Ready For FEMA Camps? Project DIVA Enables the Elite to Take out The Red List

Ready For FEMA Camps? Project DIVA Enables the Elite to Take out The Red List

0

Putting together all of the pieces of this tyrannical puzzle, suddenly the endgame becomes painstakingly clear. The various moving parts are; the NDAA, FEMA Camps, the Homeland Security’s bias that right-wing extremists are just as big a threat as ISIS, and finally the government wants computers to spot terrorists on live video.

Understanding what it all means paints a very nasty picture, one in which many people have warned of for years. The United States government, extension IARPA, will create D.I.V.A or Deep Intermodal Video Analytics. Diva is a program that will analyze live video feeds from multiple sources at the same time. The analytics of the video will show the operators who the selected “terrorists” are. Then, “before they strike” the government can “take care of” the potential threat.

Project DIVA will allow the government to detain indefinitely any single individual considered a threat determined by an artificial intelligence. Algorithms are changing the world, and now they will strip Americans of their freedoms, and the rest of their lives.

According to an IARPA synopsis, “The DIVA program will produce a common framework and software prototype for activity detection, person/object detection and recognition across a multi-camera network. The impact will be the development of tools for forensic analysis, as well as real-time alerting for user-defined threat scenarios.”

READ–‘The Americans’ Revisits ‘The Day After Martial Law’ – How to Avoid the FEMA Camp Detention Centers

Let’s go over all of the pieces and compile it.

Part I

First, a huge step towards tyranny occurred when the NDAA was originally signed into law in 2012 and is still active today. Under the NDAA, any American suspected of terrorism, or just defying the government, can be detained for the rest of their lives without due process. This law allows the government to arrest absolutely anyone in the country, and they do not need a court sanctioned reason or warrant.

Part II

Then the infamous FEMA camps, even though the government still denies their existence, they are still standing today and waiting to be populated. There are various theories as to who will populate them, but the most prominent theory is that individuals on the red list and the blue list will occupy them until the red list dissipates, the blue list gets deciphered, and the yellow list willingly joins.

And this may be the fuel to the fire when it comes to the theory of FEMA Camps.-BulletProof Home Defense is an Unconventional Home Defense  that teaches you How To Protect Your Home and Family in Crisis in Real Life.

Part III

The United States Government is quickly turning into that of a dictatorship. Homeland security continually references that Christians are the real problem, not ISIS, or Islam. Actions speak louder than words to prove who the real threat to freedom is. One month after the San Bernardino shooting; Jeh Johnson told advisors that right wing extremists pose just as much of a threat to the country as Islamic extremists. Their bias points to the next part.

Member Acevedo reminded the Council that the threat from right wing extremists domestically is just as real as the threat from Islamic extremism. Secretary Johnson agreed and noted that CVE, by definition, is not solely focused on one religion. Member Goldenberg seconded Member Acevedo’s remarks and noted the importance of online sites in right wing extremist communities, not only in America but worldwide. 


U.S. Department of Homeland Security

Homeland Security Advisory Council Meeting– Open Session

The Woodrow Wilson International Center for Scholars

January 21, 2016

EXECUTIVE SUMMARY

1:23 p.m. to 3:07 p.m.

The meeting of the Homeland Security Advisory Council (HSAC) was convened from 1:23 p.m to 3:07 p.m. at the Woodrow Wilson International Center for Scholars in Washington, D.C. The meeting was open to members of the public under the provisions of the Federal Advisory

Committee Act (FACA), P.L. 92-463 and 5 U.S.C. § 552b.

The following individuals were in attendance:

Judge William Webster, Chair

Commissioner William Bratton, Vice-Chair

Chief Art Acevedo

Mr. Steve Adegbite

General John Allen

Admiral Thad Allen

Mr. Norm Augustine

Mr. Richard Danzig (via telephone)

Ms. Elaine C. Duke

Mr. Paul Goldenberg

Hon. Lee Hamilton (video)

Hon. Elizabeth “Liz” Holtzman

Ambassador Jim Jones

Ms. Juliette Kayyem

Department Leadership and Other Attendees

Jeh C. Johnson, Secretary, DHS

Sarah Morgenthau, Executive Director, Homeland Security Advisory Council, DHS

Adnan Kifayat, Co-Chair, Countering Violent Extremism Subcommittee

Karen Tandy, Co-Chair, CBP Integrity Advisory Panel

Mr. Bill Livingood

Mr. John Magaw

Mr. Christian Marrone

Mr. David A. Martin

Mr. Jeff Moss

Mr. Ned Norris, Jr.

