Categories
Uncategorized

A Page from Corey’s Digs

Latest Victims of Debanking Trend: Dr. Mercola & Associates

By Corey Lynn and The Sharp Edge

A steady descent into financial tyranny is taking place one step at a time, as major banks continue to target customers based on their beliefs. JPMorgan Chase is listed among a host of financial institutions as “high risk” for cancelling or denying services based on views or beliefs, according to a nonprofit organization dedicated to protecting consumers and businesses from woke capitalism.

The latest victims of this debanking trend are Dr. Mercola, his business associates, and their family members.  The following excerpt of Dr. Mercola’s article titled Chase Shuts Down Bank Accounts of Mercola and Key Employees,” outlines the cancellations of personal and business accounts by JPMorgan Chase with little to no explanation provided.

“July 13, 2023, JPMorgan Chase Bank suddenly informed me they are closing all of my business accounts, both banking and investment accounts, along with the personal accounts of my CEO, my CFO and their respective spouses and children.

No reason for the decision was given, other than there was ‘unexpected activity’ on an unspecified account. The oldest of these accounts has been active for 18 years.

Source: “Chase Shuts Down Bank Accounts of Mercola and Key Employees,” Mercola, July 27, 2023

Politically-Motivated Harassment

This is what the new social credit system looks like, and what every soul on the planet can expect from the central bank digital currencies (CBDCs) that are being rolled out. Go against the prevailing narrative of the day, and your financial life will be deleted with the push of a button.

It’s difficult enough trying to navigate this hurdle today. Once everything is digitized, cash eradicated and the social credit system completely integrated and automated, this kind of retaliatory action for wrongthink could be a death sentence for some people.

My CFO, Amalia Legaspi, whose Chase accounts — including a joint account with her husband — were closed along with mine, is now struggling to figure out how to pay for her husband’s health care in the Philippines. He’s bedridden with dementia and is wholly dependent on her financial support, and she’s not allowed to open another bank account in his name.

‘I have to provide all the legal documentations including notarized physicians’ affidavit from the Philippines to prove that my husband is incapable of handling his finances and request the Federal to directly deposit the pension to my own personal account,’ Legaspi told Florida’s Voice.

Legaspi’s son’s account — which he’s using to pay for college expenses — was also cancelled. My CEO, Steven Rye, believes his and his wife’s accounts were shut down because of my opinions on COVID-19. He told Florida’s Voice:

‘I believe they cancelled all of the accounts because of Dr. Mercola’s (our employer) opinions. He has carried a contradictory view throughout the COVID narrative and co-authored the best-selling book ‘The Truth About COVID-19,’ which exposed the likelihood that this virus was engineered in a laboratory funded by the NIH.’

In May 2023, Florida Gov. Ron DeSantis signed legislation specifically prohibiting financial institutions from denying or canceling services based on political or religious beliefs.

Apparently, Chase Bank is bowing to some other ‘authority,’ and perhaps they refuse to cite a specific reason for the cancellation, ‘for legal reasons,’ is because they know they’re acting unlawfully.

Generational Punishment for Wrongthink

On top of closing the accounts of Rye and his wife, Rye also was told his young children will not be able to open accounts with Chase Bank.

‘It’s just hard to believe that your family, your wife, your kids can’t have a bank account because of the opinions of your employer and they’ve never done anything wrong. We all have completely clear records,’ Rye told Florida’s Voice.

In a voicemail reply, a Chase Bank representative told Rye the reason for closing his personal accounts and that of his wife could not be disclosed ‘for legal reasons.’ He was, however, told he could submit paperwork to have their accounts reconsidered. ‘We are going to try because you’re a good client of our institution,’ the representative said.”


Florida’s Anti-ESG Law

Debanking Dr. Mercola, his employees, and their family members for “wrongthink” is not only outrageous, but it’s also illegal.

Thanks to Anti-ESG legislation signed into law in May, financial institutions operating in the state of Florida are prohibited “from discriminating against customers for their religious, political, or social beliefs.”

Furthermore, the financial sector is banned from “considering so-called ‘Social Credit Scores’ in banking and lending practices that aim to prevent Floridians from obtaining loans, lines of credit, and bank accounts.”

Provisions of the new Florida statute, which took effect on July 1, 2023, will be enforced “to the fullest extent of the law” and banks that violate these provisions will be subject to sanctions and penalties.  As Dr. Mercola noted, JPMorgan Chase Bank informed him of the account closures on July 13, 2023, after the new law was put into action.

JPMorgan Chase’s History of Debanking & Lawsuits

The flagrant discrimination Dr. Mercola and his associates experienced is not unique.  In fact, 19 state attorneys general have put JPMorgan Chase & Co. (Chase) on notice for allegedly disenfranchising customers who hold religious, social, or political beliefs that are antithetical to the bank’s ‘woke’ ideology.

Despite Chase’s own public statements that, “No form of discrimination, harassment, inappropriate or abusive conduct is tolerated by or against employees, customers, vendors, contractors or any other individuals who conduct business with JPMorgan Chase,” attorneys general in 19 Republican states assert that the financial institution “de-banked a preeminent religious liberty organization.  And this was not an anomaly, as there have been at least two other similar incidents.”

JPMorgan Chase is accused of cancelling, without explanation, the account of a religious nonprofit organization known as the National Committee for Religious Freedom.  As a condition to reinstate the account, the bank then demanded a list of the nonprofit’s donors.

Additionally, the Missouri state treasurer’s office threatened to stop doing business with JPMorgan Chase after the bank’s WePay system denied payment processing for a conservative group known as the Defense of Liberty.  The bank reversed course only after the public backlash brought on by the Missouri state treasurer.

The nation’s largest bank, JPMorgan Chase, is no stranger to lawsuits over its unethical and discriminatory practices.  Since 2000, the financial institution has paid out nearly $39 billion in penalties.

Source: Violation Tracker, JPMorgan Chase

In two of the bank’s largest payouts totaling more than $18 billion, JPMorgan Chase was accused of deceptively representing the quality of mortgage loans the institution sold, which significantly contributed to the 2008 financial crisis.

Perhaps the most stunning piece of evidence is the extensive 20-page chart put together by The Solari Report that documents selected legal, regulatory, and enforcement settlements of JPMorgan Chase between 2022-2019.

Countless lawsuits over the years have proven a pattern of deceptive and unethical practices by the largest banking institution in the United States, which is now weaponized against customers who hold beliefs that contradict the establishment narrative.

JPMorgan Chase’s Blatant Double Standard & Ties To Criminals

While JPMorgan Chase has repeatedly cancelled customers based on their religious, social and political beliefs, the financial giant gave criminals with political connections a pass.

Just last month, JPMorgan Chase reached a $290 million settlement with Jeffrey Epstein’s victims who accused the financial institution of not only turning a “blind eye” to Epstein’s activities but facilitating his child sex trafficking enterprise.  The suit against JPMorgan Chase accused the bank of skirting federal laws while reaping the benefits of providing the convicted child predator financial services for years.

Despite the fact that JPMorgan Chase tracked suspicious transfers over nearly a decade between Epstein and his partner, Ghislaine Maxwell, amounting to over $30 million, the bank maintained ties with Jeffrey Epstein until just a few months before his death in 2019.

A separate lawsuit by the US Virgin Islands has revealed that the former CEO of JPMorgan Chase, Jes Staley, “had a close personal relationship with Epstein” and that the disgraced banker exchanged around 1,200 emails with the convicted pedophile.  The suit alleges that the emails “even suggest that Staley may have been involved in Epstein’s sex-trafficking operation.”  Staley has been accused by one victim of using “aggressive force in his sexual assault” of her and informing the victim “that he had Epstein’s permission to do what he wanted to her.”

Aside from JPMorgan Chase’s disturbing ties to Jeffrey Epstein, the corrupt bank also provided financial services for Hunter Biden and his associates.  The House Oversight Committee recently subpoenaed four major financial institutions, including JPMorgan Chase, for records in relation to their investigation of the Bidens’ influence peddling scheme.

The nonprofit watchdog, Marco Polo, has released a trove of pictures and documents from Hunter Biden’s laptop, including five Suspicious Activity Reports from JPMorgan Chase, which indicate that the bank was fully aware of the criminal activity surrounding Hunter Biden and his associates.  One Suspicious Activity Report flagged financial activity by Hunter Biden and his law firm, Owasco, for possible connections to human trafficking.

The Suspicious Activity Reports raised red flags on financial activity by Hunter Biden and his associates dating back to 2014, though Hunter Biden continued to maintain an account with the bank until 2017.

The troubling connections between JPMorgan Chase and criminals like Jeffrey Epstein illustrate a blatant double standard.  While JPMorgan Chase has consistently targeted customers for their religious, social and political beliefs, the bank maintained questionable ties with known criminals.

Their End Game

The actions by JPMorgan Chase against Dr. Mercola and his associates follows a disturbing trend by all major financial institutions to cancel voices of dissent to the established narrative on a range of topics from Covid mRNA injections to election integrity, resembling the social credit system of Communist China.

Corrupt financial institutions are colluding with globalist organizations through public-private partnerships to transform society and initiate a Great Reset of the global financial system.  Their end game is to install a worldwide system of social credit, digital IDs, CBDCs, and tokenized assets under the central banks and Bank for International Settlements, all of which are protected by immunities and shielded from accountability by the public.

As Dr. Mercola’s article stated, “That’s our future, unless we all refuse to play along. It’s crucial to reject CBDCs and to do everything in your power to not enter into that system. The life and freedom of your children and grandchildren depend on it. Your actions today will shape the future of your descendants, perhaps in perpetuity.”

Subscribe to Corey’s Digs so you don’t miss a Dig!

 
 

In-Vesica Art Design Energy

“Do All Things In-Vesica.”

Metaphysical Services and Spiritual Art

Get your free 50-minute Health History. Go to In-Vesica/Health for details.

Categories
foods Uncategorized

Marijuana Honey

Manage Reusable blocks

by Allison Williams Hill  6/21/17

In-Vesica  Art  Design  Energy

“Do All Things In-Vesica.”

Do bees pollinate marijuana?  Yes.  Marijuana blossoms possess female and male parts.  Then it would be possible to make marijuana honey from the pollen.  It will contain, in addition to the amino acids honey is blessed with, marijuana pollen.

So many factors influence the relationship between acreage and the number of hives.    to produce singular honey.  Tupelo, orange blossom, and clover honey are produced this way.  All states’ marijuana laws limit where and the amount that can be grown and harvested.   Anywhere from 1 acre to 7 acres are required to pollinate trees or plants.  So the end product may be a combination of flowers including marijuana.

Amino acids are our building blocks.  Honey contains them all as well as vitamins and minerals.

Honey is high in vitamin C, a variety of B vitamins such as niacin, riboflavin, and pantothenic acid, as well as, minerals such as potassium.

Marijuana

There is at least one blog that demonstrates how to insert marijuana into honey.  I have not seen anywhere bees are allowed to pollinate their flowers and produce honey directly.  Organic wax surrounded and containing marijuana honey – can you see it?

Does marijuana have any pests?

Honey Nutrition Health         Benefits Information

Source: http://www.amazing-green-tea.com/honey-nutrition.html

The secret to honey nutrition: Why the rich array of complex sugars, vitamins, minerals, amino acids and antioxidants are so beneficial.

It is savored by all due to its taste as well as health benefits. What make honey so popular is its nutritional benefits and the ease with which it can be consumed.

One can eat honey directly, or put it on bread like a jam. You can mix it with juice or any drink instead of sugar. Alternatively, mix it with warm water, lime juice, cinnamon and other herbs to make a medicine.

So, what exactly does honey contain that make it such a healthful beverage?

Honey Nutrition #1:
Complex Sugar and Carbohydrates

Honey is made up of both simple sugars (called monosaccharides) such as glucose and fructose, and complex sugars (called oligosaccharides).

Complex sugars are present in all life forms and particularly in cell membranes and cell secretions. They form the basic components of:

  • Hormones – made of links of complex sugars and proteins known as glycoproteins.
  • Blood proteins – also made from glycoprotein links, with the only exception being serum albumin.
  • Blood cells – especially if you have a blood group of ABO.

Which type of honey contains the most complex sugars? It depends on the type of nectar the bees collect.

Honeys that contain nectar from blackberry, chinquapin, coral vine, cranberry, holly, poison oak, mountain laurel, raspberry, rhododendron, Spanish needle, sumac, thistle, tulip trees, cedar honeydew, or hickory honeydew have higher complex sugars levels.

Honey Nutrition #2:
Complex Carbohydrates

The complex carbohydrates found in honey are made up of complex sugars.

They are considered prebiotic – i.e. these complex carbohydrates are non digestible, but by consuming them you encourage the growth of friendly intestinal bacteria in the body, which helps you digest food more easily.

Honey Nutrition #3:
Vitamins and Minerals

It may come as a surprise to many people, but honey is an excellent source of vitamins. This is not equally true of vegetables and fruits.

For example, spinach loses 50% of its vitamin C content within 24 hours after being picked. Fruits lose some of their vitamin content during storage. In contrast, honey keeps well. In fact, it is probably the only food that never expires!

Honey contains a variety of vitamins and minerals. The vitamin and mineral content of honey depends on the type of flowers used for agriculture. When bees are allowed free forage, the honey blend is higher in a wider variety of vitamins and minerals.

Honey is high in vitamin C, a variety of B vitamins such as niacin, riboflavin, and pantothenic acid, as well as, minerals such as potassium.

Honey Nutrition #4:
Amino Acids

All varieties of honey are rich in amino acids. One study has found that the level of amino acids present in honey is a reliable indicator of the honey’s antioxidant capacity.

Amino acids are the basic building blocks of life, essential to our very existence. When you examine the various properties and benefits of each amino acid, you will start to form a clearer picture as to why honey is so beneficial.

Tryptophan:

A natural relaxant, it helps alleviate insomnia by inducing normal sleep. It reduces anxiety and depression, relieves migraine headaches, boosts immune system, reduces the risk of artery and heart spasms, and works with Lysine to reduce cholesterol levels.

Learn why honey may be a good remedy for insomnia.

Lysine:

It is one of the essential amino acids – your body cannot generate its own Lysine, meaning you must get it from your diet.

Recent studies have shown that Lysine may be effective against herpes by improving the balance of nutrients that reduce viral growth. Prolonged stressful situations increase our requirements for Lysine and it is important in the formation of collagen (the protein that forms the matrix of your bone, cartilage and connective tissue).

Methionine:

Another essential sulfur amino acids. As with other essential amino acids, you do not create your own so you must ingest it for survival.

Contributes to the formation of important compounds in your body and works as a sulfur donor to aid in your body’s detoxification processes.

Cysteine:

Functions as an antioxidant and protects the body against radiation and pollution.

Histidine:

Another essential amino acid and is delivered mostly from our diets.

It has anti-inflammatory properties and is the only amino acid found to be consistently low in the blood of those with rheumatoid arthritis.

Glutamine:

This essential amino acid plays a key role in the metabolism and the gastrointestinal tract. It is the primary energy source for the cells that line your intestines and is essential to keeping them healthy.

It is considered also to be a brain food by improving mental capacity. It may also help speed the healing of ulcers and reduce fatigue.

Tyrosine:

Tyrosine is a natural mood enhancer due to its ability to convert to feel-good neurotransmitters norepinephrine and dopamine in the brain. It helps with depression. It also may convert to thyroid hormone and to adrenaline which is produced by your adrenal gland in response to stress.

Honey Nutrition #5:
Antioxidants

Honey contains powerful antioxidants which fight free radicals and reverse aging.

Free radicals are everywhere – in the air we breathe, the food we eat, and even the sunlight we love so much. Every moment, the body absorbs oxygen and turns it into energy in a process called oxidation. This process also releases free radicals.

Antioxidants slow down aging by neutralizing these free radicals. They perform healing at the deepest cellular level, allowing the benefits to manifest in a myriad of different ways.

Further information can be found in the Honey Antioxidant.

Now you have understood the incredible benefits of honey nutrition, you may have one more lingering question: how much calories does it contain? Well, you can find the answer at

http://www.amazing-green-tea.com/honey-nutrition.html

Categories
Uncategorized

Not “There”

by Allison Williams Hill 3/4/23

In-Vesica  Art  Design  Energy

“Do All Things In-Vesica.”

 I was back in the existentialism classroom at the college I attended. A Russian woman was speaking as I came out of a distant place and thought. The room was quiet. I must have missed something. I looked around the room. The teacher was looking at me. I smiled slightly and he looked away. I looked down at my desk. He said something but I don’t remember what. The class ended. I walked out and turned back towards the door to connect with another classmate. He and I are the only two Black people. I saw some faces. I smiled at them but they looked away.

I wondered what happened when I was not “there.”

The other Black student told me that the Russian woman was saying derogatory things about Black people, that they did not want to work, and that they were lazy. I sat closer to her than he did and I heard nothing she said. He wondered what I was doing that I did not hear her comments.  I could only say, “Wow.” It became apparent that I was looked towards to respond to her comments. I did not.

I thought about this day many times since. I know people experience “do-overs”, opportunities to change the outcome of events, personal or public. For example, people think of eliminating Hitler, long after his demise. (He reportedly died in Oregon in 2002.) I thought of that day in class. I thought of what I would say in response to what she said, but that was based on what my classmate said and not what I would have heard. There’s a difference: I can hear what people say and hear what they are not saying.

It was not until today, over forty years later, that I realized what happened.   I felt that I was saved. I went “somewhere else” in mind. I was not mentally in the classroom although my body was in the chair. I was distracted. I know now that it was energetic. Some weeks before in that class, another white woman, in effect, called me stupid. We were discussing Jack Kerouac’s “On the Road.”   I was assertive in my response to what she said to me. I felt that I was holding back but went with it anyway. I was short of literally telling her off.

The second time could have been worse. This woman said very inflammatory stuff, however, right now, I thank Spirit for the distraction. I often thought about what I would have said or would have done to her; what repercussions there might have been, and the fallout.  This tape is gone. The do-overs, the shoulda-coulda-wouldas are over now. I am smiling and shaking my head about this late discovery of a gift I received.   Thank you, Distractors, for directing my attention to something else I needed at that time. Please acknowledge my acceptance of your assistance in the future. Looking at the time span in between, Spirit has obliged.

Categories
Uncategorized

DR. KARY MULLIS

Dr. Kary Mullis, oddly, is no longer with us. He has been “late” for a while. Somehow, his silence was made possible, naturally, or…

First is an upload of an interview that Dr. Gary Null had done with Dr. Mullis. All of Gary’s work is hard-hitting, just like this exchange. Dr. Mullis challenged Dr. Anthony Fauci, the head of the National Institute of Allergy and Infectious Diseases, or NIAID, under whose supervision, according to Robert F. Kennedy, Jr. Americans’ vulnerability to allergy and infectious diseases increased, not decreased.

Question: if Robert F. Kennedy Jr.s’ book “The Real Anthony Fauci” is baseless, why hasn’t Anthony Fauci sued?

An article by The Phase entitled  “THE MYSTERIOUS DEATH OF DR. FAUCI’S MOST NOTABLE CRITIC” also has several videos, some of which were banned from Youtube.

THE MYSTERIOUS DEATH OF DR. FAUCI’S MOST NOTABLE CRITIC

By  | 0 Comments

from JimMub – VIDEOS – SHARE:

MYSTERIOUS DEATH OF DR. FAUCI’S MOST NOTABLE CRITIC – DR. KARY MULLIS, INVENTOR OF PCR TEST

VIDEO:

The late Dr. Kary Mullis, the inventor of the PCR test, has been blowing the whistle on Fauci and big pharma for thirty years. CONVENIENTLY died in august of 2019. Doctors Kaufman, Shiva, Tenpenny, Cahill, Martin, Mikovits and many others knows Fauci is a lying little criminal who should be in jail. Nuremberg 2.0 trial for crimes against humanity soon.

Celia Farber wrote an outstanding article on this topic featuring Mullis. Here is the article; I learned a ton from reading it: https://uncoverdc.com/2020/04/07/was-the-covid-19-test-meant-to-detect-a-virus/

Interesting to note that the first hit from a Google search of “Dr. Kary Mullis” results in a defamatory article: https://www.the-scientist.com/news-opinion/kary-mullis–inventor-of-the-pcr-technique–dies-66256

The first hit from a Duck Duck go search results in his Wiki page: https://en.wikipedia.org/wiki/Kary_Mullis
You know you are over the target when Google has to override their search engine to defame a Nobel scientist.

https://banned.video/watch?id=60a8280ab72e4b4268fa84ba



		
Categories
Espionage Uncategorized

Israel’s Decades of Economic Espionage in the United States

by Allison L. Williams Hill  In-Vesica  Art  Design  Energy

“Do All Things In-Vesica.”

Posted on October 26, 2021

(Article and more information at https://israelpalestinenews.org/israels-decades-of-economic-espionage-in-the-united-states/)

Israel’s Decades of Economic Espionage in the United States

An Israeli Ofek (Ofeq) spy satellite is launched into space from a site in central Israel. Few people know that Israel had stolen key technology for Ofek from a US company, Recon/Optical. After Recon’s security guards caught three Israeli air force officers stealing 50,000 pages of technical documents, an arbitration panel eventually ordered Israel to pay Recon $3 million in damages for what it found to be “perfidious” illegal acts. (PHOTO:cgtn)

Israel, which receives billions of dollars from the United States, has conducted espionage in the U.S. – especially economic espionage – since its creation in 1948.

The illegal behavior includes fraudulent diversion of U.S. foreign aid, illicit retransfer of sensitive U.S. technologies to third parties, and violation of end-use restrictions on U.S. military items transferred to Israel.

According to the U.S. intelligence community, Israel’s motivations appear to be threefold: to strengthen its industrial base, to sell/trade the information to/with other countries (especially China) for profit, and to sell/trade the information to/with other countries to develop favorable political ties and alternative sources of arms and intelligence.

To these, a fourth factor might be added: the certain knowledge that, in the words of a senior former U.S. intelligence official, “Israel can steal right and left, but we will still pump money in.”

Israel is the only country whose defense industry is heavily subsidized by the United States.

No foreign country has a more effective informational network inside the executive and, especially, legislative branches of the U.S. government…

By Duncan L. Clarke, reposted from Journal of Palestine Studies, Vol. 27, No. 4 (Summer, 1998), pp. 20-35 (Images added by IAK)

ISRAEL HAS CONDUCTED ESPIONAGE in the United States, especially economic espionage, [1] since its creation in 1948. [2] This espionage principally targets military and dual use items (goods and technology with civilian and military uses) and furthers strategic as well as economic objectives. This article examines the scope and nature of this activity, its distinctiveness, its apparent benefits and costs for Israel, and the U.S. response.

In one sense, Israel is hardly unique: it is just one of the dozen countries identified by the National Counterintelligence Center (NACIC) as active against U.S. interests. [3] Israeli operations are reflective of the larger global phenomenon of economic espionage. Like more than half of these countries, Israel is a U.S. ally whose intelligence and armed services work closely with U.S. counterparts. Like most of the twelve, Israel’s defense firms are closely tied to the state and compete actively with American firms. Like South Korea and Taiwan, Israel has sought to exploit potentially sympathetic American ethnic groups. Like Iran and China, Israel has employed economic espionage to advance a nuclear weapons program and the means to deliver such weapons. Like China and Russia, its political-strategic intelligence collection in the United States appears to be ongoing, often merging imperceptibly with its economic collection.

Yet Israeli espionage against the United States is also distinctive. No other country is more frequently said to have a unique “special relationship” with the United States. No ally’s security, even survival, is more reliant on U.S. intelligence. No other ally on the list receives U.S. foreign aid. Few countries’ defense industries and infrastructures are more dependent on close, cooperative ties with the United States. No other country has a more intimate grasp of the American political system, and no country receives more reliable political protection from Congress. Finally, while allegations of “dual loyalty” are not confined to American citizens supportive of Israel, that explosive charge is particularly disturbing here.

CONSTANCY OF ISRAELI ECONOMIC ESPIONAGE

With the cooperation of some American Jews, Israeli espionage in the United States was underway throughout the late 1940s and early 1950s. [4] A far more concerted, systematic effort to collect scientific and technical information was initiated in 1960 when Israel’s Defense Ministry created what was to evolve into its

). [5] LAKAM soon became a technical penetration and acquisition network designed to strengthen Israel’s defense industry [6] by giving top priority, according to a CIA report, to “the collection of scientific intelligence in the U.S.” [7]

During the cold war, says John Davitt, former head of the Justice Department’s internal security section, U.S. counterespionage specialists “regarded Israel as being the second most active foreign intelligence service in the United States.” [8] When in 1996 the CIA finally exposed Israel (and France) publicly for being “extensively engaged in espionage,” [9] the U.S. General Accounting Office (GAO) also issued a report stating that Israel “conducts the most aggressive espionage operations against the United States of any ally…. [It] routinely resorts to state-sponsored espionage [to steal] classified military information and sensitive military technology [and] sensitive U.S. economic information.” [10]

In 1986 former head of the Justice Department’s internal security section John Davitt said: “The Israeli intelligence service, when I was in the Justice Department, was the second most active in the United States, to the Soviets.” (PHOTO:Boston Globe)

No foreign country has a more effective informational network inside the executive and, especially, legislative branches of the U.S. government. [11] It appears that several units within Israel’s intelligence community are engaged in economic espionage. [12] They include Israel’s foreign intelligence service (Mossad) and a new organization within the Defense Ministry – the Security Authority (Malmab). [13]

According to the U.S. intelligence community, Israel’s motivations appear to be threefold: to strengthen its industrial base, to sell/trade the information to/with other countries (especially China) for profit, and to sell/trade the information to/with other countries to develop favorable political ties and alternative sources of arms and intelligence. [14] To these, a fourth factor might be added: the certain knowledge that, in the words of a senior former U.S. intelligence official, “Israel can steal right and left, but we will still pump money in.” [15]

The United States and Israel agreed in 1951 not to spy on one another. [16] There is little evidence that the United States has conducted economic espionage against Israel, [17] but the agreement has been flouted repeatedly and flagrantly by Israel. Israeli economic espionage has infuriated the U.S. intelligence community, especially the FBI and the Customs Service, and has left a legacy of distrust in that community. [18] Still, such espionage does not have the same impact as attempts to penetrate the national security bureaucracy, as in the notorious 1985 Jonathan Pollard case, which strained diplomatic relations and disrupted intelligence cooperation for some time. [19] Economic espionage, on the other hand, has not significantly affected strategic cooperation, including the sharing of intelligence. Indeed, U.S.-Israel strategic ties are closer today than ever before. Among other things, since the U.S.-Israel Counterterrorism Accord was signed in 1996, the United States has continued to preposition munitions in Israel, and financial aid to Israel for counterterrorism and ballistic missile defense increased. [20]

SPECIFIC TARGETS OF ECONOMIC ESPIONAGE

Israeli Defense Industrial Base

Israel maintains a strong defense industrial base. Both the quality of Israel’s arsenal and the competitiveness of its armaments industry are enhanced by economic espionage.

Representative targets of Israeli economic espionage have included: U.S. technology for artillery gun tubes, coatings for missile reentry vehicles, avionics, missile telemetry, and aircraft communications systems. [21] One particularly notorious case concerned Recon/Optical, an Illinois firm producing state-of-the-art aerial surveillance equipment for the Pentagon and the U.S. intelligence community. In 1986, Recon’s security guards caught three Israeli air force officers stealing 50,000 pages of technical documents relating to the company’s proprietary information. For at least a year, these officers had been exploiting contractually provided visitation rights and passing Recon’s documents to a competing Israeli firm, El Op Electro-Optics Industries. An arbitration panel eventually ordered Israel to pay Recon $3 million in damages for what it found to be “perfidious” illegal acts. [22] Nonetheless, Recon suffered grievous damage and barely escaped bankruptcy. The optics technology stolen from Recon apparently provided critical elements of Ofek-3, Israel’s first durable reconnaissance satellite. [23]

There were other troubling episodes throughout the 1980s. For example, in the early 1980s some Israelis were caught illicitly taking classified blueprints of the F-16 fighter out of the General Dynamics plant in Fort Worth, Texas. A separate facility was then set up outside the plant for the Israelis (who were awaiting delivery of about fifty-five F-16s). [24]

General Dynamics plant at Fort Worth where Israelis were caught steaking classified blueprints of the F-16 fighter (PHOTO:Lockheed)

In another case, the Customs Service intercepted Israeli agents who were suspected of plotting to export U.S. cluster bomb technology to Israel. In 1982, the Reagan administration had banned the export of such weapons to Israel when Israel violated, during its war on Lebanon that year, its end-use agreement with the United States not to employ cluster weapons against civilians. Although there was abundant evidence of intentional wrongdoing, the State Department prevailed on the Justice Department not to prosecute. [25]

A third case involved NAPCO, Inc., a Connecticut company. NAPCO worked with Israeli agents to illegally export sensitive new technology for chrome plating the inside of 120mm tank barrels. Indeed, U.S. foreign aid paid for building a plant in Israel to utilize this process. NAPCO pleaded guilty to violating U.S. export law and was fined $750,000. No Israelis were prosecuted. [26]

The U.S. Army’s Watervliet Arsenal near Albany, New York, where Israelis illicitly acquired advanced electroplating technology for cannons that had been developed by the U.S. (PHOTO)

In other cases, the Justice Department charged an executive of the Science Applications International Corporation with illegally transferring missile defense technology to Israel by “dealing with the highest levels of the military … in Israel,” [27] and Israel improperly acquired U.S. RPV (remotely piloted vehicles) technology, allowing the Israeli company Mazlot to underbid its American competitors. [28]

Public U.S. government reports, including the 1996 GAO report and the 1997 NACIC annual report to Congress alluded to above, suggest that the problem has worsened since the end of the cold war. For instance, a 1997 FBI affidavit revealed that David Tenenbaum, a civilian with the U.S. Army Tank Automotive and Armaments Command (TACOM), admitted giving “nonreleaseable classified information to every Israeli liaison officer assigned to TACOM over the last 10 years.” [29] This included classified data on theater missile defense systems, the Bradley fighting vehicle, ceramic armor, and other weapons systems. [30]

A civilian with the U.S. Army Tank Automotive and Armaments Command (TACOM) admitted giving “nonreleaseable classified information to every Israeli liaison officer assigned to TACOM over the last 10 years.” This included classified data on theater missile defense systems, the Bradley fighting vehicle, ceramic armor, and other weapons. systems. (PHOTO:Military.com)

These technologies are necessary to meet what General Matan Vilnai, deputy chief of Israel’s defense staff, says are Israel’s “operational environments,” particularly resisting a Syrian armor attack and countering an over-the-horizon missile attack. [31] Tenenbaum also appears to have furthered Israel’s commercial interests as the Israeli company Elbit now offers upgrades of the U.S. army’s Bradley fighting vehicle, Israeli companies have long been involved in ceramic designs for tanks, and Israel approached the United States in 1997 about selling its forthcoming Arrow theater missile defense system to Turkey.

