Wednesday, 2 July 2014

Merlyn Rees - See No Evil, Hear No Evil, Speak No Evil

"That relates to Kincora, which I know nothing about..."
"I'm not that interested in Kincora..."
-Merlyn Rees

from Spike EP on Vimeo.

He's wrong - the Privy Council is in fact 799 years old...

Lord Louis Mountbatten had the nickname “Dickie” …and for good reason. Philip’s uncle Dickie was the last viceroy in India where he was a known paedophile who sexually exploited young working class Indian peasant boys”.

Mountbatten is also linked to the paedophile ring who abused boys living at the Kincora Care Home in Belfast Northern Ireland. An excellent website, dedicated to exposing the Royal Family http://www.helpfreetheearth.com/index.html, have this to say about a book written on that paedophile ring entitled ‘The Kincora Scandal’:

“The Kincora Scandal connects Lord Dickie Mountbatten to a child prostitution vice ring in Belfast, Ireland. Authorities failed to intervene at the Kincora care home for boys until 1981, despite reports over the years of child sexual abuse”.

The operators of the Kincora child prostitution ring were eventually convicted in 1981 of the RITUAL sexual abuse of defenceless young boys who were sold like prostitutes. No charges were ever brought against the VIP customers made up of Royals, Politicians, lawyers, and Judges. However, Belfast citizens finally had reason to celebrate when Prince Philip’s paedophile uncle was killed by an IRA bomb planted in his boat”.

This is not true.

And he had at least two young boys aboard the Shadow V - both were blown to bits by the MI6 bomb.

The Provisional IRA and Sinn Feinn had a complete operational ban on:

a) Operations within the 26 Counties of the Republic



b) Operations involving a probable of risk to civilians unaffiliated with the British State - even the collateral killing of women and children was considered completely unacceptable.





c) Attacks on members of the Royal Family - Although Mountbatten was technically still on the Admiralty reserve list as a Naval Officer, the IRA Army Council had determined that the largely symbolic role (if only they knew...) the Royals played in Northern Ireland was of limited strategic value and would consilidate Loyalist feeling on the mainland as a rallying cry to crush the Republican movement and further entrench the Freemasons of the Orange Order.

The Killing of Mountbatten violated ALL of these rules - 

but such was the cellular structure of PIRA, Gerry Adams had gone on television to justify the attack before having direct, firsthand knowledge or confirmation that PIRA was indeed responsible... 

a function of the Plausible Deniability of the Sinn Fein / PIRA relationship, used to their disadvantage by MI6 (who could only conduct operations within the 26 Counties) and their globalist allies in NATO Command, against the Loyalist chauvinism of their counterparts in 5.

"[Officers of] MI5 and MI6 swear their absolute, personal allegiance to Her Majesty the Queen, which they feel elevates them above elected government, according them the power to do whatever they like..."
- Tony Benn

Officers of MI6, however, consider themselves sworn to a higher loyalty - The North Atlantic Treaty...



At the end of the war, in June 1945, the British King, George VI, the father of Queen Elizabeth and puppet of the Queen Mother, sent the former MI5 officer, Anthony Blunt, to the Kronberg Castle of Prince Philip’s sister Sophie, and her Nazi husband Prince Christoph of Hesse, to recover correspondence between the British Royal Family and their Nazi relatives, for propaganda aimed at convincing the aristocrats of Britain they had not been in contact all along. 

Blunt was the ‘surveyor of the Queens Pictures’ and a world expert in the paintings of Poussin, the initiate who painted pictures called ‘The Shepherds of Arcadia’ which related to the Rennes-le-Chateau mysteries. Blunt was named as a member of a KGB unit inside British Intelligence along with Burgess, MacLean, and Philby, the fifth man was never named, but was in fact, Lord Victor Rothschild."


Ripperology from Spike EP on Vimeo.

"'When you tell me, then I'll start taking it in. So have you done it or what?' An' he says, 'I haven't done 'em all. I'll tell you that now. But I've done six or seven of them, aye." So I says, 'Well, that's it then," an' we sat down."


What Carl knew was mainly what his brother had told him on his first visit to see him in Armley. "He said he hadn't done them all." He said to me, "They aren't really as bad as they say." "He hadn't really ripped them to bits", he said."

Peter Sutcliffe wrote to his brother Mick. "Don't take so much notice of any ignorant talk about me as the public in general know absolutely nothing about me or the type of person I am. It is all absolute rubbish that has been printed so far."


In another letter to Carl he says. "Don't feel too bad because soon you will know the whole truth of this matter."

In every case the reaction was one of stunned disbelief. Sonia's mother, Maria Szurma, told reporters: 

"We just can't believe it. Peter is so loving, so generous, so thoughtful. 

He would do anything for anyone if he could. 

Nothing was too much trouble for him.

I just can't believe Peter is the man who killed 13 women. It is not possible. I will not believe it. 

Even if it comes from his own mouth I will never accept that he is the Yorkshire Ripper. 

He was worried about the Ripper and used to drive me about when I had to go out at night so I would be safe."

from Spike EP on Vimeo.

