martes, 18 de enero de 2011

MÁS ALLÁ DE LA VIDA (HEREAFTER)


ADVERTENCIA: ¡¡¡OPERACIÓN PSICOLÓGICA!!!
WARNING: PSYOPS!!!

Esta película es maravillosa porque:
This movie is wonderful because:

1) Prepara a las tropas estadounidenses para la muerte.

En muchas culturas, a quienes se envía a matar y morir por intereses absurdos, se les cuentan lindas historias sobre la "vida ultraterrena".

Un colaborador tan efectivo del DEPARTAMENTO DE DEFENSA ESTADOUNIDENSE (U.S. DEPARTMENT OF DEFENSE / DoD) y de la COMUNIDAD DE INTELIGENCIA ESTADOUNIDENSE [actualmente en manos comunistas] y de la industria militar estadounidense (también dirigida por comunistas) como es CLINT EASTWOOD tenía que dirigir un filme que consuele y entusiasme a toda la "carne de cañón" que va a entregar su único aliento a tierras alejanas de sus hogares. Y por supuesto, el Sr. EASTWOOD recibe la generosa ayuda del productor STEVEN SPIELBERG, otro experto en propaganda.

2) Es una visión gnóstica / satánica del universo a favor del Nuevo Orden Mundial (New World Order).



Una lectura ecuánime del filme muestra un discurso subversivo en el que las figuras paternas o de autoridad son descalificadas progresivamente ante los espectadores, mediante distintas tretas: Alcoholismo [la madre], intransigencia ante la "verdad de la vida ultraterrena" [los editores], deseos interesados de servir a la humanidad [el hermano del vidente].

Quienes desautorizan a la tradición han recibido la "iluminación" de modo individual, personal, al morir y resucitar. El vidente estuvo muerto en la mesa de operaciones, la periodista falleció en la inundación y uno de los gemelos fallece de hecho. Estos personajes "poseedores del conocimiento" [portadores de la luz] se rebelan ante su entorno como PROMETEO ante los dioses y desean "iluminar" a quienes buscan el conocimiento (la periodista con su libro, el vidente accediendo a la petición del gemelo sobreviviente) lo cual es "luciferismo".

El mensaje gnóstico es evidente en la casa de Charles Dickens. En la pared de la cual el vidente toma la información relativa al libro de la periodista, resalta un afiche que dice "GNOSTICISM" (GNOSTICISMO). La madre finalmente puede hablar con el gemelo sobreviviente cuando éste ingresa en la misteriosa habitación "133", número que es señal de su iniciación.

3) Sugiere la continuidad de "ataques terroristas" como método de control social.

Con los continuos incrementos en los gastos militares estadounidenses, en particular en el área de los "dispositivos explosivos improvisados" (explosive improvise devices EIDs), un nombre que parece aguantar todo tipo de interpretaciones, intervenciones y participantes, era natural que un filme como "MÁS ALLÁ DE LA VIDA (HEREAFTER)" mostrara una explosión misteriosa en el metro londinense. Cabe preguntarse, con este tipo de promoción cuánto tiempo falta para el proximo desastre provocado en el metro de alguna ciudad conocida (¿ya ocurrió?, ¿en Moscú tal vez?).

Cuando cuantiosos presupuestos son colocados en actividades que lidian con la locura, a algunos geniecillos de pocos escrúpulos se le puede ocurrir darle un empujoncito a la vesanía para estimular ciertos intereses crematísticos.

Siempre es bueno darle una miradita a los gastos que se realizan en esta área para apreciar cómo se dilapidan los impuestos de los pobrecitos estadounidenses (carecen de la suerte de haber nacido en Latinoamérica):

[La información completa está en:
http://projects.washingtonpost.com/top-secret-america/functions/counter-ied/]
"Counter-IED explosives operations

Programs, including research and development, associated with efforts to counter terrorist and adversary use of improvised explosive devices (IEDs), including intelligence and operations efforts associated with identifying and attacking individual IEDs and the networks of fighters who employ them, as well as the forensics associated with gathering information after explosive incidents. The Joint IED Defeat Organization (JIEDDO) leads the Department of Defense's counter-IED (C-IED) efforts.

96 results for Counter-IED explosives operations
23 government organizations | 73 companies
Showing page of 0 page

Government OrganizationHQ LocationNumber of LocationsNumber of Contracting Companies
Air ForceArlington, VA99392
Air Force IntelligenceArlington, VA113153
ArmyArlington, VA106353
Army IntelligenceFort Belvoir, VA93120
Bureau of Alcohol, Tobacco, Firearms and ExplosivesWashington, DC18228
Central CommandTampa, FL664
Central Intelligence AgencyMcLean, VA36114
Defense agenciesArlington, VA78332
Defense Intelligence AgencyArlington, VA22317
Department of Defense HQArlington, VA80291
Department of EnergyWashington, DC1887
Department of Homeland Security HQWashington, DC270318
European CommandStuttgart-Vaihingen, AE211
Federal Bureau of InvestigationWashington, DC448173
Joint Chiefs of StaffArlington, VA645
Joint Forces CommandNorfolk, VA845
Joint Improvised Explosive Device Defeat Org.Arlington, VA468
Marine CorpsArlington, VA2482
National Security AgencyFt. Meade, MD19484
NavyArlington, VA56385
Navy IntelligenceArlington, VA31104
Pacific CommandCamp H.M. Smith, HI627
Special Operations CommandTampa, FL12125
Company NameHQ LocationYear Est.EmployeesRevenueLocationsGovt. Clients
A-T Solutions, Inc.Fredericksburg, Virginia2002101-500Unknown712
Alion Science and Technology CorporationMclean, Virginia20022,001-5,000$750 million to $1 billion2012
Allied Technology Group, Inc.Rockville, Maryland1986101-500Under $100 million3114
American Systems CorporationChantilly, Virginia1975501-2,000$100 million to $750 million2513
ANSERArlington, Virginia1958501-2,000$100 million to $750 million712
Applied Systems Research, Inc.Fairfax, Virginia199826-100Under $100 million28
ASG RenaissanceDearborn, Michigan1987101-500Under $100 million33
BAE Systems, Inc.Rockville, Maryland194810,000+$10 billion to $50 billion6422
Beacon SystemsCoral Springs, Florida2005<25Under $100 million62
Booz Allen HamiltonMcLean, Virginia191410,000+$1 billion to $10 billion6926
By Light Professional IT ServicesArlington, Virginia200226-100Under $100 million17
C2 Technologies, Inc.Vienna, Virginia1997101-500Under $100 million511
CACI International, Inc.Arlington, Virginia196210,000+$1 billion to $10 billion7426
Calhoun InternationalTampa, Florida2005<25Under $100 million66
Camber CorporationHuntsville, Alabama19902,001-5,000$100 million to $750 million3019
Celestar CorporationTampa, Florida200126-100Under $100 million44
Centauri Solutions, LLCAlexandria, Virginia2006101-500Under $100 million128
CMX TechnologiesReston, Virginia2005<25Under $100 million44
Cobham Analytic Solutions Columbia, Maryland1979501-2,000$100 million to $750 million236
Complete Data SolutionsArlington, Virginia1997UnknownUnknown22
Computer Sciences CorporationFalls Church, Virginia195910,000+$10 billion to $50 billion7724
Dell, Inc. / Dell Perot SystemsRound Rock, Texas1984UnknownAbove $50 billion204
Detica Federal, a BAE Systems CompanyArlington, Virginia2001101-500Under $100 million35
Dynetics, Inc.Huntsville, Alabama1974501-2,000$100 million to $750 million710
E-merging Technologies Group, Inc.Cleveland, Ohio199926-100Under $100 million1413
Fulcra Worldwide Arlington, Virginia200426-100Under $100 million17
Fulcrum IT Services Manassas, Virginia1985101-500Under $100 million1910
Global Defense Technology & Systems, Inc. (GTEC)McLean, Virginia1990501-2,000$100 million to $750 million710
GS5 LLCDumfries, Virginia200326-100Under $100 million46
i_SW corpArlington, Virginia2006<25Under $100 million35
Ideal Innovations, Inc.Arlington, Virginia1999101-500Under $100 million53
Infinity Systems EngineeringColorado Springs, Colorado199626-100Under $100 million14
Intelligent Software Solutions, Inc.Colorado Springs, Colorado1997101-500Under $100 million1117
ITT CorporationMcLean, Virginia1995501-2,000$1 billion to $10 billion5217
JIL Information Systems, Inc., a Allied Technology Group companyRockville, Maryland2005101-500Unknown31
L-3 CommunicationsNew York, New York199710,000+$10 billion to $50 billion9629
Leonie IndustriesPacific Palisades, California200126-100Under $100 million48
Lockheed MartinBethesda, Maryland199510,000+$10 billion to $50 billion7323
Logos Technologies, Inc.Arlington, Virginia199626-100Under $100 million34
MacAulay Brown, Inc.Dayton, Ohio1979501-2,000$100 million to $750 million1513
ManTech International CorporationFairfax, Virginia19685,000-10,000$1 billion to $10 billion8128
MARKON Inc.Falls Church, Virginia200726-100Under $100 million22
Masy Group, TheAlexandria, Virginia2005<25Under $100 million24
McNeil TechnologiesSpringfield, Virginia1985501-2,000$100 million to $750 million1311
MOJA, IncorporatedManassas, Virginia199526-100Under $100 million512
MPRI, an L-3 Communications CompanyAlexandria, Virginia1987UnknownUnknown710
MTC Services CorporationChula Vista, California1991101-500Under $100 million116
NEK Advanced Securities Group, Inc.Colorado Springs, Colorado2002101-500Unknown78
Northrop GrummanLos Angeles, California193910,000+$10 billion to $50 billion9827
Omega SystemsPhoenix, Arizona1998<25Under $100 million34
Operational Intelligence LLCWarrenton, Virginia2008<25Unknown21
Radiance TechnologiesHuntsville, Alabama1998101-500Under $100 million910
Reger Group, TheStafford, Virginia2004101-500Under $100 million32
Ronco ConsultingWashington, District of Columbia1974<25Unknown21
Saffron TechnologyCary, North Carolina1999<25Under $100 million12
SAICMcLean, Virginia196910,000+$10 billion to $50 billion12333
Science, Engineering, and Technology Corporation, A SAIC corporationArlington, Virginia200226-100Unknown14
Sierra Nevada CorporationSparks, Nevada1994501-2,000$750 million to $1 billion166
Six3 Systems, Inc.McLean, Virginia2009101-500Unknown2218
SPADACMcLean, Virginia2002101-500Under $100 million910
SRC, Inc.North Syracuse, New York1957501-2,000$100 million to $750 million2110
SRI International, Inc.Menlo Park, California19462,001-5,000$100 million to $750 million58
Summit TechnologiesWest Hartford, Connecticut1997101-500Unknown116
Systems Documentation Inc.South Plainfield, New Jersey1978101-500Under $100 million13
TASC, IncChantilly, Virginia19662,001-5,000$1 billion to $10 billion4411
Technology Associates International CorporationCarlsbad, California1999101-500Under $100 million48
TechOp Solutions InternationalStafford, Virginia200526-100Under $100 million44
Textron, Inc.Providence, Rhode Island192310,000+$10 billion to $50 billion75
Threat Management GroupGoose Creek, South Carolina200426-100Under $100 million13
TMC DesignLas Cruces, New Mexico199726-100Unknown21
USfalcon, Inc.Morrisville, North Carolina2005101-500$100 million to $750 million2510
WBB ConsultingReston, Virginia1981101-500Under $100 million109
Wexford Group InternationalVienna, Virginia1992<25Unknown43



