What’s “Jade Helm 15” all about? The official explanation is:

Jade Helm 15 will be carried out in 7 states and will run from July 15 to September 15, 2015. Personnel participating in Jade Helm or units participating in Jade Helm will come from U.S. Army Special Forces Command at Fort Bragg. They’ll be on the ground for about eight weeks, and we’ll have some Navy SEALs participating for about two weeks. United States Air Force Special Operations Command will take part in it at varying points in time throughout the eight weeks. And there will be a small amount of U.S. Marine Force Special Operations Command participating for about two weeks. And then for about five days, 82nd Airborne Division will have a battalion participating with about 600 soldiers, 600 paratroopers.”

Jade_Capture-700x545

Some people claim its a surprise Martial Law or an Obama invasion of Texas, others don’t understand what the brouhaha is all about and shine it on with “That’s Texas for you.” Meanwhile, the Department of Defense calls anyone skeptical of their intentions “Alarmists!” The Army Special Operations Command released an article in Stars and Stripes with the by line: “Army Special Operations Command pushes back against alarmist claims about upcoming exercise.” Apparently, not there are not only “conspiracy theorists” running amuck, but “alarmist” as well.” I suppose, according to the current spin, an “alarmist” is a “conspiracy theorist” who’s irresponsibly predicting the future. We can’t have that! However, “preemptive strikes” seem to be exempt from such accusations. They must not be basing their ill advised invasions on “conspiracy theories.” Perhaps the Pentagon employs fortune-tellers. Meanwhile, the corporate media has done their part to deflect the whole issue. Poor John Steward had to laugh it off over the air as just another case of crazy Texas right-winger paranoia, They think they’re being invaded, he said, but they forget “they’re already part of the United States.” All the while, the man on the street is deciding, “It’s much ado about nothing”, and turns to the sports page.

Mark Lastoria, Army Special Operation Command spokesman, told the Houston Chronicle, soldiers would practice “emerging concepts in special operations warfare” in Texas…. Training exercise Jade Helm is going to assist our Special Operations Soldiers in refining the skills needed against an ever changing foreign threat,” he said….There’s good reason to be skeptical regarding Lastoria’s candor. He didn’t mention what those “emerging concepts” or what an “ever changing foreign threat” means.

The Special Ops are “special” because they’re the guys that do the dirty tricks. In the glossary for Special Forces Operations 2015 is listed “clandestine operation”. “An operation sponsored or conducted by governmental departments or agencies in such a way as to assure secrecy or concealment. A clandestine operation differs from a covert operation in that emphasis is placed on concealment of the operation rather than on concealment of the identity of the source of the operation.” Now, how are we supposed to know whether or not Lastoria is forthright or covering up a clandestine operation?   Aren’t the people who laugh at such a suggestion simply relying on blind faith? Sometimes a guffaw is nothing more than whistling in the dark.

Lastoria, told the Houston Chronicle “Unofficial sources providing inaccurate information on Jade Helm want people to believe that it’s something other than a training exercise.” But, isn’t this just what we’d expect to hear from someone covering a clandestine operation? How are we to know? If I told you “I’m a liar, but I’m not lying about this.” What would or could you believe?  The headline on the blog “Courthouse News”, March 27, 2015 read, “No Black Helicopters, Army Tells Texans”. In mid March, a very reliable contact, who’d never heard of “Jade Helm”, told me he saw three black helicopters land at night in a schoolyard in Houston, Texas, “A van pulled up and some people boarded the van and they all left.” That’s sounds pretty “clandestine ” to me! This isn’t a smoking gun, but an anomaly. However, the more frequent the anomalies one finds, the more difficult it is to sweep them under the rug. Another indirect test of veracity often employed in interrogations is noting how many times a person contradicts himself. The more times, the more likely it is he’s lying. In a court of law, the testimony of a witness is thrown out if it has inconsistencies. Let’s look at a few of Army Special Operation Command spokesperson Lastoria’s inconsistencies

In a packed County Commissioner’s Court in Bastrop County Texas, Lastoria told the audience that the “exercise would be held on private property and in some instances on public property, such as a state park” He said that landowners had volunteered their private property for the Jade Helm exercise. Later in the presentation, Lastoria contradicted his original explanation and said “a lot of” rather than “all” the training in Texas will take place on private land.” “Okay”, you say, “give the guy a break, after all he’s facing a skeptical crowd of concerned citizens worried about the military taking over their community and he’s merely a soldier.”   Let’s move on.  Another major component”, he said, “would be soldiers training to blend in with the local community.” Several people ask how they could be blending in with the local community, if they were going to be on private land? Lastoria replied that “role players’” would be involved in simulating communities in rural land.” There will be “roll players.” I’ve found advertising on the Internet near Lastoria’s Special Op base for role players for this assignment. There’s even a video on YouTube of a roll player meeting. However, Roy Boyd, chief deputy with the Victoria County Sheriff’s Office said that county law enforcement officials were briefed by the Army and were told, “Among the planned exercises, soldiers will try to operate undetected amongst civilian populations in some towns and cities where residents will be advised to report any suspicious activity they notice as a means of testing the military’s effectiveness, …They’re going to set up cells of people and test how well they’re able to move around without getting too noticed in the community…They’re testing their abilities to basically blend in with the local environment and not stand out and blow their cover.” While Lastoria has not contradicted himself here, we have testimony from a credible witness that contradicts Lastoria’s assertions and a fortiori indicates Lastoria is prevaricating.

