THOUGH OFTEN DISCUSSED IN RELATION TO NUCLEAR WAR OR A SIMILARLY CHAOTIC SCENARIO, “CONTINUITY OF GOVERNMENT” PLANS CAN BE TRIGGERED EVEN BY POPULAR, NONVIOLENT OPPOSITION TO AN UNPOPULAR WAR ABROAD. IT EXISTS SOLELY TO KEEP THE CURRENT SYSTEM IN PLACE, REGARDLESS OF THE COST.
WASHINGTON DC — Last week, Newsweek published a report entitled “Inside The Military’s Top Secret Plans If Coronavirus Cripples the Government,” which offers vague descriptions of different military plans that could be put into effect if the civilian government were to be largely incapacitated, with a focus on the potential of the current novel coronavirus (COVID-19) pandemic to result in such a scenario.
The article’s author, William Arkin, largely frames these plans as new, though — buried deep within the article — he eventually mentions that such contingency plans can be traced back to the Eisenhower administration (though they were in place before) and have since been developed and updated by most subsequent administrations, largely through the issuance of executive orders. Arkin also points out that some of these “Continuity of Government”, or COG, plans include the “devolution” of leadership and Constitutional authority, which he notes “could circumvent the normal Constitutional provisions for government succession, and military commanders could be placed in control around America.”
Yet, there are key aspects of COG and its development that Arkin leaves out. For instance, in his timeline on how such plans have developed in the post-World War II era, he conveniently fails to mention any of the Reagan administration’s major changes to COG, including the Reagan-era Executive Order on which all current COG programs are based. Indeed, many of the “extra-Constitutional” aspects of COG that Arkin mentions began during the Reagan administration, when these plans were redrafted to largely exclude members of Congress, including the Speaker of the House, from succession plans and even moved to essentially eliminate Congress in the event of COG being implemented, with near total power instead being given to the executive branch and the military. It was also during this time that the “devolution” aspect of COG was hammered out, as it created three president-cabinet “teams” to be stationed in different parts of the country outside of the nation’s capital. Arkin’s decision to not mention how COG was a major focus of the Reagan administration is striking given that that administration poured hundreds of millions of dollars annually into COG planning and development and also conducted COG drills on a regular basis.
Furthermore, the Miami Herald revealed in 1987, that the COG programs of that era were deeply connected to what the Herald termed “a virtual parallel government outside the traditional cabinet departments and agencies” that began operating “almost from the day Reagan took office” and included many of Reagan’s closest advisers, including then-CIA Director William Casey. The Heraldfurther claimed that this “parallel government” had been responsible for the Iran-Contra scandal (i.e. “involved in arming the Nicaraguan rebels”) as well as “the drafting of martial law plans for national emergencies,” i.e. COG, as well as “the monitoring of U.S. citizens considered potential security risks.”
Other key players in those Reagan-era COG developments, such as former Vice President dikk Cheney, former CIA Director James Woosley and former Secretary of Defense Donald Rumsfeld, are also left unmentioned in Arkin’s article. Not mentioning Cheney and Rumsfeld are particularly glaring omissions given that they were involved in the implementation of aspects of those COG plans thatwent live in the wake of the September 11 attacks, when both men were serving in key posts in the George W. Bush administration.
While Arkin’s omission of the role of the Reagan administration and leading neoconservatives in the development and use of COG is significant, arguably more significant is his failure to mention one of COG’s major components, one that has gone essentially unmentioned by well-known media outlets for well over a decade – Main Core.
THE GOVERNMENT’S DATABASE OF “POTENTIAL TROUBLEMAKERS”
When Reagan issued Executive Order 12656, he created COG plans that could be implemented during “any national security emergency,” which the E.O. loosely defined as “any occurrence, including natural disaster, military attack, technological emergency, or other emergency, that seriously degrades or seriously threatens the national security of the United States.” E.O. 12656 also put the National Security Council (NSC) in charge of developing and administering COG policies. The NSC official placed in charge of this “secret” COG program was Oliver North, whose name would later become infamous for the key role he played in the Iran-Contra Scandal. During the Iran-Contra hearings in the late 1980s, then-Representative Jack Brooks (D-TX) attempted to ask the following question to North: “Colonel North, in your work at the NSC, were you not assigned at one time to work on plans for the continuity of government in the event of a major disaster?” Brooks, however was immediately cut off by Senator Daniel Inouye (D-HI), who stated ” I believe that question touches upon a highly sensitive and classified area, so may I request that you not touch upon that, sir.” Brooks protested, but North was ultimately not required to give an answer.
As the de facto leader of COG development and planning during the Reagan administration, North oversaw the creation of a controversial database that later became known simply as “Main Core.” The Main Core database, first built using the stolen PROMIS software (more information on PROMIS hereand here), was essentially a list of American dissidents and “potential troublemakers.” A senior government official with a high-ranking security clearance and service in five presidential administrations described the database to journalist Chris Ketcham in 2008 as follows:
“A database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.”
