Military Police Document Reveals Integration with Local Law Enforcement

Kurt Nimmo
May 8, 2009

On May 5, the WikiLeaks website posted a document entitled “Concept of Operations for Police Intelligence Operations” produced by the U.S. Army and dated March 4, 2009. The 60 page PDF is a “For Official Use Only” intelligence manual from the U.S. Army’s Military Police School.

featured stories   Military Police Document Reveals Integration with Local Law Enforcement  
  Click on image to read the document in PDF.

“PIO [Police Intelligence Operations] supports the homeland defense goals of detecting, deterring, preventing and defeating threats and attacks,” the document states. “PIO supports the range of homeland defense operations and civil support protection capabilities. A CONUS [Contiguous United States] based PIO network that is integrated with local, country, tribal, state and federal, law enforcement entities will ensure a federated approach to enable a unified effort for defense support to civil authorities (DSCA) [Defense Support of Civil Authorities] as well as support (within legal constraints) development and exchange of data assisting in the production of watch lists that deny adversaries access to the homeland, fixed installations/facilities, or expeditionary forces in-transit.”

In short, the document explains how the U.S. military, in violation of the Posse Comitatus Act, has “integrated” with local law enforcement under the rubric of the GWOT, or so-called Global War on Terrorism. It stresses the need for military police to collect “information that identifies trends, patterns and associations that indicate a possible nexus disrupting or targeting Army operations” within the United States. The “criminal intelligence produced from this analysis should be focused on future coordination” with local law enforcement, again a direct violation of Posse Comitatus.

In 2005, NBC revealed the existence of a DoD database containing information on the antiwar activities of American citizens. “A secret 400-page Defense Department document obtained by NBC News lists the Lake Worth meeting as a ‘threat’ and one of more than 1,500 ’suspicious incidents’ across the country over a recent 10-month period,” Lisa Myers, Douglas Pasternak, and Rich Gardellareported on December 14, 2005. “Other documents obtained by NBC News show that the Defense Department is clearly increasing its domestic monitoring activities.”

According to Robert Dreyfuss, writing for Rolling Stone, the Pentagon has assembled a nationwide domestic spying machine that rivals the NSA’s warrantless surveillance of telephone and email traffic. “Operating in secret, the Defense Department is systematically gathering and analyzing intelligence on American citizens at home — and a new Pentagon agency called Counterintelligence Field Activity (CIFA) is helping to coordinate the military’s covert efforts with federal, state and local law enforcement agencies.” The Pentagon insists the effort is aimed at preventing another attack by al-Qaeda, but as Dreyfuss notes “the military’s efforts at domestic spying have caught few, if any, terrorists.”

In 2008, in response to negative publicity, the Pentagon’s illegal CIFA unit was shuttered, or so the media was told. CIFA maintained a databased called TALON, short for Threat and Local Observation Notice. An ACLU Freedom of Information Act lawsuit in 2006 revealed that the Department of Homeland Security, the FBI’s Joint Terrorism Task Force and local police departments had supplied the Pentagon with information that aided intelligence operations against the antiwar movement.


It is not merely the antiwar movement the feds and the military are spying on. During the Tea Party antitax protests held last month, a number of people reported the presence of DHS’ Federal Protective Service at the rallies. “The Department of Homeland Security has an important public safety mission,” says spokesman Russ Knocke. “In a post 9/11 world, I think the public would be comforted to know that part of our mission is to maintain situational awareness of possible vulnerabilities to public safety or even security, such as, for instance, at large public gatherings. The department will, as a routine matter, maintain situational awareness of large public gatherings and share that with state and local partners.”

As it turns out, CIFA was not closed down. It was outsourced to QinetiQ, a major British-owned defense and intelligence contractor based in McLean, Virginia. “Pentagon ‘outsourcing’ of intelligence operations to corporations provide yet another layer of ‘plausible deniability’ to the DoD as it wages the administration’s odious ‘war on terror’ against the American people,” writes Tom Burghardt.

During the Republican National Convention, military intelligence teamed up with federal, state, and local law enforcement to violate the civil liberties of Americans and disregard Posse Comitatus. In late 2008, WikiLeaks posted a DHS document detailing how security forces worked together during the RNC. Many federal, state and local organizations are mentioned in this document and a number of these agencies are military based. NORTHCOM figures prominently in the document (see Did Feds Use Military Intelligence to Spy On RNC Protesters? where there is a link to the DHS document).

The “Concept of Operations for Police Intelligence Operations” document is instrumental because it provides additional information on how this “theater of operation” network operates. Intelligence “fusion cells,” the document explains, are now more prevalent in “operational environments” and these cells enable “commanders to have a ’see, decide and act’ advantage over criminal networks, terrorist groups, cells, and individuals [as noted above, consisting primarily of American citizens opposed to government policies] by ensuring police information and police intelligence is integrated as vital pieces of the overall battlefield visualization.”

As documented on the Infowars and Prison Planet website and covered by Alex Jones on his nationally syndicated radio show, military collaboration with local law enforcement has increased substantially since the false flag terror attacks of September 11, 2001. Most recently, military police have patrolled civilian events such as the Kentucky Derby and the Boston Marathon. DHS, federal agencies, and military police have participated in illegal (under Posse Comitatus) checkpoints in Tennessee, California, Texas, and elsewhere. These operations are designed primarily to acclimate the populace to the presence of uniformed and armed soldiers in our midst — in essence, a standing army — a notion completely antithetical to the sensibilities of the founders.

The “Concept of Operations for Police Intelligence Operations” document is another indication that the military is in the process of incrementally imposing a military dictatorship by stealth in the United States under cover of the bogus GWOT. As then General Tommy Franks told Cigar Aficionado magazine in December, 2003, the next terrorist attack will result in a cancellation of the Constitution and the imposition of a military dictatorship.

The next terrorist attack will be pulled off by the same people as the first one — not a distant organization of patsies and dupes created by the CIA and hiding out in caves, but forces within the shadow government. Before this can happen, however, the military and police state apparatus must be in order. “Concept of Operations for Police Intelligence Operations” provides us with another glimpse of the operational plans now underway.


About Audio Prison

More to follow ...

Posted on May 10, 2009, in Uncategorized. Bookmark the permalink. 2 Comments.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: