The Corbett report along with Douglass Valentine has done this great video called “Trump Admin Raising Phoenix Program From the Ashes” Douglass Valentine has really done his homework on the Phoenix program. He shows how the Phoenix program started in Vietnam and has been used as a system for social control to take over a country. The Phoenix program has been used over and over again in Nicaragua, Central America and now Syria and Iraq. It is presented as a program to help the people but it does just the opposite. In America it brings contractors into our neighborhoods under cover of neighborhood watch groups. What this is however is really a takeover of our neighborhoods with backing by the military. It is Full Spectrum Dominance of America. Primarily Phoenix was developed by the CIA and I cannot stress that enough. Whatever you hear about it always remember the CIA developed it and controls it and oversees how it is working. Phoenix is a cookie cutter operation that was designed to gain Full Spectrum Dominance of a country. Now when you hear that the Phoenix Program is in operation here in America, remember it is still CIA and it is a system that has been perpetrated on the American Public. Remember that it is a psychological operation (PSYOP). It is designed to fool the people of a country to believe in this case that the country (America) is at war. We are at war, but it is a war with the CIA and they are winning unless and until you pull your head up to take a look and see the truth. Really, look around and notice….> In order to understand what is going on, remember that the CIA is in league with the corporations and banks.
THERE ARE NO TERRORISTS
Okay, maybe there are a few, but the US has been pulling off False Flag Operations for over 50 years. You have a 500,000 to One chance of being killed by a Terrorist. You have a 500:1 chance of being killed by a Weaponized Moron. So, if you are not focussing on Weaponized Morons you are not paying attention. Okay, you could call the WEAPONIZED MORONS terrorists and that would be a true statement.
Terrorism was a psychological operation developed by the CIA, surrounding the events which occurred on 9/11. Torture too was needed and it was worked into the news and the conversations due to Guantanamo. Torture was a psyops because the Iraq war was a psyops. Torture was needed for trauma based mind control, which is how they make Manchurian candidates. Think about this, If there was no 9/11, This Phoenix Program would be meaningless and would not have worked. 911 brought the war on terror and the Iraq War.
We went to war with Iraq over Weapons of Mass Destruction. But remember, there were no weapons. But we did go there and Iraq had OIL which we wanted. Yes we wanted something they and other countries have. What happened in and to Iraq has happened to countless countries beginning with IRAN in the 1950′, to Central and South America, Iraq, Afghanistan and now America, Yes, America because we have something they want. We have pension funds and other financial objects. But I think the main objective is the fact that they have been asset stripping for years and the elite is afraid they will be found out and punished.
One thing you must know at this point is that the Phoenix Program is already in place in America. It has surfaced in the news that Erik Prince is collaborating with the Trump administration. You hear how Prince is talking about instituting a renewed Phoenix Program. But this is a psyops or false news, because the Phoenix Program is already in place in America and is going on now. The CIA leaked this news and they are masters of leaking. This particular news is not true because this program is already in place in America. Phoenix is psychological terror against a country and its people. Mercenary Contractors are killing Targeted Individuals (TI’s) with soft kill methods which include Gangstalking and Directed Energy Weapons (DEW). These are combined to terrorize the citizens. which are called less than lethal weapons. But that is a lie because energy weapons were designed from the start to be lethal and they have some lower power versions which are used to hurt people but it just depends on the power level what the outcome is. Low power over a longer period of time leads to early death. Also, high power for a short period of time also results in death, but DEW was designed from the beginning to be lethal.
The Phoenix program has brought contractors to invade our neighborhoods. These contractors will tell you that this is done to help you and save you from Terrorism. They are doing counter terrorism which is itself terrorism. It is terrorism on the American people. Targeted individuals are used as a scapegoat or false flag operation. The contractors use the TI as a false flag means to enter a neighborhood. Under the guise of protecting the people, the targeted individual is under surveillance by them. Now we have contractors being sent into our neighborhoods using neighborhood watch as cover. This whole thing is scripted as though it were a play. There are variations of this play in every neighborhood but is always the same basic thing. The contractors will say that the TI is a terrorist who needs to be watched, but that is a lie to mislead the people. The TI’s are being tortured by these contractors and have done nothing to warrant being put into a virtual prison. This whole thing is orchestrated by the Department of Homeland Security (DHS) and the fusion centers. They chase targeted individuals, who are on the terrorist watch list as enemies of the state. The contractors present the TI’s as a false flag operation, saying that the TI is dangerous and telling the people in the neighborhood vicinity that they need their help to monitor the TI which begins their psychological operation. They tell the people that they should help them and good things will happen and they get money and jobs to assist them. But they will be spied on and surveilled and they will be killed because the shadow government is afraid of them. They will be put on lists of gun owners or Libertarians or natural leaders and constitutional extremists believe in constitution as law, etc. Remember that I said this was a war against the American People. So you can see now that the TI is again, a false flag operation. What is really wanted is threats in the neighborhood. In case of an insurrection and America, where martial law is declared and America is taken over, they want to know who is on their side and who is going to be a trouble maker so they can be taken out. This is not what the contractors want the public to know. The contractors will lie to gain their cooperation.
