In this video actor Matt Damon speaks publicly on the New World Order and the Illuminati in a powerful speech.
He mentions the “topsy turvy world”we’re living in where the wrong people are in jail and the wrong people are out of jail.
He also says that the wrong people are in power, whilst the wrong people are out of power. Matt Damon has been a voice in the public eye for many years. He speaks out for human rights and freedom of information. He is a proponent of helping people and a respected actor and director. His speech is great and I am sure you guys will enjoy your time listening to it.
One of the most widely used tools for Schools monitoring kids and restricting pupils’ internet use in UK schools has a serious security flaw which could leave hundreds of thousands of children’s personal information exposed to hackers, a researcher has warned.
Impero Education Pro, a product that restricts and monitors’ students’ website use and searches, is used in 27% of UK secondary schools, according to the company. In a controversial pilot programme, a version of the software looks for extremism-related searches such as “jihadi bride”.
But last month the security researcher Zammis Clark posted extensive details of a flaw in the company’s encryption protocols which could allow almost anyone to gain full access to computers running the Impero software, run software such as spyware on the systems, or access files and records stored on them.
The company said it had released a temporary security patch and was working on a permanent upgrade.
Clark said the flaw he found would leave affected schools’ networks “completely pwned”, online slang meaning in this context that the networks’ security would be fully compromised and information on it would be rendered vulnerable.
He said he had posted it publicly, rather than privately disclosing it to the company, for several reasons. “One was that I was against the ‘anti-extremism’ stuff, the other was because not being a customer, I didn’t know where to send it.”
Schools using Impero’s software said the company had notified them of the security flaw in the middle of last month but they were offered few details of its potential scale.
One school IT manager said the response from Impero was vague and required managers to contact the firm for more information. “Impero are crap at communication,” he said.
Three schools and chains using the software that were approached by the Guardian said the company had been slow to deliver promised software patches. Impero also offered fixes to schools that were using the software without contractual support, but left it up to those schools to make contact.
One school said the most recent update on the situation from Impero arrived by email on Monday.
The company is known on school tech forums for its pushy sales techniques, but the software remains popular because of the lack of quality alternatives.
Impero stressed that no data had been compromised, it had already issued a temporary fix for the vulnerability and it would install a full solution before the start of the next academic year.
“On 13 June 2015, we were made aware that someone had maliciously and illegally hacked our product, subsequently making this hack public rather than bringing it to our attention privately and in confidence. No customers have been affected by this and no data has been leaked or compromised,” it said.
“We immediately released a hot fix, as a short-term measure, to address the issue and since then we have been working closely with our customers and penetration testers to develop a solid long-term solution. All schools will have the new version, including the long-term fix, installed in time for the new school term.”
The company said “the methods used to identify and communicate this particular issue were not legal” and they would take a “firm stance”.
“Impero Education Pro is designed to protect and safeguard children in schools and any attempt to jeopardise this by illegally obtaining and publicising sensitive information will be dealt with appropriately,”it said.
On Monday, a month after Clark first disclosed the software vulnerability, lawyers acting for Impero demanded in a letter that he should remove all of his online postings about the company, under the threat of civil proceedings for breach of confidence and copyright infringement and criminal proceedings under the computer misuse act. The letter admits the potential seriousness of the vulnerability Clark disclosed in schools’ systems.
“By publicising the encryption key on the internet and on social media and other confidential information, you have enabled anyone to breach the security of our client’s software program and write destructive files to disrupt numerous software systems throughout the UK,” it said.
Impero said the hack “could only be exploited if basic network security does not exist” and would require the hacker to be physically present in a school.
Publicly disclosing details of security vulnerabilities is a controversial practice in the online security world. Some believe private disclosure is better initially, as it gives companies time to fix flaws before they are made public, but it rarely results in legal action.
Mustafa al-Bassam, a security engineer and former member of the hacking collective Lulzsec, said the legal threat against Clark was bizarre, especially when such exploits can be used or sold for profit, rather than posted online to be fixed.
“Responding with a legal threat to a security researcher that highlighted a serious security flaw in your software is bizarre and shows utter disregard for customers,” he said.
“Unfortunately it shows a theme that is too common in the software industry: companies view security as an external PR issue because it often affects their customers more than it affects them. And they should be grateful that this security flaw was disclosed publicly instead of being sold to malware developers like Hacking Team.”
Impero’s Education Pro software serves a variety of roles in schools’ systems, including blocking inappropriate web surfing – such as adult sites – and monitoring students’ activity, as well as rationing printing and making IT administration simpler.
However, last month – just days before Clark discovered the flaw – the Guardian reported Impero was offering a new feature to monitor keywords potentially tied to terrorism or extremism before the implementation of new counter-terrorism legislation introducing a requirement on schools to monitor pupils for such signs.