"What was the state of the IRA at the beginning of 1974?"

"They were on their knees." - Former MI5 Officer

"Could the War have been won then?"

"Yes." - Former MI5 Officer


In Britain, there has always been a fierce rivalry between MI5 and MI6 - my researches indicate that historically, MI6 have long been aligned with the interests of NATO and the European Union, whilst MI5 still owes it's allegiance solely to the British Crown.

Therefore MI6 is perfectly capable of going around, pretending to be the IRA, blowing up British cabinet ministers and members of the Royal Family in order to prevent the outcome of a united Ireland outside of NATO.


"Few people in this country understand the enormous political power wielded by our security services.

Officers of MI5 and MI6 swear their absolute, personal allegiance to Her Majesty the Queen, which they feel elevates them above elected government, according them the power to do whatever they like.

These men have always been hostile to Labour politicians, to the trade Union movement and to all socialists, almost as though they felt that we were all secret subversive agents of the KGB..."


from Spike EP on Vimeo.



















Rolf Harris, Freemasonry and the Police


"He's Australian and famous...? It has to be either Michael Hutchence or Rolf Harris..."
The Late Paula Yates fails to deduce the identity of Dannii Minogue's latest beau...
The Big Breakfast, 1993

Sir Elton John, Rolf Harris MBE, OBE, CBE, and Friend.




Trouble Brewing...

Rolf Harris, MBE, OBE, CBE.








Savile, Freemasonry and the Police

Savile (and Friends) make a donation to their favourite charity: The Police Benevolent Fund.
And Two Tickets to the Secret Policemen's Ball; one for me, one for The Widow's Son.


"The review also examined reports that up to eight officers attended the infamous "Friday Morning Clubs" at Savile's flat in Leeds – but insisted this did not protect the disgraced entertainer from prosecution.

The report said: "No evidence has been found to conclude that there was any impropriety or misconduct in relation to the Friday Morning Club.

"All of those people spoken to who had knowledge of the Friday Morning Club described it as a "coffee morning." "








Despite the review by West Yorkshire Police (WYP) finding there was an "over-reliance on personal friendships" between Savile and some officers, it concluded: "There is no evidence that he was protected from arrest or prosecution for any offences as a result of his relationship with WYP, or individual friendships with officers."

Even after receiving child abuse allegations, one officer – who was a personal friend of Savile's – joked "Jimmy gets so many of these type of complaints," while the force continued to use his image for publicity purposes, the review showed.

The 59-page report said it was "of greater concern" that the force continued to use Savile as part of crime prevention campaigns – even after it received a request from Surrey Police in 2007 to check what records were held on the broadcaster as part of its investigation into Duncroft School.

The review also examined reports that up to eight officers attended the infamous "Friday Morning Clubs" at Savile's flat in Leeds – but insisted this did not protect the disgraced entertainer from prosecution.

The report said: "No evidence has been found to conclude that there was any impropriety or misconduct in relation to the Friday Morning Club.

"All of those people spoken to who had knowledge of the Friday Morning Club described it as a "coffee morning."

The report stressed that at the time the paedophile was "seen by most of the public as a man who did good work," allowing him to evade justice.

Police officials today admitted the force was "duped for many years" by Savile and that officers had "failed [his] victims".

However, responding to today's report, lawyer Alan Collins, who represents more than 40 of Savile's victims, said the report simply "doesn't add up" and that the force was guilty of "collective myopia".

"Savile was able to run rings around the police for decades. He used police officers," he said.

"He was engrained with them, dovetailed with them.

"The report begs a lot more questions. It provides some answers but the report reveals memories that are not as sharp as perhaps they ought to be, 'can't remember', documents that can't seem to be located," he added.

The West Yorkshire Police report examined the history of Savile's relationship with the force

We must do everything we can to understand why that was, to ensure it does not happen again
Assistant Chief Constable Ingrid Lee
The report said 68 of Savile's victims have now come forward in the force area and shockingly revealed his youngest victim was just five-years-old.

Victim Support, who advises West Yorkshire Police on sex abuse and who have helped Savile victims, today said it is "disturbing" that none of Savile’s victims in the region felt unable to contact officers about their complaints while he was still alive.

Assistant Chief Constable Ingrid Lee said today that she feels "incredibly saddened that the victims didn't feel able to come forward, and we must do everything we can, working with our partners, to ensure that we understand the reasons why, to encourage more victims to come forward because we will listen."

She added: "Savile was a national celebrity. He duped millions of people, the police included, into believing that he was a celebrity, a charity fundraiser, a person who did good for the community.

"He duped millions of people and lived on that myth for ages, and police officers also will have been duped in the same manner."

The disgraced Top of the Pops presenter has been revealed as one of Britian's most prolific abusers

Disturbingly, the review also examined suggestions Savile was a "person of interest" in the Yorkshire Ripper inquiry in the 1970s.

It found that many records has been destroyed but they had found thousands of record cards with information about men who had been spoken to.

The report said: "They contain scant information and do not indicate whether Savile was a 'person of interest' to the inquiry team.

But the review said: "One card does make reference to Savile offering his services as an intermediary for the police, should the 'Ripper' wish to make contact."

