOT responsibilities to assume a simulated increased preparedness for specified forces.” In addition, the DOMS, “maintains an around-the-clock civil disturbance command center to monitor incipient and on-going disturbances.”

This “operational plan” has grown over the years, as the interests of corporate sponsored social control have broadened. The U.S. military now trains police as well as troops to suppress the right of free people to democratic opposition. Garden Plot has been updated three times. Its last up-date was in 1991. The plan was activated during the Los Angeles “riots” of 1992, and because of the obvious convergence of the military and the police, it was probably activated during the “Battle for Seattle” and the “Occupy Wall Street” movement.

Training, under [U.S. Army Field Manual] FM 19-15/Garden Plot, must be “continuous” and “must develop personnel who are able to perform distasteful and dangerous duties with discipline and objectivity.”  Some of the simulation exercises participants are trained to preform with “discipline and objectivity” are the suspension of civil liberties, the rounding up of dissidents and their incarceration in detention camps for the duration of an (unspecified) “crisis.”  Under the heading “civil disturbance planning”,  soldiers and police are trained to perform these unpleasant and dangerous duties, as well as how to use weaponry and tactics that could be dangerous to the local citizenry.: “…every member of the control force must be trained to use his weapon and special equipment (including) riot batons, riot control agent dispersers and CS grenades, grenade launchers, shotguns, sniper rifles, cameras, portable videotape recorders, portable public address systems, night illumination devices, fire fighting apparatus, grappling hooks, ladders, ropes, bulldozers, Army aircraft, armored personnel carriers, and roadblock and barricade materials.” [1] These exercises have been continuous for over 40 years and have incorporated local police in their training.   This aspect of the Jade Helm15 operation, as well as previous similar operations, usually preformed under the guise of “urban warfare training”, and is now part of their hidden operation package not mentioned in the JADE HELM Fact Sheet.  It further explains why reporters already embedded with Special Ops troops are not allowed to witness these “exercises.”

Of course, there’s a psy-ops angle to this as well.  If each time these exercises are preformed and claims resonate across the Internet and news media that this is a precursor to Martial Law, and then nothing happens, the public is expected to become numbed into believing that what’s going on is no more than what the Military tells them is going on.  Further more, all the while the public is becomming accustomed to soldiers and military equipment in their communities. This is the boiling frog syndrome.  In another light, watching these exercises over time is like playing the old shell game. The eye tires of watching the switching movements of the shells back and forth, back and forth until finally when the movement stops, one is forced to guess which shell holds the “prize.”.

Like a virus, “Garden Plot” Duplicated, divided and mutated over the years.  In fact, its become a metaphor for the anti-democratic, mean-spirited authoritarianism that characterizes the Department of Defense.  Under the rubric of “Internal Security” its Directives, Doctrines and training manuals harbor one common goal and that is to silence and suppress the rights of a free people. And when those people see a need to refresh the operating system under which they live, because it’s no longer working for them, the military will be their to combat the will of the people.  Is Jade Helm a precursor to Martial Law? Yes, the problem is when will it happen?  The time, however, seems to be drawing near and any of a number of things could trigger a need in this country to reset and download an improved operating system.

Garden Plot reveals, to all who care to care, the true disposition of the military mind and those officers who assume the responsiblity for molding the attitudes of the young men and women who enlisted believing they had done something good for their country.   Soon they’ll be trained to embrace the idea that within the civilian body politic, from which they sprung, lurks an enemy, an enemy that they may one day be ordered to fight in the name of obedience to authority.  These new recruits  son must learn to live with the knowledge that the people, of their nation, who paid billions of dollars in protection money to the institution which they have sworn loyalty, may someday be attacked by their protectors in the service of a cabal of corporate suits united only by their common unfettered greed and gluttony.

In Part 4, we’ll see how Garden Plot evolved in the Administration of the Federal Government and the institutions that determine public policy.



