Posted by: Puddy Dunne | March 11, 2012

Identity Ecosystem Governance

This document provides a simple outline from where all projects regarding internet, data and information spectrum domination are derived. From SOPA to NDAA to drones the GLOBAL SMART GRID is just as advertized. SMART.

Now the universal internet ID will be coming this year behind NSTIC  and the Commerce Department as part of the climate change/HAARP  type cover program called  Identity Ecosystem Governance which is just full spectrum IO surveillance

Information Operations, Electronic Warfare and Cyberwar: Capabilities and Related Policy Issues  2007
DOD Information Operations Core Capabilities
DOD identifies five core capabilities for conduct of information operations; (1)
Psychological Operations, (2) Military Deception, (3) Operations Security, (4)
Computer Network Operations, and (5) Electronic Warfare. These capabilities are interdependent, and increasingly are integrated to achieve desired effects.
Psychological Operations (PSYOP)

DOD defines PSYOP as planned operations to convey selected information to targeted foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behavior of foreign governments, organizations, groups, and individuals.5

For example, during the Operation Iraqi Freedom (OIF), broadcast
messages were sent from Air Force EC-130E aircraft, and from Navy ships operating in the Persian Gulf, along with a barrage of e-mail, faxes, and cell phone calls to numerous Iraqi leaders encouraging them to abandon support for Saddam Hussein.
At the same time, the civilian Al Jazeera news network, based in Qatar, beams
its messages to well over 35 million viewers in the Middle East, and is considered by many to be a “market competitor” for U.S. PSYOP. Terrorist groups can also use the Internet to quickly place their own messages before an international audience.
Some observers have stated that the U.S. will continue to lose ground in the global media wars until it develops a coordinated strategic communications strategy to counter competitive civilian news media, such as Al Jazeera.6
Partly in response to this observation, DOD now emphases that PSYOP must
be improved and focused against potential adversary decisionmaking, sometimes well in advance of times of conflict. Products created for PSYOP must be based on in-depth knowledge of the audience’s decision-making processes. Using this  knowledge, the PSYOPS products then must be produced rapidly, and disseminated directly to targeted audiences throughout the area of operations.7
DOD policy prohibits the use of PSYOP for targeting American audiences.
However, while military PSYOP products are intended for foreign targeted
audiences, DOD also acknowledges that the global media may pick up some of these targeted messages, and replay them back to the U.S. domestic audience. Therefore, a sharp distinction between foreign and domestic audiences cannot be maintained.8
Military Deception (MILDEC)
Deception guides an enemy into making mistakes by presenting false
information, images, or statements. MILDEC is defined as actions executed to
deliberately mislead adversary military decision makers with regard to friendly military capabilities, thereby causing the adversary to take (or fail to take) specific actions that will contribute to the success of the friendly military operation.
As an example of deception during Operation Iraqi Freedom (OIF), the U.S.
Navy deployed the Tactical Air Launched Decoy system to divert Iraqi air defenses away from real combat aircraft.
Operational Security (OPSEC)
OPSEC is defined as a process of identifying information that is critical to
friendly operations and which could enable adversaries to attack operational
vulnerabilities. For example, during OIF, U.S. forces were warned to remove certain information from DOD public websites, so that Iraqi forces could not exploit sensitive but unclassified information.
Computer Network Operations (CNO)
CNO includes the capability to: (1) attack and disrupt enemy computer
networks; (2) defend our own military information systems; and (3) exploit enemy computer networks through intelligence collection, usually done through use of computer code and computer applications. The Joint Information Operations Warfare Command (JIOWC) and the Joint Functional Component Command for Network Warfare (JFCCNW) are responsible for the evolving mission of Computer Network Attack.9
The exact capabilities of the JIOWC and JFCCNW are highly
classified, and DOD officials have reportedly never admitted to launching a cyber attack against an enemy, however many computer security officials believe the organization can destroy networks and penetrate enemy computers to steal or manipulate data, and take down enemy command-and-control systems. They also believe that the organization consists of personnel from the CIA, National Security Agency, FBI, the four military branches, and civilians and military representatives from allied nations.10
Computer Network Defense (CND)
