Thursday, August 30, 2012

STATE DEPARTMENT OFFICIAL REMARKS ON THE INFORMATION AGE AND ARMS CONTROL

Photo:  Minute Man III Missile Launch.  Credit:  U.S. Navy
FROM: U.S. DEPARTMENT OF STATE
Arms Control in the Information Age: Harnessing "Sisu"
Remarks
Rose Gottemoeller
Acting Under Secretary for Arms Control and International Security

Finnish Institute for International Affairs


Helsinki, Finland
August 29, 2012
Thank you for inviting me to speak here at the Finnish Institute for International Affairs. This is my first visit to Finland and it is an absolutely lovely place. This nation has been a strong partner for the United States in pushing for a safer, more secure world, whether through diplomacy, peacekeeping or arms control efforts.

I would like to start out by saying that this is not a policy speech; this is an ideas speech. The United States has an ambitious arms control agenda and as such, we are doing some big thinking. I know Finns are no strangers to big thinking, so I think I am in the right place to discuss arms control in the information age.

The Challenges Ahead

It has been over 3 years since President Obama made his now-famous speech in Prague, in which he stated that the United States would seek the peace and security of a world without nuclear weapons. That speech was not just a rhetorical gesture; the Prague Agenda is a step by step path to the elimination of nuclear weapons. For the first two years of my service in the Administration, I worked on one step in that path – the New START Treaty. I am happy to report that Treaty has now been in force for over 18 months and its implementation is going very well. Both the United States and Russia are benefitting from the enhanced predictability it provides, which in turn enhances security for both nations and the world.

In the context of moving the President’s overall nuclear policy agenda forward, the entry into force of New START is just the beginning. In order to reach our goals, we are going to have to think bigger and bolder. Indeed, persistence, determination and willpower will be important to the next steps in arms control. I believe the Finns have the perfect term for what it will take: "sisu."

As we look towards the next steps in reductions, it is clear that there will be new challenges facing us. We have not tried to limit non-deployed or non-strategic weapons before, which President Obama called for the day he signed New START. We are thinking about how we would verify reductions in those categories and people have different ideas about what terms like ‘non-strategic’ even mean. Even more complicated: the lower the numbers of nuclear weapons and the smaller the components, the harder it will be to effectively verify compliance.

New Concepts

With this is mind, I have been challenging myself to think about how we use the knowledge from our past together with the new tools of the information age. The seed of an idea was planted in my mind in Geneva during the New START negotiations. As we considered verification mechanisms for New START, it occurred to me that, by and large, we were still thinking about verification through the lens of the 1970’s. The advancements in technology since then have been nothing short of revolutionary, but it wasn’t quite clear how to incorporate these advancements into an effective verification regime.

It was actually a conversation with my two tech-guru sons over the dinner table that helped to further develop my thoughts on the subject. We discussed the incorporation of open source technologies – including social networking – into the verification of arms control and nonproliferation treaties.

Our new reality is a smaller, increasingly-networked world where the average citizen connects to other citizens in cyberspace hundreds of times each day. These people exchange and share ideas on a wide variety of topics: why not put this vast problem-solving entity to good use?

Today, any event, anywhere on the planet, could be broadcast globally in seconds. That means it is harder to hide things. When it is harder to hide things, it is easier to be caught. The neighborhood gaze is a powerful tool, and it can help us make sure that countries are following the rules of arms control treaties and agreements.

I look out at a crowd like you and realize that I don’t need to convince you that the technologies of the 21st century are changing the world as we know it. Finland has been a leading force in innovation in the information age. Over 95% of Finns have access to the internet and broadband access is now considered a legal right. It was not too many generations ago that Finland was a primarily agrarian state and now it is an economic powerhouse, with cutting-edge research and development. I am always amazed that Nokia went from making rubber boots to revolutionizing the communications world with its inexpensive and efficient cellular phones. It is this kind of creativity and adaptability that will be needed as we think about how to verify reductions going forward.

Of course, I should caveat that this is not actually a new idea. Renowned physicist and Nobel-laureate Joseph Rotblat proposed the concept of involving everyday citizens in the verification of arms control agreements back in the 1960’s. But without the tools to "crowd-source" verification, the idea languished. In the 1990s, Joseph Rotblat revived the idea of establishing an international system for public reporting and whistle-blowing as a complement to technological verification. Rotblat termed this concept "societal verification," to reflect the idea that entire communities of non-experts could be involved. While Rotblat and others saw that the new global political conditions could be fertile ground for cultivating societal verification, there was still a need for technical tools. Today, we may finally have those tools.

New Possibilities

So now, armed with an idea and technological capacity, we can start to think about the possibilities.

Social verification can take place on a scale that moves from active participation, like public reporting and crowd-sourced mapping and analysis, or to passive participation, like ubiquitous sensing or data mining and analytics.

On this scale, the open source information technologies in use can improve arms control verification in at least two ways: either by generating new information, or by analyzing information that already is out there.

Let me give you some examples, to give you an idea what I’m talking about.

In 2009, in recognition of the 40th anniversary of the Internet, the U.S. Defense Advanced Research Projects Agency (DARPA) held a competition where 10 red weather balloons were moored at visible fixed locations around the continental United States. The first team to identify the location of all 10 balloons won a sizable cash prize--$40,000. Over 4,300 teams composed of an estimated 2 million people from 25 countries took part in the challenge. A team from the Massachusetts Institute of Technology won the challenge, identifying all of the balloon locations in an astonishing time of 8 hours and 52 minutes. Of course, to win in such a short time or complete the challenge at all, the MIT team did not "find" the balloons themselves. They tapped into social networks using a unique incentive structure that not only incentivized people to identify a balloon location, but also incentivized people to recruit others to the team. Their win showed the enormous potential of social networking, and also demonstrated how incentives can motivate large populations to work toward a common goal.

Social networking is already being incorporated into local safety systems. RAVEN911—the Regional Asset Verification & Emergency Network—is a multilayer mapping tool that supports emergency first response in Cincinnati, Ohio. RAVEN911 uses live data feeds and intelligence gathered through Twitter to provide details that cannot be given on an everyday geographic map, such as the location of downed electric power lines and flooded roads. Authorities are cooperating with communities in Southwestern Ohio, Southeastern Indiana and Northern Kentucky to develop and implement this emergency management system, in order to help fire departments assess the risks and potential dangers before arriving on the scene of an accident. This open source system gives emergency responders a common operating picture, to better execute time-critical activities, such as choosing evacuation routes out of flooded areas.

In addition to collecting useful data, the ability to identify patterns and trends in social networks could aid the arms control verification process. In the most basic sense, social media can draw attention to both routine and abnormal events. We may be able to mine Twitter data to understand where strange effluents are flowing, to recognize if a country has an illegal chemical weapons program or to recognize unexpected patterns of industrial activity at a missile production plant. In this way, we may be able to ensure better compliance with existing arms control treaties and regimes, such as the Chemical Weapons Convention.

Now, how could approaches such as this work, specifically in the arms control context?

Let’s just imagine that a country, to establish its bona fides in a deep nuclear reduction environment, wishes to open itself to a verification challenge, recruiting its citizens and their iPhones to help prove that it is not stashing extra missiles in the woods, for example, or a fissile material production reactor in the desert. Of course, some form of international supervision would likely be required, to ensure the legitimacy of the challenge and its procedures. And we would have to consider whether such a challenge could cope with especially covert environments, such as caves or deep underground facilities.

Sound far-fetched? Just consider that even today, tablets such as your iPad have tiny accelerometers installed – that’s what tells the tablet which way is up. But the accelerometers also have the capability to detect small shakes, like an earth tremor.