- the hamlet informant program, [This is now the NeighborHood Program]
- the province interrogation program [There is one FUSION CENTER in each State and one for large City]
- agent penetrations of people who are in place [Infiltrator or Secret Agent]
So now you know The phoenix program is already in place. It is the infrastructure which allows contractors (Mercenaries) to attack Targeted Individuals. You may have seen Eric Prince in the news lately and this is on purpose because he is there just to scare you into thinking that Trump will target Americans with Phoenix. This is all part of the psyops or psychological operation.
Reblogged by James Lico from Douglass Valentines article on Douglass Valentines blog . http://www.douglasvalentine.com/
CIA Pacification Programs, Secret Interrogation Centers, Counter Terror Teams, Propaganda Teams and military and civilian tribunals in all 44 provinces of South Vietnam; 1965 US military sent in; National Liberation Front; secret 1967 CIA General Staff For Pacification by combining all CIA, military, and South Vietnamese programs to became The Phoenix Program; Phoenix based on systems analysis theory combining 20-30 programs to pacify South Vietnamese civilians to support the government; Phoenix instituted to more perfectly coordinate CIA and military operations; streamlined and bureaucratized a system of political repression in South Vietnam; media cover-up; CIA Foreign Intelligence including the Hamlet Information Program, the Province Interrogation Center program and Agent Penetrations; CIA Covert Action Program; reliance on corruption; Pacific Architects and Engineers oversaw design and construction of interrogation centers in South Vietnam which became the model for the black sites
in order to understand what is going on, you must listen to this podcast with Douglas Valentine telling how the program has evolved into what it is today. This podcast is on “Guns and Butter” which is an internet radio program.
Journalist George Webb Stated on Ella Free’s podcast that the Phoenix contractors are waiting for an insurrection to so what they were hired to do. Until the insurrection they are supposed to target designated people on the Terrorist watch list and practice torture on them. The CIA has been a leader in the types of actions such as creating covert actions to target people they dont like. It turns out that all the people on the terrorist watch list are people who are targeted by the CIA for various reasons. They are a take over group for when there is a regime change. They will be a black group who are supposed to take over the United States. The shadow government needs a standing army ready to take over the US, which is trained to use special weapons and recover from special challenges These contractors are members of the takeover army. They are actually traitors to America. They are planning for the failure of America. Think of it, you have this standing army of folks hanging around until there is a takeover by the military. They have nothing to do unless they are put to work practicing their weapons techniques on these poor TI’s. The targeters are mercenaries. They make good money to target TI’s and they are just hanging around practicing on them until there is a take over of America.
John Perkins wrote confessions of an economic hitman. Perkins was a CIA economic hit man who was dispatched to third world countries to make lucrative deals, which were beneficial to his corporate bosses. Now John Perkins is trying to make amends by blowing the whistle on this extremely unfair practice. He is an excellent speaker and knows his subject.
John Perkins is a CIA Whistleblower who can tie all this together for you because he was an Economic Hit Man. He actually took over countries resources for the CIA and their Corporate sponsors without firing a shot. It turns out that America has been asset stipping every third world country which had resources of value to american corporation. If you watch this video, you will find out what happened. You will find out why the CIA and the corporations and banks want to take over countries. This is the short version, about 42 minutes.
If you are looking at all this and thinking that it could cause the society to be destabilized, you are right. They (CIA and Corporations) are trying to bring down the United States as a country. Remember that the corporations are Global Corporations now, not American corporations and have no allegiance to America. Asset striping this country is a big money making operation and the Military Security Complex has been on the welfare wagon for a long time. Will you let the psyops continue? The contractors who invaded your neighborhoods are still there collecting your tax dollars for nothing, actually worse than nothing. Lets kick them the hell out of town.
The following information is taken directly from the DHS fusion centers own information which they present to the public.
Since the Phoenix program is orchestrated out of the DHS Fusion centers, It would be a good Idea to examine them more closely.