CND is defined as defensive measures to protect information, computers, and networks from disruption or destruction. CND includes actions taken to monitor, detect, and respond to unauthorized computer activity. Responses to IO attack against U.S. forces may include use of passive information assurance tools, such as firewalls or data encryption, or may include more intrusive actions, such as monitoring adversary computers to determine their capabilities before they can attempt an IO attack against U.S. forces.
Some DOD officials believes that CND may lack sufficient policy and legal
analysis for guiding appropriate responses to intrusions or attacks on DOD networks. Therefore, DOD has recommended that a legal review be conducted to determine what level of intrusion or data manipulation constitutes an attack. The distinction is necessary in order to clarify whether an action should be called an attack or an intelligence collection operation, and which aggressive actions can be appropriately taken in self-defense. This legal review should also determine if appropriate authorities permit U.S. forces to retaliate through manipulation of unwitting third party computer hosts. And finally, DOD has recommended structuring a legal regime that applies separately to domestic and to foreign sources of computer attack against
DOD or the U.S. critical. infrastructure.11
Computer Network Exploitation (CNE)
CNE is an area of IO that is not yet clearly defined within DOD. Before a crisis develops, DOD seeks to prepare the IO battlespace through intelligence, surveillance, and reconnaissance, and through extensive planning activities. This involves intelligence collection, that in the case of IO, is usually performed through network tools that penetrate adversary systems
to gain information about system vulnerabilities, or to make unauthorized copies of important files. Tools used for CNE are similar to those used for computer attack, but configured for intelligence collection rather than system disruption.
Computer Network Attack (CNA)
CNA is defined as effects intended to disrupt or destroy information resident in computers and computer networks. As a distinguishing feature, CNA normally relies on a data stream used as a weapon to execute an attack. For example, sending a digital signal stream through a network to instruct a controller to shut off the power flow is CNA, while sending a high voltage surge through the electrical power cable to short out the power supply is considered Electronic Warfare (However, a digital stream of computer code or a pulse of electromagnetic power can both be used to also create false images in
adversary computers). During Operation Iraqi Freedom, U.S. and coalition forces reportedly did not execute any computer network attacks against Iraqi systems. Even though comprehensive IO plans were prepared in advance, DOD officials stated that toplevel approval for several CNA missions was not granted until it was too late to carry them out to achieve war objectives.
U.S. officials may have rejected launching a planned cyber attack against Iraqi financial computers because Iraq’s banking network is connected to a financial communications network also located in Europe. Consequently, according to Pentagon sources, an information operations attack directed at Iraq might also have brought down banks and ATM machines located in parts of Europe as well. Such global network interconnections, plus close network links between Iraqi military computer systems and the civilian infrastructure, reportedly frustrated attempts by U.S. forces to design a cyber attack that would be limited to military targets only in Iraq.13
In a meeting held in January 2003, at the Massachusetts Institute of Technology, White House officials sought input from experts outside government on guidelines for use of cyber-warfare. Officials have stated they are proceeding cautiously, since a cyberattack could have serious cascading effects, perhaps causing major disruption to networked civilian systems.14
In February 2003, the Bush Administration announced national-level guidance for determining when and how the United States would launch computer network attacks against foreign adversary computer systems. The classified guidance, known as National Security Presidential Directive 16, is intended to clarify circumstances under which a disabling computer attack would be justified, and who has authority to launch such an attack.
Electronic Warfare (EW)
EW is defined by DOD as any military action involving the direction or control
of electromagnetic spectrum energy to deceive or attack the enemy. High power electromagnetic energy can be used as a tool to overload or disrupt the electrical circuitry of almost any equipment that uses transistors, micro-circuits, or metal wiring.15
Directed energy weapons amplify, or disrupt, the power of an electromagnetic field by projecting enough energy to overheat and permanentlydamage circuitry, or jam, overpower, and misdirect the processing in computerized systems. The Electronic Warfare Division of the Army Asymmetric Warfare Office has responsibility for creating electronic warfare policy, and for supporting
development of new electromagnetic spectrum concepts that can be translated into equipment and weapons.

Domination of the Electromagnetic Spectrum.