Mark Lastoria, also told the public during his presentation, at the Bastrop Courthouse, that the name “Jade Helm” meant nothing. “They’re just completely random, pointless words”, he said, “so don’t read too much into it or try to associate it with China’s rising economy and military or the blue helmets of UN’s peacekeeping forces.” Again, Lastoria did not contradict himself, but within less than a week after Lastoria made this vacuous remark, the real meaning of “Jade Helm” was revealed on the Internet.

JADE (Joint Assistant for Deployment and Execution) is a knowledge-based mixed-initiative system that supports force deployment planning and management. JADE uses case-based and generative planning methods to support the development of large-scale, complex deployment plans in minimal time. JADE incorporates the technology of three tools: Prodigy-Analogy (a combined case-based and generative planner developed by Carnegie Mellon University); ForMAT (Force Management and Analysis Tool) that supports case-based force deployment planning developed by BBN Technologies); and PARKA (a highly-indexed knowledge based management system developed by the University of Maryland).  With JADE, a military planner can build a preliminary force deployment plan, including the Time Phased Force Deployment Data (TPFDD) in less than one hour. This speed in plan construction is possible because JADE supports the rapid retrieval and reuse of previous plan elements for use in the development of new plans. In addition, JADE employs an easy to use map-oriented drag and drop interface where force modules (FMs) from previous plans (cases) whose force capabilities and composition match the requirements of the current situation can be dragged from the case library and dropped onto a geographic destination. Plan modification and/or adaption is supported through remindings, e.g., each time that a force module is created or is copied into a plan (TPFDD) the user is automatically reminded of the need for geographical changes.” 

Another reason Lastoria has given in other contexts for why the seven state areas was chosen is because the terrain is similar to areas in the Middle East. However, in the above explanation it is said that every time a “force module is created”, which translates into a strategic plan, “the user is automatically reminded of the need for geographical changes.” This means, that war games can be played any where, but whenever the program is ask to apply a particular strategy to a particular situation, the user must also provide data on the geographical changes involved in that military action. That means that the geography in which war games are played and uploaded into their computers is irrelevant.  Furthermore, practicing blending in to a small town Texas community would be quite different from blending in to a Middle Eastern Islamic community. Again, the rational for picking this seven state area appears to be concealed from the public. Jade Helm has a very specific meaning, which Lastoria hides by insulting the audience with silly imagined interpretations.

We know what “Jade” means, but what about “Helm”?   Initially, some people thought it might be an acronym that stood for: “Homeland Eradication of Local Militants.” While that was a good guess, there’s nothing to substantiate this. We need, however, to once again remember that this is a Special Forces operation.  “Helm” in “Jade Helm” is not an acronym. Special Ops people usually refer to the place of control or command as “at the helm”. The helm was the place where sailing ships were steered.  In Special Ops jargon when so and so is “at the helm” that means he is in command.   “Jade Helm” simply means “Jade is at the helm” or in command. There will be no general or human commander determining battle plans in this exercise but only the artificial intelligence “Jade”. “15” of course means 2015. This suggests that this exercise is perhaps unrolling one of many.

clog_master_screen_split-300x169

Another rather bizarre aspect of the Jade Helm logo is the blur where the arrows cross.  By photo-shopping that blur it can be brought out to be a pair of wooden shoes.  Wooden shoe means “sabot.”  The word “sabot” means “wooden shoe” and is where the term “sabotage” comes from. One theory is that the shoe symbol is an illustration of what “they” will do to the humans as they “master the human domain.” Another theory is that wooden shoes are what the Nazis had their prisoners wear in their internment camps.    This is certainly inconclusive, however, the fact that it is obscured in the logo indicates that it bears a hidden meaning. Clearly, there are a lot of things concealed from the public concerning the Jade Helm 15 exercises than either Mark Lastoria or the Department of defense wants to reveal.  In part 2 we will investigate the Net Centric Warfare background of Jade Helm 15 to better understand the full implications of this “exercise”.

network_centric-700x457

 