Now, imagine a whole community of tablet users, all containing an "earth shake" app, dispersed randomly around the country, and connected into a centralized network node. An individual shake could be something as simple as bumping your iPad on a table. But a whole network of tablets, all shaking at virtually the same time? That tells you that something happened; knowing where all the tablets are and the exact time they started shaking can help you to geo-locate the event. It could be an earthquake, or it could be an illegal nuclear test. Of course, other sensors and analysis would have to be brought to bear to figure out the difference.

This is called "ubiquitous sensing," that is, collecting data and basic analysis through sensors on smartphones and other mobile-computing devices. These sensors would allow citizens to contribute to detecting potential treaty violations, and could build a bridge to a stronger private-public partnership in the realm of treaty verification.

The Challenges Ahead

Of course, for any of this to work, there are technical, legal and political barriers ahead that would need to be overcome—no easy feat to be sure.

On the technical front, it would be necessary to work together to make sure nations cannot spoof or manipulate the public verification challenges that they devise. We also have to bear in mind there could be limitations based on the freedoms available to the citizens of a given country.

On the legal front, there are many questions that must be confronted about active vs. passive participation. How can we prevent governments from extracting information from citizens without their knowledge, or manipulating results collected in databases? Further, in some circumstances, how can active participants be sheltered from reproach by authorities? It may be possible, through careful handling and management, to mask sources, even if locations are public.

On the political front, we cannot assume that information will always be so readily available. As nations and private entities continue to debate the line between privacy and security, it is possible to imagine that we are living in a golden age of open source information that will be harder to take advantage of in future. In the end, the goal of using open source information technology and social networks should be to add to our existing arms control monitoring and verification capabilities, not to supersede them.

Joining Forces

Even with great ideas and fool-proof planning, another issue that we have to consider is: how do we create, organize and, when necessary, fund efforts such as these? Developing partnerships among governments, civil society groups, philanthropic organizations and private businesses will be the key to moving ahead.

We are just now starting to think about how governments can actively enlist their publics to help prove that they are in compliance with their arms control and nonproliferation obligations. To this end, on Tuesday, the U.S. Department of State launched the "Innovation in Arms Control Challenge" asking, "How Can the Crowd Support Arms Control Transparency Efforts?" We want to get ideas on if and how the everyday citizen can help support arms control transparency efforts. While the contest can only be won by U.S. citizens or permanent residents, we encourage anyone who is interested in the subject to participate.

The Future

As I said at the outset, this is not about policy; this is about coming up with the bold ideas that will shape policy in the future. As governments around the world work to enhance and expand our arms control and nonproliferation efforts, we will need your help to find new ways to use the amazing information tools at our disposal. It is increasingly apparent that we are going to need every tool we have, and many we have not yet developed or perhaps even thought of, to fulfill the Prague Agenda. We will need "sisu".

Thank you again for inviting me here to speak. I would now love to take some questions.

Calories on the brain

Calories on the brain

TRITON, NEPTUNE'S LARGEST MOON


FROM:  NASA PHOTOS
Montage: Neptune and Triton

This computer generated montage shows Neptune as it would appear from a spacecraft approaching Triton, Neptune's largest moon. The wind and sublimation eroded south polar cap of Triton is shown at the bottom of the Triton image, a cryovolcanic terrain at the upper right, and the enigmatic "cantaloupe terrain" at the upper left. Voyager 2 flew by Triton and Neptune on Aug. 29, 1989.

Credit: NASA 

Lonely and living less

Lonely and living less

'Ruimtevaart biedt kansen voor landbouw'

'Ruimtevaart biedt kansen voor landbouw'

CHILDREN WITH HIGH RISK OF DEATH FROM FLU

FROM: CENTERS FOR DISEASE CONTROL AND PREVENTION

Children with neurologic disorders at high risk of death from flu

Health care and advocacy groups join to protect children most vulnerable to influenza

A disproportionately high number of children with neurologic disorders died from influenza-related complications during the 2009 H1N1 pandemic, according to a study by scientists with the Centers for Disease Control and Prevention. The report in the journal Pediatricsunderscores the importance of influenza vaccination to protect children with neurologic disorders. CDC is joining with the American Academy of Pediatrics, Families Fighting Flu and Family Voices to spread the message about the importance of influenza vaccination and treatment in these children.


The Pediatrics study looked at influenza-related deaths in children during the 2009 H1N1 pandemic based on data submitted to CDC from state and local health departments. The number of pediatric deaths associated with 2009 H1N1 virus infection reported to CDC during the pandemic was more than five times the median number of pediatric deaths that were reported in the five flu seasons prior to the pandemic. Sixty-eight percent of those deaths occurred in children with underlying medical conditions that increase the risk of serious flu complications.


Of the 336 children (defined as people younger than 18 years) with information available on underlying medical conditions who were reported to have died from 2009 H1N1 flu-associated causes, 227 had one or more underlying health conditions. One hundred forty-six children (64 percent) had a neurologic disorder such as cerebral palsy, intellectual disability, or epilepsy. Of the children with neurologic disorders for whom information on vaccination status was available, only 21 (23 percent) had received the seasonal influenza vaccine and 2 (3 percent) were fully vaccinated for 2009 H1N1.

"We’ve known for some time that certain neurologic conditions can put children at high risk for serious complications from influenza," said Dr. Lyn Finelli, chief of the surveillance and outbreak response team in CDC’s Influenza Division. "However, the high percentage of pediatric deaths associated with neurologic disorders that occurred during the 2009 H1N1 pandemic was a somber reminder of the harm that flu can cause to children with neurologic and neurodevelopmental disorders."

"Flu is particularly dangerous for people who may have trouble with muscle function, lung function or difficulty coughing, swallowing or clearing fluids from their airways," said study coauthor and pediatrician Dr. Georgina Peacock. "These problems are sometimes experienced by children with neurologic disorders," said Peacock, of CDC’s National Center on Birth Defects and Developmental Disabilities

The most commonly reported complications for children with neurologic disorders in this study were influenza-associated pneumonia and acute respiratory distress syndrome (ARDS). Seventy-five percent of children with a neurologic condition who died from 2009 H1N1 influenza-related infection also had an additional high risk condition that increased their risk for influenza complications, such as a pulmonary disorder, metabolic disorder, heart disease or a chromosomal abnormality.

CDC is partnering with the American Academy of Pediatrics and influenza advocacy groups to help promote awareness about the importance of influenza prevention and treatment in these high risk children. Since the H1N1 pandemic, children with neurologic conditions continue to represent a disproportionate number of influenza-associated pediatric deaths. CDC, the American Academy of Pediatrics (AAP), Family Voices, and Families Fighting Flu recognize the need to communicate with care takers about the potential for severe outcomes in these children if they are infected with flu.

"Partnering with the American Academy of Pediatrics, influenza advocacy groups and family led-organizations CAN help prevent influenza in children at highest risk," said CDC Director Dr. Thomas R. Frieden.

The partnering organizations are working to coordinate communication activities with their constituents, which include parents and caregivers, primary care clinicians, developmental pediatricians and neurologists in hopes to increase awareness about flu prevention and treatment in children with neurologic disorders.

"The American Academy of Pediatrics, Families Fighting Flu and Family Voices were all natural partners when we thought about how to reach as many key people as possible with this message," Dr. Peacock adds. "The collaboration and energy around this effort has been fabulous."

"Our network of physicians is committed to influenza prevention in all children, and especially in reducing complications in those children at higher risk for experiencing severe outcomes as a result of influenza-like illness," says Robert W. Block, M.D., president of the AAP. "This coalition can more broadly engage the entire community of child caregivers to express how serious flu can be for these children. These efforts emphasize why the medical home is so important for children and youth with special health care needs."

Family Voices is a national family-led organization supporting families and their children with special health care needs. Ruth Walden, a parent of a child with special needs and president of the Family Voices Board of Directors, says, "It’s frightening to think that flu can potentially lead to so many complications or even death. We’re pleased to see organizations working together to educate families and providers about the importance of prevention."