Mr. Michael Nutter

Mr. Matthew Olsen

Ms. Farah Pandith

Ms. Annise D. Parker

Mr. John Pistole

Mr. Robert Rose

Mr. Paul Stockton

Ms. Lydia Thomas (via telephone)

Mr. John Chaussee (proxy for Gary Kelly)

Mr. Michael Masters (proxy for Ali Soufan)

Welcome by HSAC Leadership and Swearing-In of New Council Members

William Webster, Chair of the HSAC, called the open session of the meeting to order at 1:23 p.m. The members present introduced themselves. Chair Webster thanked Sarah Morgenthau,HSAC Executive Director, for her efforts in support of the Council.

Secretary of Homeland Security Jeh Johnson administered the Oath of Office to the newly appointed HSAC members Michael Nutter and Christian Marrone.

Remarks by Secretary Jeh Johnson

Secretary Johnson thanked Executive Director Morgenthau for bringing this exemplary group of citizens together as part of this important advisory council. Secretary Johnson thanked HSAC Vice-Chair Bill Bratton, Police Commissioner for the New York City Police Department, for inviting him to speak at the recent New York City Police Academy graduation in late December.

Secretary Johnson said there is much left to accomplish in this final year of the Administration,and expressed his intention to complete his remaining objectives for the Department. His principal priority for senior management is to leave the Department in better shape than when the team arrived, so it functions more efficiently, and more effectively in delivering its homeland security services for the American people. As part of this process, DHS leadership continues to institutionalize the principles of the “Unity of Effort” initiative. DHS is working to reform the hiring, acquisition and budget processes, with the ultimate goal of raising the level of employee Counterterrorism remains a cornerstone mission of the Department.


“A prudent man foresees the difficulties ahead and prepares for them;the simpleton goes blindly on and suffers the consequences.” – Proverbs 22:3


There is a new environment when it comes to the global terrorism threat, which includes not only terrorist-directed attacks, but terrorist-inspired attacks. These threats call for a whole-of-government response, including military, law enforcement, and robust intelligence gathering and sharing efforts. These efforts extend to the private sector as well, and DHS is very active in this arena. In recent months, DHS has enhanced the Federal Protective Service presence at federal offices around the country. In addition, DHS is currently reforming and strengthening the Visa Waiver Program security Last year, DHS established the Office for Community Partnerships as part of its efforts in Countering Violent Extremism (CVE). The White House announced this month the creation of an interagency CVE Task Force, in which DHS plans to be deeply involved. DHS is very active in community outreach to complement these efforts. Last week Secretary Johnson visited Dearborn, Michigan to meet with the community there. Secretary Johnson also discussed recent efforts related to aviation security, including enhancing overseas pre-clearance reviews. DHS recently revised its National Terrorism Advisory System (NTAS) to include a new intermediate message to better inform the public about the threat environment. It is also focused on cybersecurity threats, and expanding and enhancing information-sharing efforts both across the federal government and private sector entities. The EINSTEIN 3-Accelerated (E3A) monitoring and intrusion prevention program is now live and available for use by all federal agen
cies. Currently about half of the federal government is 
covered by E3A and DHS will continue to work to expand coverage. On the immigration and border security front, DHS awaits the Supreme Court ruling on the Texas v. United States case which bears heavily on the Department’s Deferred Action for Childhood Arrivals program. DHS has reframed and focused its priorities for removal on convicted criminals and those apprehended at the border. DHS is viewing the ongoing events in Central America as a refugee problem and must be handled like one. The Secretary of State has called for a regional solution and approach to the problem. Meanwhile, DHS is obligated to enforce U.S. law consistent with U.S. priorities, not least of which is border security.