Obviamente, con este tipo de actividad comercial se puede comenzar a comprender un discurso tan propio de las historietas de superhéroes como el dado por JANET NAPOLITANO, una mujer muy tierna que es casi la dulzura encarnada, el 27 de Enero de 2011 en la George Washington University en relación al estado de la Seguridad Territorial Estadounidense:

http://www.dhs.gov/ynews/speeches/sp_1296152572413.shtm

(Las letras en naranja en el texto las hemos agregado en perucine.blogspot.com)

"State of America's Homeland Security Address

Release Date: January 27, 2011

Washington, D.C.
George Washington University
(Remarks as Prepared)

Good afternoon, and thank you President Knapp for that kind introduction, and for the invitation to be here at George Washington University.

I’ll be speaking at several colleges and universities throughout the year about different aspects of homeland security. I’m happy to kick things off here, though, with an address on the overall state of our homeland security.

So, thank you to the Homeland Security Policy Institute. And I want to especially acknowledge the Institute’s founding director, Frank Cilluffo, who is a good friend of DHS. Frank is one of those who were "present at the creation" of our homeland security effort after the 9/11 attacks. And under his leadership, the Homeland Security Policy Institute has been at the vanguard of treating homeland security as its own discipline that demands serious study.

Because of this Institute, and other efforts emerging at colleges and universities across the country, homeland security is taking its place among longer-standing fields – like international affairs and criminal justice – as an area where major global challenges are being studied and addressed. For the students and young professionals here with us today, or watching online, you are the next wave of homeland security thinkers, professionals, and managers. You can – and undoubtedly will – have a significant influence on this emerging field.

I also want to take a moment to note that the very existence of the Department of Homeland Security is due, in large part, to the efforts of Senator Joe Lieberman. Senator Lieberman could not be here this afternoon. But all of us know about, and have tremendous appreciation for, his tireless, nonpartisan efforts to make our country more secure.

Two days ago, President Obama delivered to Congress and the American people his annual address on the state of our union, a tradition that goes as far back as 1790 with the namesake of this institution. Today, I’m beginning a new tradition, an annual assessment of the state of our homeland security. I want to begin by telling two stories that illustrate the breadth and the complexity of our challenge, but also the humanity of it as well.

Just a few weeks ago, I had the honor of spending New Years in Kabul, Afghanistan, with many of the men and women serving in our armed forces and our civilian mission there. I met with soldiers at the Torkham Forward Operating Base and was briefed on operations at Torkham Gate, a heavily-trafficked border crossing between Afghanistan and Pakistan. It is near Jallalabad, not far from the Khyber Pass, and it’s where Afghan and U.S. officials – including border security and customs officials from the Department of Homeland Security – work side by side to provide security, while allowing legal commerce and travel to get through.

The second experience was very different, and took place a little more than a year ago at Ellis Island. I was leading a naturalization ceremony – another great honor of this job. I read the oath of allegiance to new Americans from 48 different countries, including a 95-year-old woman from the Dominican Republic. Collectively, in that room, were dozens of individuals, with very different backgrounds, who all wanted the same thing – to accept the rights, and the responsibilities, of American citizenship.

These two experiences remind us that the hard work of securing the U.S. homeland stretches from the mountains of Afghanistan and Pakistan, and other far-off places, all the way back to the Main streets of our smallest home towns. They remind of us of why that hard work must be done; who we are doing it for; and how we must conduct ourselves while carrying it out. And they remind us that securing the homeland means upholding the very values on which this country was founded, and honoring the millions who passed through Ellis Island – and the ones still coming today – seeking the promise and blessings of America.

So, what, then, is the state of homeland security today? I can report that our young department has matured, building on the good work of my two predecessors, Tom Ridge and Michael Chertoff.

I can also report that our homeland is more secure that it was ten years ago, and, indeed, more secure than it was two years ago.

If these were ordinary times, that might suffice. But these are not ordinary times. The kinds of threats we now face demonstrate that our homeland security is a shared responsibility. Only a "whole of nation approach" will bring us to the level of security and resilience we require.

So over the last two years, our approach has acknowledged that the Department of Homeland Security – indeed, the whole Federal government and the military – cannot, itself, deliver security. Real security requires the engagement of our entire society, with government, law enforcement, the private sector, and the public all playing their respective roles.

From day one, the Obama Administration has operated on the premise that security is a shared responsibility – that no matter who you are – from students and professors to first responders to everyday citizens – we all play a part.

Because of the trust we have in Americans to share in our collective security, today I announce the end of the old system of color-coded alerts. In its place, we will implement a new system that is built on a clear and simple premise: When a threat develops that could impact you – the public – we will tell you. We will provide whatever information we can so you know how to protect yourselves, your families, and your communities.