Families Fighting Flu, an advocacy group dedicated to preventing influenza, has a long history of reaching out to families who’ve lost loved ones to flu. "Throughout the years we’ve seen firsthand how flu can affect these kids and their families’ lives. We understand that prevention is absolutely critical," explains Laura Scott, executive director of Families Fighting Flu. "Working with other groups only expands our mission of keeping kids safe throughout the flu season."

CDC recommends that everyone aged 6 months and older get an annual influenza vaccination, including people who are at high risk of developing serious complications. Flu vaccine is the best prevention method available. Antiviral drugs, which can treat flu illness, are a second line of defense against flu.

                                                     
 Photo: Flu Virus. Credit: CDC
 
 

HHS SEC. SEBELIUS ANNOUNCES NEW INVESTMENTS IN WORKFORCE

FROM: U.S. DEPARTMENT OF HEALTH ANDHUMAN SERVICES

Obama administration takes new action to improve public health
Health and Human Services (HHS) Secretary Kathleen Sebelius today announced new investments that will help strengthen the nation’s public health workforce and fight disease and illness.

"These investments are part of our work to promote public health and they will help strengthen our efforts to fight disease and illness before they happen," Secretary Sebelius said.

The initiatives include:
The Health Resources and Services Administration (HRSA) is awarding $23 million in grants to 37 Public Health Training Centers to provide training to current and future public health workers in key public health issues such as nutrition and epidemiology, and to enhance the workforce’s basic public health skills.

The Centers for Disease Control and Prevention (CDC) is providing $25 million to support fellowship programs, similar to medical residencies, and placement of fellows in state and local public health departments, as well as expanding training programs for existing public health workers, focusing on e-learning. This includes funding for 227 new fellows in contract and field positions providing necessary screening services and community education, as well as critical assistance with ongoing public health challenges.

"Public health workers are on the front lines, educating their community members and doing the hard work to ensure we stay healthy and can respond to public health challenges when they arise," HRSA Administrator Mary K. Wakefield, Ph.D., R.N., said. "These resources will help ensure they have the resources they need to do the job."

MAJOR PROBE LAUNCH TO STUDY RADIATION BELT STORMS

The identical Radiation Belt Storm Probes will follow similar orbits that will take them through both the inner and outer radiation belts. The highly elliptical orbits range from a minimum altitude of approximately 373 miles (600 kilometers) to a maximum altitude of approximately 23,000 miles (37,000 kilometers). PHOTO CREDIT: NASA

 
FROM: LOS ALAMOS NATIONAL LABORATORY
Los Alamos Provides HOPE for Radiation Belt Storm Probes

Spacecraft pair to explore mysterious region where other satellites fear to tread

LOS ALAMOS, NEW MEXICO, August 30,2012—Los Alamos National Laboratory expertise in radiation detection and shielding is poised to help a national team of scientists better understand a mysterious region that can create hazardous space weather near our home planet.

The Helium Oxygen Proton Electron (HOPE) analyzer is one of a suite of instruments that was successfully launched today as part of the Radiation Belt Storm Probe mission—an effort by NASA and the Johns Hopkins University’s Applied Physics Laboratory to gain insight into the Sun’s influence on Earth and near-Earth space by studying our planet’s radiation belt.

The radiation belt—also known as the Van Allen belt in honor of its discoverer, James Van Allen—is a donut shaped soup of charged particles that surrounds Earth and occupies the inner region of our planet’s Magnetosphere. The outer region of the belt is comprised of extremely high-energy electrons, a shower of tiny, negatively charged bullets if you will, that can easily pierce the skin of spacecraft and knock out their electrical components. Because of these hazards, spacecraft routinely avoid the region.

"Today we are boldly going where no spacecraft ever wants to go," said plasma physicist Geoffrey Reeves of Los Alamos National Laboratory’s Intelligence and Space Research Division. "We know we’re going into the riskiest of environments, so we’ve taken the greatest steps ensure the satellites can complete their mission."

Combined with its inner region of energetic protons and electrons, the Radiation Belt is thought to be a product of cosmic rays and charged particles from the Sun carried toward Earth by the solar wind. The energy of particles within the belt constantly changes, and scientists have sought for decades to understand the mechanisms underlying these fluctuations.

Some space scientists originally thought the intensity of the radiation belts was fairly predictable. Conventional thought assumed that radiation energy levels within the belt increased when the belt was hammered by a large solar storm. However, recent observations have shown that radiation energy intensifies only about half the time after a storm interacts with the belt; in fact, about one-quarter of the time, energy within the belt actually decreases on the heels of a solar drubbing, Reeves said.

"We now know that big storms do not necessarily create large amounts of radiation," he said.

Understanding the radiation belt environment and its variability has extremely important practical applications in the areas of spacecraft operations, spacecraft and spacecraft system design, and mission planning and astronaut safety.

To better observe the complex processes in the radiation belts, the RBSP mission is sending a pair of probes to circle the Earth. The probes will orbit at different speeds, allowing researchers to see subtle energy changes from dual vantage points on much shorter time scales than anything available from Earth’s surface.

The Los-Alamos-designed HOPE instrument is part of a subset of instruments aboard the craft that will directly measure near-Earth space radiation particles to understand the physical processes that control the acceleration, global distribution, and variability of radiation belt electrons and ions. One of the things that makes HOPE unique is the instrument’s ability to measure the more subtle, low-energy particles (electrons, hydrogen, and helium and oxygen ions) while under intense fire from the radiation belts’ high-energy particles.

"It’s like measuring the smallest, slowest raindrops in the eyewall of a hurricane," said Herb Funsten, principal investigator for HOPE instrument and chief engineer for Los Alamos’ Intelligence and Space Research Division. "This is a tremendously difficult measurement. We detect atoms and electrons one at a time, and we sort the atoms by their weight. We have to make sure that the high-energy electron bullets that penetrate the instrument walls don’t mess up our measurements."

The ability to successfully design and build an instrument to provide precise measurements under demanding high-energy conditions not only aids the RBSP mission, but can provide useful expertise for future intelligence applications as well.

A dozen instruments aboard the two probes will help unravel mysteries of the Van Allen Belt, but HOPE will be one of the last of the group to switch on. Because of HOPE’s sensitivity to contamination, scientists will give the spacecraft time to complete its thruster firings, and for any remaining trapped gas in the spacecraft and instrument to dissipate before HOPE begins taking measurements.

"We’ll wait for the probe to shed the rest of its spacecraft body odor before we turn on," Reeves said. "Then, all the instruments will work together to solve the radiation belt puzzle. Ultimately we want to make life better here on the ground by making sure all satellite keep working the way they are supposed to."

The RBSP mission is slated to continue for two years. Los Alamos scientists are hoping to begin having preliminary data to share with other space scientists by the end of the year if the mission experiences no complications.

 

ADDITIONAL STORY
FROM: U.S. AIR FORCE
45th Space Wing Supports NASA’s Radiation Belt Storm Probes Launch
8/30/2012 - CAPE CANAVERAL AIR FORCE STATION, Fla. -- The U.S. Air Force's 45th Space Wing provided flawless Eastern Range support for the successful launch of the NASA's Radiation Belt Storm Probes on an Atlas V rocket Aug. 30.

The launch was designed to study the Earth's Van Allen Radiation Belts and probe the influences of the Sun, according to Col. Robert Pavelko, vice commander of the 45th Space Wing.

"Understanding the radiation belt has important practical applications in the areas of spacecraft operations, design and mission planning -- all key to the mission of Air Force Space Command," said Col. Pavelko.

The launch occurred at 4:05 a.m. (EDT) from Space Launch Complex 41 at Cape Canaveral Air Force Station.

A combined team of military, government civilians and contractors from across the 45th Space Wing provided vital support to the RBSP mission, including weather forecasts, launch and range operations, security, safety and public affairs.

The wing also provided its vast network of radar, telemetry, optical and communications instrumentation to facilitate a safe launch on the Eastern Range.

This was the vice commander's first time serving as the Launch Decision Authority and he said he was thoroughly impressed by the preparation of the entire Eastern Range team to "make it happen."

"It's exhilarating to join so many gifted, hard-working teammates -- military, government civilians, and contractors -- all integral to demonstrating the 45th Space Wing is 'The World's Premier Gateway to Space!'" said Col. Pavelko.

Members of the Wing were involved throughout the process of getting the RBSP into orbit.

"What most people don't see is the amount of behind-the-scenes work that goes on among all our mission partners," said 1st. Lt. Tatiana Cornier, a member of the 5th Space Launch Squadron and on-console Atlas V flight commander for the RBSP mission.

"People around the world and here at the Space Coast see the liftoff, which is definitely my favorite part," she said, "but they don't always see all the heavy lifting that goes on prior to launch day to ensure another successful mission. It's awe-inspiring and I'm honored to be a part of this world-class team," she said.

The mission of the 45th Space Wing is one team...delivering assured space launch, range, and combat capabilities for the Nation

U.S. CAPTAIN BUILDS RELATIONSHIPS IN AFGHANISTAN

Capt. Nick Plante prepares to visit the Uruzgan provincial governors compound to visit with Afghan partners Aug. 14, 2012. (Photo by Army Spc. Nevada Jack Smith)

FROM: U.S. AIR FORCE
Through Airmen's Eyes: Captain makes mark in Afghan culture
by Army Spc. Nevada Jack Smith
117th Mobile Public Affairs Detachment

8/28/2012 - TARIN KOT, Afghanistan (AFNS)

With his rugged beard and long hair, Air Force Capt. Nick Plante is not your typical service member serving overseas in Afghanistan.

Dressed like a local national to help facilitate positive interactions with locals, Plante serves as the Afghan Hand for Multi-National Base Tarin Kot.

"The Afghan Hands program was designed to take experienced and motivated service members and use them to build relationships with Afghan partners," Plante said.

As the focus of the war in Afghanistan shifts from fighting to ensuring Afghan National Security Forces are capable of maintaining things on their own, the need for effective liaisons increases. Plante recognized this and jumped at the opportunity to work in a rarified field.

"I was set to go to a regular staff job in Germany when I saw the request come out to public affairs officers asking for volunteers. From there I just started training," Plante said.

Plante spent four months engrossed in language training and cultural seminars as well as current counter insurgency operations before deploying to Afghanistan as an Afghan Hand.

"It was very difficult to learn a different language, but I wouldn't classify it as a burden," said Plante. "Anything new is difficult, but it is what you make of it."

With the same enthusiasm for his training, Plante quickly stepped into his role and began working with the Afghanistan Peace and Re-integration Program.

The APRP is a three-phase process designed to bring former insurgents back into the community as productive members of Afghan society.


The first phase is Outreach, where local leaders put the out word that insurgents can lay down their arms and have their grievances addressed peacefully.

The second stage is Demobilization, where former insurgents register with the program and turn in their weapons.

"Finally there is community recovery, which brings small grant projects to the community, and the communities acceptance of the former insurgent," Plante said.

Plante spoke with humility about his role in the reintegration program.

"I want make it clear that the Afghans have had the success with the program and I have been honored to help them through those successes," Plante said.

With more than 100 re-integrees enrolled in the program the success speaks for itself.

"I have been here for ten months now," said Plante," and when I came here in October there was hardly any outreach; it was all centralized."

"But what the Afghans have done is help themselves. They have developed a plan and began to reach more people with the outreach program," Plante said.

Plante spoke on the lessons learned from working so closely with Afghan partners.

"To tell you the truth I think I got lucky. I think I have the best job," said Plante. "The Afghan culture, especially here in the south, is one built on respect. If you treat people here with respect you have already accomplished 70 percent of your fight."

Through partnership, Plante has seen that the battlefield isn't the only place to win.

"This job has given me a better perspective. Things are not all about killing the enemy and kinetic operations," Plante said. "When you think about counterinsurgency there are a lot of kinetics, but the APRP is an opportunity to take people off the battlefield and win the fight without bloodshed."

Plante will soon be returning home after a successful deployment.
Though Plante plans to have the typical wind down and relax time when he gets home, he is also eager to receive more training to better work with Afghans and will be attending a masters program upon his return home.

When asked about his family Plante said, "We all serve over here, but our families also sacrifice when we leave and I appreciate their support."

With just a few weeks left before he returns home Plante has been busy saying goodbye to his Afghan counterparts and though he may be leaving the country, he is also leaving a legacy through the friendships formed and goals accomplished during his stay.
Sarkhatib Mohammad Shah, Uruzgan Provincial Peace Committee Chairman, spoke of his friendship with Plante.

"Nick is a very brave and excellent person. He is more than a friend to me, he is a brother," said Shah. "He has spent a year working with us and we have accomplished so much. Though we are sad to see him go, we are happy he will get to see his family, and proud to have known him."

U.S. NAVY PHOTOS OF 9-11 ATTACK






 
FROM: U.S. NAVY
010914-N-3995K-015 New York, N.Y. (Sept. 15, 2001) -- A New York City fireman calls for 10 more rescue workers to make their way into the rubble of the World Trade Center. U.S. Navy Photo by Journalist 1st Class Preston Keres. (RELEASED)

 
 



010914-N-1350W-003 New York, N.Y. (Sept. 14, 2001) -- Rescue workers conduct search and rescue attempts, descending deep into the rubble of the World Trade Center. U.S. Navy Photo by Photographer's Mate 2nd Class Jim Watson. (RELEASED)


 



010911-N-3783H-174 Arlington, Virginia (Sept. 11, 2001) -– Smoke and flames rose over the Pentagon late into the night, following a suspected terrorist crash of a commercial airliner into the southwest corner of the Pentagon. Part of the building has collapsed meanwhile firefighters continue to battle the flames and look for survivors. An exact number of casualties is unknown. The building was evacuated, as were the federal buildings in the Capitol area, including the White House. U.S. Navy Photo by Photographer’s Mate 2nd Class Bob Houlihan (Released)

Wednesday, August 29, 2012

ISAF NEWS FROM AFGHANISTAN FOR AUGUST 28, 2012


Photo Credit:  U.S. Air Force

FROM:  U.S. DEPARTMENT OF DEFENSE

Helicopter Makes Forced Landing in Eastern Afghanistan


Compiled from International Security Assistance Force Joint Command News Releases
WASHINGTON, Aug. 28, 2012 - An International Security Assistance Force helicopter made a forced landing in eastern Afghanistan today, military officials reported.
There were no reported fatalities, and the site of the incident is secure, officials said. Initial reporting indicates that there was no enemy activity in the area at the time.
ISAF officials are assessing the circumstances to determine more facts.
In Afghanistan operations today:
-- An Afghan and coalition security force arrested a Haqqani network leader and three suspected insurgents during an operation in the Zurmat district of Paktia province. The Haqqani insurgent -- an improvised explosive device specialist -- is responsible for numerous attacks against Afghan and coalition forces, including recent attacks against Afghan forces in Zurmat.

-- A combined force arrested a Taliban leader and one other suspect in the Nahr-e Saraj district of Helmand province. The Taliban leader planned and directed IED attacks and had acquired suicide vests for attacks on Afghan and coalition forces.

-- A combined force detained multiple suspects during an operation to arrest a Taliban leader in the Zharay district of Kandahar province. The Taliban leader directs attacks against Afghan and coalition forces in the Zharay and Panjwai districts.

-- A combined force arrested a Haqqani weapons supplier and one suspected insurgent during an operation in the Pul-e Alam district of Logar province. The weapons supplier acquired weapons and IEDs for Haqqani fighters throughout the province. In the days leading to his arrest, the weapons supplier provided funds, weapons and equipment to Haqqani fighters for an upcoming attack.