DOD now emphasizes maximum control of the entire electromagnetic spectrum, including the capability to disrupt all current and future communication systems, sensors, and weapons systems. This may include: (1) navigation warfare, including methods for offensive space operations where global positioning satellites may be disrupted; or, (2) methods to control adversary radio systems; and, (3) methods to place false images onto radar systems, block directed energy weapons, and misdirect unmanned aerial vehicles(UAVs) or robots operated by adversaries.16

For example, recent military IO testing examined the capability to secretly enter an enemy computer network and monitor what their radar systems could detect. Further experiments tested the capability to take over enemy computers and manipulate their radar to show false images.17
For example, recent military IO testing examined the capability to secretly enter an enemy computer network and monitor what their radar systems could detect. Further experiments tested the capability to take over enemy computers and manipulate their radar to show false images.17

Electromagnetic Non-Kinetic Weapons.

Non-Kinetic Weapons emit directed electromagnetic energy that, in short pulses, may permanently disable enemy computer circuitry. For example, an electromagnetic non-kinetic weapon mounted in an aircraft, or on the ground, might disable an approaching enemy missile by directing a High Power Microwave (HPM) beam that burns out the circuitry, or that sends a false telemetry signal to misdirect the targeting computer.18

Also at reduced power, electromagnetic non-kinetic weapons can also be used as a non-lethal method for crowd control.

The Active Denial System (ADS), developed by the Air Force, is a vehiclemounted nonlethal, counter-personnel directed energy weapon. Currently, most non-lethal weapons for crowd control, such as bean-bag rounds, utilize kinetic energy. However, the ADS projects a focused beam of millimeter energy waves to induce an intolerable burning sensation on an adversary’s skin, repelling the individual without causing injury. Proponents say the ADS is safe and effective at ranges between 50 and 1,600 feet. The nonlethal capabilities of the ADS are designed to protect the innocent, minimize fatalities, and limit collateral damage.19

The Pentagon reportedly has requested immediate deployment of at least 8 ADS devices to Iraq to assist Marines in guarding posts, countering insurgent snipers and protecting convoys. The ADS system would be the first operationally deployed directed-energy weapon for counter-personnel missions.20

Some observers have stated that success in future conflicts will depend less on
the will of governments, and more on the perceptions of populations, and that
perception control will be achieved and opinions shaped by the warring group that best exploits the global media39. As a result of the increasingly sophisticated use of networks by terrorist groups and the potentially strong influence of messages carried by the global media, does DOD now view the Internet and the mainstream media as a possible threat to the success of U.S. military missions? How strongly will U.S. military PSYOP be used to manipulate public opinion, or reduce opposition to unpopular decisions in the future?
Another emerging issue may be whether DOD is legislatively authorized to
 engage in PSYOP that may also affect domestic audiences.
 DOD Joint Publication 3-13, released February 2006, provides current doctrine for U.S. military Information Operations, and explains the importance of achieving information superiority.41
However, the DOD Information Operations Roadmap, published October 2003, states that PSYOP messages intended for foreign audiences increasingly are consumed by the U.S. domestic audience, usually because they can be re-broadcast through the global media. The Roadmap document states that, “…the distinction between foreign and domestic audiences becomes more a question of USG (U.S. Government) intent rather than information dissemination practices (by DOD).”42


  1. Reblogged this on Johnsono ne'Blog'as and commented:
    Verčiamės ir skaitom.

  2. Proponents say the ADS is safe and effective at ranges between 50 and 1,600 feet. The nonlethal capabilities of the ADS are designed to protect the innocent, minimize fatalities, and limit collateral damage”

    This paragraph made me laugh out loud because we all know how interested they are in protecting the innocent… ha! Bastards. Off with their heads …all of them!

  3. Puddy has been excavating data again. I noticed something very strange here in our county. There are only 3 places to buy food and the 3 stores all have a cage built outside to lock up the valuable bags of potting soil (that sell for 2 dlls. ) the cages are large enough to accomodate 100 persons easy. I predict when we go into siege (lockdown) the stores will then be bus stations (to hell).

  4. Boomer said the email was dire. Did you read it? Prepper shows are 24/7.

    His email said Montana prison personnel were advised to bug out 6 months supply.

    In the 5 doomsday scenario’s the asteroid DA14, or Yellowstone seem the likeliest if not a cyber EMP.

