Category: BureauFest Destiny: Mission Creep in the Bureaucracy

War in the middle east. It’s happening again for the United States (lets see, this will be the first, second, third, fourth, no fifth intervention in the U.S. since 9/11/01). First we went into A-stan, then Iraq, fooled around during the Spring in Egypt and Libya. In an unprecedented (am I kidding?) turn of events, the government refused to back a legitimate people-led revolt in Iran, even though we know that of all middle-eastern countries, Persia/Iran’s youth are the most pro-western. Now folks are bringing out the drummer boys to get ready to rock and roll into Syria.  Why?

Why is a good question. Officials claim we must intervene because Assad used chemical weapons that killed his own people. To be exact, 150 were killed with chemical weapons. In a war where 93,000 have died from good ol’ n0-intervention-necessary bullets and rockets. So predictable though- we are going to go there, establish a no-fly zone, and most likely have boots on the ground within 6 months. How do I know? We have history to thank for that, and the fact that Congress tipped their hand when they suddenly cared about 150 people/93,000.

The history I refer to is the tendency of wars to give in to Mission Creep. It’s what happens when one day you decide your garage is no longer going to store your car, but instead protect your gym equipment. A year later you have a full-on mancave with a minibar, flat screen tv, a couch, and a pool table.

Mission Creep matters as the U.S. has a history of doing this with it’s wars, going back to the Spanish American war in 1898 (we can go further, but lets stay somewhat focused). Here are a couple of wars (I did not include our minor interventions) over the last 115 years, with a short blurb on the mission creep that happened.

  • Spanish American War:what started over a spat in Cuba (where the Cubans wanted independence from Spain) ended up with the United States obtaining colonial authority over Puerto Rico, Guam, and the Philippines, effectively making the United States an empire. For roughly 50 years we were still well entrenched in Cuban domestic affairs, and the Philippines became independent in 1946. Notice that we are still occupying Guam, and holding Puerto Rico as territories to this day.
  • World War I: the United States started out bankrolling both sides. While most are told we went to war because the Germans sunk a (British) ship and killed Americans, we had been bankrolling the Brits and supplying arms under the table for a long time, and some dead Americans on foreign ships made a good excuse to go all in.
  • World War II: started out as a war to liberate and conquer, ended up with the United States nation-building, setting up alliances, providing for the defense of Europe, and never leaving. Even after The Wall came down.
  • Korea: started as an international effort to block communist expansion, ended up with the United States pulling border security 60 years later.
  • Vietnam: started out with aid to South Vietnam and patrolling the Gulf of Tonkin. One day in 1964 some communist “patrol boats” attacked the USS Maddox. Two days later it was alleged the US Navy was attacked again, although declassified reports now say it was completely made up. At that point it was time for WAR, and 9 years later we were evacuating tens of thousands of refugees while Saigon fell, and 60,000 Americans lay dead because the United States was too cowardly to actually cross into North Vietnam and hit the enemy at home.
  • Iraq I: what started as a liberation party ended up as a 12 year operation to maintain no-fly zones, while watching thousands of Iraqis get killed (ones that we promised to back up if they revolted against Saddam- notice the difference between then and now).
  • Iraq II: started out as an operation to find WMD, get it out of the area, and shut down the torture chambers. A decade later we have wasted billions on setting up a government that now has a security agreement with Iran to fight against the United States in the event of war. Thanks W.
  • Afghanistan: same as Iraq, except we had a real reason to go there- they attacked us. At first we were supposed to topple the Taliban and Al Qaeda (the same Al Qaeda we are funding and arming in Egypt, Libya, Syria, and probably the next country to go up in flames). Then we were supposed to democratize the country. Now we are trying to build an economy with modern infrastructure, along with the workings of a modern bureaucratic system where the unbroken tradition for thousands of years was to deal with issues at the tribal level, and to kill all dissenters. Its working out well (sarcasm).

So sleep well knowing that this has happened before, and one day your grand child will be patrolling the same land you fought on, fighting the same battle, and that nothing will change. Its your fault too, since you keep on electing these people.


A recent poll has found that Fifty-seven percent (57%) of voters nationwide “believe it is likely the NSA data will be used to harass political opponents. So far the NSA has not commented as to whether or not they have queried data to confirm that statistic.

Is this a baseless concern? Over at CBS, reporter Sharyl Attkisson’s computer was discovered to have been hacked. According to CBS, “forensic analysis revealed an intruder had executed commands that appeared to involve search and [removal] of data. This party also used sophisticated methods to remove all possible indications of unauthorized activity, and alter system times to cause further confusion.

If you recall, Attkisson was the one that pressed the administration on Operation Fast and Furious and Benghazi. Certainly one could say she was an enemy of the administration, and anyone else trying to keep stones from being turned over.

The Technical Side of Storing Personal Data

Forget about the who, what, and why for a moment, and lets focus on the how. It seems impossible that the government can track your IP address, telephone, history of snail mail use, along with comments posted on the internet. But it is not. Numerous banks, companies, and foundations use constituent database programs that have thousands of functions, and are designed to collect data on every part of your life. In fact, state and federal government law makers use constituent contact systems that provide information of all those in their districts. (The government programs go off of voting registration records and public documents filed).

Using databases like Lexis, an organization can use a program offered by a company like Blackbaud to store any available information about a potential, or current donor/constituent. Nearly every foundation, university, and charity does this in through their development arm. Why? It allows them to exploit information when they make calls or visits to gather money. It’s a pretty basic marketing technique- appeal to your client’s interest, and stroke their ego. Make them feel important.

What does that have to do with the NSA? Easy- the technology exists for one mass database to exist, whereby information from various sources and agencies can be imported. Here is how the operation would look like

  • Each person would have an individual file based on a unique identifier, which is easy due to the common usage of social security and drivers’ license numbers.
  • The database fields would be pre-programmed/coded to file certain information under various tabs. For instance, in each person’s record, there could tabs or sections relating to phone records, email records, snail mail records, etc.
  • An agency regularly imports information to the program, which uses the coding to sort the data and file it into its appropriate record.
  • When a person is flagged as suspicious, all that is left is to query information relating to that person, and then you have everything on that individual.

One big problem is how this is done at a massive scale, with massive amounts of information, and performed regularly. That’s a big hump to overcome, but it seems that data centers in Utah are meant to solve that problem. The fact remains is that this data is being collected, but we don’t know how its being organized, if at all. Even if it is not organized, the data can still be queried using known information about the person, which means they will search through all their files for information that matches what they put in the search box. That takes a lot of processing power and time, but its possible.

A Long History of the Establishment Spying on Opponents

Many have heard about COINTELPRO, and the activities the Nixon administration took against political dissidents. What many don’t know is that the FBI had throughout its history documented dissident political groups, and for 15 years operated the counter intelligence program, a series of projects collectively referred to as COINTELPRO. While some organizations under FBI scrutiny were legitimate threats, such as the SDS, scrutiny was used under Nixon to undermine opponents of not only his administration, but of the political establishment. In investigating the FBI, the Church committee also revealed that the anti-communist John Birch Society and Christian Action Council were among targeted organizations.

Between 1960 and 1974, over on one million Americans were being spied on by the FBI, and of 500,000 “subversives” that were investigated, there was not one court conviction. In one year alone, the FBI had opened 65,000 domestic files. Fast-forward to present day, and we see that not only has the government continued to carry out these programs, but they have clearly amplified the amount of scrutiny and harassment they are willing to openly commit upon the citizens of this nation.

In light of the PRISM program, the government spying on varying news agencies including AP, and the IRS scandals, we can determine that there is something awry.  It seems as if the political establishment has grown accustomed to spying on their rivals, even using official means to do so when in power.

It is quite normal for political groups to keep tabs on each other., a project of People for the American Way, keeps track of over 600 conservative organizations, news site, committees, etc., as well as over 1,000 government officials, sports stars, and private citizens. Media Matters has also made graphics of the interconnectedness of the conservative movement, while Glenn Beck is famous for his research on the interconnectedness of organizations on the left.

There is one difference: the left has power, controls the Presidency, has the majority and controls the leadership in the Senate, and controls the leadership of the minority in the House. They also control the bureaucracy, which includes the NSA, CIA, FBI, DOJ, DHS, EPA and the IRS. Keep in mind they control the unions that staff these agencies. Did I forget to mention the left-wing’s control of our universities? Of the aforementioned agencies, two have direct evidence implicating them in acquiring and releasing private information of citizens to leftist groups.  The others are known to keep records on the activities of all Americans, including: phone calls, emails, facebook and twitter posts.

Not only are conservatives being targeted, but so are those on the left. In fact, the ACLU has just filed suit against the FBI on behalf of AntiWar, alleging that the FBI had spied on its editors. Back in 2006, the ACLU also sued the FBI for spying on members of the anti-war Thomas Merton Center for Peace & Justice, based solely on their political stances. However, these organizations are secondary targets which broke rank with the Obama agenda.

The true primary targets are the conservative organizations that not only oppose this administration, but are also opposed to the political elites in Washington, and the programs instituted by many (and most) high level bureaucratic agencies. In their first step to identify targets, in 2009 the Department of Homeland Security under Secretary Janet Napolitano labeled as potential domestic terrorists “right wing extremists,” which comprised of veterans, supporters of limited government, the constitution, and those opposed to abortion and immigration.

Now we know the IRS targeted 300 conservative and right leaning grass-roots organizations, as well as their donors.  In their request forms, the IRS had asked for lists of donors, the employment histories for current employees and along with their families, and even of their former interns. The Leadership Institute alone provided over 23,000 pages of documents over one year in order to comply with IRS requests.

In all, we know that the government has a history of targeting political dissidents, and that the current government has hundreds of thousands of pages with lists of employees, donors, interns, and the inner workings of political dissident groups. And that is just the IRS. Numerous other agencies have the cell phone records, emails, and everything else everyone has ever done on their servers.

It is definitely within the means of the government to map out dissident organizations, and then harass and exploit the organizations and members in order to comply and accept government policies. The essence of counter-intelligence/intelligence operations is in fact to gather information for the sole purpose of exploitation, as is what happened under COINTELPRO.

That begs the question- what is the purpose of the government gathering this data? Is the government trying to merely conduct harassing actions against dissidents, or is it attempting to map out dissident (read conservative) organizations which threaten their agenda, so that they can undermine political opposition and retain power?