In an Aug. 26 operation in the Khoshi district of Logar province, a coalition force found and destroyed 136 mortar rounds and 23 rockets.

IMAGINE'S LEADER PLEADS GUILTY TO COPYRIGHT INFRINGEMENT

FROM: U.S. DEPARTMENT OF JUSTICE

Wednesday, August 29, 2012
Leader of Internet Piracy Group "IMAGiNE"Pleads Guilty to Copyright Infringement Conspiracy
WASHINGTON – A Virginia man pleaded guilty today to conspiring to willfully reproduce and distribute tens of thousands of infringing copies of copyrighted works without permission, including infringing copies of movies before they were commercially released on DVD, Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney for the Eastern District of Virginia Neil H. MacBride and Special Agent in Charge John P. Torres of U.S. Immigration and Customs Enforcement Homeland Security Investigations (ICE-HSI) in Washington, D.C., announced today.

Jeramiah B. Perkins, 39, of Portsmouth, Va., pleaded guilty to one count of conspiracy to commit criminal copyright infringement. The plea was entered before U.S. Magistrate Judge Tommy E. Miller in the Eastern District of Virginia. At sentencing, scheduled for Jan. 3, 2013, Perkins faces a maximum sentence of five years in prison, a fine of $250,000 and three years of supervised release.

Perkins was indicted on April 18, 2012, along with three other leading members of the IMAGiNE Group, an organized online piracy group seeking to become the premier group to first release Internet copies of new movies only showing in theaters.

According to court documents, Perkins and his co-conspirators sought to illegally obtain and disseminate digital copies of copyrighted motion pictures showing in theaters. Perkins admitted he took the lead in renting computer servers in France and elsewhere for use by the IMAGiNE Group. He also admitted he registered domain names for use by the IMAGiNE Group, and opened e-mail and PayPal accounts to receive donations and payments from persons downloading or buying IMAGiNE Group releases of pirated copies of motion pictures and other copyrighted works. Perkins directed and participated in using receivers and recording devices in movie theaters to secretly capture the audio sound tracks of copyrighted movies and then synchronized the audio files with illegally recorded video files to create completed movie files suitable for sharing over the Internet among members of the IMAGiNE Group and others. Perkins also admitted the IMAGiNE Group’s conduct resulted in a readily provable and reasonably foreseeable infringement amount of more than $400,000.

Co-defendants Sean Lovelady, Willie Lambert and Gregory Cherwonik each pleaded guilty to one count of conspiracy to commit criminal copyright infringement on May 8, 2012, June 22, 2012, and July 10, 2012, respectively.

The investigation of the case and the arrests were conducted by agents with ICE-HSI. Assistant U.S. Attorney Robert J. Krask of the Eastern District of Virginia and Senior Counsel John H. Zacharia of the Justice Department Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS) are prosecuting the case. Significant assistance was provided by the CCIPS Cyber Crime Lab and the Justice Department Criminal Division’s Office of International Affairs.

This case is part of efforts being undertaken by the Department of Justice Task Force on Intellectual Property (IP Task Force) to stop the theft of intellectual property. Attorney General Eric Holder created the IP Task Force to combat the growing number of domestic and international intellectual property crimes, protect the health and safety of American consumers, and safeguard the nation’s economic security against those who seek to profit illegally from American creativity, innovation and hard work. The IP Task Force seeks to strengthen intellectual property rights protection through heightened criminal and civil enforcement, greater coordination among federal, state and local law enforcement partners, and increased focus on international enforcement efforts, including reinforcing relationships with key foreign partners and U.S. industry leaders.

This investigation was supported by the HSI-led National Intellectual Property Rights Coordination Center (IPR Center) in Washington. The IPR Center is one of the U.S. government’s key weapons in the fight against criminal counterfeiting and piracy. As a task force, the IPR Center uses the expertise of its 21 member agencies to share information, develop initiatives, coordinate enforcement actions and conduct investigations related to IP theft. Through this strategic interagency partnership, the IPR Center protects the public's health and safety, the U.S. economy and our war fighters.

U.S. DEPARTMENT OF STATE DAILY PRESS BRIEFING

http://www.google.com/url?q=http://www.addthis.com/bookmark.php&sa=D&sntz=1&usg=AFQjCNFYzDlKeLL_IMEm7XBQrYQa1f17Zg

PARALYMPIAN HEROS BEAR DOWN ON THE LONDON GAMES

FROM: U.S. DEPARTMENT OF DEFENSE

Navy Lt. Bradley Snyder, a member of the U.S. Paralympic swimming team, watches as some of his personal items are packed for shipping back to the United States as part of team processing prior to the start of the 2012 Paralympic Games in London, Aug. 28, 2012. DOD photo by Army Sgt. 1st Class Tyrone C. Marshall Jr. 
Paralympians Complete Preparations in London
By Army Sgt. 1st Class Tyrone C. Marshall Jr.
American Forces Press Service


LONDON, Aug. 28, 2012 - Members of the U.S. Paralympic team completed their team processing and remain focused amid growing anticipation for the 2012 Paralympic Games here.

The Paralympic Games, held every four years following the Summer Olympics, are a multisport event for athletes with physical, mental and sensorial disabilities.

More than 200 Paralympians, staged at the University of East London campus, are prepared to compete in 20 sporting events, including wheelchair basketball, wheelchair fencing, wheelchair rugby, swimming, shooting and sailing as they serve as American ambassadors for their respective sports.

"It's an amazing experience," said Navy Lt. Bradley Snyder, a member of the 2012 U.S. Paralympic swimming team. "It's a lot of things happening at once. It can be a little overwhelming. You come to processing and they hand you $3,000 worth of apparel and things like that. It's a lot happening at once."

Snyder, slated to swim in seven events, compared the excitement of competing in front of large crowds with his previous experience as a competitor.

"The swimming venue, I think, holds 18,000 people, so everyone's running through their heads, 'What's it going to be like to swim in front of 18,000 people?'" he said. "I was a collegiate athlete for four years [and] I swam for 12 years. I think the largest crowd I ever swam in front of was in the hundreds. To be able to go out in front of 18,000 people is going to be an amazing experience.

"It's been a challenge, I think, to ... stay focused on what we're trying to stay focused on, and at the same time, utilize the adrenaline rush we're going to have to our advantage." he added.

Michael Prout Jr., of West Springfield, Mass., also a member of the swimming team, will compete in the 100-meter butterfly, backstroke and freestyle, 200-meter individual medley and the 400-meter freestyle.

"For the past two years, I've been living out in Colorado Springs at the Olympic Training Center with the resident team out there," he said. "There's nine of us, actually, that made the Paralympic team this time around from that area. I was out there just training full-time instead of focusing on anything else. I think that is going to help out a lot."

Prout noted even though he's competed in the 2004 Paralympic Games in Athens, Greece, and in Beijing in 2008, he still feel the excitement of the approaching competition.

"It's been crazy," he said. "We've been training in Germany for the past week and a half, and we just got into the village yesterday. And we've been going back and forth trying to get training in and coming over for all the fitting of apparel.

"Today's been crazy, but it's been a lot of fun," he continued. "And we're getting so much cool stuff that I think we're all pretty overwhelmed with everything still."

The biggest thing, he said, is trying to stay focused and establishing a good routine while helping the rest of the team stay on the same page.

With 227 Paralympians processing through the campus, many needing assistance, it would be nearly impossible without volunteers such as Air Force Staff Sgt. Brandi Campbell to assist the U.S. Olympic Committee.

Campbell, who serves in an orthopedic clinic with the 48th Mission Support Group in Lakenheath, England, had such a strong desire to help that she used leave to augment three days of permissive temporary duty to help with team processing.

"An email went out to everyone to give you an option that you'd be able to choose to help with the Olympics or the Paralympics, or you could do both," she said. "I chose the Paralympics just because they work with our duty section, and to get to work with these people is a blessing.