    Here’s some interesting Blue Projects


    THE BLUE PILL (refer to puddy’s doomsday implant)

  5. There are some simple deductions I can make without much doubt.

    1) I can find more intelligence and DoD info than ever before. Really deep stuff going into Cyberwar execution, Radio control IED, Human Event detection, Bioweaponry science etc, etc.

    If the Islamists, terrorists, Rogue states wanted to they could access all of this better than I could. And put it into the hands of people far smarter than this dude.

    But when you operate all the Roogue states and terrorists there are no security issues. The only security issue is me (we) who would expose the con.

    2) Example

    Another Big Blue Omnibus project is Blue Coat Systems

    Web filtering and internet monitoring by this technology was supposedly confirmed in Syria for censorship of which the US is crying foul to Bluecoat.

    How about the Redcoats? Are we to believe the US hasn’t provided this in events that were shown where foreign factions were uploading proof of al-CIAda, French and British mercenaries acting as rebel freedom fighting citizens?

    I know that if such a person like Syria Girl would try to post some evidence, those freedom fighting Xe types would just gang rape her and kill her but there still has to be a Mossad software version working in reverse.

  6. This short article ends up asking the pointed questions that need to be asked —

    Observation reveals the useless, spineless, treasonous CONgress has been shit-canned as a faux “People’s Representatives” body.

    Apparently, their “use before” date is up, and the puppet masters feel confident enough to impose their will without the limp-wristed interference of the poofters. They’re peeling off the rubber and readying for a real orgy upon The People. That’s what they do is it not? Fuck The People. Now, with no pretenses, or sham covering. Maybe it “Feels Better, Feels More Real”, closer to the skin? (sic)

    We’ve reached “That Point” where nobody believes the lies and propaganda anyways (categorically), so why not just bring the ‘programs’ out in the open?

    Psychopathic Killers want notoriety for their dirty deeds. First, they do it in secret, in the dark. After getting away with it for so long, they’re ready for the “Star” treatment and recognition.

    The important question is, how long and to what lengths will American Soldiers go in Killing for Corporations (K4C)?

    • Haven’t seen much of Marti lately. In 1992 and Clinton on board, I warned about G^6 project. Nixon and China and the gorby devil and fall of the Soviets were obvious clues to the Great Whore UN.

      As was Carter a groomed stooge unknown, so was Clinton and Obama. These groomed quarterhorses improve as the technology does. Barry is as polished as you can get.

      He doesn’t have the quirks and quarks of Carter or Billy-boy but the Soros-Bzig-Quigley bunch believes they can still improve the model. This one is being raised in a petri dish in Switzerland as we speak. Must be a mass of gel weighing about 3 pounds by now 🙂

  7. The TH video sounds just like a ‘talking head CNN robotnik” giving a news story about a serial killer. Killer of children, beauty, landscapes and jobs by the praetorians but they kill the truth and that’s the serial nature of the devils.

  8. O.K. Here’s the latest Breitbart video —

    Do listen to the very end when Obama the Orator plugs the commie-loving congressman as great because he “Shares Our Values!”. (sic)

    Any questions?!

    • Great video. Clear cut NWO agenda under the same old con. Excellent video.

  9. Americans — Hello! What part of “I’m a Communist, I Share Their Values” don’t you understand?

    Do Actions start to complete the picture?

  10. More Important Stuff to Consider…


    I read this, and I’m thinking “closer to home” is better than some burr-o-crap or worse in D.C. passing B.S. laws and sending out email memos for compliance. My first question is, “are there more than a handful of corruption-savvy sheriffs?” If they’re stormtroopers and psychosheriffs then they’re obviously part of the problem. The long arm of the law reaching, reaching, reaching to break the neck of The People.

    Yet, The People need a “lawful” force who will defend commonsense and Creator Laws of Liberty. Something to think about. The Plastic People in Legoland DC should be shocked to find out their laws are just paper and spit. Sure as spit we’ll be finding out soon.

  11. Where IS Everybody? I can hear my own “Echo” coming back off the machine’s walls.

    Ron Paul provides an answer here to the rhetorical questions being asked about the United States Castrated CONgress:

    He’s a bit droll but you get the point.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s


%d bloggers like this: