Minot/Barksdale Nuclear Bent Spear Incident-Part I by Richard Scott

Bookmark and Share

Dandelion Salad

by Richard Scott
http://www.boilingfrogspost.com
7. December 2009

An Analysis & Critique

Over 36 hours on August 29-30 2007, six AGM-129_ACM Air Launched Cruise Missiles each containing one W80_(nuclear_warhead) were removed from safeguarded weapons storage facilities at the Minot AFB in North Dakota, loaded aboard a B-52 bomber and flown 1500 miles to Barksdale AFB in Louisiana. While removed from secure storage, these weapons passed through six separate links in the chain of custody without being discovered, without being visually inspected and were left unguarded and unsecured on the runways of both Minot and Barksdale for 15 hours and 12 hours respectively before the Ordnance Unloading Team at Barksdale discovered the error, established a security zone and activated a Nuclear Security Alert to further safeguard the warheads.

Attempting to conceal the incident as part of the DOD’s policy on neither confirming nor denying the presence of nuclear weapons, Defense Secretary Robert Gates notified President Bush and ordered in internal Air Force Investigation of the incident, the first of it’s kind in the 40+ years of nuclear weapons handling. This lasted 6 days until the story of the incident was broken by the Military Times, quoting unnamed sources and picked up by the MSM. Soon after, the Air Force announced that the Minot Munitions Squadron commander was relieved of command and 25 airmen were disciplined. They also assured the public that the weapons never left the custody of Air force personnel and the public was never in danger. The results of that investigation saw the commanders of the 5th Bomb wing and the 5th Maintenance Group at Minot and the 2nd Operations Group at Barksdale relieved of command, four senior NCOs of the 5th Bomb Wing received “administrative action”, all personnel of the 5th Bomb Wing were stripped of their nuclear certifications, 65 airmen lost their Personnel_Reliability_Program certifications and all tactical weapons ferry operations were suspended, citing:

“There has been an erosion of adherence to weapons-handling standards at Minot Air Force Base and at Barksdale Air Force Base.”

[…]

via Sibel Edmonds’ Boiling Frogs Post | Home of the Irate Minority.

see

An Analysis of Warrantless Wiretapping – Part II by Richard Scott

by Richard Scott
Dandelion Salad
originally published by Boiling Frogs Post
19 November 2009

Parental Controls on Everyone

In Part one of my piece, I attempted to explain the nature and scope of the US Warrantless Wiretap Program and the growing Surveillance Regime being built in this country. In Part 2, I will compare and contrast the growth and structure of the aforementioned Surveillance Regimes with other countries’ corresponding Systems of surveillance and control. I will also spotlight the International Surveillance Industry and its efforts to market its products by offering this technology to governmental power centers around the world.

Continue reading

Richard Scott discusses Warrantless Wiretapping on the Jeff Farias Show

Bookmark and Share

Dandelion Salad

Posted with permission from Jeff Farias

The Jeff Farias Show
Nov. 10, 2009

Richard Scott interview:

Broadcasting live here and simulcast on • Roots Up Radio and Jerva Westerort Local Community Radio – 91.1 Stockholm, Sweden

Richard “Ishmael” Scott, a writer at Sibel Edmonds website Boiling Frogs Post. Ishmael acquired his moniker hunting submarines for six years as a Destroyer Sonarman and specialist on Anti-Submarine and Anti-Surface Warfare. As a member of Nuclear Weapons Handling Teams, he participated in Nuclear Weapons Acceptance Inspections, Nuclear Technical Proficiency Inspections and Technical Surprise Inspections. He then spent thirty years in the belly of the Telecommunications beast as a technician specializing in all phases of Broadband Carrier Network Operations for A.T. &T., Qwest, Level3, Allegiance and others. He was personally responsible for keeping A.T. &T.’s long distance service working out of San Francisco in the immediate aftermath of the 1989 Loma Prieta Earthquake disaster. H[is] research for Boiling Frog Post focuses on telecommunications privacy and nuclear weapons issues. We will discuss his article “An Analysis of Warrantless Wiretapping-Part I

So the questions I have are this. 1. Why is such an overarching, intrusive, draconian wiretap program necessary? 2. What mechanisms are there in place to prevent government-sourced private information from being shared with corporate entities? 3. Is the NSA positioning itself to take control of all telecommunications in the event of a national emergency?” 4. What national emergency might provide a trigger mechanism for the assumption of such control?”

see

An Analysis of Warrantless Wiretapping – Part I by Richard Scott

Spying on Americans: Obama Endorses Bush Era Warrantless Wiretapping by Tom Burghardt

The Surveillance State and Domestic Spying in the Obama Era

Election Pre Mortems by Steven Jonas, MD, MPH

Domestic Spying on Dandelion Salad

An Analysis of Warrantless Wiretapping – Part I by Richard Scott

by Richard Scott
Dandelion Salad
originally published by Boiling Frogs Post
8 November 2009

Definition of Terms & Analysis of Klein’s Affidavit

This piece will attempt to analyze the US Government’s Warrantless Wiretap Program utilizing open source information including A.T.&T. Whistleblower Mark Klein’s EFF affidavit, podcasts by James Bamford and Russell Tice available on this site, and comparisons with similar surveillance networks currently in use in Great Britain and China. The rise of the Internet and the World Wide Web in the past thirty years has been touted as a mechanism of information freedom and open societies, a global clearinghouse for political and personal empowerment and a panacea against the forces of repression and censorship. What I will attempt to show in this piece is how those lofty goals remain largely unrealized and how governments, under the guise of “security” are, in fact, using the Internet as a new, overarching and suffocating surveillance state to monitor, compile and track the personal and private lives of virtually everyone who uses modern telecommunications in any form. I will attempt to demonstrate that, because of the erection of this surveillance regime, privacy of communications is essentially dead. I will also attempt to show how information gathered under this program can be used to populate private corporation databases and affect the general populace through credit reports, employment opportunities and the convergence of private and government databases.

Continue reading