"They're amazing," she added. "They have to overcome so much that to work with them and hear their stories, get to meet them, get to see their coaches -- I [wouldn't] trade it for anything."

Campbell said she was also excited when she learned the rugby team was from her hometown of Portland, Ore.

Part of the team processing duties, Campbell said, is passing out brand-name apparel and accessories provided by sponsors to the athletes.

"The athletes get 99 items [each]," she said. "I get to see the joy on their face when they get to see everything they get."

Campbell helps the athletes try on the apparel, and said it can take up to 20 attempts for some to get the right fit.

"But to see their face at the end of the day [and] to know that you helped them is perfect," she said.

SEC CHARGES Wwebnet, INC. AND CEO WITH MISLEADING INVESTORS

FROM U.S. SECURITIES AND EXCHANGE COMMISSION
On August 28, 2012, the Securities and Exchange Commission filed a civil action in the United States District Court for the Southern District of New York charging Wwebnet, Inc. (Wwebnet) and its chief executive officer, Robert L. Kelly (Kelly), with making material misrepresentations and omissions to investors in Wwebnet.

The SEC’s complaint alleges that, between 2005 and 2008, Wwebnet, a video software company, and Kelly made false and misleading statements and omissions to investors, including: (1) failing to disclose and misrepresentations concerning the existence of a related-party transaction, which enabled Kelly to funnel at least $2.1 million of investor funds to himself, including approximately $2 million which was sent to his personal options trading account in the Cayman Islands; (2) misrepresentations that Wwebnet had been generating revenue pursuant to contracts with entertainment companies when Wwebnet had never generated any such revenue; and (3) misrepresentations concerning Kelly’s effective compensation by failing to disclose that Wwebnet paid approximately $180,000 ($9,000 per month) in rent on Kelly’s personal luxury apartment in Manhattan.

The Complaint alleges that through these actions Wwebnet and Kelly violated Section 17(a) of the Securities Act of 1933, Section 10(b) of the Securities Exchange Act of 1934 (Exchange Act) and Rule 10b-5 thereunder, and that Kelly aided and abetted Wwebnet’s violations of the Exchange Act and is liable as a control person under Section 20(a) of the Exchange Act for Wwebnet’s violations. The SEC’s complaint seeks a final judgment permanently enjoining Wwebnet and Kelly from future violations of the federal securities laws, ordering them to pay civil penalties and disgorgement of ill-gotten gains plus prejudgment interest, and imposing a penny stock bar and an officer and director bar against Kelly.

DEPARTMENT OF JUSTICE INVESTIGATION OF ALLEGATIONS REGARDING THE ASSASSINATION OF DR. MARTIN LUTHER KING, JR.

FROM: U.S. DEPARTMENT OF JUSTICE
UNITED STATES DEPARTMENT OF JUSTICE INVESTIGATION OF
RECENT ALLEGATIONS REGARDING THE ASSASSINATION OF
DR. MARTIN LUTHER KING, JR.

In August 26, 1998, the Attorney General directed the Civil Rights Division of the United States Department of Justice, assisted by the Criminal Division, to investigate two separate, recent allegations related to the April 4, 1968 assassination of Dr. Martin Luther King, Jr. These allegations emanate from Loyd Jowers, a former Memphis tavern owner, and Donald Wilson, a former agent with the Federal Bureau of Investigation (FBI).

In 1993, 25 years after the murder, Jowers claimed that he participated in a conspiracy to kill Dr. King, along with an alleged Mafia figure, Memphis police officers, and a man named Raoul. According to Jowers, one of the conspirators shot Dr. King from behind his tavern.

Wilson alleged in 1998 that shortly after the assassination, while working as an FBI agent, he took papers from the abandoned car of James Earl Ray, the career criminal who pled guilty to murdering Dr. King. Wilson claims he concealed them for 30 years. Some of the papers contained references to a Raul (the alternate spellings, Raoul and Raul, are discussed in Section I) and figures associated with the assassination of President John F. Kennedy. According to Wilson, someone who later worked in the White House subsequently stole the other papers he took from Ray's car, including one with the telephone number of an FBI office.

Both the Jowers and the Wilson allegations suggest that persons other than or in addition to James Earl Ray participated in the assassination. Ray, within days of entering his guilty plea in 1969, attempted to withdraw it. Until his death in April 1998, he maintained that he did not shoot Dr. King and was framed by a man he knew only as Raoul. For 30 years, others have similarly alleged that Ray was Raoul's unwitting pawn and that a conspiracy orchestrated Dr. King's murder. These varied theories have generated several comprehensive government investigations regarding the assassination, none of which confirmed the existence of any conspiracy. However, in King v. Jowers, a recent civil suit in a Tennessee state court, a jury returned a verdict finding that Jowers and unnamed others, including unspecified government agencies, participated in a conspiracy to assassinate Dr. King.

Our mission was to consider whether the Jowers or the Wilson allegations are true and, if so, to detect whether anyone implicated engaged in criminal conduct by participating in the assassination. We have concluded that neither allegation is credible. Jowers and Wilson have both contradicted their own accounts. Moreover, we did not find sufficient, reliable evidence to corroborate either of their claims. Instead, we found significant evidence to refute them. Nothing new was presented during King v. Jowers to alter our findings or to warrant federal investigation of the trial's conflicting, far-ranging hearsay allegations of a government-directed plot involving the Mafia and African American ministers closely associated with Dr. King. Ultimately, we found nothing to disturb the 1969 judicial determination that James Earl Ray murdered Dr. King or to confirm that Raoul or anyone else implicated by Jowers or suggested by the Wilson papers participated in the assassination.

I. SUMMARY OF THE FINDINGS OF THE INVESTIGATION

This report documents the findings of our investigation. Our conclusions are based on over 200 witness interviews, scientific testing and analysis of relevant documentary evidence, and review of tens of thousands of pages of records, including the files and papers from four previous official investigations, related litigation including King v. Jowers, private parties, and the media.

After original investigation and analysis of the historical record, we have concluded that neither the Jowers nor the Wilson allegations are substantiated or credible. We likewise have determined that the allegations relating to Raoul's participation in the assassination, which originated with James Earl Ray, have no merit. Finally, we find that there is no reliable evidence to support the allegations presented in King v. Jowers of a government-directed conspiracy involving the Mafia and Dr. King's associates. Accordingly, no further investigation is warranted.

 

A. Findings Regarding Jowers' Allegations

At the time of the assassination, Loyd Jowers owned and operated Jim's Grill, a tavern below the rooming house where James Earl Ray rented a room on April 4, 1968. Until 1993, Jowers maintained in several public statements that he was merely serving customers in his tavern when Dr. King was shot. He did not claim any involvement in the assassination or significant knowledge about it.

In December 1993, Jowers appeared on ABC's Prime Time Live and radically changed his story, claiming he participated in a plot to assassinate Dr. King. According to Jowers, a Memphis produce dealer, who was involved with the Mafia, gave him $100,000 to hire an assassin and assured him that the police would not be at the scene of the shooting. Jowers also reported that he hired a hit man to shoot Dr. King from behind Jim's Grill and received the murder weapon prior to the killing from someone with a name sounding like Raoul. Jowers further maintained that Ray did not shoot Dr. King and that he did not believe Ray knowingly participated in the conspiracy.

Since his television appearance, Jowers and his attorney have given additional statements about the assassination to the media, the King family, Ray's defenders, law enforcement personnel, relatives, friends, and courts. Jowers, however, has never made his conspiracy claims under oath. See
Section IV.C.1.a. In fact, he did not testify in King v. Jowers, despite the fact that he was the party being sued. The one time Jowers did testify under oath about his allegations in an earlier civil suit, Ray v. Jowers, he repudiated them. Further, he has also renounced his confessions in certain private conversations without his attorney. See Section IV.C.1.b. For example, in an impromptu, recorded conversation with a state investigator, Jowers characterized a central feature of his story -- that someone besides Ray shot Dr. King with a rifle other than the one recovered at the crime scene -- as "bullshit." Consequently, Jowers has only confessed in circumstances where candor has not been required by law or where he has not been required to reconcile his prior inconsistencies.