Fraud and the Israeli Purchasing Mission

Israeli economic espionage is sometimes associated with two often interrelated factors: the fraudulent acts committed by Israeli officials in the United States and the activities of the Israeli Purchasing Mission in New York.

Concerning the former, Israeli general Rami Dotan was convicted by an Israeli court in 1991 for conspiring with an executive of the General Electric Company, Herbert Steindler, to illegally divert $40 million of U.S. military assistance. [32] Steindler, Dotan, and another person were indicted by a U.S. federal court in 1994 for the same offense. [33] Many of these fraudulent practices were taken at the express direction of senior Israeli defense officials, possibly at the highest levels. [34] A 1992 memorandum from the Justice Department to Secretary of Defense Dick Cheney stated that these fraudulent diversions of U.S. aid may have been intended to “finance Israeli intelligence operations … in the United States.” [35] Investigators for the House Energy and Commerce Committee concurred, and a knowledgeable congressional source said that “Dotan was continuing a fraudulent diversion of military aid that had been going on before he ever arrived on the scene.” [36]

An Israeli general conspired with an executive of the General Electric Company, Herbert Steindler, to illegally divert $40 million of U.S. military assistance. Steindler was an international sales manager for General Electric at the company’s aircraft engines facility in Evendale, Ohio (pictured above). His responsibilities included negotiating and supervising sales to Israel. (PHOTO:GE)

The Israeli Purchasing Mission was established in 1952, well before the United States became Israel’s principal arms supplier. It is run by Israeli military officers and defense officials with a staff of about two hundred (many of whom are Israeli college students). The Purchasing Mission is Israel’s locus of coordination with the U.S. defense industry, and it draws from the $1.8 billion of annual U.S. military aid to buy defense goods and services in the United States. [The aid is now $3.8 billion] It awards contracts to U.S. firms and obtains export licenses from the Departments of State and Commerce for shipments to Israel. It has liaison officers at many defense plants, sites, and installations in the United States and is accredited to additional U.S. defense facilities. Mission personnel are often aware of evolving new technologies long before key officials in Washington, thus enhancing opportunities for evading export controls. [37]

The unusual access to U.S. firms facilitates economic espionage, as do Israel’s unique arrangements for paying U.S. companies. For other countries that use U.S. military aid to buy defense goods in the United States, the government disburses funds directly to American companies, thereby enhancing oversight. For Israel, however, the Purchasing Mission pays the companies and is then reimbursed by the U.S. Treasury. This, plus other relaxed rules for Israel’s use of U.S. military aid and the presence of many retired Israeli generals and defense officials in American firms seeking business from the Mission, sharply degrades U.S. monitoring of Mission expenditures and activities. This invites the kind of fraud and/or espionage that variously involved Mission personnel in the Dotan affair and the NAPCO, Recon, and cluster bomb cases. [38] When the Justice Department sought to move against some Purchasing Mission personnel for recurring involvement in illegal technology acquisition, Israel requested – and in 1988 received from the State Department – limited diplomatic immunity for most of its professional staff. [39]

Nuclear Weapons and Means of Delivery

Although evidence remains officially inconclusive, there is a “widespread belief” in the CIA and elsewhere within the U.S. intelligence community that in the 1960s Israeli intelligence spirited about two hundred pounds of weapons-grade uranium from the Nuclear Materials and Equipment Corporation (NUMEC) in Apollo, Pennsylvania. [40] John Hadden, a former CIA station chief in Tel Aviv, states that NUMEC was an “Israeli operation from the beginning.” [41]

This private corporation was owned by Zalman Mordecai Shapiro, an active member of the Zionist Organization of America, who had close ties to Israel. These ties and Shapiro’s activities convinced the FBI and CIA that he had helped Israeli agents smuggle the material out the United States to Israel, where it provided fuel for the first four nuclear devices assembled at Dimona. [42] The NUMEC case was investigated by the GAO and the House Interior Committee in 1978, but their reports have never been declassified. Indeed, the political sensitivity of the issue led President Lyndon Johnson and successive administrations to bury various intelligence reports on the NUMEC affair. [43]

Zalman Mordecai Shapiro, an active member of the Zionist Organization of America. The FBI and CIA investigated him for helping Israeli agents smuggle nuclear material to Israel. (PHOTO:NSarchive)

Another case arose in May 1985 when Richard Smyth, an American Jew, was charged by a federal grand jury with smuggling 810 krytons to Israel. Krytons can act as electronic triggers for nuclear weapons. Smyth was released on $100,000 bail and failed to appear for trial. He was later seen in Israel. [44] This was a premeditated act of nuclear weapons-related espionage by Israel. [45] Espionage was only one reason for Israel’s successful drive for nuclear weapons. A sophisticated scientific base, early assistance from France on the Dimona reactor, the financial role of individual Jewish Americans, and covert cooperation with South Africa were important factors. [46] Yet espionage got Israeli scientists and engineers past crucial roadblocks, such as the acquisition of weapons-grade uranium and krytons.

Producer Arnon Milchan and Director Steven Spielberg attend the 88th Annual Academy Awards Governors Ball, February 28, 2016 in Hollywood, California. Milchan spent his many years in Hollywood as an agent for Israeli intelligence, helping obtain embargoed technologies and materials that enabled Israel to develop a nuclear weapon. Milchan worked with Richard Smyth, who skipped out on his trial for smuggling nuclear parts to Israel. Milchan says that “other big Hollywood names were connected to [his] covert affairs.” (PHOTO: Hollywood Reporter)

Espionage may also help Israel keep pace with technological innovations in nuclear weaponry and missile technology. The 1997 annual report to Congress by the NACIC identifies “inappropriate conduct during visits to secure facilities” as one of the most common collection methods by foreign economic spies. [47] Using a variety of covers to gain access to sensitive U.S. facilities, the visitors “manipulate” the visit by taking pictures or notes, bringing unannounced guests, and utilizing fraudulent data-exchange agreements. [48]

This is a potentially serious problem, given close cooperation between the Israeli and U.S. defense scientific communities on projects such as the Arrow missile. Scores of Israeli scientists visited U.S. nuclear weapons laboratories at Sandia, Los Alamos, and Livermore. Israeli visitors were often treated more openly than others. [49] During just one twenty-month period in the late 1980s, 188 Israeli scientists visited these three labs. [50] Most of the visits were under the auspices of U.S.-Israel cooperation agreements, especially one for the study of nuclear physics and fusion; opportunities for inappropriate behavior were considerable. The GAO has highlighted the need to improve security with respect to foreign visitations of U.S. defense facilities. [51]

Scores of Israeli scientists visited U.S. nuclear weapons laboratories at Sandia, Los Alamos, and Livermore (pictured aabove), where they often received special treatment.  A report to Congress identified “inappropriate conduct during visits to secure facilities” as one of the most common collection methods by foreign economic spies. (PHOTO:LAT)

Israeli nuclear – and weapons of mass destruction – related espionage has an important economic dimension. As Israel’s nuclear doctrine and posture become more elaborate – and require the integration of command and control systems with satellite imagery – access to new developments in software and computer technology is crucial. [52] The acquisition of these technologies, through licit and illicit means, has a valuable spinoff effect for the civilian economy.

DUAL LOYALTY

The issue of dual loyalty, though not assuming the dimensions it does in cases threatening national security such as the Pollard affair, has also figured in economic espionage. For example, the 1997 case of David Tenenbaum (discussed above), a religious Jew fluent in Hebrew, instantly concerned many in the Jewish community. [53]

The issue of dual loyalty also arose during a 1996 effort to draft legislation to strengthen trade secrets protection. As part of an effort to increase awareness of economic espionage throughout the intelligence community, the Defense Investigative Service (DIS) prepared a profile of Israel. After noting Israel’s “voracious appetite” for information on U.S. defense technologies, the DIS profile stated that Israel’s “very productive collection effort” in the United States was facilitated by “ethnic targeting” and “the strong ethnic ties to Israel present in the U.S.” [54]

Abraham Foxman of the Anti-Defamation League obtained a copy of the profile and wrote Secretary of Defense William Perry asserting that it “borders on anti-Semitism.” [55] Senator Arlen Specter (R-PA), chairman of the Senate Select Committee on Intelligence, also wrote to Secretary Perry, and Specter’s staff met with Defense Department officials. The Defense Department responded: “While the Israelis may have . . . attempted to exploit ethnic and religious ties with Jewish Americans, it does not follow that these Americans are necessarily any more susceptible to external exploitation than any other . . . American citizens.” [56]

Virtually no one, including Senator Specter, denies the reality of ethnic targeting by foreign intelligence services. Israel has employed this technique repeatedly, [57] as have China, Taiwan, and South Korea. [58] Indeed, instances of improper ties between Israel and some American Jews-ties that contribute to perceptions of dual loyalty-date from the earliest days of the Jewish state. [59] The FBI and CIA have long been aware of such ties. For instance, a 1979 CIA report stated: Israel’s intelligence “depends heavily on various Jewish communities and organizations abroad for recruiting agents and eliciting informants,” and, “a substantial effort is made to appeal to Jewish racial [sic] or religious proclivities.” [60]

A 1979 CIA report stated: Israel’s intelligence “depends heavily on various Jewish communities and organizations abroad for recruiting agents and eliciting informants”. A current example is Act.il

The American Jewish community is rightly concerned that allegations (or insinuations) about the dual loyalty of some citizens could cast aspersions on the patriotism of Jewish Americans. [61] A 1987 CBS News/New York Times poll indicated that fully 33 percent of the general public believed American Jews placed the interests of Israel above those of the United States; this figure was 35 percent in a 1992 poll by the Anti-Defamation League of B’nai B’rith. [62] These findings, which have been consistent over the past thirty years, also indicate that another 20 percent of Americans say they do not know where Jews’ loyalties lie. [63]

In practice, of course, Jews serve in considerable numbers and at the highest levels of the American national security establishment; only very rarely does this issue arise in individual cases. Yet Israel seems insensitive to the damaging effects its illegal acts may have on Diaspora Jews. Former Reagan administration Pentagon official Dov Zakheim, an Orthodox rabbi, states flatly that Israel’s conduct is responsible for it being viewed as an intelligence threat by the Department of Defense: “This is not an American problem, but an Israeli problem.” [64] Zakheim also cautions fellow Jews “not to play the card” of anti-Semitism when the U.S. government takes reasonable measures to counter Israeli intelligence activities. [65] In this area, as in so many others, the maintenance of a free and open multiethnic society requires that a balance be struck between guarding against sweeping, McCarthy-like allegations and implementing prudent security measures. [66]

ESPIONAGE AND AN EMERGING TECHNOLOGY-BASED ECONOMY

As Israel’s national priorities evolve, its government is actively promoting an export-oriented technology sector featuring, among other things, strong software, Internet services, and biotechnology firms. Some of the conditions underlying these current initiatives resemble those existing during the development of Israel’s arms industry and nuclear weapons program in the 1950s and 1960s, when Israel could not have developed nuclear weapons and a sophisticated armaments industry quickly without the illicit acquisition of foreign technology and information.

In its quest to “make the desert bloom” with software design firms and telecommunications labs, Israel must overcome its relatively late entry into the international competition for advanced technology. Despite some successful initial public offerings, the Israeli civilian technology sector has little capital to invest in expensive research and development programs, [67] and the stalled peace process discourages investment. The pace of technological innovation and obsolescence is staggering, thereby escalating the risks associated with investment in new product development. Moreover, military scientific research in countries like Israel is hampered by such factors as the emigration of top scientists, insufficient technical support, the relatively small scale of scientific communities, and difficulties in attracting the best minds to applied weapons research. [68] All of these factors point to a continued need for economic espionage in both the civilian and defense sectors.

To be sure, there are countervailing considerations that may dampen Israel’s proclivity to steal from foreign firms. Israeli firms in the new global order have much better access to international customers, potential sources of capital, and joint ventures-something that was impossible for its nuclear arms program and difficult for its early conventional arms industry. In addition, Israel’s innovative defense sector has spun off useful dual-use technologies for its civilian industries. [69]

However, opportunities and incentives for economic espionage are inviting. The Department of Commerce confirms that Israel’s technology-based industries are “eager” for joint ventures with U.S. firms and the U.S. government. [70] In Silicon Valley, there are scores of Israeli-owned or managed companies, and American firms hire many Israeli engineers. This facilitates “brain-theft and idea-theft.” [71]

Israelis work in Mailpad’s Silicon Valley office. Israel’s Ha’aretz newspaper reports: “Almost every Silicon Valley company, whether large or small, has Israelis among its employees.” The number may be as high as 200,000. One says: “It’s easy for Israelis. We feel like we have moved to another city, not to another country. Everyone here speaks Hebrew. My son is in the third grade and is in a class of 20 kids, half of them are Israeli.” JTA reports: “For most of these techies, Israel is home.” A co- founder of the Israeli Executives and Founders Forum explains: “We find it harder to adapt here, to say ‘I’m American. We’ve been so indoctrinated. I’m Israeli. I want my kids to go to the army.” Some Israeli techies are reportedly connected to Israel’s notorious 8200 cyber espionage unit. (PHOTO:Ha’aretz)

Moreover, the U.S. government itself is providing Israeli intelligence with inviting targets. By 1997, the United States and Israel were moving toward several new agreements on everything from basic research to prototype testing under their joint Technology Research and Development Projects. Potential areas of cooperation include avionics, a range of armaments development projects, laser target identification systems, and others. [72] While Israel has expressly agreed not to transfer technology from such joint endeavors to third parties without prior U.S. approval, and while such unauthorized retransfers are prohibited by the Arms Export Control Act (PL 90-629), Israel has repeatedly violated both the law and identical prior commitments concerning technology retransfers. [73]

Beyond this, institutional habits and missions should ensure that Israeli intelligence units continue to utilize existing networks for collecting economic intelligence, while developing new ones to meet civilian needs. Confidential business information, particularly financial information, competitor bids, customer lists, and marketing plans may become as important targets as technical and scientific data. New forms of electronic intelligence collection, including satellites and computer intrusion, will contribute to improving Israel’s capabilities in this area.