Secretary Johnson closed his remarks by lauding the quiet, day-to-day efforts of DHS employees in ensuring the safety of the American people. Executive Director Morgenthau thanked Secretary Johnson for his remarks and opened the floor for HSAC subcommittee updates. CBP Integrity Advisory Panel Progress Report Karen Tandy, Co-Chair of the CBP Integrity Advisory Panel, provided the update. The Advisory Panel issued its interim report in June 2015 and will deliver its final report to the Secretary via teleconference in March of this year. Since its inception, the Panel has focused on several key areas: transparency, stakeholder and public outreach, and use of force issues. Since the issuance of the interim report, the Panel has met with representatives from Congress to discuss the report’s initial findings and recommendations related to internal affairs staffing at CBP. Indrafting its report, the Panel met with numerous stakeholders, Inspector General representatives,employee unions, and visited several sites along the border. This subject will remain a focus of the Panel’s final report, as the Secretary has highlighted the proactive prevention of corruption as area of particular importance. The Panel expects to make recommendations on data analytics,intelligence gathering, identification of red flags related to potential corruption, and partnering with the Federal Bureau of Investigation (FBI) Border Corruption Task Forces.

111111

DHS Grant Review Task Force Progress Report

Bill Livingood, Chair of the DHS Grant Review Task Force, thanked Ms. Morgenthau for her and her staff’s commitment and dedication to the HSAC and its members. Mr. Livingood also thanked FEMA representatives for their support and assistance to the Task Force.

Michael Masters, Vice Chair of the Task Force, briefed the Secretary and the Advisory Councilon the Task Force’s preliminary findings. The Task Force examined methods to ensure DHS is enhancing homeland security and emergency management as efficiently and effectively as possible. The Task Force reviewed existing programs, conducted data collection and analysis, and engaged in outreach to key stakeholders. The Task Force reviewed the entire suite of non-
disaster preparedness grant programs and has conducted over six months of stakeholder engagement. While significant progress was achieved in ensuring that preparedness grants are better meeting their objectives, particularly in respect to guidance, metrics, and follow-up from FEMA, there remains significant opportunities for the programs to better meet their objectives.

Those opportunities are particularly evident at the local level, where competencies, consistency and communication remain very unequal among different stakeholders.

ARTICLE-CONFIRMATION for FEMA Camps, MARTIAL LAW And Gun Confiscation- WHERE ARE THESE CAMPS LOCATED?Find The FEMA Camp Nearest You

Mr. Masters highlighted some of the progress that has been achieved over the last several years.

FEMA’s Grant Programs Directorate (GPD) has made considerable progress addressing historic issues and providing much clearer guidance and stronger support for those who work at the state and local level. FEMA has implemented risk-based monitoring of grant recipients, but work can be done to improve coordinating these auditing procedures. The period of performance has been lengthened to three years which has received universal praise from stakeholders. In addition, GPD has also greatly improved its communications efforts with stakeholders.

Going forward, the Task Force will focus its recommendations on improving competency and grant execution, enhancing consistency in understanding and application, and communication by and between stakeholders. Elaine Duke, Task Force Vice-Chair, briefed the HSAC on the details of these findings and recommendations. The Task Force’s scope was to review the grants programs’ outcomes, mechanisms, and whole communit
y approach. The Task Force identified a pattern in the 
responses from the stakeholders, primarily directed towards consistency, communication, and unequal applications and understanding of the grants process. In particular, the Task Force noted a lack of clarity on whether grants possess a terrorism-specific or an all-hazards approach. The Threat Hazard Identification and Risk Assessment (THIRA) process was another area where unequal application was noted by stakeholders. A number of the Task Force’s recommendations will be focused on improving clarity in grant guidance. The final report will be presented in

Cybersecurity Subcommittee Progress Report Jeff Moss, Co-Chair of the Subcommittee, updated the HSAC on the committee’s recent activities. The Subcommittee was created in August 2015 and was issued its first two taskings: providing recommendations on a national cyber incident response framework and reviewing state, tribal and territorial cybersecurity matters.