Ms Lee admitted "there is no doubt that police forces made mistakes in relation to sharing and keeping information relating to Savile so no single clear picture of his offending could be made.

"As Savile's home police force, WYP would have been the obvious place to collect all such information, but investigation has shown that much of the available information during Savile's lifetime was never shared with WYP and, when it was WYP, did not connect the events to recognise a potential pattern of offending.

"We must do everything we can to understand why that was, to ensure it does not happen again."


Savile and a Friend From a Certain Place.

"We Want Your Soul..."

Now, then, now-then, now/then...

"Australian broadcaster and artist Rolf Harris is awarded he Officer of the Order of Australia by the High Commissioner, John Dauth, at Australia House. Picture: John Stillwell Source: Getty Images

HE has received almost every award there is but as he was presented with another gong today, Rolf Harris said just still being seen as a larrikin in his homeland Australia was all the recognition he needed.

Harris, 82, was today appointed Officer of the Order of Australia , from the Queen's Birthday Honours list , for services to performing and visual arts and to charities and to international relations through promotion of the Aussie culture.
The entertainer said he was humbled by his award, more so than any other because it showed Australia appreciated him.
Harris, who has lived in the UK for more than five decades, said it was a marvelous thankyou from Australia who had not forgotten him.

"It is a lovely feeling," he said. "I am so very much an Australian living in this country and I had a marvelous childhood in Australia and a marvelous setup for my life."
He said being an Australia meant he always felt he could speak "even-Stevens" to anybody in the world and it was that attitude that helped him survive overseas for as long as he has.



Australian broadcaster and artist Rolf Harris holds the Officer of the Order of Australia. Picture: John Stillwell Source: Getty Images

In 2006 Harris received a CBE (Commander of the Order of the British Empire) in addition to previous honours including being appointed an MBE (Member of the Order of the British Empire) in 1968, an OBE in 1977 and became a Member of the Order of Australia (AM) in 1989. This, all in addition to honourary doctorates and other industry awards.

Harris, accompanied by his wife Alwen and other members of the family at his receiving of his gong at the Australian High Commission in London, said he will continue to act as a roving ambassador for Australia for as long as he lived.

"The main thing I think I've brought is a sense of larrikinism and the fact you've got permission to muck about and do silly things as well as do serious things," he said.

"You just now you don't need to be formal and pompous all the time, you can muck around a bit and people welcome that, you've broken the tension melted the ice as it were and have a laugh."

Harris is to return to the stage next year for a one night only performance of song and painting at London's Royal Festival Hall.

Originally published as Chuffed Rolf wants the last laugh "



Tuesday, 1 July 2014

Catastrophic Terrorism: Tackling the New Danger By Ashton B. Carter, John Deutch, and Philip Zelikow



Home

Catastrophic Terrorism: Tackling the New Danger
By Ashton B. Carter, John Deutch, and Philip Zelikow 

FROM OUR NOVEMBER/DECEMBER 1998 ISSUE

IMAGINING THE TRANSFORMING EVENT

Terrorism is not a new phenomenon. But today's terrorists, be they international cults like Aum Shinrikyo or individual nihilists like the Unabomber, act on a greater variety of motives than ever before. More ominously, terrorists may gain access to weapons of mass destruction, including nuclear devices, germ dispensers, poison gas weapons, and even computer viruses. Also new is the world's dependence on a nearly invisible and fragile network for distributing energy and information. Long part of the Hollywood and Tom Clancy repertory of nightmarish scenarios, catastrophic terrorism has moved from far-fetched horror to a contingency that could happen next month. Although the United States still takes conventional terrorism seriously, as demonstrated by the response to the attacks on its embassies in Kenya and Tanzania in August, it is not yet prepared for the new threat of catastrophic terrorism.

American military superiority on the conventional battlefield pushes its adversaries toward unconventional alternatives. The United States has already destroyed one facility in Sudan in its attempt to target chemical weapons. Russia, storehouse of tens of thousands of weapons and material to make tens of thousands more, may be descending into turmoil. Meanwhile, the combination of new technology and lethal force has made biological weapons at least as deadly as chemical and nuclear alternatives. Technology is more accessible, and society is more vulnerable. Elaborate international networks have developed among organized criminals, drug traffickers, arms dealers, and money launderers, creating an infrastructure for catastrophic terrorism around the world.

The bombings in East Africa killed hundreds. A successful attack with weapons of mass destruction could certainly take thousands, or tens of thousands, of lives. If the device that exploded in 1993 under the World Trade Center had been nuclear, or had effectively dispersed a deadly pathogen, the resulting horror and chaos would have exceeded our ability to describe it. Such an act of catastrophic terrorism would be a watershed event in American history. It could involve loss of life and property unprecedented in peacetime and undermine America's fundamental sense of security, as did the Soviet atomic bomb test in 1949. Like Pearl Harbor, this event would divide our past and future into a before and after. The United States might respond with draconian measures, scaling back civil liberties, allowing wider surveillance of citizens, detention of suspects, and use of deadly force. More violence could follow, either further terrorist attacks or U.S. counterattacks. Belatedly, Americans would judge their leaders negligent for not addressing terrorism more urgently.