U.S. RESPONSE TO ISRAELI ESPIONAGE

Like defense firms in most foreign countries, Israeli companies are closely linked to the government and compete with American firms in the international market. Yet excepting Egypt, Israel is the only country today whose defense industry is heavily subsidized by the United States. That is, even apart from the more than $76 billion in foreign aid (over 90 percent in security assistance) from the United States through fiscal year 1998, the U.S. government, and especially Congress, continues to give Israel numerous unique privileges which, cumulatively, advantage Israeli firms and disadvantage American ones in the international armaments market. [74] In return, Israel conducts an aggressive campaign of economic espionage against American firms. Yet this campaign has never triggered a vigorous response from the U.S. government. Why is this?

While the Israeli case is unique in several respects, the tepid U.S. response (or nonresponse) to economic thievery is not unusual. Indeed, among the countries identified by the NACIC as targeting U.S. economic secrets, it is difficult to identify a single instance where relations were truly disrupted by economic espionage. This is especially true when the culprit is a close ally. Concerning Israel generally, Secretary of State Madeleine Albright said: “You don’t use levers with friends.” [75]

A former senior U.S. defense intelligence official commented: “The closer you come to national defense, the more likely there is to be an effect on cooperation. Pollard really disrupted U.S.-Israeli relations, but Recon-type [economic] operations have less of an impact.” [76] That is, significant political fallout from espionage is limited to traditional national security cases; even then, it is rarely severe when an ally is involved. Thus, when Robert C. Kim, a naturalized Korean-American Navy computer specialist, pleaded guilty to passing classified documents to South Korea in 1997, the U.S.-South Korean strategic relationship remained largely undisturbed. [77]

But there is more here than just a reluctance to punish an ally. Individual members of Congress occasionally criticize such allies as France or Japan for their economic espionage, [78] but similar behavior by Israel elicits only silence. Whereas Congress as an institution rarely demands retribution for any ally’s espionage against the United States, Congress actively advances Israel’s interests and shelters it from all but the most egregious violations of U.S. law. [79] Hence, as Recon/Optical executive William Owens discovered, any explanation of the moderate U.S. response to Israeli wrongdoing must be rooted in an understanding of the American policy process. Owens pleaded with his Illinois congressional delegation to help him recover from what Israel had done to his company, but it refused to confront Israel and its potent lobby. Said Owens,” We begged people [in Washington] to help us, but we got nothing but their backs.” [80]

Recon/Optical plant in Barrington, Illinois in 1986, when it was forced to lay off 200 employees and nearly went bankrupt after Israeli air force officers stole some of its proprietary information and gave it to the Israeli company El Op Electro-Optics Industries. The Israel lobby was so powerful that Recon’s Congressional delegation wouldn’t intercede on its behalf. (PHOTO:Bourns)

In addition to hesitancy about reprimanding an ally and Congress’s protectiveness of Israel, a third factor moderating the U.S. response is the special strategic tie between the two countries. Despite serious misgivings within the U.S. national security bureaucracy concerning Israel’s net value as a strategic asset, [81] the strategic relationship was formalized at least by 1983 and subsequently acquired significant breadth and depth. It was strengthened in the Clinton administration by, among other things, joint counterterrorism operations and defense research programs, an extension of U.S. defense satellite warning to Israel, and an increase in U.S. funding for Israel’s Arrow missile. [82]

A fourth factor is the Economic Espionage Act of 1996 (PL 109-294). While this law makes it much easier to prosecute economic spies successfully, [83] it punishes individuals, not nations. It makes no reference to sanctions against offending states. Criminal prosecutions, publicity, and diplomatic demarches will not alone be sufficient to deter systematic state-sponsored economic espionage, especially when that state is Israel. There is little indication today that Washington is politically disposed toward imposing weighty sanctions that might present a more credible deterrent. In May 1997, it was reported that the National Security Agency had intercepted communications between Israeli intelligence officials that referred to a U.S. official code-named “Mega” who was illicitly passing sensitive diplomatic information to Israel. This appeared to confirm long-standing rumors to this effect. Israeli officials denied that Mega was a spy. [84] The episode soon vanished from public view, and with its disappearance went the possibility that it might upset U.S.-Israeli relations. [85]

It may be, then, that another reason for the weak U.S. response to Israeli espionage is a kind of resignation or even cynicism as captured in the term “friendly spies.” One key shaper of U.S. intelligence policy remarked in 1996, “The trend with Israel is to catch them, then back off politically.” [86] It is also conceivable that legislators like Senator Specter and other sentries alert to inappropriate inferences of dual-loyalty may foster an “investigation chill” among U.S. officials monitoring Israeli intelligence activity.

Arlen Spector, R-PA., talks with Charles Schumer, D-N.Y., during a Senate committee hearing on “The War Against Terrorism.” Specter and other Israel advocates like Schumer may foster an “investigation chill” among U.S. officials monitoring illicit Israeli activity. Schumer has called himself a “guardian of Israel.” (PHOTO:Getty)

CONCLUSION

Israel’s economic espionage is surely part of the game of nations, but its chutzpah is unique. Few allies are more strategically and economically dependent on the United States. No ally that annually receives large foreign aid subsidies spies actively on its patron. Few close allies have conducted both economic and traditional strategic espionage against the United States. Few nations’ espionage activities in the United States suggest less sensitivity to their diasporas’ legitimate fears about the specter of dual loyalty. Yet no other foreign country enjoys the support of America’s most effective coalition of ethnic special interest groups, a coalition whose individual and organized members’ huge financial contributions affect virtually all major U.S. political campaigns. [87]

Wholly apart from espionage, no U.S. ally has more frequently violated contractual obligations and laws relating to U.S. national security. The various categories of illegal behavior include the fraudulent diversion of U.S. foreign aid, the illicit retransfer of sensitive U.S. technologies to third parties, and violation of end-use restrictions on U.S. military items transferred to Israel. Few well-established democracies can be so accurately characterized by what Ehud Sprinzak calls an “elite illegalism” that pervades the country’s domestic political culture and international behavior. Elite illegalism depreciates the idea of the rule of law and assumes “that democracy can work without a strict adherence to . . . law.” [88] Especially in security matters, say Dan Raviv and Yossi Melman, Israelis “believe that anything goes; . . . lies, of course, but even violations of other countries’ laws.” [89]

The greater concern, however, is not Israel’s behavior. Rather, it is with those senior U.S. officials and legislators who abide it. This aspect of the “special relationship” with Israel annoys, even embitters, much of the permanent national security bureaucracy. It is also a latent domestic political issue with divisive overtones. Whatever immediate advantages Israel’s illicit practices may bring, they could eventually weaken the long-run relationship that is the ultimate guarantee of Israel’s security.


DUNCAN L. CLARKE is coordinator of the United States Foreign Policy field at American University’s School of International Service in Washington. [Additional information is here.]

  1. Economic espionage is defined as the employment of various means by foreign governments to target U.S. persons, firms, industries, or the U.S. government to unlawfully and covertly obtain classified data and/or sensitive policy or proprietary information with the intent of enhancing the economic competitiveness of a foreign country and its companies.
  2. Dan Raviv and Yossi Melman, Friends in Deed. Inside the US.-Israel Alliance (New York: Hyperion, 1994), pp. 39-48, 63-64. See also Andrew Cockburn and Leslie Cockburn, Dangerous Liaison. The Inside Story of the US.-Israeli Covert Relationship (New York: Harper Collins, 1991), pp. 195-99.
  3. NACIC is an interagency entity that monitors cases of economic espionage against the United States and coordinates prevention and response options with both the private sector and federal agencies and units such as the Overseas Advisory Council. Twelve countries are thought to account for 90 percent of the economic intelligence collection directed against the United States: China, Cuba, France, Germany, Iran, Israel, Italy, Japan, Russia, South Korea, Sweden, and Taiwan. National Counterintelligence Center, Annual Report to Congress on Foreign Economic Collection and Industrial Espionage (Washington, D.C.: Author, 1997), pp. 2, 7; U.S. Congress, Senate, Select Committee on Intelligence, Hearing. Current and Projected National Security Threats To the United States and Its Interests Abroad, 104th Cong., 2d sess., 1996, p. 99; Tony Cappacio, “CIA: Israel Among Most ‘Extensive’ in Economic Espionage,” Defense Week, 5 August 1996, p. 16.
  4. Raviv and Melman, Friends in Deed, pp. 41-46.
  5. Seymour M. Hersh, The Samson Option: Israel’s Nuclear Arsenal and American Foreign Policy (New York: Random House, 1991), p. 62; Ian Black and Benny Morris, Israel’s Secret Wars. A History of Israel’s Intelligence Services (New York: Grove Wiedenfeld, 1991), p. 418.
  6. Cockburn and Cockburn, Dangerous Liaison, p. 195; Ronald D. McLaurin, “Technology Acquisition: A Case Study of the Supply Side,” in Kwang-Il Baek, Ronald D. McLaurin, and Chung-in Moon, ed., The Dilemma of Third World Defense Industries (Boulder, CO: Westview Press, 1989), p. 87.
  7. U.S. Central Intelligence Agency (CIA), Israel: Foreign Intelligence and Security Services, Washington, D.C., March 1979, p. 9 (typescript). The report, classified SECRET, was released to the world by Iranian students who occupied the U.S. embassy in Tehran in 1979.
  8. Edward T. Pound and David Rogers, “An Israeli Contract with a U.S. Company Leads to Espionage,” Wall Street Journal, 17 January 1992, p. 1.
  9. U.S. Congress, Current and Projected National Security Threats, p. 99; Paul Blustein, “France, Israel Alleged to Spy on U.S. Firms,” Washington Post, 6 August 1996, p. A28.
  10. U.S. General Accounting Office (GAO), Defense Industrial Security. Weaknesses in U.S. Security Arrangements with Foreign-Owned Defense Contractors, NSIAD-96-64, Washington, D.C., 1996, pp. 22-23; U.S. Congress, Current and Projected National Security Threats, p. 99. Israel is country “A” in the GAO report. Bill Gertz, “Allies’ Spying in U.S. Reported,” Washington Times, 22 February 1996, p. A9; Tony Capaccio, “Report Highlights Espionage Threat From Israel, Allies,” Defense Week, 26 February 1996, p. 1. Some reports indicate that Israel employed thirty-five agents to gather economic intelligence in the United States between 1985 and 1995. Andrew Jack, “Post-Cold War Spies Turn to Commercial Targets,” Financial Times, 24 February 1995, p. 2.
  11. McLaurin, “Technology Acquisition,” pp. 89-90, 94.
  12. GAO, Defense Industrial Security, pp. 22-23; Protecting Corporate America’s Secrets in a Global Economy (Framingham, MA: American Institute for Business Research, 1992), p. 43; “Inside Israel’s Secret Organizations,” Jane’s Intelligence Review (October 1996), pp. 464-65.
  13. Barbara Opall, “Turf Battle Exposes Secret Israeli Industry Surveillance Unit,” Defense News, 5-11 January 1998, p. 6.
  14. GAO, Defense Industrial Security, pp. 22-23. See also Duncan L. Clarke, “Israel’s Unauthorized Arms Transfers,” Foreign Policy 99 (Summer 1995), pp. 89-109.
  15. Interview, former senior U.S. defense intelligence official, Washington, D.C., December 1996.
  16. Dan Raviv and Yossi Melman, Every Spy a Prince (New York: Houghton Mifflin, 1990), p. 78.
  17. On rare occasions the United States has attempted other types of intelligence operations in Israel, apparently with little success. Senior U.S. officials fear a domestic political backlash in the United States should such operations be exposed. See Raviv and Melman, Every Spy a Prince, pp. 307-8; Raviv and Melman, Friends in Deed, pp. 64-65, 292-93, 296-97; Hersh, The Samson Option, pp. 107, 162-63. Indeed, some members of Congress have not maintained confidentiality. Shortly after stepping down as chairman of the Senate Select Committee on Intelligence in 1987, Senator David Durenberger (R-MN) angered U.S. officials when he revealed to American Jewish groups that the CLA had recruited an Israeli military officer to spy for the United States. “Israeli Spy Conviction Undercuts U.S. Denial,” Washington Post, 6 June 1993, p. A4. See also Charles Babcock, “Israel Uses Special Relationship to Get Secrets,” Washington Post, 15 June 1986, p. Al.
  18. Interviews, several past and present U.S. intelligence officials, Washington, D.C., 1996-97; Pound and Rogers, “An Israeli Contract,” p. 1; Raviv and Melman, Every Spy a Prince, p. 305.
  19. George P. Shultz, Turmoil and Triumph (New York: Charles Scribners’ Sons, 1993), pp. 458-59; Raviv and Melman, Every Spy a Prince, pp. 320, 322. According to then Secretary of Defense Caspar Weinberger, Pollard’s theft of classified documents had caused “substantial and irrevocable damage” to the nation. Wolf Blitzer, Territory of Lies (New York: Harper and Row, 1989), p. 233.
  20. Clyde R. Mark, Israel. US. Foreign Assistance, CRS Issue Brief, Congressional Research Service, Washington, D.C., 1 October 1997.
  21. GAO, Defense Industrial Security, p. 23; Pound and Rogers, “An Israeli Contract,” p. 1.
  22. John J. Fialka, War by Other Means. Economnic Espionage in America (New York: W. W. Norton, 1997), pp. 181-84; “Recon Tells Its Tale,” National Center for Manufacturing Sciences Focus, February 1995, pp. 2-3 (typescript); Cockburn and Cockburn, Dangerous Liaiso,n, pp. 197-99.
  23. Protecting Corporate America’s Secrets, pp. 45-46.
  24. Interview, U.S. defense official, Washington, D.C., February 1990.
  25. Pound and Rogers, “An Israeli Contract,” p. 1; Stephen Endelberg, “U.S. Aids Say Policy Stands on Cluster Weapons Exports,” New York Times, 10 July 1986, p. 18; William Claiborne, “Israel Denies Trying to Skirt U.S. Arms Technology Ban,” Washington Post, 10 July 1986, p. A18; Charles Babcock, “Export Licenses to Israel Were Lifted Last Month,” Washington Post, 10 July 1986; David Ottaway, “Israel Seeks Immunity for 47 in Military Purchasing Office: Unit Suspected of Illegal Exports in the Past,” Washington Post, 12 September 1988, p. Al.
  26. Charles Babcock, “Firm Guilty of Smuggling Technology: Israel Manufactures Tank Cannon Barrels,” Washington Post, 25 November 1987, p. A16; Douglas Frantz and James O’Shea, “Israel Arms Deals Strain U.S. Ties,” Chicago Tribune, 16 November 1986, p. 14; Cockburn and Cockburn, Dangerous Liaison, pp. 196-97.
  27. “Executive Charged with Selling ‘Star Wars’ Data,” New York Times, 16 June 1990.
  28. INDICTMENT: United States of America v. Zvika Schiller and Uri Simhony, U.S. District Court for the Eastern District of Virginia, Alexandria Division, April 1993 (typescript); Victor D. Ostrovsky, By Way of Deception (New York: St. Martin’s Press, 1990), p. 270.
  29. Roberto Suro and Barton Gellman, “FBI Probes Engineer for Leaks to Israelis,” Washington Post, 20 February 1997, p. A12.
  30. Shawn L. Twing, “American Engineer Under Investigation for Passing Secrets to Israel,” Washington Report on Middle East Affairs, no. 15 (April-May 1997), p. 32.
  31. Joris Janssen, “Country Briefing: Israel,” Jane’s Defense Weekly, 19 June 1996, p. 53.
  32. U.S. Congress, House, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, Hearing: Illegal Military Assistance to Israel, 102d Cong., 2d sess., 1992, pp. 1-4, 16-17. In fact, U.S. officials found that about $100 million had been siphoned off. Interview, congressional source, Washington, D.C., August 1994.
  33. “Three Indicted in Alleged GE Israel Kickback Scheme,” Washington Post, 18 March 1994.
  34. GAO, Foreign Military Aid to Israel: Diversion of US. Funds and Circumvention of U.S. Program Restrictions, GAO/T-OSI-94-9, Washington, D.C., October 1993, pp. 1-9; U.S. Congress, Hearing: Illegal Military Assistance to Israel, pp. 5-9, 91-92; U.S. Congress, House, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, Hearing. The Roles of United Technologies and National Airmotive Corporation and the Department of Defense in the Illegal Diversion of Tens of Millions of Dollars in Foreign Military Assistance to Israel, 103d Cong., 1st sess., 1993; interview, congressional source, Washington, D.C., August 1994.
  35. Steven Perlstein and John M. Goshko, “Israel Eases Stance in Arms Aid Probe,” Washington Post, 29 July 1992, p. Gl.
  36. Ibid.; interview, congressional source, Washington, D.C., August 1994.
  37. McLaurin, “Technology Acquisition,” pp. 70, 88-89; GAO, Military Sales to Israel and Egypt: DOD Needs Stronger Controls Over U.S.-Financed Procurements, NSIAD-93-184, Washington, D.C., July 1993, p. 9; Edward Pound and David Rogers, “How Israel Spends $1.8 Billion a Year at Its Purchasing Mission in New York,” Wall Street Journal, 20 January 1992, p. A4; Mark, Israel. U.S. Foreign Assistance, p. 7; Cockburn and Cockburn, Dangerous Liaison, pp. 196-98; Claiborne, “Israel Denies Trying to Skirt,” p. Al; Ottaway, “Israel Seeks Immunity,” p. Al.
  38. Pound and Rogers, “How Israel Spends $1.8 Billion,” p. A4; Mark, Israel: US. Foreign Assistance, p. 7; Cockburn and Cockburn, Dangerous Liaison, pp. 196-98; Claiborne, “Israel Denies Trying to Skirt,” p. Al; Ottaway, “Israel Seeks Immunity,” p. Al.
  39. McLaurin, “Technology Acquisition,” p. 70; Pound and Rogers, “An Israeli Contract,” p. 1. Lt. Col. Oliver Nolth came to the Purchasing Mission in 1985 to broach what was to become the diversion of U.S. arms sales profits to the contras in Central America. Pound and Rogers, “How Israel Spends $1.8 Billion,” p. A4.
  40. Hersh, The Samson Option, pp. 187-89; Cockburn and Cockburn, Dangerous Liaison, pp. 71-97.
  41. Quoted in Cockburn and Cockburn, Dangerous Liaison, pp. 78-81.
  42. Hersh, The Samson Option, pp. 188-89, 242; Raviv and Melman, Every Spy a Prince, pp. 197-98.
  43. Interview, congressional source, Washington, D.C., August 1994. The interviewee had access to most of these reports as well as personal knowledge of how they were received by consumers. See also Cockburn and Cockburn, Dangerous Liaison, pp. 73-75.
  44. “Israelis Illegally Got U.S. Devices Used in Making Nuclear Weapons,” New York Times, 16 May 1985, p. A5; Charles Babcock, “Computer Expert Used Firm to Feed Israel Technology,” Washington Post, 31 October 1986, p. A24; John Goshko, “U.S. Asks Israel to Account for Nuclear Timers,” Washington Post, 15 May 1985; Frantz and O’Shea, “Israel Arms Deals Strain U.S. Ties,” p. 14; Raviv and Melman, Friends in Deed, p. 299.
  45. Ibid.; interview, Defense Department official, Washington, D.C., August 1995.
  46. The literature on this subject is voluminous. For all of these factors see Hersh, The Samson Option.
  47. “Foreign Visits: What is Inappropriate?” Counterintelligence News Digest 3 (September 1997). World Wide Web at http://www.nacic.gov/cind/vol.13html#r3.
  48. Ibid.
  49. William E. Burrows and Robert Windrem, Critical Mass (New York: Simon and Schuster, 1993), p. 290.
  50. Ibid.; Hersh, The Samson Option, p. 206.
  51. GAO, Defense Indutstrial Security, pp. 30-33, 53-54.
  52. See generally Burrows and Windrem, Critical Mass, ch. 9.
  53. Matthew Dorf, “New ‘Dual Loyalty’ Ripples,” Washington Jewish Week, 27 February 1997, p. 16.
  54. This document is reprinted in U.S. Congress, Senate, Joint Hearing before the Subcommittee on the Judiciary, Terrorism, Technology and Government Information, Committee on the Judiciary, and Select Committee on Intelligence, Economic Espionage, 104th Cong., 2d sess., 1996, pp. 83-86.
  55. Letter is reprinted in Ibid., 79.
  56. Ibid., 77.
  57. Ibid., 94; Ostrovsky, By Way of Deception, pp. 86-88; “Inside Israel’s Secret Organizations,” p. 465.
  58. R. Jeffrey Smith and Peter Pae, “Navy Worker’s Case Raises Issue of Ethnic Sympathy,” Washington Post, 26 September 1996, p. A15; Fialka, War by Other Means, p. 5; William Claiborne, “Taiwan-Born Scientist Passed Defense Data,” Washington Post, 12 December 1997, p. A23; Nicholas Eftimiades, Chinese Intelligence Operations (Annapolis, MD: Naval Institute, 1994), p. 60.
  59. Raviv and Melman, Friends in Deed, pp. 39-48.
  60. CIA, Israel: Foreign Intelligence and Security Services, pp. 21-22. For instances of ethnically-related security improprieties by Israeli authorities and American citizens see, inter alia, U.S. Congress, Hearing. Illegal Military Assistance to Israel (1992); U.S. Congress, House, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, Hearing. Illegal Military Assistance to Israel, 103d Cong., 1st sess., 1993, p. 65; Hersh, The Samson Option, pp. 83-92.
  61. This intracommunity concern sometimes extends well beyond espionage to the more general identity many American Jews share regarding the overall welfare of the Jewish state. Hence, Rabbi David Lapin and David Klinghoffer state: “We [American] Jews love our country. But Non-Jews must wonder which country that is.” “The Patriotism Problem,” Washington Jewish Week, 27 November 1997, p. 23.
  62. Blitzer, Territory of Lies, pp. 285-86; Anti-Defamation League of B’nai B’rith, Highlights from an Anti-Defamation League Survey on Anti-Semitism and Prejudice in America, New York, 26 November 1992, pp. 18-19.
  63. Dorf, “New ‘Dual Loyalty’ Ripples,” p. 16.
  64. Lawrence Cohler, “Who Authorized Pentagon ‘Dual Loyalty’ Memo?” The Jewish Week (of Queens, New York), 9 February 1996, p. 32.
  65. Ibid.
  66. For a thoughtful analysis of historical relationships between anti-Semitism and the policy roles of Jews in government, see Benjamin Ginsberg, The Fatal Embrace. Jews and the State (Chicago: University of Chicago Press, 1993), especially pp. 9-10, 57-58. Also see Albert S. Lindemann, Esau’s Tears: Modern AntiSemitism and the Rise of the Jews (New York: Cambridge University Press, 1997).
  67. Amy Dockser Marcus and Stephanie N. Melta, “Israel Stumbles in High Technology Push,” Wall Street Journal, 10 June 1997, p. A12.
  68. See James Everett Katz, “Factors Affecting Military Scientific Research in the Third World,” in James Everett Katz, ed., The Implications of Third World Militarization (Lexington, MA: Lexington Books, 1986), p. 297.
  69. See “Emanuel Gill, President and CEO, Elbit, Ltd.,” Defense News, 13-19 December 1993, p. 38.
  70. Mark Walsh, “Israeli Firms Could Challenge U.S. Tech Markets Study Shows,” Defense Week, 27 August 1996, p. 1.
  71. “Israel: Israeli Presence in Silicon Valley,” FBIS Daily Report, Near East and South Asia, FBIS-NES-97-090, 6 May 1997. See also GAO, Defense Industrial Security, p. 16.
  72. Barbara Opall, “U.S., Israel Launch Research Effort,” Defense News, 10-16 February 1997, p. 4.
  73. Clarke, “Israel’s Unauthorized Arms Transfers,” pp. 89-109; U.S. Department of State, Office of the Inspector General, Report of Audit. Department of State Defense Trade Controls, Washington, D.C., March 1992.
  74. The $76 billion figure excludes $9.8 billion in housing loan guarantees. For aid data and a partial listing of Israel’s special privileges, see Mark, Israel. U.S. Foreign Assistance. See also Shawn Twing, “Funding the Competition: Aid to Israel Returns to Haunt U.S. Industry,” Defense News, 3-9 March 1997, p. 19.
  75. Jim Hoagland, “A Foreign Policy That Asks ‘Can’t We All Just Get Along’?” Washington Post, 30 October 1997, p. A23.
  76. Interview, former senior U.S. defense intelligence official, Washington, D.C., December 1996.
  77. Charles W. Hall and Dana Priest, “Navy Worker is Accused of Passing Secrets,” Washington Post, 26 September 1996, p. Al; David Johnson, “Korean Spy Case Called More Serious Than Was Thought,” New York Times, 3 October 1996, p. A8; Brooke Masters, “Ex-Computer Specialist Pleads Guilty to Espionage,” Washington Post, 8 May 1997, p. A16.
  78. For instance, see the remarks of Representative Helen Bentley (R-MD) in U.S. Congress, House of Representatives, Congressional Record, 139 (21 April 1993), p. H1979.
  79. See, for instance, Clarke, “Israel’s Unauthorized Arms Transfers,” pp. 98, 101-2, 109. Feldman finds that the U.S. Congress is a pivotal “focus of U.S. support for the Jewish state, sometimes even pursuing initiatives .. . more energetically than Israel’s own government.” Shai Feldman, The Future of U.S.-Israel Strategic Cooperation (Washington, D.C.: Washington Institute for Near East Policy, 1996), p.6.
  80. Fialka, War by Other Means, p. 182; Pound and Rogers, “An Israeli Contract,” p. 1. The three culpable Israeli air force officers were disciplined by their government, not for thievery, but for getting caught.
  81. Duncan L. Clarke, Daniel B. O’Connor and Jason D. Ellis, Send Guns and Money: Security Assistance and U.S. Foreign Policy (Westport, CT: Praeger, 1997), p. 173; Feldman, The Future of US.-Israel Strategic Cooperation, pp. 7, 16, 21, 46. Even such an outspoken academic partisan of Israel as Bernard Reich acknowledges that “Israel is of limited military or economic importance to the United States…. It is not a strategically vital state.” Bernard Reich, Securing the Covenant. United States-Israel Relations after the Cold War (Westport, CT: Praeger, 1995), p. 123.
  82. John Donnelly, “U.S. Gives NATO Nations, Israel Access to Missile Warning,” Defense Week, 23 December 1996, p. 1; Martin Sieff, “Israel Assured of More Weapons,” Washington Times, 4 April 1997, p. Al; “NSC Fact Sheet: Standing by Israel for Peace and Security,” National Security Council, Washington, D.C., 1996 (typescript); Opall, “U.S. Israel Launch Research Effort,” p. 4.
  83. Interview, FBI agents, Washington, D.C., April 1997; author’s confidential correspondence with retired FBI and CIA officials, May 1997; “FBI Hits Out at French Spies,” Intelligence Newsletter, 12 December 1996.
  84. Nora Boustany and Brian Duffy, “A Top U.S. Official May Have Given Sensitive Data to Israel,” Washington Post, 6 May 1997, p. Al; Barton Gellman, “Israel Asserts Monitored Talk Was Not Spying,” Washington Post, 17 May 1997, p. Al.
  85. But see “Israel, United States: Commentator Analyzes Mega Spy Affair,” FBIS Daily Report, Near East and South Asia, FBIS-NES-97-091, 9 May 1997.
  86. Confidential briefing, U.S. government official, Washington, D.C., November 1996.
  87. It is estimated that between 25 and 33 percent of all funds raised in major political campaigns in the United States, and about 50 percent of all funds raised for Democrats in major political campaigns come from the Jewish community. Seymour Maltin Lipset and Earl Raab, Jews and the New American Scene (Cambridge, MA: Harvard University Press, 1995), p. 138; J. J. Goldberg, Jewish Power. Inside the American Jewish Establishment (New York: Addison-Wesley, 1996), pp. 275-77.
  88. EhuLd Sprinzak, “Elite Illegalism in Israel and the Question of Democracy,” in Ehud Sprinzak and Larry Diamond, ed., Israeli Democracy under Stress (Boulder, CO: Lynne Rienner Publishers, 1993), p. 175.
  89. Raviv and Melman, Friends in Deed, p. 283

 

Categories
Uncategorized

Ryan Davis: This Is America

by

“Do All Things In-Vesica.”

Posted on October 25, 2021

<center

Ryan Davis is a comedian. He has a video, in particular, about women being the best storytellers in the world. I thought this video was pertinent. “Black people need to get over it.” Get over what? 

         Being enslaved, of course. 

Being targeted consistently to diminish wealth accumulation, of course. 
 
Any wealth that we do accumulate, is devalued compared to the wealth accumulated by whites, of course. 
 
Kept in specific areas, known as redlining, so white people don’t lose sight of where we are, of course.       

Provide substandard education and services despite paying taxes. (Well, since your  homes are devalued, therefore, you pay less taxes, shouldn’t your education and   services reflect the taxes collected?)

My ancestors created Black Wall Street and several other towns by and for Black people. Whites burned and tore them down, people included over exaggerated reasons. It bothers them to see others thrive. It rubs against the grain when Black people create.
Greenwood, Okla.: The Legacy of the Tulsa Race Riot

In 1921, Greenwood, a successful, all-black enclave in Tulsa, was the site of the deadliest race riot in U.S. history. For the inhabitants of “the Black Wall Street,” life would never be the same.