In 1993, Wired magazine stated that:
“Using PROMIS, sources point out, North could have drawn up lists of anyone ever arrested for a political protest, for example, or anyone who had ever refused to pay their taxes. Compared to PROMIS, Richard Nixon’s enemies list or Sen. Joe McCarthy’s blacklist look downright crude.”
Main Core is the aspect of COG that is most often ignored in reporting on these types of plans, with Arkin’s article being just a more recent example. While most of the rare mentions of COG in the mainstream touch on how those plans would result in the implementation of martial law and the suspension of the Constitution, they even more rarely — if ever — mention Main Core. Indeed, the last “mainstream” reports on Main Core were written over a decade ago — all in 2008 — by Chris Ketchamin Radar, by Scott Horton in Harpers and by Tim Shorrock in Salon.
Given that COG is now creeping back into mainstream reporting, revisiting Main Core is essential as the database still exists and has grown considerably since Oliver North first oversaw its creation in the early 1980s. In Ketcham’s 2008 article on the subject, he quotes then-senior government officials who said that, at the time, the number of “unfriendly” Americans on that database was approximately 8 million. Ketcham further notes that, in the event COG is implemented, these individuals could be subject to anything ranging from “heightened surveillance and tracking to direct questioning and possibly even detention.”
Tim Shorrock, in his coverage of Main Core, noted that the database was seen in use at the White House following the September 11 attacks and there is strong evidence pointing to it having been used by the George W. Bush administration to guide its domestic surveillance activities in the post-9/11 era. A government official who had told a reporter about having seen the database operational at the White House following September 11th “turned white as a sheet” when the reporter mentioned the name “Main Core” specifically. Shorrock’s reporting also details how Main Core includes vast amounts of information on those “unfriendly” Americans, including the fruits of the vast domestic surveillance programs of the NSA and other U.S. federal agencies that continue today and are now set to be expanded due to the current coronavirus crisis.
In a report written last year on the involvement of U.S. and Israeli intelligence and their private sector allies in pushing for new, troubling pre-crime programs, I noted that Main Core is not only available to U.S. intelligence but also Israel’s intelligence apparatus and that Israeli intelligence was involved in the creation and expansion of Main Core. That report also detailed how Main Core was used by members of Reagan’s NSC to blackmail members of Congress, a practice that is likely to have continued under subsequent administrations. It also noted how Main Core today likely involves the same software now used by every U.S. intelligence agency and numerous other federal agencies that is marketed by Palantir, a company created and owned by Trump ally Peter Thiel. Palantir’s software boasts “predictive policing” capabilities and tracks a category of person using the label “subversive,” very much in keeping with the spirit of Main Core.
MAIN CORE AND BILL BARR’S POWER GRAB
WASHINGTON DC — Last week, Newsweek published a report entitled “Inside The Military’s Top Secret Plans If Coronavirus Cripples the Government,” which offers vague descriptions of different military plans that could be put into effect if the civilian government were to be largely incapacitated, with a focus on the potential of the current novel coronavirus (COVID-19) pandemic to result in such a scenario.
The article’s author, William Arkin, largely frames these plans as new, though — buried deep within the article — he eventually mentions that such contingency plans can be traced back to the Eisenhower administration (though they were in place before) and have since been developed and updated by most subsequent administrations, largely through the issuance of executive orders. Arkin also points out that some of these “Continuity of Government”, or COG, plans include the “devolution” of leadership and Constitutional authority, which he notes “could circumvent the normal Constitutional provisions for government succession, and military commanders could be placed in control around America.”
Yet, there are key aspects of COG and its development that Arkin leaves out. For instance, in his timeline on how such plans have developed in the post-World War II era, he conveniently fails to mention any of the Reagan administration’s major changes to COG, including the Reagan-era Executive Order on which all current COG programs are based. Indeed, many of the “extra-Constitutional” aspects of COG that Arkin mentions began during the Reagan administration, when these plans were redrafted to largely exclude members of Congress, including the Speaker of the House, from succession plans and even moved to essentially eliminate Congress in the event of COG being implemented, with near total power instead being given to the executive branch and the military. It was also during this time that the “devolution” aspect of COG was hammered out, as it created three president-cabinet “teams” to be stationed in different parts of the country outside of the nation’s capital. Arkin’s decision to not mention how COG was a major focus of the Reagan administration is striking given that that administration poured hundreds of millions of dollars annually into COG planning and development and also conducted COG drills on a regular basis.
Furthermore, the Miami Herald revealed in 1987, that the COG programs of that era were deeply connected to what the Herald termed “a virtual parallel government outside the traditional cabinet departments and agencies” that began operating “almost from the day Reagan took office” and included many of Reagan’s closest advisers, including then-CIA Director William Casey. The Heraldfurther claimed that this “parallel government” had been responsible for the Iran-Contra scandal (i.e. “involved in arming the Nicaraguan rebels”) as well as “the drafting of martial law plans for national emergencies,” i.e. COG, as well as “the monitoring of U.S. citizens considered potential security risks.”
Other key players in those Reagan-era COG developments, such as former Vice President dikk Cheney, former CIA Director James Woosley and former Secretary of Defense Donald Rumsfeld, are also left unmentioned in Arkin’s article. Not mentioning Cheney and Rumsfeld are particularly glaring omissions given that they were involved in the implementation of aspects of those COG plans thatwent live in the wake of the September 11 attacks, when both men were serving in key posts in the George W. Bush administration.
While Arkin’s omission of the role of the Reagan administration and leading neoconservatives in the development and use of COG is significant, arguably more significant is his failure to mention one of COG’s major components, one that has gone essentially unmentioned by well-known media outlets for well over a decade – Main Core.
THE GOVERNMENT’S DATABASE OF “POTENTIAL TROUBLEMAKERS”
When Reagan issued Executive Order 12656, he created COG plans that could be implemented during “any national security emergency,” which the E.O. loosely defined as “any occurrence, including natural disaster, military attack, technological emergency, or other emergency, that seriously degrades or seriously threatens the national security of the United States.” E.O. 12656 also put the National Security Council (NSC) in charge of developing and administering COG policies. The NSC official placed in charge of this “secret” COG program was Oliver North, whose name would later become infamous for the key role he played in the Iran-Contra Scandal. During the Iran-Contra hearings in the late 1980s, then-Representative Jack Brooks (D-TX) attempted to ask the following question to North: “Colonel North, in your work at the NSC, were you not assigned at one time to work on plans for the continuity of government in the event of a major disaster?” Brooks, however was immediately cut off by Senator Daniel Inouye (D-HI), who stated ” I believe that question touches upon a highly sensitive and classified area, so may I request that you not touch upon that, sir.” Brooks protested, but North was ultimately not required to give an answer.
As the de facto leader of COG development and planning during the Reagan administration, North oversaw the creation of a controversial database that later became known simply as “Main Core.” The Main Core database, first built using the stolen PROMIS software (more information on PROMIS hereand here), was essentially a list of American dissidents and “potential troublemakers.” A senior government official with a high-ranking security clearance and service in five presidential administrations described the database to journalist Chris Ketcham in 2008 as follows:
“A database of Americans, who, often for the slightest and most trivial reason, are considered unfriendly, and who, in a time of panic might be incarcerated. The database can identify and locate perceived ‘enemies of the state’ almost instantaneously.”
In 1993, Wired magazine stated that:
“Using PROMIS, sources point out, North could have drawn up lists of anyone ever arrested for a political protest, for example, or anyone who had ever refused to pay their taxes. Compared to PROMIS, Richard Nixon’s enemies list or Sen. Joe McCarthy’s blacklist look downright crude.”
Main Core is the aspect of COG that is most often ignored in reporting on these types of plans, with Arkin’s article being just a more recent example. While most of the rare mentions of COG in the mainstream touch on how those plans would result in the implementation of martial law and the suspension of the Constitution, they even more rarely — if ever — mention Main Core. Indeed, the last “mainstream” reports on Main Core were written over a decade ago — all in 2008 — by Chris Ketchamin Radar, by Scott Horton in Harpers and by Tim Shorrock in Salon.
Given that COG is now creeping back into mainstream reporting, revisiting Main Core is essential as the database still exists and has grown considerably since Oliver North first oversaw its creation in the early 1980s. In Ketcham’s 2008 article on the subject, he quotes then-senior government officials who said that, at the time, the number of “unfriendly” Americans on that database was approximately 8 million. Ketcham further notes that, in the event COG is implemented, these individuals could be subject to anything ranging from “heightened surveillance and tracking to direct questioning and possibly even detention.”
Tim Shorrock, in his coverage of Main Core, noted that the database was seen in use at the White House following the September 11 attacks and there is strong evidence pointing to it having been used by the George W. Bush administration to guide its domestic surveillance activities in the post-9/11 era. A government official who had told a reporter about having seen the database operational at the White House following September 11th “turned white as a sheet” when the reporter mentioned the name “Main Core” specifically. Shorrock’s reporting also details how Main Core includes vast amounts of information on those “unfriendly” Americans, including the fruits of the vast domestic surveillance programs of the NSA and other U.S. federal agencies that continue today and are now set to be expanded due to the current coronavirus crisis.
In a report written last year on the involvement of U.S. and Israeli intelligence and their private sector allies in pushing for new, troubling pre-crime programs, I noted that Main Core is not only available to U.S. intelligence but also Israel’s intelligence apparatus and that Israeli intelligence was involved in the creation and expansion of Main Core. That report also detailed how Main Core was used by members of Reagan’s NSC to blackmail members of Congress, a practice that is likely to have continued under subsequent administrations. It also noted how Main Core today likely involves the same software now used by every U.S. intelligence agency and numerous other federal agencies that is marketed by Palantir, a company created and owned by Trump ally Peter Thiel. Palantir’s software boasts “predictive policing” capabilities and tracks a category of person using the label “subversive,” very much in keeping with the spirit of Main Core.
MAIN CORE AND BILL BARR’S POWER GRAB