The danger of weapons of mass destruction being used against America and its allies is greater now than at any time since the Cuban missile crisis of 1962. It is a national security problem that deserves the kind of attention the Defense Department devotes to threats of military nuclear attack or regional aggression. The first obstacle to imagination is resignation. The prospects may seem so dreadful that some officials despair of doing anything useful. Some are fatalistic, as if contemplating the possibility of a supernova. Many thinkers reacted the same way at the dawn of the nuclear age, expecting doom to strike at any hour and disavowing any further interest in deterrence as a hopeless venture. But as with nuclear deterrence, the good news is that more can be done.1

ORGANIZING FOR SUCCESS

The threat of catastrophic terrorism spans the globe, defying ready classification as solely foreign or domestic. As the 1993 World Trade Center incident demonstrated, a terrorist group can include U.S. citizens and foreign nationals, operating and moving materials in and out of American territory over long periods of time. The greatest danger may arise if the threat falls into one of the crevasses in the government's overlapping jurisdictions, such as the divide between "foreign" and "domestic" terrorism or "law enforcement" versus "national security."

The law enforcement/national security divide is especially significant, carved deeply into the topography of American government. The national security paradigm fosters aggressive, active intelligence gathering. It anticipates the threat before it arises and plans preventive action against suspected targets. In contrast, the law enforcement paradigm fosters reactions to information provided voluntarily, uses ex post facto arrests and trials governed by rules of evidence, and protects the rights of citizens.

President Bill Clinton appointed a national coordinator for security, infrastructure protection, and counterterrorism in May 1998 to "bring the full force of all our resources to bear swiftly and effectively." There is no harm in the designation of a White House aide, but one should not place faith in czars. Real power still resides in the executive departments that have people, equipment, money, and the capacity to get things done.

Because most of the government functions addressing the danger of catastrophic terrorism apply to other purposes as well, the people making decisions about these capabilities against terrorists should be the same people who consider the other missions and can reconcile competing demands. The U.S. government must create unglamorous but effective systems for accountable decision-making that combine civil, military, and intelligence expertise throughout the chain of command; integrate planning and operational activity; build up institutional capacities; and highlight defensive needs before an incident happens. This strategy has four elements: intelligence and warning; prevention and deterrence; crisis and consequence management; and coordinated acquisition of equipment and technology.

INTELLIGENCE AND WARNING

The intelligence role in preventing catastrophic terrorism is complicated by nonstate actors, concealed weapons development, and unconventional deployments, all of which are hard to monitor and preempt. In cyberattacks, for example, the deployment of weapons can be entirely electronic. The U.S. government should therefore have the authority to monitor any group and its potential state sponsors that might have the motive and the means to use weapons of mass destruction. In order to detect such weapons anywhere in the world, the United States should utilize remote sensing technology and cultivate global sources of information. Necessary measures include clandestine collection of open sources, such as foreign newspapers and the Internet, as well as a full exchange of information with key allies.

Nearly a year before its attack on the Tokyo subway system the Aum Shinrikyo group had used the nerve gas Sarin in assaults on civilians. Although the Japanese media had reported the news, the U.S. government remained in the dark. Not only did Washington not hear what Japanese law enforcement agencies knew, but the Japanese agencies themselves were not aware of what other local organizations in Japan had uncovered. The parties involved did not share the expertise to prevent another attack. To this day, U.S. intelligence lacks a place to perform comprehensive planning for the collection of information, where the yields from overhead reconnaissance, electronic surveillance, clandestine agents, law enforcement databases and informants, and reports from foreign governments can be sifted and organized for maximum effect.

The intelligence job is hard but not impossible. The would-be terrorists have problems as well. If they are supported by a state, their organizations tend to be either large and leaky or small and feckless. If they are not backed by a state, the group may be small, feckless, and pathological, too. These realities form the opportunities for intelligence success. The national security agencies can seize the initiative. Domestic law enforcement officials, understandably, do not actively pursue intelligence collection but focus their efforts on informants or other evidence in investigating suspected criminal actions. Civil liberties properly discourage them from going out and looking for criminals before they have evidence of a crime. On the other hand, domestic law enforcement has many techniques for gathering data, including lawful wiretaps and grand jury investigations. Much of what these efforts yield, however, is closed off to the national security community by law or regulation to safeguard constitutional rights.

The United States needs a new institution to gather intelligence on catastrophic terrorism -- a National Terrorism Intelligence Center -- that would collect and analyze information so it could warn of suspected catastrophic terrorist acts ahead of time.

Since this center would have access to domestic law enforcement data, it should not be located at the Central Intelligence Agency. Instead, the National Center should incorporate the highly successful Director of Central Intelligence Counterterrorism Center, which has a narrower mandate than this proposal, and be located in the Federal Bureau of Investigation. However, the center would be run by an operating committee chaired by the director of central intelligence and including the director of the FBI, the deputy secretary of defense, the deputy attorney general, the deputy secretary of state, and the deputy national security adviser. The National Foreign Intelligence Program, which already provides support for the FBI's National Security Division, would cover the center's budget, while the National Security Council would take up unresolved disputes. The director of the center would come alternately from the FBI and the CIA, and all intelligence organizations would provide a specified number of professionals exempt from agency personnel ceilings.

In short, the center would combine the active intelligence gathering approach of the national security agencies, which are not legally constrained in their foreign investigations, with the domestic authority and investigative resources of law enforcement agencies. This combination is consistent with public trust and respect for civil liberties: the center would have no powers of arrest and prosecution and would maintain a certain distance from the traditional defense and intelligence agencies. The center would also be subject to oversight from existing institutions, like the federal judiciary, the President's Foreign Intelligence Advisory Board, and the select intelligence committees of Congress. Such a plan reconciles the practices of foreign intelligence work with the restrictions that limit the reach of law enforcement.

PREVENTION AND DETERRENCE

at least three measures are needed to prevent and deter catastrophic terrorism: an international legal initiative outlawing the development or possession of weapons of mass destruction, a National Information Assurance Institute, and stronger federal support for strategic risk analysis.

Outlawing Terror Weapons. Prevention is intertwined with deterrence. The United States already has a firm and increasingly credible policy that criminalizes terrorist activity and supports sanctions, and even the use of force, to thwart or respond to an attack. Washington must now work with other countries to extend the prohibitions against development or possession of weapons of mass destruction. A Harvard biologist, Matthew Meselson, has suggested a convention making any individual involved in the production of biological weapons liable as an international criminal, prosecutable anywhere, as is already the case for pirates and airplane hijackers. This proposal would still permit countries to research and plan defensive work against biological warfare agents.

Governments have already promised to restrain their weapons development in other treaties, such as the Nuclear Nonproliferation Treaty, the Biological Weapons Convention, and the Chemical Weapons Convention. Governments that break such treaties violate international law. Our proposal is different and goes further. The development of prohibited weapons would become a universal crime, opening the way to prosecute and extradite individual offenders wherever they may be found around the world. Thus the power of national criminal law would be used against people, rather than the power of international law against governments. This builds on analogous developments in piracy law, airplane hijacking, crimes of maritime navigation, theft of nuclear materials, and crimes against diplomats.

Over time, the burden of proof on states to demonstrate compliance with international conventions must shift. International norms should adapt so that states are obliged to reassure other states that are worried and to take reasonable measures to prove they are not secretly developing weapons of mass destruction. Failure to supply such proof or to prosecute the criminals living within their borders should entitle worried nations to take all necessary actions for their self-defense.

National Information Assurance Institute. Private-sector cooperation is vital but has proven elusive in the fight against cyberterrorism. The President's Commission on Critical Infrastructure Protection stressed that the private sector is reluctant to work with the government on this issue because of the high cost, unclear risk, and the prospect of heavy-handed government action. On the other hand, although the FBI has created a National Infrastructure Protection Center that can help identify weaknesses, it is too overburdened with other operational duties to work successfully with industry or harness the significant resources and expertise in the Pentagon on the cyberproblem.

Instead, a National Information Assurance Institute, based in the private, nonprofit sector, could become an industry laboratory for cyberprotection through a public-private partnership. The institute would serve as a nonprofit research organization composed of private companies, universities, and existing nonprofit laboratories, governed by a board of directors drawn from the private sector and academia. The institute staff could be supplemented from both industry and government. Industry affiliates would include not only manufacturers of information systems and service vendors but companies from the power, telecommunications, banking, transportation, oil and gas, water and sewer, and emergency service sectors. This institute could confidentially assess information assurance for industry and train industry representatives on state-of-the-art procedures ("technical best practices"), possible threats, and government policies while receiving contracts from government. In addition, it could conduct research on security assessment tools, intrusion detection, data recovery, and restoration. It would be hard for individual companies to invest in such research without claiming the proprietary right to profit from it, and difficult for any company to tell competitors about its vulnerabilities. But the government cannot do these jobs effectively on its own either. A neutral third party -- a nonprofit entity in the private sector -- is needed. As the institute develops industry standard best practices and evaluates the vulnerability of commercial products, it could rely on informal private-sector enforcement of these ideas in the marketplace -- through insurance rating, for example -- rather than government regulation. The institute could also perform incident evaluations, monitor information assurance, provide on-call assistance, and help industry develop contingency plans for failure.

Risk Analysis. This form of analysis is well known to engineers who look at a dangerous mechanical or electronic system to find key sequences of errors that can lead not just to failure, but to catastrophic failure. In this case, the role of such analysis would be to define risks, gather data to assess their relative seriousness, and subdivide the problems into components where resources can make the biggest impact. A systemic approach would include area surveillance, specific threat identification, targeted surveillance and warning, interdiction and covert action, postattack consequence management, forensic analysis, preventive and punitive action, and learning lessons.

Government agencies can do many things reasonably well, but strategic risk analysis is not one of them. A better alternative would be a nonprofit center for catastrophic terrorism risk analysis, under an FBI contract -- similar to the role of the rand Corporation early in the nuclear era. The Department of Defense has already created a good planning unit, but such a center must have a domestic, not just defense, focus. Meanwhile, the prevention of catastrophic terrorism depends on the interdiction of the people and materials involved. Guided by strategic risk analysis, a serious U.S. effort would include the development of remote sensing technology to detect nuclear, biological, and chemical weapons (and their components). Aided by international agreements among suppliers, the precursor materials that could be used to make such weapons should be chemically marked to enhance detection or ex post facto investigations.

Moreover, the United States should aspire as a long-term objective to identify every person and all freight entering the country. This goal cannot be attained soon, but even imperfect measures can raise the perceived risk to would-be terrorists that someone could intercept their weapons material. International border crossings are an important bottleneck. The United States should support a system to ensure that every country's passports are computer readable, with every country's passport control stations linked to a database that can verify the document or indicate the need for further inquiries. As with credit cards, third parties can perform this role using data supplied by participating clients -- in this case, governments. Terrorists could still use documents of nonparticipating countries, but those would attract just the suspicion they prefer to avoid.

CRISIS AND CONSEQUENCE MANAGEMENT

America bases its present system for handling terrorist emergencies on the FBI at home and the State Department or local military commanders abroad. If an acute threat emerges in the United States, local authorities must alert the FBI. In turn, the FBI's special agent in charge then organizes the intergovernmental response by activating a strategic intelligence center in Washington and a joint operations center and public affairs effort at the site of the attack. Following the East Africa bombings of U.S. embassies, for example, the State Department covered the diplomatic duties and most consequence management while the FBI took charge of the crime scene and criminal investigation.

If there were a threat of weapons of mass destruction, the FBI could call on its Weapons of Mass Destruction Operations Unit, which coordinates the response with other agencies, in particular the Pentagon. It also has the legal authority to seek military aid for a crisis on U.S. soil. Meanwhile, the Federal Emergency Management Agency (FEMA) would organize consequence management under the "Federal Response Plan." This present structure is adequate for ordinary terrorist threats or attacks, or even small scares involving weapons of mass destruction.

If the U.S. government learned that a large-scale attack of weapons of mass destruction was imminent, however, this usual structure would be pushed aside. The White House would immediately take charge and seek to use every bit of power at America's disposal to avert or contain the attack. The operational command structure would need to direct everything from CIA covert actions to air strikes; set up interdiction on ground, at sea, and in air; mobilize thousands of soldiers; and move thousands of tons of freight. None of these actions can happen quickly unless plans have already been drawn up and units designated to carry them out, with repeated training and exercises that create the readiness to bring the plans to life. In this situation, the Defense Department would take the leading role. The FBI neither commands the resources nor plans to command them.

Crisis management for catastrophic terrorism should use appropriate force in any part of the world to minimize collateral damage while thwarting a possible attack. It would include urgent protective efforts; employ every resource of federal, state, and local governments; and launch a forensic investigation after an attack to collect evidence and track down the terrorists involved.

If an attack occurs, America must respond immediately to mitigate casualties and damage. Such a massive effort would include emergency medical care; distributions of protective gear, medications, and vaccines; and possible evacuations and area quarantines. It would also require extensive preparations in central locations, the capacity to mobilize its units on sudden notice, and cooperation of local authorities.

The United States needs a two-tier response structure: one for ordinary terrorist incidents that federal law enforcement can manage with interagency help, and another for truly catastrophic terrorist attacks. The government would require two new offices, one within the office of the defense secretary, and the other within the existing U.S. Atlantic Command, which already bears operational responsibility for the defense of the American homeland and the majority of the U.S. armed forces. These Catastrophic Terrorism Response Offices, or CTROS, would coordinate federal, state, and local authorities as well as the private sector to respond to major terrorist threats once they are activated by the president and the defense secretary.

The two CTROS should have the responsibility and accountability for U.S. readiness to handle catastrophic terrorist threats upon activation by the president. The defense secretary would serve as executive agent for both offices and their budget programs, so that they could be incorporated into the Department of Defense's program budgeting system, and he would submit a consolidated catastrophic terrorism response program for the president's budget proposal. Congress moved toward such a goal in the Defense against Weapons of Mass Destruction Act of 1996 (more commonly known as the Nunn-Lugar-Domenici Amendment, or Nunn-Lugar II), which mandated that the Pentagon train civilian emergency personnel at all levels of government and establish rapid terrorism response teams. This idea broadens the scope of the initiative and provides a stronger institutional base.

The Department of Defense would play a strong supporting role, but not the leading one. Its responsibilities would be contingent, not routine. It has the resources and capabilities to meet the challenge of biological and chemical weapons, but it should apply those resources either to crisis management or to postattack planning as part of a larger national effort.

Why two offices, rather than one? The CTRO in the Pentagon would concentrate on preparedness for preemptive and/or retaliatory strikes, through covert action or the armed forces. It would draw additional staff from a relatively narrow set of agencies: the Joint Chiefs of Staff, the CIA, and the FBI. This is a highly secret, delicate activity that currently only the CIA and the Joint Chiefs of Staff -- not the FBI -- cover in an ad hoc manner. The second office, in contrast, would handle a much broader range of activities that affect prevention, containment, and management of the postattack consequences. It would draw on the resources of the National Guard, FEMA, the Department of Health and Human Services, and other federal, state, and local agencies. This office would function like a large orchestra that an integrated structure like the U.S. Atlantic Command could activate in an emergency.