By: Monée Fields-White

Posted: Feb. 24 2011 9:50 AM

But old Jim Crow laws followed them northwest. Tulsa was divided into two cities. Whites held court in the southern end of the city, closer to the larger main downtown area, while African Americans were segregated in the northern section of town.

The racial split, however, gave rise to black Tulsans’ famed entrepreneurial mecca. Anchored by Greenwood Avenue, black-owned businesses stretched along the more than mile-long roadway. They included grocery stores, restaurants, medical and law offices, and two newspapers. Many black entrepreneurs in addition to Stradford — including real estate developer and Greenwood founder O.W. Gurley — thrived and reached regional and even national stature. Booker T. Washington, who had lectured in Tulsa, was the first to call Greenwood “the Negro’s Wall Street.” That moniker later became “the Black Wall Street.”

Many white Tulsans, who referred to the district as “Little Africa,” were not happy about the growth and prosperity of the community, according to Andrew Rosa, assistant professor of history at Oklahoma State University. “You had a pretty stable, upwardly mobile people in Greenwood, and the city’s whites had their eye on Greenwood,” says Rosa. “That was sort of the spirit of the friction.”

White Rage Unleashed

The underlying racial and economic tension finally boiled over on May 30, 1921. Dick Rowland, a 19-year-old shoe shiner in downtown Tulsa, had gone to use the only bathroom for blacks, located at the top of an office building. He crossed paths with white elevator operator Sarah Page, 17, whom a store clerk claimed to have heard scream. The clerk said that he found a distraught Page and saw a young black man running from the building. There is no record of what Page told the police.

Rowland was arrested but never charged. The incident, however, made the front page of the Tulsa Tribune — along with an editorial entitled, “To Lynch Negro Tonight.”

Right before dawn on June 1, a mob of nearly 10,000 white men launched an all-out assault on the Greenwood District, systematically burning down every home and business. They dropped firebombs and shot at blacks from planes that had been used in World War I. Those blacks who were captured were held in internment camps around the city by the local police and National Guard units.

Martial law was eventually declared. The National Guard confirmed that 37 blacks and whites were killed, although historians (pdf) have put that number at closer to 300. Many of the dead black Americans were buried in unmarked graves around town, and some were laid to rest in an anonymous section of Tulsa’s Oak Lawn cemetery. Some photographers made their pictures of the dead into postcards.

The riot “just shows you how irrelevant, not only from the view of Oklahoma but that of the nation as a whole, black life was. It was seen as expendable,” says Rosa.

After the riot, black Tulsans, who were living in tents and forced to wear green identification tags in order to work downtown, still managed to turn the tragedy into triumph. Without state help, they rebuilt Greenwood, and by 1942 the community had more than 240 black-owned businesses.

 Heather Gilligan

Editor @calhealthreport, onetime senior editor @Timeline_Now, bylines in @slate, @huffpo, @thenation, @modfarm, and more.

Apr 3

A white mob wiped this all-black Florida town off the map. 60 years later their story was finally told

Even by the standards of the 1920s South, the chain of events in Rosewood were unfathomable

Nine-year-old Minnie Lee Langley was outside with her mother on New Year’s Day 1923 when she saw them coming: a mob of white men marching toward her hometown of Rosewood, Florida. A daughter of the Jim Crow South, where violence against black people was part of everyday life, Minnie knew that all those white men together meant terrible trouble.

“We was out there in the front yard and them crackers were just coming down the railroad just as far as you can see, some of them,” she recalled in a radio documentary in the 1990s. “Just as far as you could look, you could see them in those big white hats and on horseback.”

Even by the standards of the 1920s South, the chain of events that followed was unfathomable. Over the course of a week, Minnie Lee’s small town would be wiped off the map, with the families who lived there so terrified to speak of what happened that the town was almost wiped from history, too.

Rosewood was a relatively well-off, nearly all-black town a few miles from Florida’s Gulf Coast, with an African Methodist Episcopal church, a Masonic lodge that doubled as a schoolhouse, and two general stores. Most of the people who lived there were domestics for white families in nearby Sumner, or worked in that town’s sawmill. The white mob had been summoned after the screams of Sumner resident Frannie Taylor brought neighbors running to her door on the morning of January 1. Taylor had been beaten, her face visibly bruised, and she claimed her attacker was black. Eyewitness accounts from her domestic workers told a different story; they said she was struck during an argument with the white lover she was seeing while her husband was at work. Nevertheless, the group of whites, numbering in the hundreds according to white witness and Sumner resident Edith Foster, were deputized by the county sheriff. They’d followed a bloodhound’s nose two miles to Rosewood and Minnie Lee’s family’s front yard, where they grabbed Aaron Carrier, Minnie’s uncle, and started looking for rope to tie him up with. “Mama just went to crying and all that, saying ‘Don’t kill him ’cause he don’t know nothing about this,’” Langley recalled. The sheriff intervened and took Carrier to a nearby jail for his own safety; it was the only time that white authorities would help black residents of Rosewood.

A few hours later, the mob dropped the pretense of lawfulness, and grabbed Rosewood resident Sam Carter, who was African American. They accused him of knowing and hiding Taylor’s assailant, strung him up in a tree, and tortured him before murdering him, taking body parts as souvenirs.

The next target was another of Minnie Lee’s uncles, Sylvester Carrier, who gathered the extended family at the home he shared with his mother, Sarah Carrier. Sylvester’s house was two stories tall, with glass windows. He stocked up on ammunition, hid his nieces and nephews in the upstairs bedroom, and took up watch. “He considered himself the protector of the family, which he had a right to,” recalled white Sumner resident Earnest Parham, who was 17 at the time of the massacre.

On January 4, the mob returned and surrounded Sylvester’s house. From upstairs, Minnie Lee heard the mob calling her great-aunt: “Sarah. Sarah. Sarah. Come on out here now.” Sarah refused to leave. Minnie Lee crept downstairs, looking for comfort from a grown-up. Sylvester grabbed her just before a member of the mob kicked down the front door, and sheltered her behind the firewood bin as he took aim and shot the intruder, then fired at the man who rushing in behind him.

A firefight followed, but, afraid to approach the house and running short on ammunition, the mob disbanded. Thirteen of the women and children left the home and ran for the swampy woods. “Three days and three nights we stay out there in the woods, in that cold,” Minnie Lee recalled. “We didn’t have no clothes.”

The bodies of Sylvester and Sarah were found the next day, January 5, when the mob returned to torch their house and the town church. They burned the home of Lexie Gordon, who couldn’t run because she was sick with typhoid. When she dragged herself out of the fire into her backyard, she was shot and killed.

Then the mob came across James Carrier, Minnie Lee’s grandfather, and made him dig his own grave before they shot him.

By January 7, eight people — six black and two white — had been confirmed dead. By the time the destruction ended, the town had been all but razed.

Some white people refused to simply stand by and watch. John Wright, who owned the general store, was one of the few whites who still lived in Rosewood in 1923. He did what he could to save his black neighbors by sheltering women and children in his home and searching for the survivors crouched in the woods. The owner of the sawmill in Sumner sheltered his Rosewood workers until the rampage ended, instructed his white employees not to participate in the mob, and sent guards to protect Sumner’s black residents.

Wright is credited with arranging for a train to stop in Rosewood at 4 a.m. on January 6, and guiding women and children onboard. They took refuge in Gainesville, Jacksonville, and other nearby towns and eventually reunited with the men in their families, sometimes after months-long searches.

Few others helped, despite national publicity about what was, at the time, called the “Rosewood riots.” Those who failed to act included the governor of Florida; in fact, he offered to help the county sheriff, who declined assistance. Reassured that the matter had been well handled, the governor headed out for a lazy round of golf.

Rosewood, meanwhile, was left in ruins, and today it’s all but impossible to tell it was once a town.

It took 60 years for the refugees to return to Rosewood. Their visit was initiated by a Florida journalist, Gary Moore, who’d stumbled on the story of the massacre; his 1983 article in the St. Petersburg Times drew national attention. 60 Minutes followed up with a story that same year, and reunited Minnie Lee, by then a frail woman in her seventies, with a few fellow survivors on the site of the former town.

Standing in a field of tall grasses, broken up only by the occasional tree and the remains of fences, Minnie Lee seemed overwhelmed.

Yet she kept telling her story. In 1994, she testified before the Florida legislature, lending her support to a bill that noted the state’s failure to protect Rosewood residents and requested compensation for the survivors. The bill passed. Minnie Lee, who had spent her life making brooms in a factory and retired without a pension, was awarded $150,000. She died a year later at age 82.

Source: https://timeline.com/all-black-town-rosewood-wiped-off-the-map-by-white-mob-73ca6630802b

I apologize for not including the images. Please click on the link above to view them. 

-Allison

                   In-Vesica Is Powered by SBI!       

                                                                                      –

Categories
Uncategorized

The Lancet: More than half of police killings in USA are unreported and Black Americans are most likely to experience fatal police violence

Posted on October 5, 2021

NEWS RELEASE

The Lancet: More than half of police killings in USA are unreported and Black Americans are most likely to experience fatal police violence

Peer-Reviewed Publication

THE LANCET

More than 55% of deaths from police violence in the USA from 1980-2018 were misclassified or unreported in official vital statistics reports according to a new study in The Lancet. The highest rate of deaths from police violence occurred for Black Americans, who were estimated to be 3.5 times more likely to experience fatal police violence than white Americans.

Researchers estimate that the US National Vital Statistics System (NVSS), the government system that collates all death certificates in the USA, failed to accurately classify and report more than 17,000 deaths as being caused by police violence during the 40-year study period.

“Recent high-profile police killings of Black people have drawn worldwide attention to this urgent public health crisis, but the magnitude of this problem can’t be fully understood without reliable data. Inaccurately reporting or misclassifying these deaths further obscures the larger issue of systemic racism that is embedded in many US institutions, including law enforcement. Currently, the same government responsible for this violence is also responsible for reporting on it. Open-sourced data is a more reliable and comprehensive resource to help inform policies that can prevent police violence and save lives,” says co-lead author Fablina Sharara of the Institute for Health Metrics and Evaluation (IHME), University of Washington School of Medicine, USA. [1]

To examine the extent of under-reporting, researchers compared NVSS data to three non-governmental, open-source databases on police violenceFatal Encounters, Mapping Police Violence, and The Counted [2]. These databases collate information from news reports and public record requests. When compared, the researchers’ new estimates highlight the extent to which deaths from police violence are under-reported in the NVSS and the disproportionate effect of police violence on Black, Hispanic, and Indigenous people in the USA.

Across all races and states in the USA, researchers estimate that NVSS data failed to report 17,100 deaths from police violence out of 30,800 total deaths from 1980-2018 (the most recent years of available NVSS data), accounting for 55.5% of all deaths from police violence during this period. Using a predictive model, researchers also estimated the total number of deaths from police violence in the USA, for all races/ethnicities and all states for 2019, estimating an additional 1,190 deaths, bringing the total number of deaths from police violence from 1980-2019 to 32,000.

Black Americans experienced fatal police violence at a rate 3.5 times higher than white Americans, according to this analysis, with nearly 60% of these deaths misclassified in the NVSS (5,670 unreported deaths from police violence out of 9,540 estimated deaths). From the 1980s to the 2010s, rates of police violence increased by 38% for all races (with 0.25 deaths from police violence per 100,000 person-years in the 1980s as compared to 0.34 deaths from police violence per 100,000 person-years in the 2010s).

Compared to the deaths recorded in the new analysis, NVSS also missed 56% (8,540 deaths out of 15,200) of deaths of non-Hispanic white people, 33% (281 deaths out of 861) of non-Hispanic people of other races, and 50% (2,580 deaths out of 5,170) of Hispanic people of any race.

Deaths due to police violence were significantly higher for men of any race or ethnicity than women, with 30,600 deaths in men and 1,420 deaths in women from 1980 to 2019.

Previous studies covering shorter time periods have found similar rates of racial disparities, as well as significant under-reporting of police killings in official statistics. This new study is one of the longest study periods to date to address this topic.

The authors call for increased use of open-source data-collection initiatives to allow researchers and policymakers to document and highlight disparities in police violence by race, ethnicity, and gender, allowing for targeted, meaningful changes to policing and public safety that will prevent loss of life.

Additionally, the researchers point out that because many medical examiners or coroners are embedded within police departments, there can be substantial conflicts of interest that could disincentivize certifiers from indicating police violence as a cause of death. Managing these conflicts of interest in addition to improved training and clearer instructions for physicians and medical examiners on how to document police violence in text fields on death certificates could improve reporting and reduce omissions and implicit biases that cause misclassifications.

“Our recommendation to utilize open-source data collection is only a first step. As a community we need to do more. Efforts to prevent police violence and address systemic racism in the USA, including body cameras that record interactions of police with civilians along with de-escalation training and implicit bias training for police officers, for example, have largely been ineffective. As our data show, fatal police violence rates and the large racial disparities in police killings have either remained the same or increased over the years. Policymakers should look to other countries, such Norway and the UK, where police forces have been de-militarized and use evidence-based strategies to find effective solutions that prioritize public safety and community-based interventions to reduce fatal police violence,” says co-lead author Eve Wool of the Institute for Health Metrics and Evaluation (IHME), University of Washington School of Medicine, USA. [1]

The authors acknowledge some limitations in the study. This paper does not calculate or address non-fatal injuries attributed to police violence, which is critical to understanding the full burden of police violence in the USA and should be examined in future studies. The data also do not include police officers killed by civilians, police violence in USA territories, or residents who may have been harmed by military police in the USA or abroad. Because the researchers relied on death certificates, which only allow for a binary designation of sex, they were unable to identify non-cisgender people, potentially masking the disproportionately high rates of violence against trans people, particularly Black trans people.  The authors note that the intersectionality of gender, race/ethnicity, sexual orientation, and other identities and the relationship to fatal police violence should be studied in the future.

Lancet Editorial adds, “The study is a potential turning point for improving national estimates of fatalities from police violence by incorporating non-governmental open-source data to correct NVSS data…Better data is one aspect of a public health approach; introducing harm-reduction policies is another. Policing in the USA follows models of hostile, racialised interactions between civilians and armed agents of the state. Marginalised groups are more likely to be criminalized through the war on drugs or homelessness. Reducing hostile or violent interactions between police and civilians, particularly those who are most vulnerable overall, is a forceful case for investment in other areas of community-based health and support systems, including housing, food access, substance use treatment, and emergency medical services. Strategies to lower fatalities from police violence must include demilitarisation of police forces, but with the broader call to demilitarize society by, for example, restricting access to firearms…Police forces too must take greater responsibility for police-involved injuries and deaths. Such changes are long overdue.”

NOTES TO EDITORS

This study was funded by the Bill & Melinda Gates Foundation, the National Institute of Minority Health and Health Disparities, and the National Heart, Lung, and Blood Institute. A full list of authors and institutions is available in the paper.