The Jade Helm Logo also includes the phrase “Master of the human domain.” What does this mean?  In November 2012, General Odierno, a member of the Council on Foreign Relations, announced plans to create the Strategic Landpower Task Force. The first major policy offering from the task force was a white paper titled “Strategic Landpower: Winning the Clash of Wills”. It emphasized the “human domain” as the key determining factor in future conflicts. “In a word, the success of future strategic initiatives and the ability of the U.S. to shape a peaceful and prosperous global environment will rest more and more on our ability to understand, influence, or exercise control within the ‘human domain.”   First of all, isn’t “shape a …..global environment” simply a euphemism for “control the world”? To rephrase what this white paper is saying is, “For the U.S. to control the world, it must be able to understand, influence and control the human domain.”   Well duh! This is no more than a simple-minded tautology: “For the U.S. to control the world it must control the human domain.”   What is so remarkable about this statement, besides the fact that its conclusion is no different than what any third grader would consider obvious, is the blatant admission that the U.S. is bent on controlling the world.

The white paper, defined the “human domain” as the “physical, cultural and social environments” that exist within a conflict. It was adopted as a “doctrinal term” signifying the ground forces own unique perspective and ability to shape the human domain in future conflicts.  Now it is not only their training as Special Ops that is supposed to make them “Master of the human domain”, but the type of warfare they will be engaged in.This type of warfare is called “Network centric warfare”. In order to fully comprehend what Jade Helm is all about, we’ll have to understand the history building up to the Jade Helm 15 exercises.

*          *          *

The idea of a “revolution in military affairs”, or “Transformation”, based on new information technology was kicked around in military circles even before the ‘90s. In the new Century, “Military Transformation” found its way into George W. Bush’s Presidential campaign rhetoric in 2000. The Bush’s belonged to the Neocon “think” tank, the Project for a New American Century and it had taken up “Transformation” as a major theme. Many PNAC members would soon hold the highest level positions in the George W. Bush administration. Two months before George Bush took office PNAC released a report entitled ‘Rebuilding America’s Defenses‘. According to the PNAC report, “The American peace has proven itself peaceful, stable, and durable. Yet no moment in international politics can be frozen in time…” To preserve this “Americana peace” through the 21st century, it called for (1) a massive increase in defense spending and (2) the fighting of several major theater wars in order to establish American dominance. The first was achieved in Bush’s first budget plan. It called for the exact dollar amount to be spent on defense that was requested by PNAC in 2000. Donald Rumsfeld, a member of the PNAC, had become Secretary of Defense and a vocal advocate of “Transformation”. He argued that the development and deployment of a truly modern, effective command, control, communication and intelligence system was fundamental to the transformation of U.S. military forces. Rumsfeld also believed that Transformation meant fewer troops needed to fight wars. The latter stirred up bitter disagreement within the military and so Transformation remained only a theory. The PNAC report also observed, “the process of transformation is likely to be a long one, absent some catastrophic and catalyzing event –like a new Pearl Harbor.”  Like clockwork, the Godzilla of False Flags, 9-11 happened less than a year after George Bush took office and once Bush stupidly even compared the event to Pearl Harbor.

After 9-11, the “Transformation” Rumsfeld advocated was suddenly taken seriously by the Military. Another serendipitous event that has been woven into the 9-11 myth came from Former astronaut Ron Sega, who oversaw the Pentagon’s more than $60 billion annual budget for research, development and testing. Sega reports that he arrived for work at the Pentagon, on September 12th, with a skeleton crew. “We, uh, came together and asked the question, ‘What can we do?’”, he reported. “What can the research and engineering community within the Department of Defense do to support what we were about to engage in?” The skeleton crew of scientists, analysts, and engineers became the “Combating Terrorism Technology Task Force”.

Subsequently, members of the F.B.I., C.I.A., and other defense and intelligence agencies met in a secure conference room, deep within the Pentagon, thinking, tinkering, and devising solutions. In just three days, the story goes, they produced a list of 150 technologies that could be fast-tracked in the war against terror. No sooner had they miraculously produced this list then phones started ringing throughout the military industry …requests for, “How fast? How many? What would it take to get there?” Suddenly the GDP started reeving up…Raytheon, Textron Inc., Lockheed-Martin, and countless other corporations started gearing R&D, and production, towards the new military demands. The orders flooding in were for precision weapons, lots of them. Throughout his tenure, Rumsfeld never missed an opportunity to remind the American people of the 9/11 attacks and threats against Americans. He even noted in a 2006 memo to “make the American people realize they are surrounded in the world by violent extremists.”

As Secretary of Defense, Rumsfeld was deliberate in crafting the public message from the Department of Defense. People will “rally” to the word “sacrifice”, Rumsfeld noted after a meeting. “They are looking for leadership. Sacrifice = Victory.” Rumsfeld also ordered specific public Pentagon attacks on and responses to U.S. newspaper columns that reported the negative aspects of the war.