Under the new, two-tiered system, DHS will coordinate with other Federal entities to issue formal, detailed alerts regarding information about a specific or credible terrorist threat. These alerts will include a clear statement that there is an "imminent threat" or "elevated threat." The alerts also will provide a concise summary of the potential threat, information about actions being taken to ensure public safety, and recommended steps that individuals and communities can take.

The new system reflects the reality that we must always be on alert and be ready. When we have information about a specific, credible threat, we will issue a formal alert providing as much information as we can. Depending on the nature of the threat, the alert may be limited to a particular audience, like law enforcement, or a segment of the private sector, like shopping malls or hotels. Or, the alert may be issued more broadly to the American people, distributed – through a statement from DHS – by the news media and social media channels.

The alerts will be specific to the threat. They may recommend certain actions, or suggest looking for specific suspicious behavior. And they will have a specified end date.

Today, we are beginning a 90-day implementation period in which Federal, state and local government, law enforcement entities, private and non-profit sector partners, airports, and other transport hubs will officially transition to the new system, which flows from evolving practice in the last few years. This means that the days are numbered for the automated recordings at airports, and announcements about a color code level that were, too often, accompanied by little practical information.

As I said, this new National Terrorism Advisory System is built on the common-sense belief that we are all in this together, and that we all have a role to play. This system was developed in that same collaborative spirit. It was largely the work of a bipartisan task force that included law enforcement, former Mayors and Governors, and members of the previous administration. Some of them are here today, and I thank them, and ask for a round of applause for their great work that led to this new tool in our homeland security arsenal.

Continuing to evolve our approach to defending the homeland remains critical because the threats we face today are real, they are persistent, and they are evolving rapidly. We know that al Qaeda, and other groups sharing their terrorist ideology, continue to target us. Increasingly, this is done through al Qaeda affiliates in places like Yemen and the Arabian Peninsula. We are also dealing with the threat from terrorists who use the Internet and social media like Facebook and YouTube to reach vulnerable individuals and inspire new recruits.

Historically, our domestic counterterrorism efforts were based on the belief that we faced the greatest risk from attacks planned, and carried out, by individuals coming from abroad. But the arrests of an increasing number of U.S. persons on terror-related charges in the last two years mean that we must move beyond this paradigm. These include Najibullah Zazi, a legal permanent resident arrested in 2009 for plotting to attack the New York City subway system; Faisal Shahzad, a naturalized U.S. citizen, who attempted to explode a car bomb in Times Square last year; as well as more recent arrests in Portland, Oregon; Dallas, Texas; and here in the Washington area.

Today, we operate under the premise that individuals prepared to carry out terrorist acts might already be in the country, and could carry out further acts of terrorist violence with little or no warning. We must all work to gain a better understanding of the behaviors, tactics, and other indicators that could point to terrorist activity.

At the same time, we face the possibility of sophisticated attacks ranging from chemical, biological, and nuclear, to attacks in cyberspace. Indeed, in just the last year, we’ve seen the full spectrum of cyber threats, from denial-of-service attacks and spamming to attacks with spyware.

Finally, we know that our borders and ports of entry represent potential avenues, not just for terrorist travel, but also for threats in the form of smuggling, human trafficking, and transnational crime.

So as I said earlier, our approach to confronting these threats has been to build and strengthen partnerships, and to build a shared sense of responsibility for our security by working with state, local and, tribal law enforcement, our international allies, partners in the private sector, and of course, the American people.

Despite our title, the Department of Homeland Security does not possess sole responsibility for securing the homeland within the Federal government.

Our nation’s armed forces may be thousands of miles from our shores, living in Forwarding Operating Bases far from loved ones or the comforts of home, but they’re every bit on the frontlines of our homeland security. They have helped to significantly degrade al Qaeda’s capabilities to mount major attacks right here in the United States and elsewhere throughout the world.

The Director of National Intelligence, the CIA, and the entire Intelligence Community, of which DHS is a member, is producing more and better streams of intelligence than at any time in the past. The National Counterterrorism Center has made critical improvements to our federal watchlisting systems and to the coordination of our counterterrorism efforts.

And of course, the Federal homeland security enterprise includes our strong partners at the Department of Justice and the FBI, whose work has led to the arrest of more than two-dozen Americans on terrorism-related charges since 2009.

At the Department of Homeland Security over the last two years, we've seen some extraordinary progress and hard work pay off. But that could not have happened without the dedicated, professional men and women of this great Department, like the nearly 50,000 Transportation Security Officers who work tirelessly, and often thanklessly, to deter and prevent terrorist attacks on passenger planes; the more than 20,000 Border Patrol agents who put their lives on the line to protect our borders; the more than 10,000 officers and investigators who enforce our immigration laws, and bring to justice those who seek to traffic drugs, arms and people; the more than 40,000 men and women who serve in the United States Coast Guard protecting our maritime borders; or the thousands of scientists and engineers working on the next generation of security technology; the security guards at government buildings; the trainers of our law enforcement professionals; or the intelligence analysts working around the clock to stay ahead of emerging threats.

But the homeland security enterprise extends far beyond DHS and the federal government. As I said, it requires not just a "whole of government," but a "whole of nation" approach. In some respects, local law enforcement, community groups, citizens, and the private sector play as much of a role in homeland security as the federal government. That is why I like to say that "homeland security starts with hometown security."

For example, we know that communities can play a vital security role when they forge strong partnerships with local law enforcement. In fact, this is something of an old story in our nation’s history. Americans have long helped to secure their hometowns, as well as their homeland, from our tradition of civil defense, to more recent efforts like neighborhood watches and community-oriented policing initiatives.

A study just last year study found that, between 1999 and 2009, more than 80 percent of foiled terrorist plots in the United States were thwarted because of observations from law enforcement or the general public.

At DHS, we also work closely with a diverse array of religious, ethnic, and community organizations and leaders. Members of these communities have, in fact, been critical in thwarting violence. And, like all Americans, they play very positive roles in enriching our national life.

And so, every day at DHS, we are doing everything we can to get more information, more tools, and more resources out of Washington, DC, and into the hands of the men and women on the front lines.

That is why we launched the national "If You See Something, Say Something" campaign last year to raise awareness of potential terrorist tactics, and emphasize the importance of reporting suspicious activity to law enforcement. You’ve no doubt heard this campaign if you’ve ridden on Metro or Amtrak. And we have continued to expand this effort across the country in partnership with professional and collegiate sports, shopping centers – like the Mall of America – and retailers – like Wal-Mart.

We also see this effort as a partnership between citizens and local police. Therefore, we’ve worked closely with the Department of Justice to expand the Nationwide Suspicious Activity Reporting, or SAR, initiative. Currently active in over two dozen states and cities, and soon to be utilized by fusion centers, transit police, and other groups across the country, the SAR initiative creates a standard process for law enforcement to identify and report suspicious activity so it can be shared nationally and analyzed for broader trends.

I want to pause here to make an important point. Both the "If You See Something, Say Something" and SAR initiatives have been designed, and tested, with civil liberties and privacy in mind. Both are aimed at identifying suspicious behaviors and increasing our shared ability to protect the country.

Today, we’re also premiering several additional resources to better connect citizens and communities with the kinds of information and tools that DHS offers. I urge you to visit our new "Hometown Security" resource page on DHS.gov, and to stay connected via the Department’s new Facebook page as well.

To give you a better sense of how our partnership approach looks, and – to borrow a sports metaphor – how we're fielding a bigger, better-trained team, I’d like to discuss four areas of focus for us in the coming year.

Counterterrorism

Our most fundamental responsibility remains preventing terrorist attacks on the homeland. And to support this critical mission we have worked very hard to strengthen and build our domestic information-sharing architecture by increasing the capacity of state and major-area fusion centers to serve as centers of analytic excellence.

We have made historic strides in aviation security - accelerating the deployment of new security equipment at our domestic airports, and launching an international initiative that, in October of last year, produced a first-of-its-kind global agreement by 190 nations to increase aviation security standards worldwide. During the coming year, we will continue, and hopefully complete, negotiations with the European Union on strengthening information sharing in the aviation environment, and extend such information sharing to other continents as well.