The labels have been added to this press release as part of a project run by the Academy of Medical Sciences seeking to improve the communication of evidence. For more information, please see: http://www.sciencemediacentre.org/wp-content/uploads/2018/01/AMS-press-release-labelling-system-GUIDANCE.pdf if you have any questions or feedback, please contact The Lancet press office pressoffice@lancet.com

[1] Quote direct from author and cannot be found in the text of the Article.

[2]Fatal encounters:  https://fatalencounters.org/; Mapping police Violence: mappingpoliceviolence.org;  The Counted:  https://www.theguardian.com/us-news/series/counted-us-police-killings

IF YOU WISH TO PROVIDE A LINK FOR YOUR READERS, PLEASE USE THE FOLLOWING, WHICH WILL GO LIVE AT THE TIME THE EMBARGO LIFTS: http://www.thelancet.com/journals/lancet/article/PIIS0140-6736(21)01609-3/fulltext

Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.

October 10, 2022

Margaret Kimberley was the host of Black Agenda Radio on Progressive Radio Network. She interviewed Aswad Thomas from The Alliance for Safety and Justice. He was a victim of a shooting. He stated that forty of his friends were killed.   Mr. Thomas revealed that he went through his rehabilitation alone without physical or mental therapy.  People would return and ask about the incident only. They never suggested where he could get the help he needed.

In my mind, I visualized them returning to their workplaces, creating reports that oddly did not contain information about support. Their responses were, “Well, he did not ask.”  It was because he did not know. It was the same when we returned to the United States and I approached the Veterans Administration for support for my husband.  The physician’s assistant, who turned out to be the third worst person on the planet, asked, “So what do you want from the VA?” My reply was. “Support for my husband.” I told him what was going on with him.  For twenty minutes, this man focused on activities on his computer.  For months, I heard nothing.   I returned for another reason and met someone who was mortified by how I was treated. We had a discussion.  Because of this woman, who I learned was ill and took leave after,  my husband received what he needed.

The bottom line is what you don’t know, you don’t know.  I think the best question to ask is, “What don’t I know that I need to know?” It can be asked in meditation. If asked of another human being, discern who can respond in a way that supports.  Libraries and databases are accessible and should be reviewed periodically because programs change. There is a lot of support made available by law – local, state, and federal.  Black people have been and continue to be excluded from benefits. Keep mining. Dig until you cannot dig any further.

Related: Husband Clement Edwardo Hill, II, Ph.D.

Categories
Uncategorized

There’s a Multibillion-Dollar Market for Your Phone’s Location Data article

Posted on  October 4, 2021

There’s a Multibillion-Dollar Market for Your Phone’s Location Data

A huge but little-known industry has cropped up around monetizing people’s movements

By: Jon Keegan and Alfred Ng

Originally published on themarkup.org

Companies that you likely have never heard of are hawking access to the location history on your mobile phone. An estimated $12 billion market, the location data industry has many players: collectors, aggregators, marketplaces, and location intelligence firms, all of which boast about the scale and precision of the data that they’ve amassed.

Location firm Near describes itself as “The World’s Largest Dataset of People’s Behavior in the Real-World,” with data representing “1.6B people across 44 countries.” Mobilewalla boasts “40+ Countries, 1.9B+ Devices, 50B Mobile Signals Daily, 5+ Years of Data.” X-Mode’s website claims its data covers “25%+ of the Adult U.S. population monthly.”

In an effort to shed light on this little-monitored industry, The Markup has identified 47 companies that harvest, sell, or trade in mobile phone location data. While hardly comprehensive, the list begins to paint a picture of the interconnected players that do everything from providing code to app developers to monetize user data to offering analytics from “1.9 billion devices” and access to datasets on hundreds of millions of people. Six companies claimed more than a billion devices in their data, and at least four claimed their data was the “most accurate” in the industry.

“There isn’t a lot of transparency and there is a really, really complex shadowy web of interactions between these companies that’s hard to untangle,” Justin Sherman, a cyber policy fellow at the Duke Tech Policy Lab, said. “They operate on the fact that the general public and people in Washington and other regulatory centers aren’t paying attention to what they’re doing.”

Occasionally, stories illuminate just how invasive this industry can be. In 2020, Motherboard reported that X-Mode, a company that collects location data through apps, was collecting data from Muslim prayer apps and selling it to military contractors. The Wall Street Journal also reported in 2020 that Venntel, a location data provider, was selling location data to federal agencies for immigration enforcement.

A Catholic news outlet also used location data from a data vendor to out a priest who had frequented gay bars, though it’s still unknown what company sold that information.

Many firms promise that privacy is at the center of their businesses and that they’re careful to never sell information that can be traced back to a person. But researchers studying anonymized location data have shown just how misleading that claim can be.

The truth is, it’s hard to know all the ways in which your movements are being tracked and traded. Companies often reveal little about what apps serve as the sources of data they collect, what exactly that data consists of, and how far it travels. To piece together a picture of the ecosystem, The Markup reviewed the websites and marketing language of each of the 47 companies we identified as operating in the location data industry, as well as any information they revealed about how the data got to them. (See our methodology here.)

How the Data Leaves Your Phone

Most times, the location data pipeline starts off in your hands, when an app sends a notification asking for permission to access your location data.

Apps have all kinds of reasons for using your location. Map apps need to know where you are in order to give you directions to where you’re going. A weather, waves, or wind app checks your location to give you relevant meteorological information. A video streaming app checks where you are to ensure you’re in a country where it’s licensed to stream certain shows.

But unbeknownst to most users, some of those apps sell or share location data about their users with companies that analyze the data and sell their insights, like Advan Research. Other companies, like Adsquare, buy or obtain location data from apps for the purpose of aggregating it with other data sources. Companies like real estate firms, hedge funds and retail businesses might then turn and use the data for their own advertising, analytics, investment strategy, or marketing purposes.

Serge Egelman, a researcher at UC Berkeley’s ​​International Computer Science Institute and CTO of AppCensus, who has researched sensitive data permissions on mobile apps, said it’s hard to tell which apps on your phone simply use the data for their own functional purposes and which ones release your data into the economic ether.

“When the app asks for location, in the moment, because maybe you click the button to find stuff near you and you get a permission dialog, you might reasonably infer that ‘Oh, that’s to service that request to provide that functionality,’ but there’s no guarantee of that,” Egelman said. “And there’s certainly usually never a disclosure that says that the data is going to be limited to that purpose.”

Companies that trade in this data are reluctant to share which apps they get data from.

The Markup asked spokespeople from all the companies on our list where they get the location data they obtain.

Companies like Adsquare and Cuebiq told The Markup that they don’t publicly disclose what apps they get location data from to keep a competitive advantage but maintained that their process of obtaining location data was transparent and with clear consent from app users.

“It is all extremely transparent,” said Bill Daddi, a spokesperson for Cuebiq.

He added that consumers must know what the apps are doing with their data because so few consent to share it. “The opt-in rates clearly confirm that the users are fully aware of what is happening because the opt-in rates can be as low as less than 20%, depending on the app,” Daddi said in an email.

Yiannis Tsiounis, the CEO of the location analytics firm Advan Research, said his company buys from location data aggregators, who collect the data from thousands of apps—but would not say which ones. Tsiounis said the apps he works with do explicitly say that they share location data with third parties somewhere in the privacy policies, though he acknowledged that most people don’t read privacy policies.

“There’s only so much you can squeeze into the notification message. You get one line, right? So you can’t say all of that in the notification message,” Tsiounis said. “You only get to explain to the user, ‘I need your location data for X, Y, and Z.’ What you have to do is, there has to be a link to the privacy policy.”

Only one company spokesperson, Foursquare’s Ashley Dawkins, actually named any specific apps—Foursquare’s own products, like Swarm, CityGuide, and Rewards—as sources for its location data trove.

But Foursquare also produces a free software development kit (SDK)—a set of prebuilt tools developers can use in their own apps—that can potentially track location through any app that uses it. Foursquare’s Pilgrim SDK is used in apps like GasBuddy, a service that compares prices at nearby gas stations, Flipp, a shopping app for coupons, and Checkout 51, another location-based discount app.

GasBuddy, Flipp, and Checkout 51 didn’t respond to requests for comment.

A search on Mighty Signal, a site that analyzes and tracks SDKs in apps, found Foursquare’s Pilgrim SDK in 26 Android apps.

While not every app with Foursquare’s SDK sends location data back to the company, the privacy policies for Flipp, Checkout 51, and GasBuddy all disclose that they share location data with the company.

Foursquare’s method of obtaining location data through an embedded SDK is a common practice. Of the 47 companies that The Markup identified, 12 of them advertised SDKs to app developers that could send them location data in exchange for money or services.

Placer.ai says in its marketing that it does foot traffic analysis and that its SDK is installed in more than 500 apps and has insights on more than 20 million devices.

“We partner with mobile apps providing location services and receive anonymized aggregated data. Very critically, all data is anonymized and stripped of personal identifiers before it reaches us,” Ethan Chernofsky, Placer.ai’s vice president of marketing, said in an email.

Into the Location Data Marketplace 

Once a person’s location data has been collected from an app and it has entered the location data marketplace, it can be sold over and over again, from the data providers to an aggregator that resells data from multiple sources. It could end up in the hands of a “location intelligence” firm that uses the raw data to analyze foot traffic for retail shopping areas and the demographics associated with its visitors. Or with a hedge fund that wants insights on how many people are going to a certain store.

“There are the data aggregators that collect the data from multiple applications and sell in bulk. And then there are analytics companies which buy data either from aggregators or from applications and perform the analytics,” said Tsiounis of Advan Research. “And everybody sells to everybody else.”

Some data marketplaces are part of well-known companies, like Amazon’s AWS Data Exchange, or Oracle’s Data Marketplace, which sell all types of data, not just location data. Oracle boasts its listing as the “world’s largest third-party data marketplace” for targeted advertising, while Amazon claims to “make it easy to find, subscribe to, and use third-party data in the cloud.” Both marketplaces feature listings for several of the location data companies that we examined.

Amazon spokesperson Claude Shy said that data providers have to explain how they gain consent for data and how they monitor people using the data they purchase.

“Only qualified data providers will have access to the AWS Data Exchange. Potential data providers are put through a rigorous application process,” Shy said.

Oracle declined to comment.

Other companies, like Narrative, say they are simply connecting data buyers and sellers by providing a platform. Narrative’s website, for instance, lists location data providers like SafeGraph and Complementics among its 17 providers with more than two billion mobile advertising IDs to buy from.

But Narrative CEO Nick Jordan said the company doesn’t even look at the data itself.

“There’s a number of companies that are using our platform to acquire and/or monetize geolocation data, but we actually don’t have any rights to the data,” he said. “We’re not buying it, we’re not selling it.”

To give a sense of how massive the industry is, Amass Insights has 320 location data providers listed on its directory, Jordan Hauer, the company’s CEO, said. While the company doesn’t directly collect or sell any of the data, hedge funds will pay it to guide them through the myriad of location data companies, he said.

“The most inefficient part of the whole process is actually not delivering the data,” Hauer said. “It’s actually finding what you’re looking for and making sure that it’s compliant, making sure that it has value and that it is exactly what the provider says it is.”

Oh, the Places Your Data Will Go

There are a whole slew of potential buyers for location data: investors looking for intel on market trends or what their competitors are up to, political campaigns, stores keeping tabs on customers, and law enforcement agencies, among others.

Data from location intelligence firm Thasos Group has been used to measure the number of workers pulling extra shifts at Tesla plants. Political campaigns on both sides of the aisle have also used location data from people who were at rallies for targeted advertising.

Fast food restaurants and other businesses have been known to buy location data for advertising purposes down to a person’s steps. For example, in 2018, Burger King ran a promotion in which, if a customer’s phone was within 600 feet of a McDonalds, the Burger King app would let the user buy a Whopper for one cent.

The Wall Street Journal and Motherboard have also written extensively about how federal agencies including the Internal Revenue ServiceCustoms and Border Protection, and the U.S. military bought location data from companies tracking phones.

Of the location data firms The Markup examined, the offerings are diverse.

Advan Research, for instance, uses historical location data to tell its customers, largely retail businesses or their private equity firm owners, where their visitors came from, and makes guesses about their income, race, and interests based on where they’ve been.

“For example, we know that the average income in this neighborhood by census data is $50,000. But then there are two devices—one went to Dollar General, McDonald’s, and Walmart, and the other went to a BMW dealer and Tiffany’s … so they probably make more money,” Advan Research’s Tsiounis said.

Others combine the location data they obtain with other pieces of data gathered from your online activities. Complementics, which boasts data on “more than a billion mobile device IDs,” offers location data in tandem with cross-device data for mobile ad targeting.

The prices can be steep.

Outlogic (formerly known as X-Mode) offers a license for a location dataset titled “Cyber Security Location data” on Datarade for $240,000 per year. The listing says “Outlogic’s accurate and granular location data is collected directly from a mobile device’s GPS.”

At the moment, there are few if any rules limiting who can buy your data.

Sherman, of the Duke Tech Policy Lab, published a report in August finding that data brokers were advertising location information on people based on their political beliefs, as well as data on U.S. government employees and military personnel.

“There is virtually nothing in U.S. law preventing an American company from selling data on two million service members, let’s say, to some Russian company that’s just a front for the Russian government,” Sherman said.

Existing privacy laws in the U.S., like California’s Consumer Privacy Act, do not limit who can purchase data, though California residents can request that their data not be “sold”—which can be a tricky definition. Instead, the law focuses on allowing people to opt out of sharing their location in the first place.

​​The European Union’s General Data Protection Regulation has stricter requirements for notifying users when their data is being processed or transferred.

But Ashkan Soltani, a privacy expert and former chief technologist for the Federal Trade Commission, said it’s unrealistic to expect customers to hunt down companies and insist they delete their personal data.

“We know in practice that consumers don’t take action,” he said. “It’s incredibly taxing to opt out of hundreds of data brokers you’ve never even heard of.”

Companies like Apple and Google, who control access to the app stores, are in the best position to control the location data market, AppCensus’s Egelman said.

“The real danger is the app gets booted from the Google Play store or the iOS app store,” he said.” As a result, your company loses money.”

Google and Apple both recently banned app developers from using location reporting SDKs from several data companies.

Researchers found, however, that the companies’ SDKs were still making their way into Google’s app store.

Apple didn’t respond to a request for comment.

“The Google Play team is always working to strengthen privacy protections through both product and policy improvements. When we find apps or SDK providers that violate our policies, we take action,” Google spokesperson Scott Westover said in an email.

Digital privacy has been a key policy issue for U.S. senator Ron Wyden, a Democrat from Oregon, who told The Markup that the big app stores needed to do more.

“This is the right move by Google, but they and Apple need to do more than play whack-a-mole with apps that sell Americans’ location information. These companies need a real plan to protect users’ privacy and safety from these malicious apps,” Wyden said in an email.