To Be Continued

[1] .” (Frank Morales, “U.S. Military Civil Disturbance Planning: The War at Home,” in Police State America, ed. Tom Burghardt, ATS/Solidarity, Toronto, Montreal, 2002, p. 73)


1 1757
Photo From

Politicians and betrayals are synonyms. There are however little betrayals and great betrayals. The greatest betrayal of a major modern politician had been that of Tony Blair, who single handedly destroyed the once grand Labor Party of the UK. Working people in the UK rightfully no longer believe that Labor represents them. Today they have no voice.

But Blair’s betrayal of the British people is absolutely nothing compared to what Alexis Tsipras has just done. Not only is it a dagger in the heart to the Greek people, but to truly progressive people throughout Europe, (like those who support Podemos in Spain) and even to anti EU politicians coming from the right like Marine Le Pen and Nigel Farage.

Working people reeling under the pain and misery of the neo fascist banker takeover of Europe, (called the EU and the Euro Zone) now have to ask whether any politician who claims to represent them is anything other than a Tsipras; a liar and a fraud.

After the first February negotiations between newly elected Tsipras and the Eurozone, in which he seemed to be backing off his campaign promises to the Greek people of no more austerity, many believed that he was a traitor and a fake.

But these were minor negotiations and Tsipras, as well as his political party Syriza were new to power. In order to call the Euro Zones bluff that Greece would be cut off from any new funding and its economy would collapse, Tsipras had to put a plan in place to minimize any damage the Euro Zone could do. In February he hadn’t had the time to have done that.

The great negotiations were going to happen in June when Greece would owe more money to its creditors than it could pay. In order to blunt the Euro Zone’s threat of a complete cutoff of funding, Tsipras had to do two things. One was to create the capacity for a seamless transition of Greece’s monetary system from Euros to a New Drachma, that would be used for all business within the country.

Secondly Tsipras had to insure the convertibility of the new currency into Euros or dollars, as the EU and the Anglo 5 countries would do everything in their power to make it completely worthless outside of Greece. In order to do that Tsipras needed a country rich enough to backstop the New Drachma with dollars and euros. And only China could do that, although Beijing would probably want to work through the new BRICS bank.

It was in both the interests of Greece and China as well as Russia for this to happen. Here and here is why.

Once the New Drachma would be convertible, then Greek importers could buy what they need for the countries tourist, shipping, olive oil and other businesses and Greek Inc. would be back in business again. Greece would then be able to offer sun and sand vacation packages as well as olive oil at half the price Italy and Spain, (both burdened with the Euro) could have charged. Euros would have flooded back into Greece, the New Drachma would organically strengthen and the economy would normalize.

During the February to June period, while in negotiations with his Euro creditors, it would have been prudent for Tsipras to have laid the groundwork for all of this as quietly as possible, with negotiations with Beijing and Moscow being held behind closed doors.

So it would have been unlikely that anyone would have known whether Tsipras had been doing his homework or not . But the final test would come during the June negotiations which have now dragged on into July.

The mega Bankers have long since known that Greece was bankrupt and that their Greek debt portfolio was going to go up in smoke. So since 2010 they have offloaded that bad debt on synthetic institutions like the ECB, the IMF etc that are in the end only backed by the taxes of ordinary working Europeans, (and others). The bankers did this through their usual corrupt politicians who are supposed to represent the people’s of Northern and Central Europe, but in fact represent the banks.

By 2015 the bankers not only did not care whether Greece foreclosed on their debts, they actually wanted them to. Their voice among the Euro Zone “negotiators” was and is Wolfgang Schaeuble the German Finance Minister. He made it abundantly clear that he wanted Greece out of the Eurozone altogether and for the country to fall into ruin, with maximum suffering falling on its people.

The reason for that is that the Greek people were at the cutting edge and were the leading voices of a debtors rebellion that is presently going on throughout debt ridden Europe, mostly importantly in Spain and Italy. And those countries’ debts are still mostly held by the banks. If a populist political movement in those far larger countries were to take power and renounce their debts, the whole of Europe’s weak banking system would almost certainly collapse like a house of cards.

In 2010 in order to avoid this, the bankers first needed to surgically remove Greece from Europe, with minimum impact to themselves, (the offloading of Greek debt from their portfolios). Afterwards they would need to make an example out of the Greeks to insure that no one else would dare to risk their wrath.

For Greece to successfully foreclose on its debts, make a seamless transition into the New Drachma, be able to get the dollar based liquidity necessary so that the country would be able to stabilize its economy and thrive again, would have been a knife in the heart of the bankers and their proxy Euro politicians and bureaucrats.

That is because after Greece would renounce its debts and ordinary European working class people find out that they are left holding the bag, even the dumbest would figure out that this all happened because their politicians bought the toxic loan portfolio of Greece from the bankers and gave it to their national treasuries as an “asset”. Established political parties would be badly damaged or even fall, as Labor has done in the UK.

And a happy ending in Greece would embolden the debtor countries of Europe to rebel as well, which would finish Europe’s already weak banking system.

But what if Tsipras was a phony from day one, who only used his anti banker, anti austerity rhetoric to get elected and take power, but never had any intention of doing anything other than giving the Euro Zone group everything they wanted in the first place? In such a narrative Tsipras would have made no preparation for a transition into a New Drachma, nor would he have sought out China’s help in making it convertible.

In other words Tsipras would have built no safety net under the high wire act of these negotiations, so that if the Euro Zone would pull the plug on further Euro credits it would have meant total disaster for the Greek people. That would give him the excuse to capitulate to whatever demands they would make.

This would have been a mega cynics worst case scenario. But that it seems is exactly what has happened.

Tispris’s betrayal of the Greek people may be the single worst betrayal of any people from a major country, for at least the last 50 years. And it has widespread global implications that go well beyond economics to Geo Politics and Cold War 2, especially against Russia.

To Be Continued.

By Arman Matthews

The Jade Helm Logo also includes the phrase “Master of the human domain.” What does this mean?  In November 2012, General Odierno, a member of the Council on Foreign Relations, announced plans to create the Strategic Landpower Task Force. The first major policy offering from the task force was a white paper titled “Strategic Landpower: Winning the Clash of Wills”. It emphasized the “human domain” as the key determining factor in future conflicts. “In a word, the success of future strategic initiatives and the ability of the U.S. to shape a peaceful and prosperous global environment will rest more and more on our ability to understand, influence, or exercise control within the ‘human domain.”   First of all, isn’t “shape a … environment” simply a euphemism for “control the world”? To rephrase what this white paper is saying is, “For the U.S. to control the world, it must be able to understand, influence and control the human domain.”   Well duh! This is no more than a simple-minded tautology: “For the U.S. to control the world it must control the human domain.”   What is so remarkable about this statement, besides the fact that its conclusion is no different than what any third grader would consider obvious, is the blatant admission that the U.S. is bent on controlling the world.

The white paper, defined the “human domain” as the “physical, cultural and social environments” that exist within a conflict. It was adopted as a “doctrinal term” signifying the ground forces own unique perspective and ability to shape the human domain in future conflicts.  Now it is not only their training as Special Ops that is supposed to make them “Master of the human domain”, but the type of warfare they will be engaged in. This type of warfare is called “Network centric warfare”. In order to fully comprehend what Jade Helm is all about, we’ll have to understand the history building up to the Jade Helm 15 exercises.

*          *          *

The idea of a “revolution in military affairs”, or “Transformation”, based on new information technology was kicked around in military circles even before the ‘90s. In the new Century, “Military Transformation” found its way into George W. Bush’s Presidential campaign rhetoric in 2000. The Bush’s belonged to the Neocon “think” tank, the Project for a New American Century and it had taken up “Transformation” as a major theme. Many PNAC members would soon hold the highest level positions in theGeorge W. Bush administration. Two months before George Bush took office PNAC released a report entitled ‘Rebuilding America’s Defenses‘. According to the PNAC report, “The American peace has proven itself peaceful, stable, and durable. Yet no moment in international politics can be frozen in time…” To preserve this “Americana peace” through the 21st century, it called for (1) a massive increase in defense spending and (2) the fighting of several major theater wars in order to establish American dominance. The first was achieved in Bush’s first budget plan. It called for the exact dollar amount to be spent on defense that was requested by PNAC in 2000. Donald Rumsfeld, a member of the PNAC, had become Secretary of Defense and a vocal advocate of “Transformation”. He argued that the development and deployment of a truly modern, effective command, control, communication and intelligence system was fundamental to the transformation of U.S. military forces. Rumsfeld also believed that Transformation meant fewer troops needed to fight wars. The latter stirred up bitter disagreement within the military and so Transformation remained only a theory. The PNAC report also observed, “the process of transformation is likely to be a long one, absent some catastrophic and catalyzing event –like a new Pearl Harbor.”  Like clockwork, the Godzilla of False Flags, 9-11 happened less than a year after George Bush took office and once Bush stupidly even compared the event to Pearl Harbor.

After 9-11, the “Transformation” Rumsfeld advocated was suddenly taken seriously by the Military. Another serendipitous event that has been woven into the 9-11 myth came from Former astronaut Ron Sega, who oversaw the Pentagon’s more than $60 billion annual budget for research, development and testing. Sega reports that he arrived for work at the Pentagon, on September 12th, with a skeleton crew. “We, uh, came together and asked the question, ‘What can we do?’”, he reported. “What can the research and engineering community within the Department of Defense do to support what we were about to engage in?” The skeleton crew of scientists, analysts, and engineers became the “Combating Terrorism Technology Task Force”. Subsequently, members of the F.B.I., C.I.A., and other defense and intelligence agencies met in a secure conference room, deep within the Pentagon, thinking, tinkering, and devising solutions. In just three days, the story goes, they produced a list of 150 technologies that could be fast-tracked in the war against terror. No sooner had they miraculously produced this list then phones started ringing throughout the military industry …requests for, “How fast? How many? What would it take to get there?” Suddenly the GDP started reeving up…Raytheon, Textron Inc., Lockheed-Martin, and countless other corporations started gearing R&D, and production, towards the new military demands. The orders flooding in were for precision weapons, lots of them. Throughout his tenure, Rumsfeld never missed an opportunity to remind the American people of the 9/11 attacks and threats against Americans. He even noted in a 2006 memo to “make the American people realize they are surrounded in the world by violent extremists.”

As Secretary of Defense, Rumsfeld was deliberate in crafting the public message from the Department of Defense. People will “rally” to the word “sacrifice”, Rumsfeld noted after a meeting. “They are looking for leadership. Sacrifice = Victory.” Rumsfeld also ordered specific public Pentagon attacks on and responses to U.S. newspaper columns that reported the negative aspects of the war.

The global war on terrorism, the operation in Afghanistan, later on, the operation in Iraq, all served as a great catalyst for “Transformation” to sharply accelerate. Just as Mussolini used a war with Abyssinia (now Ethiopia)  to upgrade his military machine, so the U.S. military machine used Iraq and Afghanistan as real time war laboratories to test new high tech, information dominant technology and transform the military into a new fighting machine.

The war in Afghanistan enabled the military to test its ability to bring special ops together very quickly in a Theater of operations and it provided an opportunity to blend old and new technologies together.   For instance, in the Persian Gulf War, about seven percent of the munitions were precision guided, and none were all-weather. They required a laser beam shone on the target, so things like smoke would interfere with the beam. By Afghanistan, the military had satellite-guided munitions that could pierce through clouds or oil field fires or anything else, and the military had a lot more precision weapons in its arsenal.

The advocates of Transformation pointed to the war in Afghanistan as laboratory proof of their ideas.   Rumsfeld had been waiting for an opportunity to demonstrate how transformational concepts involved more than just the ability to develop new high tech weapons, but proof, as well, that a relatively small number of American forces could be employed on the ground and rapidly defeat an enemy and that military’s had the ability to fight a joint campaign  featuring co-operation rather than competition between the services.