We will build on these efforts by leading an international effort to strengthen the security of the global supply chain, which brings goods and commodities to our shores, and across our borders. This includes an initiative called Project Global Shield that we have launched with the World Customs Organization, or WCO, and 60 other countries to prevent the theft or diversion of precursor chemicals that can be used by terrorists to make improvised explosive devices. It also includes a new initiative with the International Civil Aviation Organization, the WCO, and other international partners, to identify and protect the most critical elements of our supply chain from attack or disruption, including key transportation hubs. Together with other Federal departments and agencies, we’re seeking to bolster the resiliency of the global supply chain so that if a terrorist attack or natural disaster does occur, the supply chain can recover quickly, and any disruption can be minimized.

As Tom Ridge liked to say when he was Secretary, the physical borders of the United States should be the last line of defense, not the first. Our goal, quite simply, is to ensure the safety of all travelers and cargo as they travel across the globe.

Border Security and Immigration

A second major set of initiatives involves border security and immigration enforcement. On these two fronts, this Department has, over the last two years, been both relentless and effective.

2010 was a historic year when it comes to securing and managing our borders and enforcing our immigration laws. There are now more resources on the southwest border – in terms of personnel, technology, and infrastructure – than ever before in American history. And we continue to see progress on every metric. The numbers that are supposed to go up have gone up, and the numbers that are supposed to go down have gone down.

The number of illegal crossings – the best indicator of illegal traffic – is now at less than half its all-time high. At the same time, in the past two years, we have seized more contraband across the board – illegal bulk cash, weapons, and drugs – than we've seen in recent years.

But we won’t stop there. Our priority continues to be the removal of criminal aliens who pose a danger to public safety and national security.

Because of the dedicated work of our ICE personnel, in the past fiscal year more illegal aliens with criminal records were deported from the U.S. than ever before, a 70 percent increase from two years ago. An agreement known as Secure Communities, which uses biometrics to identify and remove criminal aliens in state prisons and local jails, has expanded from 14 jurisdictions in 2008 to more than 1000 by the end of this month. It will be in every jail and prison by 2013.

I recognize, too, that illegal immigration is driven in large part by the demand for illegal labor. As our economy grows, that demand may grow as well. That is why we’re working to make E-Verify all that it can be to help businesses ensure a legal workforce. We must instill a culture of compliance among employers. And we’ll continue to conduct audits to ensure all businesses are following the law.

We are also focused on improving and strengthening the legal immigration system, including formalizing a policy that expedites citizenship for non-citizens serving our country in the military overseas. And we continue to grant citizenship to record numbers of military service members.

DHS will also develop an automated vetting capability for immigration benefit processing that will enable us to immediately address national security risks. We will roll out the E-Verify "Self Check," which will enable prospective workers to check their employment authorization status. And, we will begin transitioning from a paper-based system to a new customer-focused, centralized, electronic case management system for immigration benefits.

Cybersecurity, Science, and Technology

While immigration and border enforcement have been longstanding challenges to our security, we also face new and emerging ones.

Over the past two years, we’ve increased our capacity to fight cyber crimes and cyber terrorism, opening a new 24/7 watch and warning center, and testing our country's first national-level cyber incident response plan, while increasing our stable of cyber experts by some 500 percent.

We entered into a historic agreement with the Department of Defense and National Security Agency to detail the division of labor among our organizations. We have also worked closely with the private sector to protect our nation's critical infrastructure, including new funding for port security and communication systems, as well as new standards for building and securing Federal facilities.

This year, we will complete the deployment of the Einstein 2 threat detection system across the Federal space, and we will continue to develop, and begin deployment, of Einstein 3, which will provide DHS with the ability to automatically detect and disrupt malicious cyber activity. And we will work through our Science and Technology directorate, our dozen academic "Centers of Excellence," and our many partners in the Federal government, on technological advances. For example, to develop the secure and efficient airport checkpoints of tomorrow; design the materials that will make our infrastructure more resilient to an attack or natural disaster; and devise the screening and detection capabilities that will keep us ahead of threats from nuclear and radiological materials.

Resilience and Response

Through the hard work of FEMA, our National Protection and Programs directorate, and others across DHS, working with our many federal, state, local, and private sector partners, we've increased our preparedness for disasters of all kinds, and strengthened the resilience of our most vulnerable critical infrastructure.

As the President announced in his State of the Union, the so-called "D Block" of communications spectrum will be set aside for public safety, so we will work with first responders on the standards and requirements for interoperability of vital communications equipment during times of crisis.

We will continue to improve and expand the disaster exercises so critical to disaster response. This year, FEMA will lead the largest exercise ever of its kind, testing our ability to respond to a major earthquake along the New Madrid fault line that runs through the midsection of the country.

To augment our global supply chain security effort, we will work with the private sector and international partners to expand and integrate "trusted traveler" and "trusted shipper" programs that facilitate legitimate travel and trade while enhancing security.

We'll launch the Chemical Facility Anti-Terrorism Standards Personnel Surety Program, requiring high-risk chemical facilities to vet individuals with access against the Terrorist Screening Database.

And we will expand the Transportation Worker Identification Credential, or TWIC, program to ensure that only authorized maritime workers can access secure areas of regulated vessels.

Recruitment

Let me say something directly to the students in the room, because part of why I wanted to give this speech – this first annual State of Homeland Security speech – here at George Washington was because I want to make a special appeal to you.

I know you are not old enough to remember, but I bet you’ve seen images of the iconic posters of Uncle Sam, with his index finger pointed out, with the caption that read, "I Want You." Those recruitment posters encouraged a generation of Americans to enlist in the U.S. Army.

Now, I have always had deep respect for the military. As Governor of Arizona I was Commander-in-Chief of the Arizona National Guard. The Coast Guard is in the Department of Homeland Security, and I have had the honor not only of visiting troops in places like Afghanistan, Europe, and the Persian Gulf, but also talking to wounded warriors at Walter Reed Hospital. My Department today employs over 48,000 veterans, and through partnerships with the Department of Defense, and organizations like the American Legion, we’ll be over 50,000 by the end of next year.

So, it is with the greatest respect that I say it’s time for a new recruitment poster. Today, DHS wants you. We want a new generation of Americans to join the fight against the new generation of threats to our homeland.

DHS offers exciting careers in areas spanning law enforcement, intelligence, and counterterrorism, like intelligence analysts, policy experts, and international affairs specialists who help negotiate global agreements; Secret Service agents and investigators who are protecting our leaders, thwarting terror plots, fighting transnational crime, and breaking up human trafficking rings. We offer many opportunities for internships, and our various fellowship and scholarship programs attract top students from top academic programs across the country.

All of these positions – all of them – come with the opportunity not only to do great work in this exciting field, but to serve your nation as well.

I am often asked what I lose sleep about as homeland security secretary. Common sense would say that in an open society with 8,000 miles of land borders, and 95,000 miles of coastline, a terrorist could get through, or a homegrown one could succeed. A novel weapon could be deployed. A community could be temporarily overwhelmed. I’m concerned about all of those things.

But I want Americans to know what I do not lose sleep over. I do not worry about the core values that have guided our country for more than two centuries – the same values that the new citizens I naturalize are seeking to uphold: freedom, hard work, shared responsibility.

Even if our enemies were to succeed in pulling off an attack on the homeland, they will never succeed in undermining those enduring values.

In Afghanistan, there’s a plaque that hangs in the residence of the American Ambassador. On it is a quote from President Woodrow Wilson that reads: "Let us set for ourselves a standard so high that it will be a glory to live up to it ...and then let us live up to it...and add a new laurel to the crown of America."

So, let us set a standard that high for homeland security. Let us strive for more partnerships; a bigger team; and an even greater willingness from our citizens to share responsibility for our collective security. And let us then meet that standard, and add a new laurel to the crown of America.

Thank you.

This page was last reviewed/modified on January 27, 2011."

---
¡¡¡¡Aaaaaaaaaaaahhhhhhh!!!! Son buenos aprendices de la geopolítica nazi (¿o lo han escrito los mismos nazis?). Es muy gracioso saber que el territorio estadounidense se extiende por todo el mundo... eso parece una apreciación un poquito comunista... :-D.

Luego de examinar los montos que mueven las empresas vinculadas al Departamento De Defensa Estadounidense (U.S. Department of Defense / DoD) se hace evidente quiénes eran y son los interesados en hacer pasar la demolición de las Torres Gemelas (y la torre 7) por un "ataque terrorista".

Esa operación psicológica se caracterizó por:
a) Control del espacio aéreo (para hace creíble la presencia de aviones fuera de ruta),
b) Control de los medios de comunicación (para emitir imágenes digitales de "aviones impactando los rascacielos"),
c) Una organización capaz de ejecutar la operación con intereses políticos en el asunto (demolición de los rascacielos y edificio adicional, control del aparato de gobierno, capacidad de beneficiarse económicamente del engaño a la población).

El anuncio de la pérdida de miles de millones de dólares en el Departamento de Defensa Estadounidense el día anterior a la demolicion de las torres ha sido poco publicitada.

http://solari.com/articles/missing_money/

Mientras la "industria militar" estadounidense (obviamente en manos de comunistas endurecidos) se beneficia del dinero de los contribuyentes estadounidenses (proletariado pro-capitalista), el Partido-Marxista-Leninista Pensamiento Paris Hilton manifiesta que:

Tal operación psicológica recibe el siguiente puntaje (escala 1-10):

- ELEGANCIA: 2 puntos (demasiado polvorienta).
- HUMOR: 1 punto (se toma demasiado en serio a sí misma)
- ABSURDIDAD: 3 puntos (que los edificios se caigan por impactos de aviones de pasajeros es absurdo mas no lo suficiente).

Y naturalmente, pensar que el Sr. OS AMA tiene alguna relación con la demolición de las Torres Gemelas es únicamente un rumor producto de la propaganda de los medios de comunicación interesados en promover guerras. La página de la OFICINA FEDERAL DE INVESTIGACIONES (FEDERAL BUREAU OF INVESTIGATION) carece de pruebas que establezcan relación alguna entre la demolición de las torres y el Sr. OZ Ama:


Si existiese tal evidencia, en la página del F.B.I. se indicaría. Únicamente se le busca en relación a hechos vinculados a una embajada en Tanzania:

"Usama Bin Laden is wanted in connection with the August 7, 1998, bombings of the United States Embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya. These attacks killed over 200 people. In addition, Bin Laden is a suspect in other terrorist attacks throughout the world"


El Partido-Marxista-Leninista Pensamiento Paris Hilton identifica que la filosofía tras la operación es anticuada, decimonónica, propia de resentidos y amargados comunistas que creen en la lucha de clases e intentan mantener la estructura de clase de la sociedad estadounidense a través de las empresas de armamentos que controlan. Estos "empresarios" comunistas deben hacer las paces consigo mismo y dejar de odiar a su sociedad.

Una recomendación típica para acabar con la dictadura comunista en los Estados Unidos de Norteamérica (United States of America) sería que un país capitalista, tal vez Rusia o China realice un ataque nuclear preventivo con los EE.UU. .

Lamentablemente la bomba atómica no existe, es otro operativo psicosocial.

Se suele exigir al Partido-Marxista-Leninista Pensamiento Paris Hilton que utilice sus ejércitos clandestinos para transformar ese país comunista en un gran agujero en el suelo. Es verdad que los ejercitos clandestinos del Partido tienen la capacidad de transformar EE.UU. en un descampado polvoriento (así lo ha visualizado el Secretario General Emperador en un lindo sueño hace dos noches). Tal acción, lamentablemente, también afectaría a los trabajadores pro-capitalistas.

Es sabido que el SECRETARIO GENERAL EMPERADOR ignora dónde están o quiénes conforman los ejércitos clandestinos del Partido-Marxista-Leninista Pensamiento Paris Hilton (porque son clandestinos) y que los contactos se establecen en sueños, por telepatia o durante arranques psicóticos en los que los miembros de los ejércitos clandestinos hablan directamente desde el ambiente.

Todo esto verifica la capacidad militar del Partido-Marxista-Leninista Pensamiento Paris Hilton. Con este hecho considerado, el SECRETARIO GENERAL EMPERADOR sostiene como tesis que son los mismo trabajadores pro-capitalistas de la republiqueta tercermundista llamada Estados Unidos los que deben liberarse a sí mismos de la dictadura comunista mediante una progresiva madurez y acción política. Desde el resto del mundo recibirán ayuda espiritual mediante constantes oraciones a la VÍRGEN DE COPACABA. Este método demostró su efectividad en la desactivación de la Unión Sovietica por rezos a la VÍRGEN DE LOURDES.

Los subdesarrollados estadounidenses han de seguir los modelos de los héroes de sus filmes de acción y desaforar a los directores de las empresas comunistas de armamento o, simplemente, negarse a trabajar para ellos y dedicarse a trabajar por la Verdad, la Bondad y la Belleza.

4) Intenta copiar la sensibilidad del gran director, escritor y guionista peruano LEÓNIDAS ZEGARRA UCEDA.

Dado que CLINT EASTWOOD es un seguidor entusiasta [como puede notarse de su estilo] de la obra de DON LEÓNIDAS ZEGARRA UCEDA e intenta aplicar sus enseñanzas (como mejor puede) le concedemos a "MÁS ALLÁ DE LA VIDA (HEREAFTER)" un lugar entre los MEJORES ESTRENOS 2011 (BEST MOVIES 2011 IN PERU).

;
DON LEÓNIDAS ZEGARRA UCEDA durante el rodaje de "MARÍA Y LOS NIÑOS POBRES", gran obra boliviana ejemplo del catolicismo militante. De izquierda a derecha: ALEJANDRO PINEDO, DIEGO TERÁN, DON LEÓNIDAS ZEGARRA UCEDA.

FERNANDO GUTIÉRREZ "HUANCHACO" (a la izquierda de la imagen) y DON LEÓNIDAS ZEGARRA UCEDA (a la derecha de la imagen). Vemos a dos artistas peruanos extraordinarios que comprenden la sensibilidad católica hispanoamericana y crean obras trascendentes de acuerdo a nuestro patrón cultural, caracterizado por su belleza, bondad y verdad.

¡¡POBRECITO!!. El señor EASTWOOD carece de la gracia de haber nacido en Latinoamérica. Hay que rezar por su alma para que se convierta al catolicismo y pueda adquirir aunque sea una protón de la sublime sensibilidad hispanoamericana. ¡Tarea para los lectores de perucine.blogspot.com!.

viernes, 14 de enero de 2011

RED


¡AMOR & FASCISMO COMUNISTA!
LOVE & THE COMMUNIST BIG BROTHER!

Esta película es maravillosa porque:
This movie is wonderful because:
1) Refleja la mentalidad y accionar de miembros de una sociedad imperialista vinculados al aparato represivo estatal estadounidense.




Specialized military operations
Unconventional warfare or SWAT-like non-military operations, including Air Force special tactics, Army special forces (Green Berets) and Rangers, Marine Corps special operations, Navy special warfare, including SEALs (sea-air-land); combat search and rescue; the specialized military-like organizations of the CIA, DEA, FBI, ICE and other civil agencies; and the clandestine units and functions of the Joint Special Operations Command (JSOC).
180 results for Specialized military operations
16 government organizations | 164 companies
Showing page of 0 page
Government OrganizationHQ LocationNumber of LocationsNumber of Contracting Companies
Africa CommandStuttgart-Moehringen, AE219
Air ForceArlington, VA99392
ArmyArlington, VA106353
Central CommandTampa, FL664
Central Intelligence AgencyMcLean, VA36114
Defense Intelligence AgencyArlington, VA22317
Drug Enforcement AdministrationArlington, VA9236
European CommandStuttgart-Vaihingen, AE211
Federal Bureau of InvestigationWashington, DC448173
Joint Improvised Explosive Device Defeat Org.Arlington, VA468
Marine CorpsArlington, VA2482
NavyArlington, VA56385
Navy IntelligenceArlington, VA31104
Pacific CommandCamp H.M. Smith, HI627
Southern CommandMiami, FL929
Special Operations CommandTampa, FL12125