When Jowers has confessed, he has contradicted himself on virtually every key point about the alleged conspiracy. See Section IV.C.2. For example, he not only identified two different people as the assassin, but also most recently claimed that he saw the assassin and did not recognize him. Jowers also abandoned his initial allegation that he received $100,000 with which he hired a hit man to kill Dr. King, claiming instead that he merely held the money for the conspirators. Additionally, Jowers has been inconsistent about other aspects of the alleged conspiracy, including his role in it, Raoul's responsibilities, whether and how Memphis police officers were involved, and the disposal of the alleged murder weapon.

Equally significant, the investigative team found no credible evidence to support any aspect of Jowers' varied accounts. See Section IV.D. There is no corroborating physical evidence, and the few isolated accounts allegedly supporting Jowers' claims are either unreliable or unsupportive. At the same time, there is evidence to contradict important elements of Jowers' allegations. For instance, investigators did not find a trail of footprints in the muddy ground behind Jim's Grill after the murder, undermining Jowers' claim that the assassin shot Dr. King from that location and brought the rifle to him at the backdoor. Similarly, there is substantial evidence establishing that the assassin actually fired from the bathroom window of the rooming house above Jim's Grill.

The genesis of Jowers' allegations is suspect. See
Section IV.F.1. For 25 years following the assassination, Jowers never claimed any specific involvement in or knowledge of a conspiracy. It was not until 1993, during a meeting with the producer of a televised mock trial of James Earl Ray, that Jowers first publicly disclosed the details of the alleged plot, including the names of the purported assassin and other co-conspirators. He also initially sought compensation for his story, and his friends and relatives acknowledge that he hoped to make money from his account.

Jowers' conduct also undermines his credibility. He refused to cooperate with our investigation. See Section IV.E. Even though he repeatedly confessed publicly without immunity from prosecution, he was unwilling to speak to us without immunity. We were willing to consider his demand, but he refused to provide a proffer of his allegation, a standard prerequisite for an immunity grant, particularly where a witness has given contradictory accounts. His failure to provide a proffer demonstrates that he was unwilling to put forth a final, definitive version of his story. It further suggests he is not genuinely concerned about obtaining protection from prosecution, but instead has sought immunity merely to lend legitimacy to his otherwise unsubstantiated story.

From the beginning, Jowers' story has been the product of a carefully orchestrated promotional effort. See
Section IV.F.2. In 1993, shortly after the HBO television mock trial, Jowers and a small circle of friends, all represented by the same attorney, sought to gain legitimacy for the conspiracy allegations by presenting them first to the state prosecutor, then to the media. Other of Jowers' friends and acquaintances, some of whom have had close contact with each other and sought financial compensation, joined the promotional effort over the next several years. For example, one cab driver contacted Jowers' attorney in 1998 and offered to be of assistance. Thereafter, he heard Jowers' conspiracy allegations, then repeated them for television and during King v. Jowers. Telephone records demonstrate that, over a period of several months, the cab driver made over 75 telephone calls to Jowers' attorney and another 75 calls to another cab driver friend of Jowers who has sought compensation for information supporting Jowers' claims.

In summary, we have determined that Jowers' claims about an alleged conspiracy are materially contradictory and unsubstantiated. Moreover, Jowers' repudiations, even under oath, his failure to testify during King v. Jowers, his refusal to cooperate with our investigation, his reported motive to make money from his claims, and his efforts along with his friends to promote his story all suggest a lack of credibility. We do not believe that Jowers, or those he accuses, participated in the assassination of Dr. King.

 

B. Findings Regarding Wilson's Allegations

Unlike Jowers, Donald Wilson, a former agent with the FBI, does not make any claims about who assassinated Dr. King. Rather, in March 1998, he revealed that for the past 30 years he had been concealing evidence that might be relevant to the crime. Wilson alleged that in April 1968, as an FBI agent of less than a year, he went to the scene where Ray's Ford Mustang had been abandoned in Atlanta, Georgia. Once there, Wilson purportedly opened the Mustang's door and a small envelope containing several papers fell out. According to Wilson, he took the papers, hid them, and told no one about them for 30 years.

Dr. William Pepper, then Ray's lawyer, publicly disclosed Wilson's revelation at a press conference. Immediately before the press conference, Wilson told his story to the District Attorney in Atlanta and expressed a strong interest in providing the documents to the Department of Justice for a full investigation.

It was not until six months later that our investigation ultimately obtained the only two documents Wilson maintained he still had. One of the documents is a portion of a torn page from a 1963 Dallas telephone directory. It has handwritten entries and information associated with President Kennedy's assassination, including the telephone numbers of Jack Ruby, the man who murdered Lee Harvey Oswald, and the Hunt family, who some have alleged was involved in the President's murder. The other document is a piece of paper that has two handwritten columns of notations, the first of words and the second of numbers, neither of which appears to have a connection to Dr. King's assassination. Both documents have handwritten entries with the name Raul. See
Attachment 1, photostatic copies of the documents provided by Wilson.

Wilson has given materially inconsistent accounts about the documents and his discovery of them. See Section V.C. Most significantly, six months after telling the District Attorney in Atlanta, as well as the King family, Ray's attorney, and the media, that he had found four documents -- the two documents we ultimately obtained and two business cards we have never seen -- Wilson advised us that he actually took a significant, but previously undisclosed, fifth document from Ray's car. Wilson reported that the additional document had the telephone number of the FBI Atlanta field office where he worked, but he never explained his initial failure to reveal its alleged existence. He also gave contradictory stories about when he first looked at the documents, when he realized their significance, and whether and which documents were allegedly later stolen from him.

We found nothing to substantiate any of Wilson's varied claims about his discovery of the documents. At the same time, we found significant, independent evidence to contradict key aspects of his accounts. See Section V.D. For example, photographic evidence and expert opinion establish that the passenger-side door of the Mustang was closed and locked when the FBI was at the scene, not ajar and unlocked as Wilson claimed. Further, we found no evidence to corroborate Wilson's claims that he was at the scene of the Mustang's recovery, opened its door, or took the documents.

Scientific analysis of the documents obtained from Wilson could not resolve two critical questions presented by his allegation -- whether the documents came from Ray's car in 1968 and who authored them. See Section V.F. At the same time, analysis of the torn telephone page suggests that a handwritten notation in its margin may have been written to create the false impression that Ray was in possession of Raul's telephone number and that the assassinations of Dr. King and President Kennedy are connected. See
Sections V.F.2.d. and G.

Important aspects of Wilson's account are implausible. See Sections V.E. and G. For instance, it is improbable that a torn page from a 1963 Dallas telephone directory linking the assassinations of Dr. King and President Kennedy would have been in Ray's car in 1968 or have fortuitously fallen out when Wilson allegedly opened the door. The paper has the telephone number of Jack Ruby, which was disconnected shortly after he shot Oswald in 1963, and Ray was in jail from 1960 until 1967. In addition, we found no credible evidence linking Ray to Jack Ruby or connecting the assassinations of President Kennedy and Dr. King.

The possibility that the documents actually came from Ray's car is even more remote since Ray himself did not remember them. Indeed, Ray had the most to gain from Wilson's revelation since the documents would have been the only physical evidence in 30 years to support his claim that Raoul existed. Nonetheless, he declined to confirm that the papers came from his car. See Section V.I.

It is equally implausible that a newly trained agent like Wilson, who joined the FBI because of his concern for civil rights, would have chosen to tamper with Ray's car, confiscate evidence, and potentially compromise the search for Dr. King's murderer. Wilson's claim that he concealed information potentially implicating the FBI for 20 years after he terminated his career as an agent and then again when he made his initial public disclosure in March 1998 is also particularly suspicious in light of his professed disdain for the FBI. See Section V.E.

