Operation Earnest Voice & Occupy Wall Street – A Trojan Horse?
By Avalon & Shepard Ambellas
Source: The Intel Hub
October 15, 2011
It is becoming increasingly clear that we are witnessing the development of a crisis situation. The Occupy Wall Street Movement is now reaching 1000 cities worldwide . Is this a modern Trojan Horse?
First, there is a growing awareness that the Banking Industry is the focus of our current economic crisis and pending collapse – and rightly so.
Other issues are part of the OWS movement although the Official Manifesto of the Occupy Wall Street Group is considered by many to be short-sighted and Socialistic – perhaps even Communistic.
The police have responded in most cases in a typical way – provoking the crowds by denying them their right to freely assemble, which is a Constitutional Right in case anyone forgot.
In fact, the violence that was inflicted on the New York protesters was in large part the reason the protests grew and got the corporate media coverage.
Rewind to the Greece and Egyptian Protests and subsequent riots that started on Twitter and one can see a pattern of using social media to spark anonymous action by hundreds and thousands of individuals. Monitoring and using social media is now part and parcel of the Intelligence Community as these two excepts demonstrate. 
“We have to remember the government is a different participant than other people in social media,” said James Carafano, a senior fellow at the conservative Heritage Foundation who recently published Social Networking and National Security: How to Harness Web 2.0 to Protect the Country. “We also have to remember that there are downsides to the technology just like anything else.” – Gen. Ray Odierno, USAF
“It’s all about the exchange of information,” said Hugo Teufel, III., former chief privacy officer for the Department of Homeland Security.
Next month a conference, entitled “Social Media Strategies for DOD and Government,” will take place in Mclean, Va. The three-day conference was organized by the Institute for Defense and Government Advancement. Officials said most of those attending will be involved in marketing, public affairs and communication with the U.S. military. 
The Pentagon is looking towards the use of social networking services like Facebook andTwitter as a resource for intelligence gathering during conflicts. The Defense Advanced Research Projects Agency is offering $42 million in funding to anyone that can help itdetect and track ideas being shared by other forces as they are spread on social networks. 
Videos from yesterday’s so called Day of Rage:
Global Occupation: 1,000 Cities Unite in Wall St. Anger Worldwide
Economic Protests in Rome Turn Violent
Protesters Rally Worldwide Against “Corporate Greed”
Germany Takes Part in Global Economic Protests
Severe Police Action as Thousands of Protesters Fill Times Square
In a recent Guardian article titled, Revealed: US spy operation that manipulates social media, the capabilities of the government are evident.
What guarantee is there that the use of these technologies has any oversight? In fact, it is now common knowledge that these technologies have been successfully implemented in Iraq, Afghanistan and elsewhere.
Here is where the Hegelian Dialectic comes into play. Create a crisis, then offer a solution – meaning, create a Global Economic Crisis and a Global Occupy Movement that turns violent, then offer the objective of the operation which is Martial Law and Military Occupation.
Cui Bono – the Military Industrial Complex and the New World Order or Global Government – a Fascist Corporate Dictatorship leading to World Government.
To demonstrate the nature of Operation Earnest Voice, the contract was awarded to Ntrepid which operates in Tysons Corner, Virginia.
Posted on Thu, 17 Mar 2011
A piece in today’s Guardian reveals a US military “sock puppet” operation that involves “using fake online personas to influence internet conversations and spread pro-American propaganda.” The article name the California-registered Ntrepid Corporation as a recipient of a contract for the project. TheCalifornia corporate registry lists an office in Tysons Corner, Virginia as the physical location of the company. A search for the company’s name on Virginia’s corporate registry turns up an entry (ID: F184248-5) with a listing of its director and officers (screenshot here). The names are as follows:
Richard H. Helms (director and officer)
Wesley R. Husted (officer)
Margaret A. Lee (officer)
As it turns out, Richard Helms was previously the founder and CEO of the Virginia-basedAbraxas Corporation. Wesley Husted was at one point its CFO. So, what is the Abraxas Corporation and what do they do? Its web site declares itself to be primarily concerned with a information security and risk assessment. A June 2004 article in the International Herald Tribune identified it as a “small compan[y] made up almost entirely of former senior CIA officers […] in McLean, Virginia.” […]
The article also noted that Abraxas was declared in 2005 to be “one of the nation’s fastest growing young companies” by the Deloitte & Touche accounting firm. Apparently, it enjoyed 714% in revenue growth over three years. Naturally, 90% of this revenue was from government contracts.
We also see the possibility that these movements are being used to distract from a potential war in Iran.
Alex also talks with Lt. Col. Anthony Shaffer about the Iran op and the move toward war. Shaffer is the author of the government censored book Operation Dark Heart.
Operation Earnest Voice
“CENTCOM Activities in the Information Environment: Consistent with the guidance provided by Secretary Gates last December, we conduct Operation Earnest Voice (OEV), which synchronizes and oversees all of our Information Operations activities. OEV seeks to disrupt recruitment and training of suicide bombers; deny safe havens for our adversaries; and counter extremist ideology and propaganda. Full funding of OEV supports all activities associated with degrading the enemy narrative, including web engagement and web-based product distribution capabilities. The effective engagement of our enemies in cyberspace requires the ability for us to conduct a full-spectrum of traditional military activities against them in that domain, including all aspects of Information Operations and Strategic Communication. We coordinate with the Joint Staff, the Interagency, the Intelligence Community, and our coalition partners to examine the adversary’s use of cyberspace and identify techniques, tactics and procedures we can use to counter the adversary in the cyber domain.”