Company NameHQ LocationYear Est.EmployeesRevenueLocationsGovt. Clients
29-Ten Security Consulting LLCAnnapolis, Maryland2000<25 td="">Unknown14
A-T Solutions, Inc.Fredericksburg, Virginia2002101-500Unknown712
Abraxas CorporationHerndon, Virginia2001101-500Under $100 million96
Aerovironment, Inc.Monrovia, California1971501-2,000$100 million to $750 million43
Alion Science and Technology CorporationMclean, Virginia20022,001-5,000$750 million to $1 billion2012
AlutiiqAnchorage, Alaska20022,001-5,000$100 million to $750 million99
Applied Signal Technology, Inc.Sunnyvale, California1984501-2,000$100 million to $750 million53
AptimaWoburn, Massachusetts1996UnknownUnknown26
Archimedes GlobalTampa, Florida2005UnknownUnknown15
Artec Group, TheTampa, Florida1991<25 td="">Unknown17
Assured DecisionsColumbia, Maryland200126-100Under $100 million21
AT&T CorporationVienna, Virginia20002,001-5,000$10 billion to $50 billion4418
Axom Technologies Inc.Pasadena, Maryland200426-100Under $100 million42
BAE Systems, Inc.Rockville, Maryland194810,000+$10 billion to $50 billion6422
Battlespace Inc.Arlington, Virginia199326-100Unknown36
Berico TechnologiesArlington, Virginia200626-100Under $100 million93
Blackbird TechnologiesHerndon, Virginia1997101-500Unknown1110
Blue Canopy Federal PracticeReston, Virginia2001101-500Under $100 million67
Blue TechSan Diego, California198526-100Under $100 million11
Booz Allen HamiltonMcLean, Virginia191410,000+$1 billion to $10 billion6926
Brandes Associates, Inc.Santa Barbara, California1990<25 td="">Unknown32
BRTRCFairfax, Virginia1985101-500Under $100 million12
By Light Professional IT ServicesArlington, Virginia200226-100Under $100 million17
C4 Planning SolutionsBlythe, Georgia200026-100Unknown41
CACI International, Inc.Arlington, Virginia196210,000+$1 billion to $10 billion7426
Camber CorporationHuntsville, Alabama19902,001-5,000$100 million to $750 million3019
CC Intelligent SolutionsRaleigh, North Carolina200126-100Under $100 million13
Celestar CorporationTampa, Florida200126-100Under $100 million44
CENTRA Technology, Inc.Arlington, Virginia1985UnknownUnknown36
Centurum, Inc.Marlton, New Jersey1969101-500Under $100 million516
ChenegaAnchorage, Alaska19745,000-10,000$750 million to $1 billion3117
Computer Sciences CorporationFalls Church, Virginia195910,000+$10 billion to $50 billion7724
Concurrent Technologies CorporationJohnstown, Pennsylvania1987501-2,000$100 million to $750 million1512
Cubic CorporationSan Diego, California19495,000-10,000$750 million to $1 billion612
Cyberspace SolutionsReston, Virginia2008UnknownUnknown25
Cybrix Group, Inc., TheTampa, Florida2002<25 td="">Under $100 million12
Data Systems Analysts, IncFeasterville Trevos, Pennsylvania1963101-500Under $100 million86
Data TacticsAlexandria, Virginia200526-100Under $100 million113
Dataline LLCNorfolk, Virginia1990101-500Unknown1011
Defense Technologies, Inc.Tampa, Florida200326-100Under $100 million33
Digital Receiver Technology, Inc., a Boeing CompanyGermantown, Maryland1997101-500Unknown11
DRS TechnologiesParsippany, New Jersey196810,000+Unknown169
Dynamics Research CorporationAndover, Massachusetts1955501-2,000$100 million to $750 million1011
Dynetics, Inc.Huntsville, Alabama1974501-2,000$100 million to $750 million710
Eagan, McCallister Associates, Inc., an SAIC CompanyLexington Park, Maryland1984501-2,000Unknown210
EKS Group, LLCTampa, Florida2006<25 td="">Unknown34
EOIR Technologies, Inc.Fredericksburg, Virginia1981101-500Under $100 million77
Espial Services, Inc.Pinellas Park, Florida200326-100Under $100 million47
Facchina Global Services, LLCLa Plata, Maryland2004101-500Unknown32
Femme Comp IncorporatedChantilly, Virginia1979101-500Under $100 million79
FiberTechnologiesMoneta, Virginia1990<25 td="">Under $100 million12
First In SolutionsCentreville, Virginia2006<25 td="">Unknown11
Frontline Defense Systems, LLCWashington, District of Columbia2002<25 td="">Under $100 million11
Fulcra WorldwideArlington, Virginia200426-100Under $100 million17
Fulcrum IT ServicesManassas, Virginia1985101-500Under $100 million1910
Futron IncorporatedLorton, Virginia199426-100Under $100 million33
G2, Inc.Columbia, Maryland200126-100Under $100 million22
Gemini Industries, Inc.Burlington, Massachusetts198626-100Unknown23
General DynamicsFalls Church, Virginia195210,000+$10 billion to $50 billion10032
Global Technical SystemsVirginia Beach, Virginia199726-100Unknown17
Harris CorporationMelbourne, Florida198710,000+$1 billion to $10 billion2917
Hewlett PackardPalo Alto, California193910,000+Above $50 billion2518
HSS InternationalLake Arrowhead, California1991UnknownUnknown11
i2 Inc.McLean, Virginia1990101-500Unknown112
iBASEtFoothill Ranch, California1986101-500Under $100 million76
Ideal Innovations, Inc.Arlington, Virginia1999101-500Under $100 million53
iGovMcLean, Virginia199626-100Under $100 million22
IISI CorporationNorth Billerica, Massachusetts1988<25 td="">Under $100 million13
INDUS CorporationVienna, Virginia1991501-2,000Unknown99
Information Manufacturing LLCFairfax, Virginia1999<25 td="">Unknown12
InovaTech Government SolutionsFayetteville, North Carolina200226-100Under $100 million13
IntellitacticsReston, Virginia200326-100Unknown13
Interferometrics Inc.Herndon, Virginia198226-100Unknown11
ISPA, Inc.Atlanta, Georgia198326-100Under $100 million14
Jacobs TechnologyPasadena, California194710,000+$10 billion to $50 billion215
JB Management, Inc.Alexandria, Virginia1990101-500Under $100 million69
Jorge Scientific CorporationArlington, Virginia1986101-500$100 million to $750 million22
K2 Group Inc.McLean, Virginia2003<25 td="">Under $100 million52
Keane Federal Systems, Inc.McLean, Virginia196510,000+Unknown711
L-3 CommunicationsNew York, New York199710,000+$10 billion to $50 billion9629
Leading Edge SystemsColorado Springs, Colorado2002<25 td="">Unknown13
Lockheed MartinBethesda, Maryland199510,000+$10 billion to $50 billion7323
Logistics 2020, Inc.Chesterfield, Virginia2000101-500Under $100 million24
Logos Technologies, Inc.Arlington, Virginia199626-100Under $100 million34
LukosValrico, Florida2008<25 td="">Unknown22
LunarlineArlington, Virginia2004<25 td="">Under $100 million19
MacAulay Brown, Inc.Dayton, Ohio1979501-2,000$100 million to $750 million1513
ManTech International CorporationFairfax, Virginia19685,000-10,000$1 billion to $10 billion8128
Mark LogicSan Carlos, California200126-100Under $100 million42
Masy Group, TheAlexandria, Virginia2005<25 td="">Under $100 million24
MAV6Vicksburg, Mississippi200726-100Unknown12
McNeil TechnologiesSpringfield, Virginia1985501-2,000$100 million to $750 million1311
MCQ Inc.Fredericksburg, Virginia198526-100Unknown17
MCSTampa, Florida1988101-500Under $100 million14
mediaEdge, a Division of Exceptional SoftwareLinthicum Heights, Maryland1996101-500Unknown110
Merlin InternationalEnglewood, Colorado199726-100Under $100 million32
MicroLink, LLCVienna, Virginia1998101-500Under $100 million14
MOJA, IncorporatedManassas, Virginia199526-100Under $100 million512
MPRI, an L-3 Communications CompanyAlexandria, Virginia1987UnknownUnknown710
Navstar, Inc.Falls Church, Virginia199926-100Under $100 million128
NCI Information Systems, Inc.Reston, Virginia19892,001-5,000$100 million to $750 million259
NEK Advanced Securities Group, Inc.Colorado Springs, Colorado2002101-500Unknown78
Nicor GlobalWashington, District of Columbia2007<25 td="">Unknown16
Northrop GrummanLos Angeles, California193910,000+$10 billion to $50 billion9827
Oak Grove TechnologiesRaleigh, North Carolina1998101-500Under $100 million313
Operational Intelligence LLCWarrenton, Virginia2008<25 td="">Unknown21
Operational Skills Group, LLCSeaside, California2000<25 td="">Unknown26
Operational Support and ServicesFayetteville, North Carolina1993101-500Unknown16
Orbis, Inc.Mount Pleasant, South Carolina200026-100Under $100 million22
Organizational Strategies IncArlington, Virginia1996101-500Under $100 million13
Praemittias GroupHighlands Ranch, Colorado200626-100Under $100 million11
Professional SolutionsAlexandria, Virginia2002101-500Under $100 million411
Radiance TechnologiesHuntsville, Alabama1998101-500Under $100 million910
RaytheonWaltham, Massachusetts192210,000+$10 billion to $50 billion7519
RDR, Inc.Centreville, Virginia1986101-500Unknown38
Rockwell Collins, Inc.Cedar Rapids, Iowa193310,000+$1 billion to $10 billion85
S4, Inc.Burlington, Massachusetts1996101-500Unknown1012
SAICMcLean, Virginia196910,000+$10 billion to $50 billion12333
Schafer CorporationArlington, Virginia1972UnknownUnknown810
SCIA SolutionsReston, Virginia2005<25 td="">Under $100 million32
Scientific Research CorporationArlington, Virginia1988501-2,000$100 million to $750 million46
SDV Solutions, Inc.Williamsburg, Virginia200426-100Under $100 million14
SentelAlexandria, Virginia1987101-500Unknown33
SGISSan Diego, California2002501-2,000$100 million to $750 million1911
Shee Atika Services, LLCHudson, Florida2007<25 td="">Under $100 million12
Silverback 7, Inc.Woodbridge, Virginia2005<25 td="">Under $100 million77
SOS International, Ltd.Reston, Virginia1989501-2,000Under $100 million46
SOTTINTDover, Tennessee1998<25 td="">Unknown11
SPADACMcLean, Virginia2002101-500Under $100 million910
Special Applications GroupTampa, Florida2004<25 td="">Under $100 million21
SpecTal LLC, an L-1 Identity Solutions companyReston, Virginia1999101-500Unknown19
SpecTIR LLCReno, Nevada200626-100Unknown21
Spectrum Communications Inc.Hampton, Virginia1999101-500Unknown105
SSA Inc.Alexandria, Virginia198126-100Under $100 million25
Suh'dutsing Technologies, LLCCedar City, Utah200326-100Under $100 million210
Sweet Analysis Services, Inc.Alexandria, Virginia1990<25 td="">Under $100 million17
Symvionics, Inc.Arcadia, California1988101-500Under $100 million14
TanagerAnnapolis Junction, Maryland199626-100Under $100 million52
Tecolote Research, Inc.Lexington Park, Maryland1973UnknownUnknown29
TeleCommunication SystemsANNAPOLIS, Maryland1987501-2,000$100 million to $750 million22
The Boeing CompanyChicago, Illinois191610,000+Above $50 billion4311
TIAX LLCLexington, Massachusetts2002101-500Unknown13
TigerSwan, IncApex, North Carolina2005101-500Under $100 million11
Torres Advanced Enterprise SolutionsArlington, Virginia2002101-500Under $100 million14
TranTech, Inc.Alexandria, Virginia1989101-500Under $100 million24
Trident Systems, Inc.Fairfax, Virginia1985101-500Under $100 million25
TVAR SolutionsMcLean, Virginia2006<25 td="">Under $100 million53
Tybrin Corporation, a Jacobs Engineering companyFort Walton Beach, Florida1972501-2,000$100 million to $750 million34
Universal Hi-Tech Development, Inc.Rockville, Maryland1982101-500Under $100 million13
Universal Strategy Group, Inc.Columbia, Tennessee2007<25 td="">Unknown21
URS CorporationSAN FRANCISCO, California195710,000+$1 billion to $10 billion3614
USfalcon, Inc.Morrisville, North Carolina2005101-500$100 million to $750 million2510
USGC, Inc.Annapolis, Maryland199926-100Under $100 million612
Varen TechnologiesColumbia, Maryland200526-100Under $100 million83
Visual Analytics, Inc.Poolesville, Maryland199826-100Under $100 million213
Visual PurpleSan Luis Obispo, California1998<25 td="">Under $100 million15
VSE CorporationAlexandria, Virginia19592,001-5,000$750 million to $1 billion15
Vykin CorporationTampa, Florida200626-100Under $100 million78
Wave Technologies, Inc.Herndon, Virginia200126-100Under $100 million45
Westech InternationalAlbuquerque, New Mexico1995101-500Under $100 million74
Western DataComCleveland, Ohio1990<25 td="">Unknown13
Zebra ImagingAustin, Texas199626-100Under $100 million16
Zel Technologies LLCHampton, Virginia1988101-500Under $100 million259
ZolonTech Government ServicesWashington, District of Columbia1998101-500$100 million to $750 million22