Neither of these new offices need be very large. Their jobs would involve planning, not day-to-day intelligence gathering, law enforcement, or combat operations. Yet their work will be invaluable should a crisis ever come.

ACQUISITION

Today the U.S. government is ordering everything from vaccines to new research, with nearly two dozen agencies issuing their own separate shopping lists. When these budget requests arrive in Congress, the lack of planning creates difficult choices for committees, which then argue with each other about how to divide the appropriations pie. The government should instead coordinate all budgets involving counterterrorism capabilities. The United States needs to acquire technology such as detectors of special materials (like radioactive substances), forensic investigation tools, automated tracking and analysis systems, and protective clothing and equipment. The Clinton administration has already started to acquire stockpiles of vaccines, antidotes, and antibiotics, adding to such a program already underway for the U.S. armed forces. But it still needs resources for storage and shipment of medications as well as research into defense against biological weapons. Laboratories around the country also need improved detection devices so they can rapidly analyze substances and check field identifications.

Attorney General Janet Reno has warned Congress of the extraordinary acquisition requirements of a serious policy addressing catastrophic terrorism. In April, she explained that "we may need to develop an approach which will permit the government to accelerate the normal procurement procedures to quickly identify and deploy new technologies and substances needed to thwart terrorist threats and respond to terrorist acts. These procedures would be used not only to purchase medications and other needed tools, but also in some instances, to borrow medications or tools from, or to enter in effective partnership with, academia and industry." This statement is a call for an interdepartmental acquisition program that draws on Pentagon expertise. Despite its limitations, the Defense Department still has the best track record in the government for successful sponsorship of technological development and rapid, large-scale procurement.

This proposed acquisition program for counterterrorism would be distinct from other programs for cooperative threat reduction (like the Nunn-Lugar programs for the former Soviet Union), the reducing of narcotics trafficking and organized crime, and nonproliferation activities. The government requires an effective interdepartmental committee system -- a National Counterterrorism Acquisition Council -- chaired by the undersecretary of defense for acquisition and technology. The council should include representatives from other departments, including top subcabinet officials from the Departments of Justice, Energy, Treasury, State, and Health and Human Services, as well as the deputy director of the FBI, the deputy CIA director for science and technology, and the FEMA director.

This acquisition council would need to oversee the field testing and evaluation of new capabilities with the participation of several concerned agencies. Some agencies might worry about the Pentagon usurping the procurement decisions. But it is precisely these agencies that should want the national program. The Defense Department will already be acquiring vast quantities of equipment for its own needs. Suppliers will naturally configure themselves around this demand. Civilian agencies need a way to ensure that their particular requirements are taken into account as well. The acquisition council can also help agencies share technology, tactics, and materiel. Further, this council can provide a point of contact for international programs and technology-sharing with other nations. It can provide government-wide procedures, controlling access to especially sensitive projects within the national counterterrorism program. Although various departments would execute the program, the acquisition council would still be responsible for monitoring the progress of each program element and should be expected to report annually on progress to both the president and Congress.

OVERCOMING DISBELIEF

Catastrophic terrorism poses an eminent threat to America's future. But the United States can fight back only if it sets the right goals. In 1940 and 1941, the U.S. government pondered what kind of forces it would need to wage a global war. The answers went so far beyond the imagination that wry smiles and shaking heads in Washington offices greeted the planning papers as they made their rounds. The Cold War saw a similar pattern of disbelief. The notion of an intelligence system founded on photographic surveillance from the upper atmosphere or outer space seemed outrageously far-fetched in 1954, when the U-2 program was born. The films and cameras alone seemed an overwhelming hurdle. A few years later the U-2s were flying; six years later satellites were in place. Similar stories could be told about the remarkable history of intercontinental missile guidance or the fast deployment of more than a half-million troops and thousands of armored vehicles to the Persian Gulf in 1991 and 1992. America can meet new challenges, but it must first imagine success. Only then can it organize itself to attain it.

*This article is a distillation of the complete report of the Universities Study Group on Catastrophic Terrorism, published by Stanford University. A version of it will appear as a chapter in the forthcoming Preventive Defense: An American Security Strategy for the 21st Century, by Ashton Carter and William Perry. Members of the group, which was convened by the Kennedy School of Government's "Visions of Governance in the 21st Century" Project, are Graham Allison, Zoe Baird, Victor DeMarines, Robert Gates, Jamie Gorelick, Robert Hermann, Philip Heymann, Fred Ikl‚, Elaine Kamarck, Matthew Meselson, Joseph Nye, William Perry, Larry Potts, Fred Schauer, J. Terry Scott, Jack Sheehan, Malcolm Sparrow, Herbert Winokur, and Robert Zoellick. Though most members are sympathetic to our conclusions, none is responsible for this essay.

True Love Waits...



Listen like Thieves...