Conducting joint campaigns required a new concept of acquiring and sharing information, a concept called network-centric warfare. In theory, everyone would be electronically connected from the top down. Information once known only to generals and admirals would be shared all the way to the frontlines. Network-centric warfare’s central nervous system is the military’s battlefield internet.  Jade ( acronym for “Joint Assistant For Development and Execution) is an Artificial Intelligence software used for a Network Centric Warfare System adapted to quantum computer technology. Raytheon developed it in conjunction with DARPA. Jade 1, developed around 2000, produces “Battle space” simulations. These simulations are in the form of holograms and virtual reality. Net centric warfare “Battle Space” accouterments for sale to the DOD is a booming business.   Jade “has the ability to use vast amounts of data being collected from the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels, or whatever labels that can be flagged as targets.

Holographic battle space   Jade II is a battle space system that is allegedly “cognitive” and “intuitive”. This is just what the Department of Defense desires, intelligence that’s not intelligent: It can follow orders and examine prior executed battle plans and solve problems like devising “new and better’ strategies to increase the ‘kill chain’”, but it can’t evaluate the orders and their source or ask “why are these problems, problems in the first place?” Jade II also has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations into the system.” In as much as, DARPA has developed land drones with kill capacity and is working on soldier robots, its only a matter of time before they too will be hooked up with JADE.


Virtual reality battlespace

The enormous cost of the Iraq and Afghanistan wars forced the DOD to scale back while still being able to maintain its planetary military superiority. Between 2008 and 2010 the DOD designed a high-capacity strategic communication control system. A Network Centric Warfare Control system was first installed in Afghanistan in 2008. In 2010, the Department of Defense announced that its goal, or template, for 2020 would be to obtain “Full spectrum dominance.” (“Joint vision for 2020”). “Full spectrum dominance” means dominance in n dimensions of the battle space (Land, sea, air, electromagnetic, and cyber).


Gig_ov1To achieve Transformational goal would require heavy investment and development of new military capabilities.  The four capabilities needing development were: dominate maneuverability, precision engagement, focused logistics, and full-dimensional protection. The DODs first move to enhance military capabilities was to condense and upgrade the Global information grid with a Global Information Grid for Network Centric Warfare environments. The grid was connected together and to the White House by fiber optic cable. It provided an integrated, seamless, network-centric framework for commanding air, sea and land warfare. At the helm of this network centric warfare system are banks of super computers with the JADE 1 & 2 artificial intelligence operating systems, in place, to address battlespace areas in complete packages. Instead, of taking weeks to package a plan involving joint maneuvers and stratagems within a battlespace, or change tactical battle plans, JADE could do it in an hour. Special Ops, instead of the regular army, will be the primary players in these operation packages.

To Be Continued

By Arman Matthews


What’s “Jade Helm 15” all about? The official explanation is:

Jade Helm 15 will be carried out in 7 states and will run from July 15 to September 15, 2015. Personnel participating in Jade Helm or units participating in Jade Helm will come from U.S. Army Special Forces Command at Fort Bragg. They’ll be on the ground for about eight weeks, and we’ll have some Navy SEALs participating for about two weeks. United States Air Force Special Operations Command will take part in it at varying points in time throughout the eight weeks. And there will be a small amount of U.S. Marine Force Special Operations Command participating for about two weeks. And then for about five days, 82nd Airborne Division will have a battalion participating with about 600 soldiers, 600 paratroopers.”