Wilson's account is finally undermined by his failure to cooperate fully with our investigation. See Section V.J. Within days of his public disclosure in March 1998, he withdrew his offer to provide the documents to the Department of Justice. In September 1998, when he met with attorneys from our investigative team, he again refused to relinquish the original documents until the execution of a search warrant was imminent. Wilson also repeatedly refused to provide information that he claimed could lead to the recovery of the documents he says were stolen from him. Ultimately, once we provided an offer of immunity in response to his expressed concerns about prosecution, he cut off all communication. Accordingly, Wilson's resistance to assisting our investigation belies his public appeal for a thorough investigation by the Department of Justice.

Based upon an assessment of Wilson's conduct, his inconsistent statements, and all other available facts, his claim that he discovered papers in Ray's car is not credible. Accordingly, we have concluded that the documents do not constitute legitimate evidence pertaining to the assassination.

 

C. Findings Regarding Raoul

The name Raoul, or Raul, is central to both the Jowers and the Wilson allegations, as well as James Earl Ray's claims of innocence. Jowers contends that he conspired with Raoul, and two of the Wilson documents include the name Raul. Ray, soon after pleading guilty, claimed that someone he knew only as Raoul lured him to Memphis and framed him by leaving a rifle with his fingerprints at the crime scene. As a result, we reviewed the numerous past allegations regarding the identity of Raoul and investigated the most recent accusation about Raoul's identity.

Initially, the alternate spellings, Raoul and Raul, may have significance. For over 25 years following the assassination, James Earl Ray, his defenders, and others consistently referred to the man who allegedly framed Ray as Raoul. In the mid-1990s, Ray's defenders changed the spelling to "R-A-U-L" when they believed that a man living in New York state, whose first name is Raul, was the Raoul described by Ray.
(1) Ray's attorneys then added the New York Raul as a defendant to a false imprisonment lawsuit brought by Ray against Jowers. The documents Wilson produced a few years later also utilized the same post-1995 spelling of Raul. See Section VI.C.2.

A review of the historical record reveals that, during the 30 years following the assassination, numerous individuals have been erroneously identified as Raoul. Those who have been falsely accused do not share common characteristics or necessarily possess any of the physical characteristics Ray attributed to Raoul. See Section VI.B.

Moreover, the man most recently accused of being Raoul -- the Raul from New York state -- was not connected to the assassination. The methods used to identify the New York Raul and the witnesses identifying him, who include Ray and Jowers, are unreliable. In addition, at the time the New York Raul allegedly planned and participated in the assassination, he could not speak English, was employed full-time with a major corporation, and was often seen in a tightly-knit, Portugese community. See
Section VI.C.3.

More than 30 years after the crime, there still is no reliable information suggesting Raoul's last name, address, telephone number, nationality, appearance, friends, family, location, or any other identifying characteristics. The total lack of evidence as to Raoul's existence is telling in light of the fact that Ray's defenders, official investigations, and others have vigorously searched for him for more than 30 years. The dearth of evidence is also significant since Ray often claimed that he was repeatedly with Raoul in various places, cities, and countries, and many of Ray's associations unrelated to the assassination have been verified. See Section VI.D.

Because the uncorroborated allegations regarding Raoul originated with James Earl Ray, we ultimately considered Ray's statements about him. Ray's accounts detailing his activities with Raoul related to the assassination are not only self-serving, but confused and contradictory, especially when compared to his accounts of activities unrelated to the assassination. Thus, Ray's statements suggest that Raoul is simply Ray's creation. See Section VI.E.

For these reasons, we have concluded there is no reliable evidence that a Raoul participated in the assassination.

D. Findings Regarding The King v. Jowers Conspiracy Allegations

King v. Jowers was a civil lawsuit in a Tennessee state court brought by King family members against Loyd Jowers for the wrongful death of Dr. King. The trial concluded in December 1999. The jury adopted a verdict offered by the parties finding that Jowers and "others, including government agencies" participated in a conspiracy to assassinate Dr. King. The trial featured some, but not all, of the information already considered by our investigation. Significant evidence from the historical record and our original investigation that undermines the credibility of Jowers' allegations was not presented. Nothing offered during the trial alters our conclusion regarding Jowers' or Wilson's allegations.
(2)

The trial also featured a substantial amount of hearsay evidence purporting to support the existence of various far-ranging, government-directed conspiracies to kill Dr. King. Witness testimony and writings related secondhand or thirdhand accounts of unrelated, and in some cases, contradictory conspiracy claims. For example, an unidentified person who did not testify alleged in an out-of-court deposition, which was read to the jury, that he participated in a conspiracy to assassinate Dr. King initiated by the President and Vice President of the United States and the head of the AFL/CIO labor union. Unrelated to that claim, the notes of an interview of an unidentified source, which were written by a journalist who did not testify, purported to document a claim that a military team was conducting surveillance of Dr. King and actually photographed the assassination.

Significantly, no eyewitness testimony or tangible evidence directly supported any of the conflicting allegations of a government-directed conspiracy. The only relevant non-hearsay eyewitness accounts presented at the trial suggest nothing more than the possibility that Dr. King, like other civil rights activists who were the subjects of government surveillance in the 1960s, may have been watched by military personnel around the time of the assassination. However, we found nothing to indicate that surveillance at any time had any connection with the assassination.

Critical analysis of the hearsay allegations in light of significant information that was not introduced at the trial demonstrates that the none of the conspiracy claims are credible. No evidence corroborated the various allegations and other information contradicted them. For instance, in the case of the interview notes of a source claiming that his military surveillance team witnessed and photographed the assassination, we found nothing to substantiate the allegation but, rather, information to contradict it. The journalist who wrote the notes also told us that he did not credit the source or his story. See
Section VII.B.3.d.

Other evidence introduced in King v. Jowers suggested the existence of yet another conspiracy apparently unrelated to the alleged government-directed conspiracies. In this regard, witnesses testified offering observations and hearsay accounts implying that two African American ministers associated with Dr. King were part of a plot to kill him.

The allegations against the African American ministers are far-fetched and unpersuasive. Additionally, we found no information during our investigation of the Jowers and Wilson allegations or our review of the historical record to substantiate these claims, while significant information, not introduced at the trial, contradicts them. See Section VII.C.

In sum, the evidence admitted in King v. Jowers to support the various conspiracy claims consisted of inaccurate and incomplete information or unsubstantiated conjecture, supplied most often by sources, many unnamed, who did not testify. Because of the absence of any reliable evidence to substantiate the trial's claims of a conspiracy to assassinate Dr. King involving the federal government, Dr. King's associates, Raoul, or anyone else, further investigation is not warranted.

E. Findings Of Earlier Official Investigations
Our findings are consistent with the conclusions reached by prior official investigations. A 1977 Department of Justice Task Force found "no evidence of the complicity of the Memphis Police Department or the FBI" in the assassination of Dr. King. It also concluded that Ray's assertions that someone else shot Dr. King were "so patently self-serving and so varied as to be wholly unbelievable." In 1979, a congressional investigation by the House Select Committee on Assassinations (HSCA) arrived at similar conclusions, additionally finding that one or both of James Earl Ray's brothers might have been his accomplices and that two racist St. Louis businessmen, who were dead by the time the HSCA probe began, may have put up a bounty for Dr. King's murder.

In 1998, the Shelby County, Tennessee District Attorney General completed a four-year investigation of the early versions of Jowers' allegations and concluded that "there is no credible evidence that implicates Loyd Jowers for the murder" of Dr. King. That investigation further determined that the Raul from New York, whose photograph was identified by Jowers, Ray, and others, was not connected to the assassination. Earlier, in 1997, a Shelby County Grand Jury also concluded that there was no credible evidence to justify investigation of any of Jowers' claims.

Search This Blog

Translate

White House.gov Press Office Feed