"Top Secret" U.S Military Document Declares Existence of "Domestic Insurgency" Inside U.S.

Started by MikeWB, August 24, 2008, 04:48:03 PM

Previous topic - Next topic

MikeWB

NOTE! Hal Turner is a white supremacist radio talk show host and he's been exposed as an FBI informant. So take this post with a huge grain of salt. I'm posting this because the document he discloses does sound credible (to a certain degree) and is definitely something that the gov might be thinking.

http://cache.search.yahoo.net/search/ca ... 1&.intl=us

Quote"TOP SECRET" U.S MILITARY DOCUMENT DECLARES EXISTENCE OF "DOMESTIC INSURGENCY" INSIDE U.S.PLAN OUTLINES GOVERNMENT INTENT TO USE MILITARY FORCE AGAINST U.S. CITIZENS OVER POLITICAL ISSUES!DESCRIBES USING PSYCHOLOGICAL OPERATIONS, OUTRIGHT MILITARY FORCE AND MEDIA PROPAGANDA AGAINST U.S. CITIZENSBy: Hal TurnerNorth Bergen, NJ -- As a radio talk show host, I receive a whole slew of e-mail and regular mail
about virtually every issue under the sun. Much of it gets deleted or thrown away. Some of it
results in stories appearing on my web site or being discussed on my show. Every once in awhile,
something akin to a bombshell arrives and yesterday, July 18, 2007 was one such day.I came into possession of portions of a U.S. military plan which was allegedly classified "Top
Secret." This put me in a bind because without having a security clearance myself, having
something which is Classified is unlawful. Reading such a document is also unlawful and
revealing it to the public is definitely unlawful. So, I thought about it. I decided screw it, I'm going
to read it.As I read the document, my blood ran cold. Chills ran up my spine. The hair on the back of my
neck stood up. My gut started churning. This document is an operational plan to use U.S.
military troops against U.S. Citizens!The plan says "A perceived serious potential of dissident American groups rising up against
constituted authority has been clearly identified by counter-intelligence agencies.[Underlining
mine]The plan goes on to say why people are clearly thinking of rising up and throwing-off our federal
government by saying "The stated cause for such an uprising appear to be growing
dissatisfaction with the course and conduct of the war in Iraq, the chronic inability of Congress to
deal with various pressing issues and the perception of widespread corruption and indifference to
public needs."Sounds accurate to me. In fact, it describes perfectly reasonable justification for the America
people to utilize our original right of self-defense against such a government or for us to impose
reform!Most stunning about the plan is that it talks about political reform and offers an unbelievably out-
of-touch, completely un-American observation: "Reform may be necessary, but reform is a matter
for the state . . . . ."A matter for the state? We The People ARE the state. We The People decide on reform. For this
U.S. military plan to assert "Reform may be necessary, but reform is a matter for the state" is like
reading something out of the old Soviet Union! What planet are these people on?The truly chilling parts of this plan involve the use of "Informant nets" of Americans literally
spying on their fellow citizens and "Block Control" where the plan calls for "trusted resident
reports on the activities of people in their neighborhoods." Folks, this is what Fidel Castro does in
Communist Cuba!As you read the details below, remember this: This plan has been drawn up by OUR military. The
military WE hired, WE train, WE equip, WE feed, WE clothe, WE house. It is an OUTRAGE that
anyone in our military would DARE to even create such plan, never mind try to implement it!A Blunt warning to our Government and our Military:In our nation of 300 million people, there are at least 95 million lawful gun owners. Those 95
million guns owners lawfully possess 212 million firearms. Even if the government recalled ALL military members from around the entire world, they would
have a force of only about two million. 95 million gun owners versus 2 million troops. I think we all know how this would turn out: the
government would be slaughtered.In fact, if only ten percent of the 95 million gun owners had guts enough to fight, we would still
outnumber the military almost 3:1.We The People of the United States aren't the least bit worried about government tanks and
planes, those tools are useless in guerilla warfare. Want proof? Iraq! The U.S. government is
getting its ass kicked over there. Government wouldn't last a week if they tried implementing this
plan here.Government would do well to remember they exist at the whim and behest of the American
people. Government in this land exists to serve us as we direct.The power government wields belongs to The People. We The People merely LEND part of our