Some people claim its a surprise Martial Law or an Obama invasion of Texas, others don’t understand what the brouhaha is all about and shine it on with “That’s Texas for you.” Meanwhile, the Department of Defense calls anyone skeptical of their intentions “Alarmists!” The Army Special Operations Command released an article in Stars and Stripes with the by line: “Army Special Operations Command pushes back against alarmist claims about upcoming exercise.” Apparently, not there are not only “conspiracy theorists” running amuck, but “alarmist” as well.” I suppose, according to the current spin, an “alarmist” is a “conspiracy theorist” who’s irresponsibly predicting the future. We can’t have that! However, “preemptive strikes” seem to be exempt from such accusations. They must not be basing their ill advised invasions on “conspiracy theories.” Perhaps the Pentagon employs fortune-tellers. Meanwhile, the corporate media has done their part to deflect the whole issue. Poor John Steward had to laugh it off over the air as just another case of crazy Texas right-winger paranoia, They think they’re being invaded, he said, but they forget “they’re already part of the United States.” All the while, the man on the street is deciding, “It’s much ado about nothing”, and turns to the sports page.

Mark Lastoria, Army Special Operation Command spokesman, told the Houston Chronicle, soldiers would practice “emerging concepts in special operations warfare” in Texas…. Training exercise Jade Helm is going to assist our Special Operations Soldiers in refining the skills needed against an ever changing foreign threat,” he said….There’s good reason to be skeptical regarding Lastoria’s candor. He didn’t mention what those “emerging concepts” or what an “ever changing foreign threat” means.

The Special Ops are “special” because they’re the guys that do the dirty tricks. In the glossary for Special Forces Operations 2015 is listed “clandestine operation”. “An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment. A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the source of the operation.” Now, how are we supposed to know whether or not Lastoria is forthright or covering up a clandestine operation?   Aren’t the people who laugh at such a suggestion simply relying on blind faith? Sometimes a guffaw is nothing more than whistling in the dark.  Lastoria, told the Houston Chronicle “Unofficial sources providing inaccurate information on Jade Helm want people to believe that it’s something other than a training exercise.” But, isn’t this just what we’d expect to hear from someone covering a clandestine operation? How are we to know? If I told you “I’m a liar, but I’m not lying about this.” What would or could you believe?  The headline on the blog “Courthouse News”, March 27, 2015 read, “No Black Helicopters, Army Tells Texans”. In mid March, a very reliable contact, who’d never heard of “Jade Helm”, told me he saw three black helicopters land at night in a schoolyard in Houston, Texas, “A van pulled up and some people boarded the van and they all left.” That’s sounds pretty “clandestine ” to me! This isn’t a smoking gun, but an anomaly. However, the more frequent the anomalies one finds, the more difficult it is to sweep them under the rug. Another indirect test of veracity often employed in interrogations is noting how many times a person contradicts himself. The more times, the more likely it is he’s lying. In a court of law, the testimony of a witness is thrown out if it has inconsistencies. Let’s look at a few of Army Special Operation Command spokesperson Lastoria’s inconsistencies

In a packed County Commissioner’s Court in Bastrop County Texas, Lastoria told the audience that the “exercise would be held on private property and in some instances on public property, such as a state park” He said that landowners had volunteered their private property for the Jade Helm exercise. Later in the presentation, Lastoria contradicted his original explanation and said “a lot of” rather than “all” the training in Texas will take place on private land.” “Okay”, you say, “give the guy a break, after all he’s facing a skeptical crowd of concerned citizens worried about the military taking over their community and he’s merely a soldier.”   Let’s move on.  Another major component”, he said, “would be soldiers training to blend in with the local community.” Several people ask how they could be blending in with the local community, if they were going to be on private land? Lastoria replied that “role players’” would be involved in simulating communities in rural land.” There will be “roll players.” I’ve found advertising on the Internet near Lastoria’s Special Op base for role players for this assignment. There’s even a video on YouTube of a roll player meeting. However, Roy Boyd, chief deputy with the Victoria County Sheriff’s Office said that county law enforcement officials were briefed by the Army and were told, “Among the planned exercises, soldiers will try to operate undetected amongst civilian populations in some towns and cities where residents will be advised to report any suspicious activity they notice as a means of testing the military’s effectiveness, …They’re going to set up cells of people and test how well they’re able to move around without getting too noticed in the community…They’re testing their abilities to basically blend in with the local environment and not stand out and blow their cover.” While Lastoria has not contradicted himself here, we have testimony from a credible witness that contradicts Lastoria’s assertions and a fortiori indicates Lastoria is prevaricating.