"He was quite a dominating and forceful person, he always had an opinion and he liked to debate things. Paula would tell me very early on that Bob always had to win in an argument. And if he thought he was losing, he would suddenly quote statistics, or a fact, which would be completely made up. Bob felt he was the boss, the man of the house, and he would always express his worries about Paula's work when he was there, but in a concerned way.


She told me she was quite scared of him..."

The "Curse" of Harry Nilsson

Is there really a Curse of Harry Nilsson, or is Harry Nilsson helping to kill these people...?

Consider "The Kennedy Curse"...


"While many purveyors of early Rock & Roll are familiar with the "curse" of Buddy Holly, most are not aware of the fatal bad luck that seemed to be connected to singer/songwriter Harry Nilsson.

Harry Nilsson's popularity lasted from the late 1960s until roughly the mid-1970s. His hits include, "You Can't Do That," "Everybody's Talkin'," "One" (as recorded by Three Dog Night), "Best Friend" (the theme from television's The Courtship of Eddie's Father), "I Guess the Lord Must Be in New York City," "Me and My Arrow," Badfinger's "Without You," "Coconut," "Jump Into the Fire" and "Spaceman." While a luminary of the Rock pantheon, Nilsson kept famous and talented company. Curiously, many who claimed Nilsson's association came to untimely and tragic ends.

Badfinger

Badfinger: Mike Gibbins, Pete Ham, Tom Evans, & Joey Molland

Badfinger's career was plagued by chaotic finances, dubious management and legal woes. In 1970, the band (Tom Evans, Mike Gibbins, Pete Ham and Joey Molland) released the album, No Dice, containing the track "Without You" (written by Evans and Ham). The song was unremarkable. A year later, Harry Nilsson covered "Without You"; it stayed at #1 on the charts for four weeks. In 1975, Pete Ham, distressed over the state of his personal finances, hanged himself in his garage/studio. He was 28. Tom Evans, reportedly after an argument with Joey Molland over the royalty division for "Without You," hanged himself in the garden of his home. It was 1983 and he was 36. Mike Gibbins would die in his sleep in 2005 - at the ripe old age of 56.

"Mama" Cass

The Mamas & The Papas: 
Denny Doherty (d. 2007), Cass Elliot (d. 1974), John Phillips (d. 2001), and Michelle Phillips.

During the 1970s, Nilsson owned a flat at 12 Curzon Place in London. In 1974, Cass Elliot, formerly of The Mamas and the Papas, was performing at the London Palladium. Nilsson allowed Elliot to use his apartment while he was out of the country. On 29 July 1974, Mama Cass was found dead in the bedroom of Nilsson's apartment, of heart failure. She was 32. (Elliot's bandmates, John Phillips and Denny Doherty would also fail to reach old age. Phillips died in 2001 at age 65 from heart failure, and Doherty passed away at age 66 after a brief illness in 2005.)

Keith Moon


On 6 September 1978, Keith Moon, eccentric drummer for The Who, previewed The Buddy Holly Story and dined with his girlfriend, Annette Walter-Lax, and Paul and Linda McCartney. Moon and Walter-Lax returned to a flat owned by Harry Nilsson - the same flat at 12 Curzon Place, London, where "Mama" Cass Elliot had died four years earlier. Moon supposedly woke up at 7:30 on the morning of the seventh, and returned to bed. At 3:40 pm, Walter-Lax tried to wake him, but he was unresponsive. At some point during the previous night or that morning, he had ingested 32 tablets of Clomethiazole (Heminevrin), a sedative prescribed for alcohol withdrawal. Keith Moon was dead of a prescription drug overdose. (The Who's bassist, John Entwistle, would die from a heart attack brought on by cocaine use in 2002. Entwistle was 57.) Red more about Moon's connection to the Curse of Buddy Holly.

John Lennon

John Lennon with Harry Nilsson

John Lennon was a fan of Nilsson's since 1968. They forged a lasting friendship and became notorious drinking buddies. Lennon turned to Nilsson during his separation from wife, Yoko Ono, in 1974, and the two embarked on a campaign of drunken and drug-induced chaos.
On 8 December 1980, Lennon and Ono were returning home to the Dakota Apartments in New York City when deranged fan, Mark David Chapman, shot the ex-Beatle to death. Lennon was 40. While still with The Beatles, Lennon was asked how he expected to die. He lightly answered: "I'll probably be popped off by some loony."

Fellow Beatle, George Harrison, passed away in 2001 at the age of 58. The cause was cancer. (Lennon and Harrison also figure into the Curse of Buddy Holly.)

Harry Nilsson


Although he survived most of the others by at least ten years, Harry Nilsson was not able to escape the bad luck that seemed to follow him. He suffered a massive heart attack in 1993. He passed away on 15 January 1994 of heart failure. He was 52.

Bruce Gary

Gary was the original drummer for the Knack ("My Sharona") and recorded with solo artists including George Harrison, Bob Dylan, Stephen Stills, Yoko Ono, and Harry Nilsson. He died in 2004 from lynphoma. He was 55.

Diana: Spot the Fake



You're Being Lied To.