The global war on terrorism, the operation in Afghanistan, later on, the operation in Iraq, all served as a great catalyst for “Transformation” to sharply accelerate. Just as Mussolini used a war with Abyssinia (now Ethiopia)  to upgrade his military machine, so the U.S. military machine used Iraq and Afghanistan as real time war laboratories to test new high tech, information dominant technology and transform the military into a new fighting machine.

The war in Afghanistan enabled the military to test its ability to bring special ops together very quickly in a Theater of operations and it provided an opportunity to blend old and new technologies together.   For instance, in the Persian Gulf War, about seven percent of the munitions were precision guided, and none were all-weather. They required a laser beam shone on the target, so things like smoke would interfere with the beam. By Afghanistan, the military had satellite-guided munitions that could pierce through clouds or oil field fires or anything else, and the military had a lot more precision weapons in its arsenal.

The advocates of Transformation pointed to the war in Afghanistan as laboratory proof of their ideas.  Rumsfeld had been waiting for an opportunity to demonstrate how transformational concepts involved more than just the ability to develop new high tech weapons, but proof, as well, that a relatively small number of American forces could be employed on the ground and rapidly defeat an enemy and that military’s had the ability to fight a joint campaign  featuring co-operation rather than competition between the services.

Conducting joint campaigns required a new concept of acquiring and sharing information, a concept called network-centric warfare. In theory, everyone would be electronically connected from the top down. Information once known only to generals and admirals would be shared all the way to the frontlines. Network-centric warfare’s central nervous system is the military’s battlefield internet.  Jade ( acronym for “Joint Assistant For Development and Execution) is an Artificial Intelligence software used for a Network Centric Warfare System adapted to quantum computer technology. Raytheon developed it in conjunction with DARPA. Jade 1, developed around 2000, produces “Battle space” simulations. These simulations are in the form of holograms and virtual reality. Net centric warfare “Battle Space” accoutrements for sale to the DOD is a booming business.   Jade “has the ability to use vast amounts of data being collected from the human domain to generate human terrain systems in geographic population centric locations to identify and eliminate targets, insurgents, rebels, or whatever labels that can be flagged as targets.

Jade II is a battle space system that is allegedly “cognitive” and “intuitive”. This is just what the Department of Defense desires, intelligence that’s not intelligent: It can follow orders and examine prior executed battle plans and solve problems like devising “new and better’ strategies to increase the ‘kill chain’”, but it can’t evaluate the orders and their source or ask “why are these problems, problems in the first place?” Jade II also has the capability for two way communication with drones through the OCCOM technology which is one of the next generation integrations into the system.” In as much as, DARPA has developed land drones with kill capacity and is working on soldier robots, its only a matter of time before they too will be hooked up with JADE.

The enormous cost of the Iraq and Afghanistan wars forced the DOD to scale back while still being able to maintain its planetary military superiority. Between 2008 and 2010 the DOD designed a high-capacity strategic communication control system. A Network Centric Warfare Control system was first installed in Afghanistan in 2008. In 2010, the Department of Defense announced that its goal, or template, for 2020 would be to obtain Full spectrum dominance.” (“Joint vision for 2020”). “Full spectrum dominance” means dominance in n dimensions of the battle space (Land, sea, air, electromagnetic, and cyber).

Vision 2020

 

The apologists for the Department of Defense claim that Jade Helm 15 is an extension of what the military has been doing for a long time.  This is, for the most part, true.  However, it differs in that it covers close to 20% of the country and lasts two months, and it focuses on mostly rural and small town populations.  We established that the army’s explanations regarding what Jade Helm is all about are lies, and from this we inferred that the true nature of the operation must be a secret. This has now been reinforced by the news, from the Washington Post, that “Embedded reporters won’t be permitted at any point during the exercise.”  This is very peculiar since the same reporters have accompanied Special Forces in overseas operations.  So the question arises, if this is a routine exercise, why is its nature of the operation secret?

One could argue that prepping for Net centric warfare in the United States is reason enough to keep the actual operation secret.  If Net centric warfare conducted by special forces is being practiced and programmed into an artificial intelligence driven by quantum computers, we can conclude that this would only be done because the military sees a real possibility for social unrest and even rebellion on the horizon.  Since, standard practice for a military invasion is to first scope out the terrain and for JADE to be at the helm, it must be able to project that battle space, a major part of this exercise would be to upload enormous amounts of data into JADE”S memory.  This type of operation would certainly be kept a secret.  While this could be glossed over as speculation, there’s another detail missing from the military’s narrative that is not speculation.

In an effort to quell the uproar caused by the Army’s blundering  JADE Helm public relations fiasco,  the Military has published a JADE Helm “Fact Sheet”.  Anyone who’s done a modicum of research on the matter would be apt to rename  this “Fact Sheet” the “Twisted Fact Sheet.”  While we’ve already exposed many of these “twisted facts” in our previous two articles, there’s one twisted fact that needs to be addressed.  The Military even thought it was such an important point that they mentioned it twice in their list of twelve facts:  “We must remember that our military has conducted unconventional warfare exercises like JADE HELM for over 40 years.”  The reference to “ over 40 years”, however, reveals more unmentioned information buried within this otherwise innocuous claim that JADE HELM is just the same old same old.