Regarding the National Cyber Incident Response Framework (NCIRF), the Subcommittee was charged with strengthening U.S. plans, capabilities, and coordinating mechanisms to restore services if defenses fail in response to a catastrophic cyberattack. In addition, the Subcommittee was asked to assess the readiness of lifeline sectors to meet emergent cyber threats and provide recommendations for building cross-sector capabilities to rapidly restore critical services in the For the second tasking, the Subcommittee has been asked to explore how the Department provides a more unified approach to include components responsible for the allocations of funds, providing threat briefings, and building resilience in support of state, local, tribal, and territorial (SLTT) governments in the field of cybersecurity.

ARTICLE-THEY’RE COMING FOR THE GUNS! – How Will They Confiscate Your Guns?

Task forces within the existing subcommittee structure have been established for each of these subtaskings and their interim reports are due in June 2016 for the NCIRF task force, and October 2016 for the SLTT task force.

Paul Stockton and Juliette Kayyem, Vice Chairs of the Subcommittee, also provided comments.

Mr. Stockton expressed the hope that the Subcommittee will provide robust recommendations on

the establishment of a National Cyber Incident Response Plan. Ms. Kayyem identified several themes that have risen to the surface in the preliminary stages of the Subcommittee’s SLTT review: the lack of a national plan for SLTT governments, importance of recognizing the cultural challenges in changing emergency response strategies, and the crucial role DHS can play in assisting and educating SLTT agencies.

0

ARTICLE-Obama: ‘Be Ready For EMP Attacks, Engineered Pandemics, Earthquakes, And Martial Law’ (Videos)

Countering Violent Extremism (CVE) Subcommittee Progress Report Farah Pandith, Co-Chair of the Subcommittee, reviewed the components of the Subcommittee’s

– What opportunities or platforms can be used to facilitate public-private partnerships between technological and philanthropic sectors?

– How can the Department develop new networks and frameworks for sustained dialogue and engagement with technology companies and philanthropic organizations?

– What other non-governmental sectors should be leveraged for CVE and how should those sectors be engaged?

– How can DHS work with education and mental health professionals to help parents and schools understand how to counter youth radicalization?

– How can the Department inspire peer-to-peer attempts to challenge violent extremism through public-private partnerships?

The Subcommittee will be working very closely with the Department’s new Office for Community Partnerships (OCP). Ms. Pandith thanked the Secretary for spearheading and encouraging efforts in the arena of CVE. The Subcommittee plans to focus on six sectors in particular: engagement with millennials and pop culture, communication and messaging, social  media, funding sources, education, and mental health.

Adnan Kifayat, Subcommittee Co-Chair, emphasized that the report will be respectful of the communities it seeks to engage with, and will take into account those communities specific Executive Director Morgenthau opened the floor for public comments; however, there were no comments from members of the public.

Member Nutter thanked the Secretary for his efforts in engaging with local communities throughout his tenure, and
particularly thanked the Department for their help in Philadelphia 
during the visit of Pope Francis.

Member Acevedo reminded the Council that the threat from right wing extremists domestically is just as real as the threat from Islamic extremism. Secretary Johnson agreed and noted that

CVE, by definition, is not solely focused on one religion. Member Goldenberg seconded Member Acevedo’s remarks and noted the importance of online sites in right wing extremist communities, not only in America but worldwide.

Member Norris thanked the HSAC and DHS for acknowledging the unique government-to-government obligations and relationships between the federal government and tribal.

Public Session Concludes

Executive Director Morgenthau adjourned the open session of the meeting at 3:07 p.m., and the

Council returned to closed session.

I hereby certify that, to the best of my knowledge, the foregoing minutes are accurate and

Judge William H. Webster, Chairman, Homeland Security Advisory Council

U.S. Department of Homeland Security

Homeland Security Advisory Council Meeting – Closed Sessions

The Woodrow Wilson International Center for Scholars

January 21, 2016

EXECUTIVE SUMMARY

Closed Session: 10:10 a.m. to 12:00 p.m.

HSAC Chairman Judge William Webster and Vice Chair Bill Bratton welcomed the Homeland Security Advisory Council (HSAC) members to the meeting and brought the closed morning session to order at 10:10 a.m.

Senior U.S. Government leaders presented an overview on the benefits and challenges of encryption technology.

Judge Webster adjourned the morning session at 12:00 p.m.

Closed Session: 3:10 p.m. to 4:40 p.m.

HSAC Chairman Judge William Webster brought the afternoon closed session to order at 3:10

Farah Pandith and Adnan Kifayat, Co-Chairs of the Countering Violent Extremism (CVE)

Subcommittee, provided HSAC members with an overview of CVE threats.

Juliette Kayyem and Paul Stockton, Vice-Chairs of the Cybersecurity Subcommittee, provided HSAC members with an overview of the Cybersecurity threat.

HSAC members also received briefings from the Cybersecurity Subcommittee’s private sector leads who provided their perspectives as well as insights on the current threat and measures they are taking to counter the threats.

Secretary of Homeland Security Jeh Johnson provided the members with an update on current issues surrounding the Department of Homeland Security.

Judge Webster adjourned the meeting at 4:40 p.m.


Survival Things We Lost To History!

The Lost Ways…a true story about our grandparents days!

The Lost Ways prepares you to deal with worst-case scenarios with the minimum amount of resources just like our forefathers lived their lives, totally independent from electricity, cars, or modern technology whatsoever, which means you’ll also be bulletproof against the ever-increasing threat of an Electro Magnetic Pulse, a Powerful Economic Breakdown, Famines, Wars, and Natural Disasters,Epidemics and Disease . You’ll have the power to protect and save your family…even to rebuild your community during the worst times.watch this FREE video!

lost ways

Part IV

The final part of the puzzle is also the newest piece of equipment produced for federal forces, the DOD, and IARPA. It’s called DIVA. Diva will equip local police, federal police with the ability to systematically choose individuals whose actions appear to be abnormal, and arrest them. DIVA takes facial recognition software to the next level, and will also take tyranny to another level.

https://www.youtube.com/watch?v=S2UELjdSzEY

The four moving pieces have taken years for the government to develop and would allow society to retain function while individuals on the red and blue lists were captured and or killed. It is important to note, Project DIVA is not active at this moment in time. IARPA is still developing the technology according to official sources. However, when the government makes a claim to build technology to the public, often it means that the technology is in its testing phase and just before the official release.


Deep Intermodal Video Analytics (DIVA) Proposers’ Day Conference

SYNOPSIS

The Intelligence Advanced Research Projects Activity (IARPA) will host a Proposers’ Day

Conference for the DIVA program on July 12, 2016, in anticipation of the release of a new Broad Agency Announcement (BAA) solicitation. The Conference will be held from 9:00 am to 5:00 pm EDT in the Washington, DC metropolitan area. The purpose of the conference will be to provide information on DIVA and the research problems the program aims to address, to address questions from potential proposers and to provide a forum for pote
ntial proposers to 
present their capabilities for teaming opportunities.

This announcement serves as a pre-solicitation notice and is issued solely for information and planning purposes. The Proposers’ Day Conference does not constitute a formal solicitation for proposals or proposal abstracts. Conference attendance is voluntary and is not required to propose to future solicitations (if any) associated with this program. IARPA will not provide reimbursement for costs incurred to participate in this conference.

PROGRAM DESCRIPTION AND GOALS

The DIVA program intends to develop robust automated activity detection for a multi-camera streaming video environment. As an essential aspect of DIVA, activities will be enriched by person and object detection, as well as recognition at multiple levels of granularity.DIVA is anticipated to be a three-phase program. The program will focus on three major thrusts throughout all phases:

 Detection of primitive activities occurring in ground-based video collection; Examples include:

o Person getting into a vehicle,

o Person getting out of vehicle,

o Person carrying object.

 Detection of complex activities, including pre-specified or newly defined activities;

Examples:

o Person being picked up by vehicle,

o Person abandoning object,

o Two people exchanging an object,

o Person carrying a firearm.

 Person and object detection and recognition across multiple overlapping and non-
overlapping camera viewpoints.

The focus for phase 1 will be on video collected with the following properties:

 Video collected within the human visible light spectrum;

 Video collected from indoor or outdoor security cameras, either fixed or with rigid motion such as pan-tilt-zoom.