power to government and we have the absolute right to take that power back at any time we
deem appropriate. In fact, the founding fathers made clear we can take it back in any MANNER
we deem appropriate! That's why they gave us the Second Amendment!If the U.S. government or military dares attempt to implement this plan, they should expect to be
killed.----------------- PRECIS OF THE PLAN ---------------------Classification: Top Secret-Noforn as of 1 June 2007 Distribution Restriction: Distribution authorized to the DOD and DOD contractors only
to maintain operations security. This determination was made on 1 June 2007. Other
requests for this document must be referred to (redacted)Destruction Notice: Destroy by any method that will prevent disclosure of contents or
reconstruction of the document. .This publication uses the term insurgent to describe those taking part in any activity
designed to undermine or to overthrow the established authoritiesCounterinsurgency is those military, paramilitary, political, economic, psychological, and
civic actions taken by a government to defeat insurgency (JP 1-02). It is an offensive
approach involving all elements of national power; it can take place across the range of
operations and spectrum of conflict
In dealing with the local populace, the primary aims must be to:·Protect the population.·Establish local political institutions.·Reinforce local governments.·Eliminate insurgent capabilities.·Exploit information from local sources.An insurgency is organized movement aimed at the overthrow of a constituted
government through use of subversion and armed conflict (JP 1-02). It is a protracted
politico-military struggle designed to weaken government control and legitimacy while
increasing insurgent control. Political power is the central issue in an insurgency.An insurgent organization normally consists of four elements:Leadership.Combatants (main forces, regional forces, local forces).Cadre (local political leaders that are also called the militants).Mass base (the bulk of the membership).The support of the people, passive or active then, is the center of gravity. It must be
gained in whatever proportion is necessary to sustain the insurgent movement (or,
contrariwise, to defeat it). As in any political campaign, all levels of support are relative.Insurgent movements begin as "fire in the minds of men." Insurgent leaders commit
themselves to building a new world. They construct the organization to carry through this
desire. Generally, popular grievances become insurgent causes when interpreted and
shaped by the insurgent leadership. The insurgency grows if the cadre that is local
insurgent leaders and representatives can establish a link between the insurgent
movement and the desire for solutions to grievances sought by the local populationInsurgent leaders will exploit opportunities created by government security force actions.
The behavior of security forces is critical. Lack of security force discipline leads to
alienation, and security force abuse of the populace is a very effective insurgent
recruiting tool. Consequently, specific insurgent tactical actions are often planned to
frequently elicit overreaction from security force individuals and units.Insurgencies are dynamic political movements, resulting from real or perceived grievance
or neglect that leads to alienation from an established government.A successful counterinsurgency will result in the neutralization by the state of the
insurgency and its effort to form a counter state. While many abortive insurgencies are
defeated by military and police actions alone, if an insurgency has tapped into serious
grievances and has mobilized a significant portion of the population, simply returning to
the status quo may not be an option. Reform may be necessary, but reform is a matter for
the state, using all of its human and material resources. Security forces are only one such
resource. The response must be multifaceted and coordinated, yet states typically charge
their security forces with "waging counterinsurgency." This the security forces cannot do
alone.These imperatives are:· Facilitate establishment or reestablishment of a 'legitimate government'.· Counterinsurgency requires perseverance.· Foster popular support for the incumbent US government.· Prepare to perform functions and conduct operations that are outside normal scope of
training.· Coordinate with US governmental departments and agencies, and with vital non-
governmental, agencies.Urban operations.· Protection of government facilities.· Protection of infrastructure.· Protection of commercial enterprises vital to the HN economy.· Protection of cultural facilities.· Prevention of looting.· Military police functions.· Close interaction with civilians.· Assistance with reconstruction projects.
· Securing the national borders.· Training or retraining a national military police and security force.Establishing and maintaining local government credibility.· Contributing local government is both tangible and psychological. Local security forces
must reinforce and be integrated into the plan at every stage.· Facilitate and use information and intelligence obtained from local sources to gain
access to the insurgent's economic and social base of support, order of battle, tactics,
techniques, and procedures.Army forces help local pro-government police, paramilitary, and military forces perform
counterinsurgency, area security, or local security operations. They advise and assist in
finding, dispersing, capturing, and destroying the insurgent force.US forces may conduct offensive operations to disrupt and destroy insurgent combat
formations. These operations prevent the insurgents from attacking government-
controlled areas.There are many organizations and extensive resources available to aid counterinsurgent
forces.Commanders should not overlook the aid these organizations may provide. All forces
assigned an AO or function should determine which departments and agencies are
assisting in that AO and coordinate actions so that there is no duplication of effort. Such
departments,councils and agencies include-· National Security Council.· Department of Defense.· Department of State.· Department of Justice.· Department of the Treasury.· Department of Homeland Security.· Department of Agriculture.
· Department of Commerce.· Central Intelligence Agency.· Department of TransportationVarious governmental departments directly administer or support other governmental
agencies. Examples of these US agencies are-· The US Coast Guard (under Department of Homeland Security).· The Federal Bureau of Investigation (under Department of Justice).· Immigration Customs Enforcement (under Department of Homeland Security).· Federal Communications Commission. The proper application of force is a critical component to any successful
counterinsurgency operation. In a counterinsurgency, the center of gravity is public
support. In order to defeat an insurgent force, US forces must be able to separate
insurgents from the population. At the same time, US forces must conduct themselves in
a manner that enables them to maintain popular domestic support. Excessive or
indiscriminant use of force is likely to alienate the local populace, thereby increasing
support for insurgent forces. Insufficient use of force results in increased risks to US
forces and perceived weaknesses that can jeopardize the mission by emboldening
insurgents and undermining domestic popular support. Achieving the appropriate balance
requires a thorough understanding of the nature and causes of the insurgency, the end
state, and the military's role in a counterinsurgency operation. Nevertheless, US forces
always retain the right to use necessary and proportional force for individual and unit
self-defense in response to a hostile act or demonstrated hostile intent.The media, print and broadcast (radio, television and the Internet), play a vital role in
societies involved in a counterinsurgency. Members of the media have a significant
influence and shaping impact on political direction, national security objectives, and
policy and national will. The media is a factor in military operations. It is their right and
obligation to report to their respective audiences on the use of military force. They
demand logistic support and access to military operations while refusing to be controlled.
Their desire for immediate footage and on-the-spot coverage of events, and the increasing
contact with units and Soldiers (for example, with embedded reporters) require
commanders and public affairs officers to provide guidance to leaders and Soldiers on
media relations. However, military planners must provide and enforce ground rules to the
media to ensure operations security. Public affairs offices plan for daily briefings and a
special briefing after each significant event because the media affect and influence each
potential target audience external and internal to the AO. Speaking with the media in a
forward-deployed area is an opportunity to explain what our organizations and efforts
have accomplished.
Continuous PSYOP are mounted to-· Counter the effects of insurgent propaganda.· Relate controls to the security and well-being of the population.· Portray a favorable governmental image..Control measures must-· Be authorized by national laws and regulations (counterparts should be trained not to
improvise unauthorized measures).· Be tailored to fit the situation (apply the minimum force required to achieve the de-sired
result).· Be supported by effective local intelligence.· Be instituted in as wide an area as possible to prevent bypass or evasion.· Be supported by good communications.· Be enforceable.· Be lifted as the need diminishes.· Be compatible, where possible, with local customs and traditions.· Establish and maintain credibility of local government.A control program may be developed in five phases:· Securing and defending the area internally and externally.· Organizing for law enforcement.· Executing cordon and search operations.· Screening and documenting the population (performing a detailed census).· Performing public administration, to include resource control.Support to the judiciary may be limited to providing security to the existing courts or may
lead to more comprehensive actions to build local, regional, and national courts and the
required support apparatus. To avoid overcrowding in police jails, the courts must have
an efficient and timely magistrate capability, ideally co-located with police stations and
police jails, to review cases for trial.Cordon and search is a technique used by military and police forces in both urban and
rural environments. It is frequently used by counterinsurgency forces conducting a
population and resource control mission against small centers of population or
subdivisions of a larger community. To be effective, cordon and search operations must
have sufficient forces to effectively cordon off and thoroughly search target areas, to
include subsurface areas.PSYOP, civil affairs, and specialist interrogation teams should augment cordon and
search orces to increase the effectiveness of operations. Consider the following when
conducting cordon and search operations:Cordon and search operations may be conducted as follows:Disposition of troops should-· Facilitate visual contact between posts within the cordon.· Provide for adequate patrolling and immediate deployment of an effective re-serve
force.Priority should be given to-· Sealing the administrative center of the community.· Occupying all critical facilities.· Detaining personnel in place.· Preserving and securing all records, files, and other archives.Key facilities include-· Administrative buildings.· Police stations.· News media facilities.· Post offices.· Communications centers.· Transportation offices and motor pools.