The unmentioned information regarding the 40 years of exercises like Jade Helm is that they were all based on a master plan developed between 1968 and 1972. It is called the Department of Defense Civil Disturbance Plan 55-2. It’s code-name is “Operation Garden Plot”.   1974 was exactly 40 years ago and “over 40 years” takes us to the early ’70s.  As a reaction to the anti-establishment urban rebellions of the ‘60s and ‘70s, regarding civil rights and the Viet Nam war, the Pentagon ordered a directorate of military planers to draw up a series of blueprints addressing instances of civil disturbance that the military might have to put down. The United States Air Force then drew up an implementation plan for Civil Disturbance Plan 55-2.  It goes into detail over every aspect of military “suppression” of “rebellion against the authority of the United States”, including who pays, who bills and how to secure “loans” to cover the costs “attributable to GARDEN PLOT.”  Ominously, under “Resources Employed Without Presidential Directive”, the document states that when the “immediate employment of military resources is required in cases of sudden and unexpected civil disturbances or other emergencies endangering life or federal property, or disrupting the normal processes of Government, expenses incurred will be financed as a mission responsibility of the DOD component employing the military resources.”  In other words, in certain situations the military can take action without a Presidential directive.

According to the plan, the military will attempt “to suppress rebellion whenever the President considers that unlawful obstructions, combinations, or assemblages, or rebellion against the authority of the United States, makes it impractical to enforce the laws of the United States in any state or territory by the ordinary course of judicial proceedings.”  A caveat is thrown in here to justify military intervention. In such a case, the military would be intervening to protect the constitutional guarantees of the people.  Thus, by a linguistic slight of hand, a military intervention in a civilian rebellion regarding the abrogation of their Constitutional rights, is justified because it’s being done to protect their constitutional rights!

The United States Army Training and Doctrine Command (TRADOC), “provides training programs and doctrine for civil disturbance operations to military services.”  The US Army Force Command (FORSCOM), “organizes, trains, and maintains in readiness Army forces for civil disturbance operations”, while the Director of Military Support (DOMS), “conducts, on a no-notice basis, exercises which direct headquarters of uniformed services, appropriate CONUS command, and other DOD components, having GARDEN PLOT responsibilities to assume a simulated increased preparedness for specified forces.” In addition, the DOMS, “maintains an around-the-clock civil disturbance command center to monitor incipient and on-going disturbances.”

This “operational plan” has grown over the years, as the interests of corporate sponsored social control have broadened. The U.S. military now trains police as well as troops to suppress the right of free people to democratic opposition. Garden Plot has been updated three times. Its last up-date was in 1991. The plan was activated during the Los Angeles “riots” of 1992, and because of the obvious convergence of the military and the police, it was probably activated during the “Battle for Seattle” and the “Occupy Wall Street” movement.

Training, under [U.S. Army Field Manual] FM 19-15/Garden Plot, must be “continuous” and “must develop personnel who are able to perform distasteful and dangerous duties with discipline and objectivity.”  Some of the simulation exercises participants are trained to preform with “discipline and objectivity” are the suspension of civil liberties, the rounding up of dissidents and their incarceration in detention camps for the duration of an (unspecified) “crisis.”  Under the heading “civil disturbance planning”,  soldiers and police are trained to perform these unpleasant and dangerous duties, as well as how to use weaponry and tactics that could be dangerous to the local citizenry.: “…every member of the control force must be trained to use his weapon and special equipment (including) riot batons, riot control agent dispersers and CS grenades, grenade launchers, shotguns, sniper rifles, cameras, portable videotape recorders, portable public address systems, night illumination devices, fire fighting apparatus, grappling hooks, ladders, ropes, bulldozers, Army aircraft, armored personnel carriers, and roadblock and barricade materials.” [1] These exercises have been continuous for over 40 years and have incorporated local police in their training.   This aspect of the Jade Helm15 operation, as well as previous similar operations, usually preformed under the guise of “urban warfare training”, and is now part of their hidden operation package not mentioned in the JADE HELM Fact Sheet.  It further explains why reporters already embedded with Special Ops troops are not allowed to witness these “exercises.”

Of course, there’s a psy-ops angle to this as well.  If each time these exercises are preformed and claims resonate across the Internet and news media that this is a precursor to Martial Law, and then nothing happens, the public is expected to become numbed into believing that what’s going on is no more than what the Military tells them is going on.  Further more, all the while the public is becoming accustomed to soldiers and military equipment in their communities. This is the boiling frog syndrome.  In another light, watching these exercises over time is like playing the old shell game. The eye tires of watching the switching movements of the shells back and forth, back and forth until finally when the movement stops, one is forced to guess which shell holds the “prize.”.

Like a virus, “Garden Plot” Duplicated, divided and mutated over the years.  In fact, its become a metaphor for the anti-democratic, mean-spirited authoritarianism that characterizes the Department of Defense.  Under the rubric of “Internal Security” its Directives, Doctrines and training manuals harbor one common goal and that is to silence and suppress the rights of a free people. And when those people see a need to refresh the operating system under which they live, because it’s no longer working for them, the military will be their to combat the will of the people.  Is Jade Helm a precursor to Martial Law? Yes, the problem is when will it happen?  The time, however, seems to be drawing near and any of a number of things could trigger a need in this country to reset and download an improved operating system.

Garden Plot reveals, to all who care to care, the true disposition of the military mind and those officers who assume the responsiblity for molding the attitudes of the young men and women who enlisted believing they had done something good for their country.   Soon they’ll be trained to embrace the idea that within the civilian body politic, from which they sprung, lurks an enemy, an enemy that they may one day be ordered to fight in the name of obedience to authority.  These new recruits  son must learn to live with the knowledge that the people, of their nation, who paid billions of dollars in protection money to the institution which they have sworn loyalty, may someday be attacked by their protectors in the service of a cabal of corporate suits united only by their common unfettered greed and gluttony.

THIS IS NOT A “THEORY”,  THIS IS AN INFERENCE BASED ON  AVAILABLE EVIDENCE

Jade Helm is a part of a larger military scheme that was included in the 2014 NDAA Budget. (The NDAA Budget is the National Defense Authorization Act that funds the US military). This operation covering Jade Helm is the largest one for involving military operations. Sit rep Phase 0 is about identifying potential threats.  Its funding is found in the following part of the budget:

Section 1074—Pilot Program for the Human Terrain System. This section would require the Secretary of the Army to conduct. a pilot program to utilize Human Terrain System assets in the U.S. Pacific Command area of responsibility to support Phase 0 shaping operations and to support the theater security cooperation plans of the geographic combatant commander.  

Phase 0 gets disproportionately the most funding.  In combat operations there’s usually 5 phases of combat. However, Phase 0 operations is relatively new.   The NDAA 2014 Budget provides for increasing the budget for phase 0 operation.   Here are some of the corporations participating:

List-of-Corbs-good

 

Phase 0 operation involves employing infiltration techniques to identify who’ll be a problem before fighting even begins. This is why special ops dressed as civilians will be moving around in local populations. The cover story, Mark Lastoria, Army Special Operation Command spokesman gave the press and public meetings is that some Special Ops will be testing to see if they’ll be identified. The Psy-Op twist is that it is they who’ll be doing the identifying. They’ll be looking for individuals and groups who they assess as possible “non-state actors”.  By “non-state actors” the Military includes people who support social unrest but are not participating in any disturbance. This falls under their definition of “Terrorist”. It was on these grounds Anwar al-Awlaki an American citizen noncombatant was targeted and murdered by a U.S. Drone. Another U.S. drone also murdered his son two weeks later

Identifying “terrorists” for later elimination is a primary objective of the opening “tickling phase” of a war. “Tickling” is a CIA concept that consists of using military force to excite the enemy and prompt him to respond.  This was the rational behind the CIA’s demented tactic of using predator missiles to murder en mass innocent Pakistani citizens and therefore provoke retaliation by their relatives.  By extracting these so-called “Terrorists” the Army thinks they’re severely limiting organized resistance.  In so far as appropriations that included JADE HELM were approved in the NDAA budget at a Phase 0  sit rep, this is what JADE Helm is all about. It also bears an insidious Psy-ops twist:  First, by extracting these trumped up “terrorist”, they hope to generate mutual distrust within hostile organizations.  Second, people who show up to protest will be added to the extraction list. As we’ve mentioned Lastoria story is that that the “exercise” is for overseas, but zero phase requires the operation occur at a specific place and due to the nature of Net Centric warfare the place must be specific to where the ops takes place? So we’re talking about U.S. soil.

(Phase 1) – the run-up to hostilities – Deter. The intent of this phase is to deter
undesirable adversary action by demonstrating the capabilities and resolve of the joint force. It includes activities to prepare forces and set conditions for deployment and employment of forces in the event that deterrence is not successful.

(Phase 2) – the onset of military action – Seize Initiative. Joint Force Capabilities seek to seize the initiative through the application of appropriate JFC’s

(Phase 3) – major combat – Dominate. The dominate phase focuses on breaking the enemy’s will for organized resistance or, in non combat situations, control of the operational environment.

(Phase 4) – “post-conflict” stabilization – Stabilize. The stabilize phase is required when there is no fully functional, legitimate civil governing authority present. The joint force may be required to perform limited local governance, integrating the efforts of other supporting/ contributing multinational, IGO, NGO, or USG department and agency participants until legitimate local entities are functioning.