What is a Terrorism Liaison Officer? http://tlo.org/what_is_tlo.html
A Terrorism Liaison Officer (TLO) is a individual that functions as the principle point of contact for a public safety agency in matters related to terrorism information. The TLO, though not necessarily an expert in terrorism, attends meetings and receives terrorism training and information from the local Fusion Center, or other local entities engaged in terrorism intelligence or investigations. The TLO then educates others within his or her department or area of responsibility.
TLOs are a vital link in keeping those engaged in public safety professions aware of current terrorist tactics, techniques, and practices. Through the diligent performance of their duties, public safety personnel are alerted to terrorism indicators and warnings that might otherwise go unreported.
TLOs are typically contacted when suspicious activities are witnessed that could potentially be related to terrorism. They in turn forward the lead or Suspicious Activity Report (SAR) to their local police, Fusion Center, or the Joint Terrorism Task Force (JTTF).
TLOs raise the level of prevention and preparedness within our communities and better prepare public safety personnel to deal effectively with the threat of terrorism.
What if my department doesn’t have a TLO?
This is easy. After securing the necessary approval from your agency, contact your local Fusion Center. They will assist you in getting started and will direct you to the appropriate contact person in your area.
What are some of the typical duties for a TLO?
Duties and responsibilities of the TLO may include the following:
The collecting, reporting, retrieving, and sharing of materials related to terrorism.
The source person for internal or external inquiry.
The contact for communicating with community stakeholders in matters related to terrorism.
The contact person for community and private sector relationships.
The person who conducts, coordinates, and/or facilitates departmental training with regard to terrorism and terrorist related subjects.
The person who conducts, coordinates, and/or facilitates community meetings, conferences, and other information sharing activities.
The designated agency representative to the JTTF, Terrorism Early Warning Group (TEW), or Fusion Center.
Do all TLOs perform the same duties?
No. TLOs can be representatives of police, fire, and public health agencies. Each of these disciplines has unique needs in dealing with the threat of terrorism. Although the education and information received is frequently the same, the role that these agencies play are quite different, therefore information is frequently provided according to the need, and training needs will differ at times.
Are there requirements to become a TLO?
Requirements to serve as a TLO vary from agency to agency. What is most desired in a prospective TLO is good communication skills and a passion for learning about the threat of terrorism and ways to protect our communities.
TLOs should be willing to contribute and give of themselves to the overriding public interest. Reluctant, and/or “ordered,” acceptance of the position will quite probably lead to an unsuccessful outcome.
The TLO must be willing to seek and attend additional education and training that will enhance their ability to perform in this challenging role.
TLOs fill a necessary and vital part of an overall national strategy to counter the threat of terrorism in the United States.
What is the origin of the TLO Program?
Shortly after 9/11, the police chiefs in South Bay, California organized a Terrorism Advisory Group as an effort apart from the existing Los Angeles County Terrorism Early Warning Group (TEW). One of the concepts that came out of this effort was that each agency designated a Terrorism Liaison Officer. These officers became the central point of contact for all terrorism-related information for their respective agencies. But there were limitations.
Recognizing the extraordinary potential for the TLO Program to be a force-multiplier in countering the threat of terrorism, the concept was adopted by the Los Angeles County TEW. The model proved to be a tremendous success and has now expanded nationwide. Fusion Centers are now the principal points of coordination for the TLO Program.
Because the multi-disciplinary approach to information sharing is vital to the success of any terrorism-related response, the TLO Program has been expanded to include fire department and public health representatives.
|NCRIC Terrorism & Infrastructure Liaison Officer Programs
https://ncric.org/default.aspx?menuitemid=629&AspxAutoDetectCookieSupport=1The NCRIC TLO program is limited to: Active Peace Officers, Firefighters, State Investigators, Federal Agents, Military Investigative personnel, or other government employees (working within the public safety /homeland security community) employed within the NCRIC’s Area of Responsibility (AOR).
To be certified by the NCRIC as a TLO, qualified applicants must:
For further information email email@example.com; Subject; TLO Program
The Northern California Regional Intelligence Center (NCRIC) private sector program is provided as a free public service, designed to enhance communication and information sharing between law enforcement, public safety organizations and the private sector. The NCRIC private sector program, which is one of the most progressive of its type in the nation, offers many benefits designed to meet the needs of our membership to include specialized training through the ILO Program as well as the following benefits:
To be certified by the NCRIC as a ILO, qualified applicants must:
For further information email firstname.lastname@example.org ; Subject; ILO Program
FUSION LIAISON OFFICER (FLO) PROGRAM
The Fusion Liaison Officer (FLO) Program is a statewide network of agency-selected law enforcement, fire-fighting and critical infrastructure agency representatives. The FLO program serves as an integral component of the Statewide Integrated Intelligence System (SIIS) and provides the mechanism to gather and analyze information, and share actionable intelligence. FLO’s attend a DHS approved basic course of instruction hosted by the Washington State Fusion Center (WSFC).
