top
US
US
Indybay
Indybay
Indybay
Regions
Indybay Regions North Coast Central Valley North Bay East Bay South Bay San Francisco Peninsula Santa Cruz IMC - Independent Media Center for the Monterey Bay Area North Coast Central Valley North Bay East Bay South Bay San Francisco Peninsula Santa Cruz IMC - Independent Media Center for the Monterey Bay Area California United States International Americas Haiti Iraq Palestine Afghanistan
Topics
Newswire
Features
From the Open-Publishing Calendar
From the Open-Publishing Newswire
Indybay Feature

The Cork is Off the Bottle - Nuclear Incident in Montana

by Counterpunch
A retired high-level government source was called yesterday to respond to a nuclear incident in Montana. Apparently the silo doors of numerous ICBM missiles were opened.
A retired high-level government source was called yesterday to respond to a nuclear incident in Montana. Apparently the silo doors of numerous ICBM missiles were opened.

Two such incidents during the Cold War era nearly started World War III. When silo doors open, it indicates the intention to launch missiles against another nation.

According to an essay published by the Nuclear Age Peace Foundation (NAPF), an organization dedicated to abolition of nuclear weapons: "The US experienced several near-accidents at its Cheyenne Mountain early warning station in the late 1970s. Twice, the equipment at the base generated false indications of a nuclear missile strike from Russia and nearly prompted US retaliation on both occasions."

According to Phil Patton, author of "Dreamland: A Cultural History of Area 51," an incident also occurred in 1980 in which "a multiplexer chip failed in a Nova 840 computer and sent a false missile warning to the national command center." Pattons says that it was the second such incident in less than a year. "In the first one, fake data from a war-sim was mistaken for the real thing, and the Pentagon was notified that a Soviet missile strike was under way. It took about eight minutes to determine that the end of the world was not, in fact, at hand."

Today, there are 200 Inter-Continental Ballistic Missiles at Malmstrom Air Force Base at five missile alert facilities in Montana, with four operational missile squadrons assigned as combat-ready forces to continuously operate, maintain, and secure "strategic nuclear deterrence."

One of these squadrons declares on its web page that its squadron works "every day of the year, 24 hours per day" to "keep America free by operating and safeguarding her most destructive power."

According to the NAPF essayist, Justin Murray, "Despite the end of the Cold War, the United States and Russia once again find themselves on the brink of a nuclear Armageddon," but the threat "does not stem from hostilities or a premeditated, intentional strike but from miscalculation and computer errors." Murray states that both the U.S. and Russia maintain thousands of nuclear weapons in launch warning mode. While launch procedures in the U.S. demand almost instantaneous decision-making by the President, the situation in Russia is even more hazardous, where decay of early warning systems elevate the possibility of false alarms.

Of course, the unasked and unanswered question here is: what about terrorists?

There seems to be no indication that the incident in Montana is a terrorist-related one. However, the incident begs two crucial questions: first, are our systems inadequately protected?, and second, does the increase in development of more nuclear weapons under President Bush create greater dangers? (We already have approximately 9600 warheads and are talking about developing a new line of small nuclear weapons called "bunker busters.")

The answers are no and no.

First, the systems are inadequately protected because whenever you have a very sophisticated electronic system (and, in this case, systems), there is the potential for an accident ­ and already there have been enough incidents to warrant shutting these dangerous systems down.

Second, there is no such thing as adequate control of nuclear weapons. Their management and control simply cannot be guaranteed. The return to proliferation of nuclear weapons is risking an End Game ­ THE End Game. Although we might labor under the false belief that the Nuclear Genie is back in the bottle, even if she is, the cork is definitely not on.

The incident in Montana, which may never make it into the mainstream press, proves this.