In phases 2 and 3, additional data used will include:

 Video collected from handheld or body worn cameras;

 Video collected from other portions of the electromagnetic spectrum (e.g., infrared).

The DIVA program will produce a common framework and software prototype for activity detection, person/object detection and recognition across a multi-camera network. The impact will be the development of tools for forensic analysis, as well as real-time alerting for user-
defined threat scenarios.

Untitled-5-1024x819

Collaborative efforts and teaming among potential performers will be encouraged. It is anticipated that teams will be multidisciplinary, and might include expertise in machine learning,deep learning or hierarchical modeling, artificial intelligence, object detection, recognition,person detection and re-identification, person action recognition, video activity detection,tracking across multiple non-overlapping camera viewpoints, 3D reconstruction from video,super-resolution, statistics, probability and mathematics. Performers will not be asked to build a monolithic system for activity detection and tracking across a large camera network. Instead,research will focus on developing a common scalable framework that deploys in an open cloud architecture for activity detection, person/object detection and recognition across overlapping and non-overlapping cameras.

IARPA anticipates that academic institutions and companies from around the world will participate in this program. Researchers will be encouraged to publish their findings in academic journals.

REGISTRATION INFORMATION

Attendees must register no later than 5 pm EDT July 5, 2016 at

https://eventmanagement.cvent.com/DIVAPD. Directions to the conference facility and other materials will be available on a full access website. No walk-in registrations will be allowed.

Due to space limitations, attendance will be limited to the first 150 registrants and to no more than 2 representatives per organization. All attendees will be required to present a government-
issued photo identification to enter the conference. Non-US citizens will be required to submit a visit request form for Foreign Nationals at least 5 business days prior to the conference. The form and submission instructions can be found on the registration website. Foreign nationals will need to present a passport.

ADDITIONAL INFORMATION

The morning session will include an overview of the program
goals, technical challenges, and 
expected participation requirements. A description of how the solutions will be evaluated will be provided.

The afternoon will include unclassified presentations and poster sessions to provide an opportunity for attendees to present their organizations’ capabilities and to explore teaming arrangements. Attendees who wish to present organization capabilities for teaming opportunities may submit a request through the registration website. Details on the presentation and poster formats, and the procedure for submitting a request to present, will be provided after approval to register for the Conference has been granted. Time available for presentations and space available for posters will be limited. Therefore, presentations will be limited to the first 20 registered respondents who request an oral presentation. There will also be a limitation on the number of posters (i.e., 25) determined by the first registered respondents that request a poster presentation. These presentations are not intended to solicit feedback from the Government, and Government personnel will not be present during the presentations.

EXCLUSIV It’s Not a Matter of ”if it happens” Anymore, But a Matter of ”WHEN” it Will Happen!

This Proposers’ Day is intended for participants who are eligible to compete on the anticipated BAA. Other Government Agencies, Federally Funded Research and Development Centers (FFRDCs), University Affiliated Research Centers (UARCs), or any other similar organizations that have a special relationship with the Government, that gives them access to privileged or proprietary information, or access to Government equipment or real property, will not be eligible to submit proposals to the anticipated BAA nor participate as team members under proposals submitted by eligible entities. While such entities are not prohibited from attending the Proposers’ Day, due to space limitations, preference will be given first to those organizations that are eligible to compete. IARPA will not provide reimbursement for costs incurred to participate in this conference.

Questions concerning conference & registration can be sent to [email protected]

Questions regarding the program can be sent to [email protected]

Contracting Office Address:

Office of the Director of National Intelligence

Intelligence Advanced Research Projects Activity

Washington, District of Columbia 20511

United States

Primary Point of Contact:

Terry Adams

Program Manager

[email protected]


It can all be summed up like this; DIVA will capture and decipher footage and dictate to the operators who to gather, under the NDAA thos individuals will be held for questioning indefinitely in the facilities known as the FEMA camps. While this only serves as one of the purposes for the FEMA camps, it will play a vital role in their agenda of bringing about the New World Order.

Who Will Live, Who Will Die in the 1st 72 Hours-SHTF! The first 3 things to do during a disaster.

lost

(source)