The FLO program benefits its partners in the following ways:
- Expedites the flow of information throughout the state, providing a more rapid response to matters of both state and national security;
- Increases awareness of pre-incident indicators and warnings of terrorism and significant criminal activity;
- Establishes standardized reporting protocols for the SIIS;
- Opens communication channels between law enforcement, fire-service, critical infrastructure, Regional Intelligence Groups (RIGs) and the WSFC; and
- Enhances SIIS efficiency and effectiveness while increasing information collection opportunities.
The development and coordination of a network of trained and certified FLOs ensures that vital disciplines are incorporated into the fusion process by serving as the conduit through which homeland security and crime related information flows to the WSFC for assessment and analysis through the state homeland security Regional Intelligence Groups.
The goal is to develop a FLO program that complements the SIIS. The end state is to have FLOs throughout the state in all aspects of law enforcement, fire service and critical infrastructure.
FLO Certification Training is hosted throughout the state as demand and funding allow.
FLO CANDIDATE QUALIFICATIONS
Fusion Liaison Officer Candidates must meet one of the following criteria:
- Be a commissioned police officer, or performing a law enforcement function and employed by a law enforcement agency (analyst, mission support, etc).
- Be a government employee or contractor who has a public safety or emergency preparedness job function (firefighter, public safety, emergency preparedness, health, military,etc)
- Be a representative of private sector or non-profit organization that has a job function that demonstrates a “Need to Know” and,
- Supports Homeland Security functions, and
- Is considered Critical Infrastructure or a Key Resource, or
- Job Function directly relates to operations, planning, prevention, protection, response or recovery to emergency operations.
The WSFC reserves the right to approve or deny all applications
FLO TRAINING TOPICS
FLO Basic training provides the tools and resources to effectively participate in the FLO Program for the WSFC . The topics include the following:
- Provide a basic understanding of the FLO program.
- Provide instruction on the Statewide Integrated Intelligence System.
- Educate the students in key concepts of intelligence, networking, terrorist infrastructures and emerging threats to better conduct the FLO mission.
- Provide students with a basic understanding of the National Suspicious Activity Reporting (SAR) Initiative.
For more information, contact the WSFC 1-877-843-9522 or email to FLO@wsfc.wa.gov. Completed FLO Applications can be emailed to FLO@wsfc.wa.gov or secure faxed to 206.262.2014.
What is a Fusion Center?
State and major urban area fusion centers (fusion centers) serve as focal points within the state and local environment for the receipt, analysis, gathering, and sharing of threat-related information between the federal government and state, local, tribal, territorial (SLTT) and private sector partners.
Located in states and major urban areas throughout the country, fusion centers are uniquely situated to empower front-line law enforcement, public safety, fire service, emergency response, public health, critical infrastructure protection, and private sector security personnel to understand local implications of national intelligence, thus enabling local officials to better protect their communities. Fusion centers provide interdisciplinary expertise and situational awareness to inform decision-making at all levels of government. They conduct analysis and facilitate information sharing while assisting law enforcement and homeland security partners in preventing, protecting against, and responding to crime and terrorism.
Fusion centers are owned and operated by state and local entities with support from federal partners in the form of deployed personnel, training, technical assistance, exercise support, security clearances, connectivity to federal systems, technology, and grant funding.
What Is INFRAGARD
WELCOME TO INFRAGARD
InfraGard is a partnership between the FBI and members of the private sector. The InfraGard program provides a vehicle for seamless public-private collaboration with government that expedites the timely exchange of information and promotes mutual learning opportunities relevant to the protection of Critical Infrastructure. With thousands of vetted members nationally, InfraGard’s membership includes business executives, entrepreneurs, military and government officials, computer professionals, academia and state and local law enforcement; each dedicated to contributing industry specific insight and advancing national security.
WHAT IS INFRAGARD?
InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S. Each InfraGard Members Alliance (IMA) is geographically linked with a FBI Field Office, providing all stakeholders immediate access to experts from law enforcement, industry, academic institutions and other federal, state and local government agencies. By utilizing the talents and expertise of the InfraGard network, information is shared to mitigate threats to our nation’s critical infrastructures and key resources. Collaboration and communication are the keys to protection. Providing timely and accurate information to those responsible for safeguarding our critical infrastructures, even at a local level, is paramount in the fight to protect the United States and its resources.