Mark Lastoria, also told the public during his presentation, at the Bastrop Courthouse, that the name “Jade Helm” meant nothing. “They’re just completely random, pointless words”, he said, “so don’t read too much into it or try to associate it with China’s rising economy and military or the blue helmets of UN’s peacekeeping forces.” Again, Lastoria did not contradict himself, but within less than a week after Lastoria made this vacuous remark, the real meaning of “Jade Helm” was revealed on the Internet.  “JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports force deployment planning and management. JADE uses case-based and generative planning methods to support the development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three tools: Prodigy-Analogy (a combined case-based and generative planner developed by Carnegie Mellon University); ForMAT (Force Management and Analysis Tool) that supports case-based force deployment planning developed by BBN Technologies); and PARKA (a highly-indexed knowledge based management system developed by the University of Maryland).  With JADE, a military planner can build a preliminary force deployment plan, including the Time Phased Force Deployment Data (TPFDD) in less than one hour. This speed in plan construction is possible because JADE supports the rapid retrieval and reuse of previous plan elements for use in the development of new plans. In addition, JADE employs an easy to use map-oriented drag and drop interface where force modules (FMs) from previous plans (cases) whose force capabilities and composition match the requirements of the current situation can be dragged from the case library and dropped onto a geographic destination. Plan modification and/or adaption is supported through remindings, e.g., each time that a force module is created or is copied into a plan (TPFDD) the user is automatically reminded of the need for geographical changes.”  Another reason Lastoria has given in other contexts for why the seven state areas was chosen is because the terrain is similar to areas in the Middle East. However, in the above explanation it is said that every time a “force module is created”, which translates into a strategic plan, “the user is automatically reminded of the need for geographical changes.” This means, that war games can be played any where, but whenever the program is ask to apply a particular strategy to a particular situation, the user must also provide data on the geographical changes involved in that military action. That means that the geography in which war games are played and uploaded into their computers is irrelevant.  Furthermore, practicing blending in to a small town Texas community would be quite different from blending in to a Middle Eastern Islamic community. Again, the rational for picking this seven state area appears to be concealed from the public. Jade Helm has a very specific meaning, which Lastoria hides by insulting the audience with silly imagined interpretations.

We know what “Jade” means, but what about “Helm”?   Initially, some people thought it might be an acronym that stood for: “Homeland Eradication of Local Militants.” While that was a good guess, there’s nothing to substantiate this. We need, however, to once again remember that this is a Special Forces operation.  “Helm” in “Jade Helm” is not an acronym. Special Ops people usually refer to the place of control or command as “at the helm”. The helm was the place where sailing ships were steered.  In Special Ops jargon when so and so is “at the helm” that means he is in command.   “Jade Helm” simply means “Jade is at the helm” or in command. There will be no general or human commander determining battle plans in this exercise but only the artificial intelligence “Jade”. “15” of course means 2015. This suggests that this exercise is perhaps unrolling one of many.

JADE-HELM-photoshop-study2 clog_master_screen_split

Another rather bizarre aspect of the Jade Helm logo is the blur where the arrows cross.  By photo-shopping that blur it can be brought out to be a pair of wooden shoes.  Wooden shoe means “sabot.”  The word “sabot” means “wooden shoe” and is where the term “sabotage” comes from. One theory is that the shoe symbol is an illustration of what “they” will do to the humans as they “master the human domain.” Another theory is that wooden shoes are what the Nazis had their prisoners wear in their internment camps.    This is certainly inconclusive, however, the fact that it is obscured in the logo indicates that it bears a hidden meaning. Clearly, there are a lot of things concealed from the public concerning the Jade Helm 15 exercises than either Mark Lastoria or the Department of defense wants to reveal.  In part 2 we will investigate the Net Centric Warfare background of Jade Helm 15 to better understand the full implications of this “exercise”.


To Be Continued


Arman Matthews