This article was originally published on The Markup and was republished under the Creative Commons Attribution-NonCommercial-NoDerivatives license.

In-Vesica Is Powered by SBI!

Categories
Uncategorized

Article by Dr. Patrick Jones of Homegrown Herbalist

What Does an Herbalist Veterinarian Take For Covid-19? Ivermectin or Herbs? Doc Jones Tells All!

POSTED ON

I’ve recently received approximately a bazillion emails and texts with questions about the drug Ivermectin and its use in the fight against Covid-19 infections. I often scratch my head a bit when I get these emails as my company is called HomeGrown Herbalist, not HomeGrown Pharmacist. But I guess it’s not too surprising. I did spend many years sitting in dark lecture halls getting pharmacology facts crammed into my noggin by professors in veterinary school. Add to that the fact that I’ve used hundreds of gallons of Ivermectin over the past 30 years on cattle, horses, pigs, goats, and dogs but am also a naturopath and clinical herbalist (which should put me squarely in the camp of folks that eschew such pharmacological interventions) and I guess it becomes an interesting question.

So, what do I think about Ivermectin? Well, I think it’s a great wormer for livestock. It’s also good for lice or mange. You can use it in dogs too. I’ve treated lots of dogs for mange with Ivermectin over the years. Just don’t give it to collies. It melts their brains. It’s much safer in other dog breeds either because their brains are too hard to melt (Schnauzers and dachshunds) or they don’t have brains (Labradors and beagles).

Ivermectin is also approved for oral use in humans as a little pill for worms and mange and lice and such. Taken properly with a prescription for those conditions, it’s pretty safe. Taken improperly it’s good for causing nausea, vomiting, diarrhea, hypotension (low blood pressure), dizziness, ataxia (problems with balance), seizures, coma, and death. But don’t feel too bad about that. Lots of other “safe” pharmaceuticals have similarly bad effects if used improperly. Another nice benefit of having your doctor prescribe it is that he’ll make sure that any other meds you’re taking don’t interact badly with it.

But what about Covid-19? Doesn’t the Internet say Ivermectin kills Covid-19?

Yes, it does but the internet says a lot of really stupid and dangerous things. In fact, I recently read an article by the FDA warning people not to use Ivermectin for Covid that said a number of really flawed and incorrect things. I think it was probably bring-your-kid-to-work-day and some guy let his 7th-grade daughter write the FDA article so he wouldn’t have to. I’ve also seen a lot of articles on the internet that say some really inaccurate and dangerous things about how to “safely” use Ivermectin for Covid. But I digress… My point is that just because something is posted on the internet doesn’t make it gospel truth. Don’t even get me started on all the herbal misinformation that’s out there as well. Some of it is mind-bogglingly erroneous. If you want to really understand something, don’t use Google. Use Google Scholar or The Bielefeld Academic Search Engine. Then at least you can read real scientific studies and get some real information. Granted some of those studies are garbage as well, but your odds of getting real data are better than you’ll get from some blogger that knows what they’re saying is true because they saw it on Instagram or YouTube.

So, what does the real research show about Ivermectin? It shows that in test tubes Ivermectin has been very effective at interrupting viral replication of the Covid-19 virus in infected cells. I’ve also recently found some good studies showing Ivermectin being effective in real, live humans with Covid. So, from the studies I’ve read on the in-vitro and live human work that has been done, it seems likely that Ivermectin has real promise as a medication for Covid cases. So, if you can find a physician that will prescribe it and get the dosing right for you, it may be helpful.

What I’m not saying is that since there are some promising studies about human Ivermectin drugs, we should all go down to the local feed store and buy some injectable cattle wormer or pour-on delousing products that contain Ivermectin and treat ourselves. Those products aren’t formulated for use in humans and would be much riskier to use than the nice little Ivermectin pills your doctor would give you.

As it happens, I got Covid-19 a couple of weeks ago from this nice lady that likes to smooch me. So, did I run over to the vet clinic and grab some Ivermectin which I can buy wholesale for peanuts?

Nope. I didn’t.

Why not? Well, a better question is why would I? You see, I have lots of little green friends that have also had excellent studies showing good activity against coronaviruses. The fact is that plants have been killing coronaviruses for years and they have no idea that the exciting new Chinese one should be scarier than all the rest of them…they just think it’s a corona and kill it. Thank heavens for plant illiteracy! If they’d Googled “Covid-19” and found out how much better this corona is than the bazillion others they kill, we may have had a real problem.

So, because I’m an herbalist I chose to use herbs instead of Ivermectin to address my Covid adventure. There were several important factors contributing to this decision. First, given the choice between plants that my body knows very well how to process and which contain dozens of chemicals that do nice things or a synthetic cattle wormer that my body has no idea how to process and which contains only one chemical, I’m going to choose the plants. Second, I’m much too lazy to drive over to the vet clinic when I have a HomeGrown Herbalist Respiratory Preparedness Kit and a few other good tinctures in my cupboard.

So, what did I do exactly?

Well, the Mrs. started getting sick on Friday…just feeling dumpy and having a scratchy throat. So, of course, I started taking Immunity Support and Cold Away.

She didn’t.

The second day she was even sicker…achy, sore, and starting to cough. So I added INFXN-ShooFloo to my protocol.

She didn’t.

I told her I knew this nice herbalist that would poke the tinctures into her if she liked but she never got around to it that day…too busy working on projects in spite of her illness, like a good Idaho farm girl. The third day she was really sick, coughing like crazy and achy. One of my adult kids went to the drug store and bought a rapid Covid test. She tested positive. So, I added Artemisia annuaPine Needle, and Chaga to my protocol, and called it “Doc’s 3 Amigos For The Respiratory System” At that point, she started taking her herbs too. We were taking all of the above about four times a day. Dosing can be found on any product page on the Info & Dosing tab.

The next day I was sick…really sore, achy, and worn out but with no respiratory symptoms. I took some Joint Support Formula and the aches and pains improved markedly. I also took some Respiratory – Cytokine Balance as it contains a lot of grape leaf which contains a lot of resveratrol which interferes with coronavirus cellular attachment and reproduction. At the end of the second day, I was done with the bug and felt pretty good. I was still tired for several days and would have a good cough or two once or twice a day but that was it.

My sweet wife, who was naughty and didn’t listen to the advice of the handsome herbalist she likes to smooch, was much sicker and had significantly more respiratory involvement. We used a lot of Respiratory-Coff which really helped the coughing. I also gave her Respiratory-EXP to get the goobers out of her lungs. Of course, she was getting the Artemisia annua, Pine Needle and Chaga, and other stuff mentioned above as well. She was much sicker than I was.

So, what do we learn from this in-depth corona case study carried out at the Jones house?

First, we learn that starting your herbs the day you think you’re exposed to a bug is a much better idea than starting your herbs three days after you’re sick.

Second, we learn that even though someone likes to smooch you, they may not always listen to you.

Third, we learn that herbal intervention is a continuous, evolving process. In other words, the herbs or formulas you need on day two may not be the same ones you need on day five (By the way, the Respiratory Preparedness Kit comes with detailed descriptions for each of the eight formulas and how, when, and why to use each one). We also learn that having the herbs on hand when you need them is a MUCH better idea than having to order them so they can arrive several days after you get sick. And, lastly, we learn that even if you’re too lazy to run down to the vet clinic and get some free Ivermectin, you can get better quite quickly if you have the right weeds around. :0)

By the way, speaking of preparing ahead of time, we will be having a wonderful online event this weekend (yes, it’ll be recorded if you can’t watch it all live). We’ll be having in-depth seminars on the immune system, auto-immune disease, leaky gut, herbal cleanses, and…wait for it…Herbs and the Respiratory System where we’ll go into great detail on how to fight all sorts of respiratory illnesses including Covid-19. The program is free for enrolled students in The HomeGrown Herbalist School of Botanical Medicine but is available to non-students as well. Personally, I’d recommend enrolling in the full program. There are more than 50 of these sorts of lessons there and, if you do the math, the low enrollment price of the school is pretty much a no-brainer. :0)

So, my advice is to fill your cupboard with herbs, fill your brain with great information and, perhaps most importantly, listen to your spouse…especially if what they’re saying sounds like a really good idea. :0)

I am doing this to keep my link with a great website, Homegrown Herbalists. I think this epidemic gets this business that at this time should be one of the things we all apply. There is a lot of information that supply lines will thin. Work on self-reliance. Doc Jones’ articles can help.

-Allison 

Also available – 

Ivermectin: a multifaceted drug of Nobel prize-honoured distinction with indicated efficacy against a new global scourge, COVID-19
Ivermectin was NOT a product that was only used for animals.  It was used to help combat river blindness on the African continent. The Nobel Prize was awarded in 2015 to Williams C. Campbell. The above is available at PubMed.gov, the United States government’s website of biomedical literature.  
More articles are available when you use “ivermectin covid-19” in the browser at Pub.Med.gov.
Allison L. Williams Hill is an artist, designer, planner, healer, Integrative Health Coach, and inventor. She shares her work and services through

Metaphysical Services and Spiritual Art

“Do All Things In-Vesica”

Registered Medium and Spiritual Counselor, Certified  Spiritual Healer, Church of Wisdom, and a member of the Holistic Healers/Healing Works Professional Association.

Get a free 50-minute Health History.  Go to In-Vesica/Health for details.

 Health Coach Services 

A health coach (or health counselor) is a wellness guide and supportive mentor. Together, we’ll work to achieve your goals in areas such as achieving optimal weight, food cravings, sleep, and energy. Through working with me, you’ll develop a deeper understanding of the foods and lifestyle choices that work best for you and implement lasting changes that will improve your energy, balance, and health.

I practice a holistic approach to health and wellness, which means that I look at how all areas of your life are connected. Does stress at your job or in your relationship cause you to overeat? Does lack of sleep or low energy prevent you from exercising? As we work together, we look at how all parts of your life affect your health as a whole.

I lead workshops on nutrition and offer individual and group health and nutrition counseling.  I realized a dream to study at The Institute for Integrative Nutrition and it changed my life.  Let me support you to change yours.

Solo Build It!
In-Vesica Is Powered by SBI!

Categories
Uncategorized

Ghost Shows

by Allison L. Williams Hill  In-Vesica  Art  Design  Energy

“Do All Things In-Vesica.”

Discerning Spirit – Gifts from Spirit by Allison L. Williams Hill

I watch a lot of ghost shows on television.  Many years ago, “The Scariest Places on Earth” was a prime-time show.  Then “Paranormal State” with an office at the University of Pennsylvania and dedicated paranormal investigators had episodes on their clients across the United States.   “A Haunting”; “Ghost Adventures”; “The Dead Files”; “Ghost Brothers”; “Paranormal Lockdown”; “Ghost Asylum”; “Kindred Spirits”; “My Haunted House”, are some of the more recent shows, with “stars” even, that have been spun to satisfy the public’s need to see other people’s experiences.  They offer that their purpose is to prove that the paranormal is real, that there is such a thing as spirits, demons, or ghosts.
The participants walked through homes or institutions, occupied or abandoned, with their equipment proving the existence of life after death or “residual energy,” and appear stunned; shocked, and even scared when “disembodied voices” were heard.  The circumstances under which the departed transitioned were sometimes disclosed.  The history of a property or building may be shared if it was significant.  Electronic recordings for voice and form, because human sight sees only a small span of the energy spectrum, tend to fall short of fully bringing these occurrences into the third-dimensional, beyond-a-reasonable-doubt place.  A lot of the results are still open to interpretation.
These investigators are still amazed time after time when they hear recorded voices or feel pressure on their bodies, or any other physical sensations not made by other living people.
The majority of these shows stop short of assisting what they believe are spirits to complete their journeys.  At the end of an episode, some stated ”…this place is definitely/without a doubt/etc. haunted.” “Yep, we have proof. There are spirits here.”
“Ghost Asylum” investigators prayed for themselves and the “…Spirits who are lost.”  I thought that was beautiful. Some may employ mediums or other professionals to move spirits on, especially if they were unaware they passed on or if they were destructive.  If more trained people prayed to assist the disincarnate to continue their journeys, or evicted negative energy, there probably won’t be another location to visit and investigate.   What would that do for and to the planet?
Locations where residents are advised to leave because of intense negative energy, these places absolutely need cleansing.  What does it do for the location, and the planet as a whole if some of these locations are cleared and others are left to worsen?  Shouldn’t all negative energies be removed? Can all negative energies be removed? I don’t know.
In some investigations, it seemed as if all of the pieces were not available.  On “The Dead Files”, which I think is a very good show with talented third dimension (and beyond) investigators, I would guess that shamans, mediums, spiritual cleansers, or healers may be so far distant from the places of need.   There may not have been enough to respond. Reading endnotes like “The activity continues…,” I wondered if the lack of follow-through was due to money to compensate and board a healer to perform the work.  Is there a need for charitable donations to assist people to clear their residences because they cannot afford to relocate?
All of these places serve as entertainment and sometimes at the suffering of the resident, family, patient or the memory of an inmate or mental patient.  Viewers watch from the comfort of their chairs as the intrepid risk life and limb in abandoned buildings and other structures populated by the unknown.
Will these locations be visited again like laboratory experiments where subsequent teams of investigators validate what was already revealed?  That’s like visiting a polluted lake, pronouncing its condition as polluted and another group visits to do the same thing.  I think all of the exposure serves a purpose: powerful human emotions and activities are responsible for the majority of these conditions. The caution is to be aware of what we do and think before we do them.   Maybe the locations were being cleansed, however, that information was not provided.
Some owners were advised to abandon their homes because they cannot be cleansed.   Discovering the conditions in which these places were left, I thought presented opportunities to cleanse in different ways.  Evil is not limited to any religion.  Maybe more than one spiritual or religious practitioner is required to completely change the energy.  Pairs of spiritual or religious practitioners, of the same or other religions, or triplets of same or other- in other words POWER!- to spin their heads faster than they could attack may be needed. I have not seen this done or suggested anywhere.  The amount and the intensity of these energies may be calling for something more than what has been practiced to date.
Allison L. Williams Hill is an artist, designer, planner, healer, Integrative Health Coach, and inventor. She shares her work and services through:

Get a free 50-minute Health History.  Go to In-Vesica/Health for details.

 Health Coach Services

A health coach (or health counselor) is a wellness guide and supportive mentor. Together, we’ll work to achieve your goals in areas such as achieving optimal weight, food cravings, sleep, and energy. Through working with me, you’ll develop a deeper understanding of the foods and lifestyle choices that work best for you and implement lasting changes that will improve your energy, balance, and health.

I practice a holistic approach to health and wellness, which means that I look at how all areas of your life are connected. Does stress at your job or in your relationship cause you to overeat? Does lack of sleep or low energy prevent you from exercising? As we work together, we look at how all parts of your life affect your health as a whole.

I lead workshops on nutrition and offer individual and group health and nutrition counseling. I realized a dream to study at The Institute for Integrative Nutrition and it changed my life.  Let me support you to change yours.

Solo Build It!

In-Vesica Is Powered by SBI!