‘Top Secret America’: radiografía de la masiva industria del terror y de inteligencia en EUA




2) Posee buen material para los que buscan mensajes secretos en las películas :-).

Por ejemplo:

2.1. WILLIAM COOPER es el nombre de una agente de inteligencia en el filme.

Esto es una broma muy simpática porque WILLIAM COOPER es el autor de "BEHOLD A PALE HORSE", referencia clave para los esquizofré... ¡perdón!... para los "conspiranoicos".

"En la vida real", WILLIAM COOPER trabajó para el gobierno estadounidense en agencias relacionadas con la seguridad nacional y falleció en circunstancias extrañas, abaleado por las autoridades, transcurridos varios años posteriores a su retiro, cuando ya era un autor reconocido dentro de la literatura conspiranoica (que en general es un buen entretenimiento para pequeñoburgueses desligados de grupos políticos organizados en actividad).

Documento Milton William Cooper


Como Murió William Cooper



¿Por qué asesinaron a Bill Cooper?

2.2. Uno los personajes femeninos principales tiene una mariposa de alambre colgada al cuello.

Dado que un agente de una agencia de inteligencia que ha sido acusada de crear asesinos con personalidades múltiples habla por teléfono con el personaje femenino que nos introduce a la historia narrada en RED, tenemos que resaltar que este personaje femenino tiene una mariposa moldeada en alambre colgada al cuello, visible durante la conversación teléfonica. Es posible notar que tal figurilla aparece muy sutilmente, casi imperceptible en el encuadre porque está en la parte baja de la imagen. Luego, el agente retirado secuestra a la fémina simpática y la obliga a acompañarlo contra su voluntad. En cierta medida, la trata como una marioneta.

Para los conspiranoicos, entonces, la mariposa es una señal de una relación con las mariposas del programa de lavado cerebral conocido como PROYECTO MONARCA (MONARCH PROYECT) basado en el trauma repetitivo para crear divisiones sucesivas de la personalidad.

2.3.


MEJORES ESTRENOS 2011 (BEST MOVIES 2011 IN PERU)

"A GOLPE DE TITULAR: LA CIA Y EL PERIODISMO EN AMÉRICA LATINA". Autor: JUAN GARGUREVICH. Editorial Causachun. Segunda edición, Lima, 1985, 88 páginas. Portada.
"A GOLPE DE TITULAR: LA CIA Y EL PERIODISMO EN AMÉRICA LATINA". Autor: JUAN GARGUREVICH. Editorial Causachun. Segunda edición, Lima, 1985, 88 páginas. Portada posterior.

"A GOLPE DE TITULAR: LA CIA Y EL PERIODISMO EN AMÉRICA LATINA". Autor: JUAN GARGUREVICH. Editorial Causachun. Segunda edición, Lima, 1985, 88 páginas. Página 65: "(...). En síntesis, los gobernantes norteamericanos decidieron que era necesario impedir que Allende asumiera el gobierno de acuerdo a la voluntad expresa de sus votantes. Y luego, al fracasar en ese objetivo decidieron "desestabilizarlo", es decir, derrocarlo./ El instrumento adecuado para estre propósito era la CIA./ "La desestabilización -escribe Gregorio Sélser- era, la locución que designaba condensándolos, todos los esfuerzos combinados realizados por organismos oficiales, semioficiales, privados, abiertos o encubiertos de Estados Unidos, para privar de sustento económico y social al experimento de gobierno en vías hacia el socialismo emprendido por el presidente Allende" (3)./En su amplio estudio, Sélser reproduce toda la documentación y datos necesarios para demostrar ya sin lugar a duda alguna el rol inmoral, deshonesto y cínico de las autoridades norteamericanas, que no vacilaron antes nada para cumplir con el objetivo propuesto./ Los detalles de la intervención comenzaron a ser conocidos en Septiembre de 1974, cuando dos diarios norteamericanos publicaron datos de una carta que el Representante Harrington había remitido al Presidente de la Comisión de Relaciones Exteriores de su Cámara. / Según ese documento, nos relata Sélser, "El director de la CIA, William E. Colby, reconoció en el transcurso de una sesión secreta legislativa que el gobierno estadounidense autorizó el uso de más de ocho millones de dólares para tornar imposible -'desestabilizar´- la gestión gubernativa del presidente Allende. La intervención de la CIA se inició con la canalización de fondos para la elección del presidente Frei en 1964, y se extendió hasta después del derrocamiento y muerte de Allende, cuando sufragó los gastos de viaje - 9000 dólares - de una delegación de chilenos presidida por el empresario León Vilarín, que tuvo por misión explicar en otros países las razones del ´pinochetazo´(4)./Las acciones de la CIA fueron varias. Lo que veremos con más detalle ahora es la cuestión relacionada con la prensa, los periodistas y la llamada "guerra psicológica"./ - LA PERFECTA CONCERTACIÓN La "desestabilización" incluía el deterioro de la imagen del gobierno de la Unidad Popular, tanto interna como externa. Para esto se debía combinar el "frente interno" conformado por diarios, emisoras de radio, revistas de oposición, con un "frente interno" compuesto por los diarios miembros de la Sociedad Interamericana de Prensa. En ésta, el ente coordinador era el Comité Ejecutivo en primera instancia, y luego la Comisión de Libertad de Prensa que funciona permanentemente en manos de empleados e independientemente de las Asambleas generales./ Las noticias las pondrían las agencias de información, Associated Press y United Press principalmente. No habría dudas respecto a la participación de LATIN-Reuter puesto que ésta transmitía directamente todo lo redactado en las estaciones CIA en América. Y AFP (France Presse) debería sumarse al coro so (Página 66) riesgo de ser calificada de ineficiente, en la medida en que no quedaría atrás en la avalancha informativa prevista. Este tipo de presión (que se resume en la frase que llega de la Central: "La competencia dice..."), es muy frecuente. / Silvia Molina y un equipo de colaboradores estudiaron con minuciosa seriedad científica el caso de la propaganda "desestabilizadora" contra el gobierno de Allende (5) haciendo un esfuerzo de sistematización del "modelo"./ Establecieron que, en primera instancia, la desestabilización de Chile incluyó la guerra psicológica y la económica y que justamente "La guerra psicológica llevada a cabo en Chile, por la riqueza y ductibilidad de su implementación y la efectividad con que se llevó a cabo, así como por la estrategia general dentro de la cual se inscribió, dio lugar a un tipo especial que con las adecuaciones indispensables se aplicó y se aplica actualmente en Latinoamérica" (6)./ Así entonces fueron hubicadas dos fases: Planeación y Ejecución. La primera, cuando "se establecen las alianzas que contribuirán a su aplicación", y la segunda "a cargo de los equipos locales" en coordinación con representantes del gobierno norteamericano y colaboración con la burguesía local./ Para ejecutar una campaña de esta envergadura hacían falta evidentemente medios masivos de información y éstos fueron proporcionados por el conocido Grupo Edwards, cuyo jefe, Agustín Edwards, se entrevistó con Henry Kissinger septiembre de 1970 en cita en la que participaron otros importantes miembros del gobierno de Nixon. Allí se estableció un presupuesto de 8 millones de dólares, de los cuales por lo menos dos millones serían para las empresas informativas de Edwards y otros medios./ ¿El objetivo?: "Crear las condiciones necesarias subjetivas para dar por resultado un golpe de Estado que cambiara radicalmente la actitud chilena hacia los Estados Unidos y reinstalara el capitalismo en gran escala" (7)./ Al revisar con atención los diversos sucesos ocurridos a lo largo de los tres años de la Unidad Popular en el gobierno, Molina misma y otros estudiosos (8) lograron identificar varias etapas:/ -Etapa de Desobediencia Civil ("demostrar la ilegitimdad del régimen; organización de sectores descontentos"). Aquí se puso de manifiesto la efectividad de la información contrarrevolucionaria de El Mercurio y otros medios de difusión. Asimismo, en esta etapa jugaron un rol clave la Sociedad Interamericana de Prensa ("peligra en Chile la libertad de prensa") y el American Institute for Free Labour Development (AIFLD), que logró formar una fantasmal "Confederación de Profesionales de Chile"./ -Etapa de Resistencia Civil ("movilización de todas las fuerzas sociales en una gigantesca campaña de descrédito contra el gobierno"). Esta etapa se inició con la llamada Marcha de las Cacerolas, es decir, el mitin de amas de casa golpeando ollas y utensilios de cocina para protestar por la falta de alimentos./ - Etapa de Desobediencia Militar ("La acción ´terrorista´sobre los militares constituyó una de las principales campañas de la guerra psicológica y tuvo por objeto crear en la población militar los temores (y despertar las ambiciones) que le permitieran integrar con facilidad los prejuicios acerca de la realidad nacional y su propia posición dentro de ella (...). El terror impuesto a los militares operó regularmente a través de diversos medios tácticos, tales como la radio y la prensa, las manifestaciones, las denuncias, las amenazas, etc.". /El nortemaericano Fred Landis ha hecho asimismo un estudio detallado (Página 67) sobre el uso de los medios masivos de información en la contrarrevolución. Justamente en su tesis para doctorado estudió fundamentalmente el rol del diario El Mercurio, con una técnica semántica-diferencial (9). / En este estudio y en otros, menciona Landis que ya en junio de 1970 el diario de los Edwards (y la CIA) publicó una gran fotografía - en un cuarto de página - de varios tanques soviéticos frente al palacio presidencial. Era un foto-montaje, un truco con un titular que decía: "Un gobierno pro-comunista abrirá la puerta de Chile con estos tanques"./ Menciona también una campaña radial patrocinada por un extraño "Poder Femenino" (organización patrocinada por la CIA) que contrató programas muy breves con textos como éste: CONTROL: Ruido de armas automáticas. LOCUTOR (mujer): ¡Los comunistas mataron a mi hijo!. CONTROL: Más ruido de disparon. LOCUTOR (hombre); Esto podría suceder si Chile fuera comunista. LOCUTOR (mujer): Este ha sido un mensaje del Poder Femenino. /- Etapa de Ofensiva Civil y Militar (Acción terrorista del grupo de ultraderecha "Patria y Libertad"; sistema de denuncias anónimas para provocar registros y allanamientos de casas en "busca de armas"; paros laborales, etc.). /Quizá el empujón final, con una población ya psicológicamente preparada para aceptarlo, fue la "revelación", dice Landis, del "Plan Z": "La CIA confeccionó un documento de seis páginas pretendiendo demostrar un plan de izquierda, que fue profusamente publicitado. Este documento fue realizado por el equipo de la CIA que trabajaba bajo la cobertura de la misión militar de 35 norteamericanos ubicada en el séptimo piso del Ministerio de Defensa". / Aquel plan, dice Landis, fue copia exacta del plan que utilizaron en Jakarta, Indonesia, para lanzar a las fuerzas armadas de este país contra la izquierda y provocar así uno de los baños de sangre más espantosos de la historia de la humanidad. / Y así ocurrió en Chile en septiembre de 1973".