(Phase 5) – the shift to civilian control – Enable Civil Authority. This phase is
predominantly characterized by joint force support to legitimate civil governance in theater. The goal is for the joint force to enable the viability of the civil authority and its provision of essential services to the largest number of people in the region.

Within the last three years or so, the military has been operating/training on civilian soil.  A lot of it has involved flying helicopter gun ships into large cities and firing blanks with machine guns.  It’s reported that there’s a quick turnover rate of participants engaged in these operations. That means the military has already trained a lot of people. It follows that there must be something they’re planning on in the not too distant future.

Now what would worry the government about civil unrest to this degree?  Why would the Federal Government have to be breaking into its own citizens homes and taking mom or dad away in the middle of the night like the CIA Death Squads did in Iran, after the U.S. installed a puppet Shah?   What could possibly be a legitimate reason for such extremes?  There’s no Constitutionally legitimate reason.  One can imagine a scenario in which the monetary system collapses and everyone’s money becomes worthless. There would be people very upset with the system and the danger of civil disturbances and instability would spike.   This is possible, but it implies a foreknowledge on the part of the Federal government beyond our keen to speculate.  However, in 2008 after the economic meltdown, the U.S. government made no secret of its intent to plant armed troops on American soil and the Pentagon announced that 20,000 uniformed troops would be stationed inside the U.S. by 2011, to help bolster domestic security and assist state and local authorities in responding to terrorist attacks.  At the time, Paul McHale, then-assistant defense secretary for homeland defense, said that this sevenfold increase in domestic troop strength marked a “fundamental change in military culture” that “would have been extraordinary to the point of unbelievable” prior to the events of September 11, 2001.  That same year the U.S. Army War College Strategic Studies Institute warned the U.S. government that it was being too complacent to domestic threats and encouraged the Department of Defense to play a more active role in homeland security.  “Widespread civil violence inside the United States would force the defense establishment to reorient priorities in extremis to defend basic domestic order and human security,”  Lieutenant Colonel Nathan Freir wrote and went on to say that the “DOD might be forced by circumstances to put its broad resources at the disposal of civil authorities to contain and reverse violent threats to domestic tranquility.  Under the most extreme circumstances, this might include use of military force against hostile groups inside the United States.”

In an article in the New York Times, titled “US Defense Department organizing covert operations against the general public”, November 19th, 2014, Thomas Gaist reported that the Department of Defense is developing domestic espionage and covert operations targeting “the general public” in coordination with the intelligence establishment and police agencies. Gaist’s analysis showed that the “military and its investigative agencies have almost as many undercover agents working inside the United States as the FBI…While most of them are involved in internal policing of service members and defense contractors, a growing number are focused in part, on part of joint federal task forces that include military intelligence and law enforcement specialist.”

Phase 0 is where the fabled “Red List” comes into play with the information provided from JADE, the artificial intelligence, operating banks of the DOD’s super quantum computers. It will provide the whereabouts of each individual defined as a non-state actor/”terrorist”, with a little flag on its holographic projection of the battle space.  The victims will, of course, be identified as “militants” in the corporate media. The story from the military will be that the victims demonstrated willingness to take-up arms and resist the authority of the Federal Government.  For now, these future victims are still just simple folk facing a low-level invasion, and haven’t yet made a conscious decision to resist.  This is how the war against terrorism works. Probably the best thing to do, for any community, having to put up with this two month imposition, is simply see nothing, say nothing, write nothing, and just go about living normal lives.  Eventually, the boys will pick up their toys and go home claiming to have had a nice exercise.

The function of “Terrorism” for the Late Modern Imperial State is analogous to the function of the “Devil” for the Papacy in the Middle Ages.  A “non-state actor” has an operational role akin to “Heretic” with the Catholic Church. “Heresy” comes from the Latin meaning “To chose”.  Just as “Satan” empowered the empire of the Roman Church, so “Terrorism” empowers the empire of the United States Inc.  One need not do devilish things to be in the employ of Satan, it’s only necessary to speak heretical things.  In a similar manner, for the America Inc. empire, whoever says things that allegedly causes social instability, is a “terrorist.”  Civilians who resist invasion, as well, are classified as “terrorists”, just as those who resisted Papal troops were enemies of God.  It’s the nature of pys-war (psychological warfare) that each small operation builds upon the previous one like an inverted pyramid, so all the building blocks rest upon one original faulty foundation stone.  In the case of the global war on terror, everything rests upon the U.S. government’s use of the vague, ambiguous and ill-defined word “terrorism”, just as everything rested on the Papacy’s use of the vague, ambiguous and ill defined word “Devil.”

In 2008 the DOD also initiated the Minerva Initiative. It partnered with universities in a variety of projects “to improve DOD’s basic understanding of the social, cultural, behavioral, and political forces that shape regions of strategic importance in the world to the US.”  While the idea of the DOD being interested in “culture” may sound something like a joke, there was big money in it for the universities.   So, Cornell University, for instance, led a study, managed by the US Air Force Office of Scientific Research.  Its aim was to develop a model “of the dynamics of social movement mobilization and contagions.” The Pentagon and Cornell hoped they would be able to determine “the critical mass (tipping point)” of social contagions by studying “digital traces” for instance “the 2011 Egyptian revolution, the 2011 Russian Duma elections, the 2012 Nigerian fuel subsidy crisis and the 2013 Gazi park protests in Turkey. “The study and program looks at Twitter and Face book posts and conversations in order “to identify individuals mobilized in a social contagion and when they become mobilized.” Note here the use of the word “contagions”. This word suggests an infection or virus. By talking about social movements as if they’re diseases, the DOD is putting a spin on the conclusion in advance of the research. This tweaking of the conclusion in advance of the research could be done in like manner had the Papacy asked a university to help it develop a model of the dynamics of social movements and the spread of evil. The idea is that any social movement challenging Imperial authority is a “disease” is no different than claiming its the work of the devil. “Terrorism” like “Evil” can be contagious and spread, so it must be stamped out before an epidemic occurs.   The DOD’s Minerva Initiative funded another project in 2012 to determine “Who Does Not Become a Terrorist, and Why?” In this study, the DOD conflates peaceful activists with “supporters of political violence”. We read the following: “In every context we find many individuals who share the demographic, family, cultural, and/or socioeconomic background of those who decide to engage in terrorism, and yet refrained themselves from taking up armed militancy, even though they were sympathetic to the end goals of armed groups. The field of terrorism studies has not, until recently, attempted to look at this control group. This project is not about terrorists, but about supporters of political violence.”  Okay, what’s the difference between this and saying that people who support the works of the devil are committing sin just as much as the ones who actually do the devils work? Once again, the DOD’s pseudo scientific objectivity can’t hide the fact that its manner of framing the problem insures the desired spin in the results of its “research”.

The DOD’s choice of words clearly reflects a military in denial of the imperial role it presumes. Hence, it feigns objectivity by carefully selecting a language that its spinners trust gives the appearance of “science.”   However, the imperial aim, for which the DOD serves as enforcer, has an authoritarian, monocultural agenda.  This absurd paradox is underscored by its Marvel Comics mottoes like “Masters of the Human Domain”.  Frank Lloyd Wright once remarked that some people are schooled but not educated and other people are educated but not schooled.  Of course, some people are both, but once one reads the DOD literature regarding how Special Ops are supposed to “Master the Human Domain”, it’s abundantly clear that none of their commanders are educated and few are schooled beyond what one might pick up at San Quentin after a few years.  Thus the DOD boasts that its Special Ops will display their cultural sensitivity by approaching healthy social dialog by intellectuals as a “Contest of wills” between it and the other participants.  In any such contest they crow, they’ll surely dominate by being the first to murder all the other contestants.  It doesn’t matter how many stars and bars, medals and fringe they wear on their neatly pressed brown apparel, anyone who sees the process of democracy as a war to be won by any means necessary, bears the low grade mentality of a thug.  Of course these “Masters of the human domain” have an excuse for murdering the present participants in an ongoing social dialog that students of humanity have carried on for thousands of years: “They’ll be extracted”, they say, “because they’re provoking ‘social instability.’”  It’s a grave misfortune that these dimwits have never realized that in civilized society’s ongoing democratic dialog, it’s the cause of social instability that’s always at issue!  The joke is, no dialog over the causes of social instability is ever resolved by assassinating the participants in the dialog.  Like tickling, it only insures the wholesale slaughter of more and more innocent people, the very people from which the Military itself has sprung.   Certainly the only real terrorist in the whole human domain thing is the Department of Defense; otherwise the word “terrorism” has absolutely no meaning.  Instead of doing the appropriate job of a military in a free democracy, or a democratic republic, i.e. support the Constitution while the dialog of a free people proceeds to weed out the causes of their nations social instability.  On the contrary, the U.S. Department of Defense assumes the preposterous posture of enforcer of social instability, on behalf of its corporate criminal sponsors, by eliminating the dialog, while all the while pretending its doing a noble thing.  All things being equal, the DOD alone will some day stand atop the rubble and ruins of what once was a pretty cool planet.

 

Arman Matthews is a blogger at Red Pill Views.

 

Footnote

[1] .” (Frank Morales, “U.S. Military Civil Disturbance Planning: The War at Home,” in Police State America, ed. Tom Burghardt, ATS/Solidarity, Toronto, Montreal, 2002, p. 73)

 

This article first appeared in Red Pill Views.

LEAVE A REPLY

Please enter your comment!
Please enter your name here