Jennifer Van Bergen, J.D., is the author of The Twilight of Democracy: The Bush Plan for America (Common Courage Press, 2004). She has written and spoken extensively on civil liberties, human rights, and international law. She and Raymond Del Papa are currently organizing a major Forum on Dissent Since 9/11 in Miami from March 11-13. See http://www.partnersinprotest.org. She may be contacted at jvbxyz [at] earthlink.net
Add Your Comments

Comments (Hide Comments)
by cp
Look at this in the NY Times today 1/23. It is a prominent article, but they are describing how for a long time, the government has set up plans to have a replacement government that acts outside of democracy, and outside of Washington DC. If they had such a disaster to warrant moving things to Colorado Springs, you'd think the people might wish to have some reforms or change the government, but instead, it will be martial law. They also describe how the army Special Forces (the same group hunting Osama bin Laden) is acting inside the US.
-----------------------------
Commandos Get Duty on U.S. Soil
By ERIC SCHMITT

Published: January 23, 2005

WASHINGTON, Jan. 22 - Somewhere in the shadows of the White House and the Capitol this week, a small group of super-secret commandos stood ready with state-of-the-art weaponry to swing into action to protect the presidency, a task that has never been fully revealed before.

As part of the extraordinary army of 13,000 troops, police officers and federal agents marshaled to secure the inauguration, these elite forces were poised to act under a 1997 program that was updated and enhanced after the Sept. 11 attacks, but nonetheless departs from how the military has historically been used on American soil.

These commandos, operating under a secret counterterrorism program code-named Power Geyser, were mentioned publicly for the first time this week on a Web site for a new book, "Code Names: Deciphering U.S. Military Plans, Programs and Operation in the 9/11 World," (Steerforth Press). The book was written by William M. Arkin, a former intelligence analyst for the Army.

The precise number of these Special Operations forces in Washington this week is highly classified, but military officials say the number is very small. The special-missions units belong to the Joint Special Operations Command, a secretive command based at Fort Bragg, N.C., whose elements include the Army unit Delta Force.

In the past, the command has also provided support to domestic law enforcement agencies during high-risk events like the Olympics and political party conventions, according to the Web site of GlobalSecurity.org, a research organization in Alexandria, Va.

The role of the armed forces in the United States has been a contentious issue for more than a century. The Posse Comitatus Act of 1878, which restricts military forces from performing domestic law enforcement duties, like policing, was enacted after the Civil War in response to the perceived misuse of federal troops who were policing in the South.

Over the years, the law has been amended to allow the military to lend equipment to federal, state and local authorities; assist federal agencies in drug interdiction; protect national parks; and execute quarantine and certain health laws. About 5,000 federal troops supported civilian agencies at the Winter Olympics in Salt Lake City three years ago.

Since Sept. 11, however, military and law enforcement agencies have worked much more closely not only to help detect and defeat any possible attack, including from unconventional weapons, but also to assure the continuity of the federal government in case of cataclysmic disaster.

The commandos here this week were the same type of Special Operations forces who are hunting top insurgents in Iraq and Osama bin Laden in the mountainous wilds of Afghanistan and Pakistan. But under the top-secret military plan, they are also conducting counterterrorism missions in support of civilian agencies in the United States.

"They bring unique military and technical capabilities that often are centered around potential W.M.D. events," said a senior military official who has been briefed on the units' operations.

A civil liberties advocate who was told about the program by a reporter said that he had no objections to the program as described to him because its scope appeared to be limited to supporting the counterterrorism efforts of civilian authorities.

Mr. Arkin, in the online supplement to his book (codenames.org/documents.html), says the contingency plan, called JCS Conplan 0300-97, calls for "special-mission units in extra-legal missions to combat terrorism in the United States" based on top-secret orders that are managed by the military's Joint Staff and coordinated with the military's Special Operations Command and Northern Command, which is the lead military headquarters for domestic defense.

Mr. Arkin provided The New York Times with briefing slides prepared by the Northern Command, detailing the plan and outlining the military's preparations for the inauguration.

Three senior Defense Department and Bush administration officials confirmed the existence of the plan and mission, but disputed Mr. Arkin's characterization of the mission as "extra-legal."

One of the officials said the units operated in the United States under "special authority" from either the president or the secretary of defense.

Civilian and uniformed military lawyers said provisions in several federal statutes, including the Fiscal Year 2000 Defense Department Authorization Act, Public Law 106-65, permits the secretary of defense to authorize military forces to support civilian agencies, including the Federal Bureau of Investigation, in the event of a national emergency, especially any involving nuclear, chemical or biological weapons.
Advertisement

In 1998, the Pentagon's top policy official, Walter B. Slocombe, acknowledged that the military had covert-action teams.