· Prisons and other places of detention.· Schools.· Medical facilities.Search Techniques include-· Search teams of squad size organized in assault, support, and security elements.One target is assigned per team.· Room searches are conducted by two-person teams.· Room search teams are armed with pistols, assault weapons, and automatic weapons.· Providing security for search teams screening operations and facilities.Pre-search coordination includes-· Between control personnel and screening team leaders.· Study of layout plans.· Communications, that is, radio, whistle, and hand signals.· Disposition of suspects.· On-site security.· Guard entrances, exits (to include the roof), halls, corridors, and tunnels.· Assign contingency tasks for reserve.· Room searches conducted by two- or three-person teams.· Immobilize occupants with one team member.· Search room with other team member.· Search all occupants. When available, a third team member should be the re-corder.· Place documents in a numbered envelope and tag the associated individual with a
corresponding number.
SCREENING AND DOCUMENTING THE POPULATIONScreening and documentation include following:· Systematic identification and registration.· Issuance of individual identification cards containing-A unique number.Picture of individual.Personal identification data.Fingerprints.An official stamp (use different colors for each administration region).Family group census cards, an official copy of which is retained at the local police
agency. These must include a picture and appropriate personal data.Frequent use of mobile and fixed checkpoints for inspection, identification, and
registration of documents.Preventing counterfeiting of identification and registration documents by laminating and
embossing.Programs to inform the population of the need for identification and registration.Covert surveillance is a collection effort with the responsibility fixed at the
intelligence/security division or detective division of the police department. Covert
techniques, ranging from application of sophisticated electronics systems to informants,
should include-Informant nets. Reliability of informants should be verified. Protection of identity is a
must.Block control. Dividing a community or populated area into zones where a trusted
resident reports on the activities of the population. If the loyalty of block leaders is
questionable, an informant net can be established to verify questionable areas.Units designated for counterinsurgency operations· 115th MIB, Schofield, HI· 704th MIB, Fort Made, MD, Collaboration with NSA
· 513st MIB, Fort Gordon, GA in Collaboration with NSA· Arlington Hall Station, VA· Aberdeen Proving Ground (Maryland)· US Army Intelligence and Security Command INSCOM- Huachuca ( Arizona )· INTELLIGENCE THREAT and ANALYSIS CENTER ( Center Analysis for threat and
Intelligence )· 501st Military Intelligence Brigade EAC· 3rd Military Intelligence Battalion Exploitation Area . . . . . . The document continues, page after page, throughout almost nine-hundred pages.
In those other pages, the document outlines "REX 84" "FEMA concentration camps", already established, constructed and manned inside the United States, to be utilized to
house "insurgents" who are rounded-up by government.ConclusionsWhen I read the document, I knew that I could be criminally prosecuted for having it, prosecuted
on a separate charge for reading it and prosecuted yet again for releasing information contained
within it.I decided that the threat to Liberty posed by the document made it imperative that I take action
and I have done so. Now, all of you know!I also realized that in order for the U.S. Government to prosecute me, the document would have
to be authentic. They would have to admit the Document is authentic and actually Classified in
order to bring any prosecution.Since such an admission would prove me right and be an ominous warning to all of you that real
trouble is here, I suspect I am safe from any reprisals for the time being. It's a gamble with
enormous consequences, but saving our Republic from a tyrannical government is worth my risk.It is clear to me that very serious things are on the horizon here in America. It will be up to us,
citizen-patriots, to step up to defend our liberty. I am ready. Are you?
1) No link? Select some text from the story, right click and search for it.
2) Link to TiU threads. Bring traffic here.