PARTNERSHIP IS OUR KEY RESOURCE
As Americans, our lifestyle, economy, and national security are supported by a complex framework of businesses and services. The central role of these critical infrastructures and key resources (CIKR), however, makes them especially vunerable as targets for both physical and cyber attacks.
The Federal Bureau of Investigation’s (FBI) priority programs share the common goal of protecting the nation’s infrastructure and resources against threats posed by criminals and foreign adversaries. In support of their mission, Bureau teams including Cyber, Counterterrorism, Counterintelligence and others rely on close dialogue across government, but also benefit substantially from outside collaboration.
CRITICAL INFRASTRUCTURE SECTORS
There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.
Critical Infrastructure Sectors
There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof. Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. This directive supersedes Homeland Security Presidential Directive 7.
PPD-21 identifies 16 critical infrastructure sectors:
The Department of Homeland Security is designated as the Sector-Specific Agency for the Chemical Sector.
The Department of Homeland Security is designated as the Sector-Specific Agency for the Commercial Facilities Sector.
The Communications Sector is an integral component of the U.S. economy, underlying the operations of all businesses, public safety organizations, and government. The Department of Homeland Security is the Sector-Specific Agency for the Communications Sector.
The Department of Homeland Security is designated as the Sector-Specific Agency for the Critical Manufacturing Sector.
The Department of Homeland Security is designated as the Sector-Specific Agency for the Dams Sector. The Dams Sector comprises dam projects, navigation locks, levees, hurricane barriers, mine tailings impoundments, and other similar water retention and/or control facilities.
The U.S. Department of Defense is the Sector-Specific Agency for the Defense Industrial Base Sector. The Defense Industrial Base Sector enables research, development, design, production, delivery, and maintenance of military weapons systems, subsystems, and components or parts to meet U.S. military requirements.
The Department of Homeland Security is designated as the Sector-Specific Agency for the Emergency Services Sector. The sector provides a wide range of prevention, preparedness, response, and recovery services during both day-to-day operations and incident response.
The U.S. energy infrastructure fuels the economy of the 21st century. The Department of Energy is the Sector-Specific Agency for the Energy Sector.
The Department of the Treasury is designated as the Sector-Specific Agency for the Financial Services Sector.
The Department of Agriculture and the Department of Health and Human Services are designated as the co-Sector-Specific Agencies for the Food and Agriculture Sector.
The Department of Homeland Security and the General Services Administration are designated as the Co-Sector-Specific Agencies for the Government Facilities Sector.
The Department of Health and Human Services is designated as the Sector-Specific Agency for the Healthcare and Public Health Sector.
The Department of Homeland Security is designated as the Sector-Specific Agency for the Information Technology Sector.
The Department of Homeland Security is designated as the Sector-Specific Agency for the Nuclear Reactors, Materials, and Waste Sector.
The Department of Homeland Security and the Department of Transportation are designated as the Co-Sector-Specific Agencies for the Transportation Systems Sector.
The Environmental Protection Agency is designated as the Sector-Specific Agency for the Water and Wastewater Systems Sector.
Last Published Date: December 30, 2016
The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. This requires the dedication of more than 240,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical facility inspector. Our duties are wide-ranging, and our goal is clear – keeping America safe.
With honor and integrity, we will safeguard the American people, our homeland, and our values.
The list of all Operational and Support Components that make up the Department along with our organization chart and the list of senior leadership.
The Secretary of Homeland Security oversees the third largest Cabinet department and leads our nation’s efforts to secure our country from terrorism to natural disasters.
Here’s where the public and others can assess how effectively DHS performs its mission and provides stewardship of resources.
Challenge your mind and use your skills and talents with a DHS career. Our employees play a vital role to secure our country and preserve our freedoms.
Start here if you want to learn how to work with DHS, how we assist small businesses and about our policies, regulations and business opportunities.
Public laws are passed by Congress and signed into law by the President. Regulations are issued to carry out the intent of legislation enacted by Congress.
The Department of Homeland Security combined 22 different federal departments and agencies into a unified, integrated cabinet agency when it was established in 2002.
DHS is committed to enabling better utilization of departmental data to improve the quality of services to the American people, while developing products that promote innovation while maintaining enhanced security.
Lookup email and mailing addresses, telephone numbers, help-desk support for Web applications, instructions on how to report incidents and more.
Resources for employees of the U.S. Department of Homeland Security.
The Presidential Transition Office coordinates and supports the Department’s transition activities to ensure continuity of operations and facilitate a seamless transition from the current presidential administration to the next administration.