"We have designated special-mission units that are specifically manned, equipped and trained to deal with a wide variety of transnational threats," Mr. Slocombe told the Senate Armed Services Committee. "These units, assigned to or under the operational control of the U.S. Special Operations Command, are focused primarily on those special operations and supporting functions that combat terrorism and actively counter terrorist use of W.M.D. These units are on alert every day of the year and have worked extensively with their interagency counterparts."

Spokesmen for the Northern Command in Colorado Springs and the Special Operations Command in Tampa, Fla., the parent organization of the Joint Special Operations Command, declined to comment on the plan, the units involved and the mission.

"At any given time, there are a number of classified programs across the government that, for national security reasons, it would be inappropriate to discuss," said Bryan Whitman, a Pentagon spokesman. "It would be irresponsible for me to comment on any classified program that may or may not exist."

But the Northern Command document that mentions Power Geyser is marked "unclassified." The document states that the purpose of the Department of Defense's contingency planning for the inauguration is to provide "unity of D.O.D. effort to contribute to a safe and secure environment for the 2005 inauguration."

The Northern Command missions include deterring an attack or mitigating its consequences, and coordinating with the Special Operations Command.

In a telephone interview from his home in Vermont, Mr. Arkin said the military's reaction to the disclosure of the counterterrorism plan and its operating units reflected "the silliness of calling something that's obvious, classified."

"I'm not revealing what they're doing or the methods of their contingency planning," he said. "I don't compromise any sensitive intelligence operations by revealing sources and methods. I don't reveal ongoing operations in specific locales."

Mr. Arkin's book is a glossary of more than 3,000 code names of past and present operations, programs and weapons systems, with brief descriptions of each. Most involved secret activities, and details of many of the programs could not be immediately confirmed.

The book also describes American military operations and assistance programs in scores of countries, from Afghanistan to Zimbabwe. The murky world of "special access programs" and other secret military and intelligence activities is covered in the book, too. Some code names describe highly classified research programs, like Thirsty Saber, a program that in the 1990's tried to develop a sensor to replace human reasoning. Others describe military installations in foreign countries, like Poker Bluff I, an electronic-eavesdropping collection station in Honduras in the 1980's.

Many involve activities related to the survival of the president and constitutional government. The book, for instance, describes Site R, one of the undisclosed locations used by Vice President Dick Cheney since the Sept. 11 attacks.

Site R is a granite mountain shelter just north of Sabillasville, Md., near the Pennsylvania border. It was built in the early 1950's to withstand a Soviet nuclear attack.

The book also describes a program called Treetop, the presidential emergency successor support plan, which provides survivors of a nuclear strike or other attack with war plans, regulations and procedures to establish teams of military and civilian advisers to presidential successors.

A White House spokesman declined to comment on the continuity of government activities cited in the book.

People who advocate that the government declassify more of the nation's official documents said the book would fuel the debate over the balance between the public's right to know and the need to keep more military and intelligence matters secret in the campaign against terror.

"This is part of an ongoing tug of war to define the boundaries of public information," said Steven Aftergood, director of the Federation of American Scientists' Project on Government Secrecy. "There has been a steady withdrawal of information from the public domain in the present administration, and a reluctance to disclose even the most mundane of facts."


by RWF (restes60 [at] earthlink.net)
there were a number of accounts of arrests and detentions being conducted during the inaugural protests by undercover officers dressed like protesters, as was also the case in Miami during the FTAA actions

sounds like it was probably these guys

this is a huge story, and, typically, the NYT engages in yet another manufactured consent process by selecting people from "the other side", who are okey-dokey with the whole thing

Americans have forgotten their history, and don't know how the significance of this development. Back in the late 19th Century, people vehemently opposed the creation of what we now know as the National Guard, because people perceived it, quite rightly, as an expansion of national military authority into civilian life

--Richard Estes
by D
I dont where you get your information but what you say could not happen, unless it was done manually to do maintanance on the missile.
We are 100% volunteer and depend on your participation to sustain our efforts!

Donate

$75.00 donated
in the past month

Get Involved

If you'd like to help with maintaining or developing the website, contact us.

Publish

Publish your stories and upcoming events on Indybay.

IMC Network