The pilot, introduced in 16 UK schools and five in the US, monitors for phrases such as “YODO” – You Only Die Once – “War on Islam”, and “Storm Front”, a neo-Nazi group.
The Department for Education said: “We have been clear that schools are expected to ensure that sensitive pupil information is held securely. The Data Protection Act of 1998 is clear what standards schools are expected to adhere to and we provide guidance on this.”
A mere cursory glimpse into the future foretells of a world in which the Internet has been integrated into almost every facet of our lives. However, the flood of smartphones, laptops, and “Internet of Things”-enabled devices in recent years has led it to expand at a rate far beyond the expectations of its original creators. With today’s generation of technology pushing the limits of current fiber optic capacity, in the next decade, radical new solutions to the “capacity crunch” are crucial to the sustained success of the web.
The domain of all things digital is evolving quickly, and tomorrow’s Internet promises to be in places it never was before: inside our appliances, in far-flung villages, even in space. While some of these needs are practical (“smart” healthcare devices, learning thermostats, rural WiFi) others are purely for amusement (Netflix, the introduction of Oculus Rift). All in all, coming changes to the constantly-expanding role of the net stand to make our world a much different place than it was just several years ago.
As much of the world races to improve Internet connection speeds, researchers are concerned that the fiber optic cables which form the physical backbone of the global Internet are reaching their peak capacity and may run out of bandwidth in as soon as five to eight years. According to UK scientists, the cables and fiber optics that deliver data to users will have reached their limit by 2023. No longer able to transmit information, this may trigger an Internet collapse of epic proportions. This is a massive problem, of course, especially taking into account the fact that much of the developing world still needs to be brought online, even as Western superpowers continue to demand greater bandwidth and faster Internet speeds.
This issue has made it to the mainstream, as doomsday predictions from scientists, physicists and engineers warning of a “full” Internet summoned the attention of all who depend on the web (for cat videos, or other perhaps more worthwhile pursuits). Until now, Internet providers have kept up with increased demand simply by sending more and more data down a single line of optic fiber. But now, the optical fibers have reached maximum capacity, and cannot transfer any additional information. Some of the world’s largest providers of fiber optic connections, such as VerizonFiOS, Google, and Microsoft, have recently worked to improve their networking infrastructure to keep up with our insatiable desire for faster, stronger Internet. However, this does not change the fact that computer-to-computer interactions are growing at an exponentially faster rate than anyone had predicted.
As reported by the media, there are several Internet initiatives afoot which may serve to mitigate this issue completely. Some of the biggest names in technology today have a stake in the race to develop better and faster forms of Internet delivery, implementing some wild schemes in an attempt to move beyond broadband. From Google’s Loons to Elon Musk’s lofty plan for individual Internet satellites, some plans are perhaps less “grounded” in reality than others. However, the key to fighting capacity crunch might already be beneath our feet.
“Dark fiber” is a term used to refer to networks of unlit optical cable infrastructure, laid down and left unused during the dotcom era. In the city of San Francisco alone, over 110 miles of fiber optic cable run underground. Only a fraction of that fiber network is currently being put to use. Right now, networks of dark-fiber primarily serve corporate entities, in high-density urban centers. But experts say that putting them to use residential communities wouldn’t be tough.
Robert Steele, former intelligence officer with the CIA, has proposed another idea to solve this problem: open source everything. As the growth of online media consumption – through streaming sites such as Netflix and Youtube – promises to further skyrocket in years ahead, his solution may make the most sense.
Steele spoke on the matter, saying:
“Sharing, not secrecy, is the means by which we realise such a lofty destiny as well as create infinite wealth. The wealth of networks, the wealth of knowledge, revolutionary wealth – all can create a nonzero win-win Earth that works for one hundred percent of humanity. This is the ‘utopia’ that Buckminster Fuller foresaw, now within our reach.”
Does reaching the end of the current optical fiber limit mean an Internet apocalypse will occur within our lifetimes? Personally, I’m optimistic that engineers will soon ameliorate the problem and clean up the mess – hopefully before I have to cancel my Netflix subscription.
When we shop for food in a supermarket or eat a fast food hamburger and fries, most of us don’t give much thought to the way the food was produced, or to the amount of suffering and environmental cost that went into each bite. But research is beginning to show definitively that industrialized factory farming, particularly animal agriculture, is having a catastrophic effect on the environment and poses a significant threat to human health and well-being. The following five documentaries look at these problems head on.
Indigestible: The Film (2014): This 90-minute documentary by Geri Atos examines factory farming and its effects not only on the animals being raised for food, but also on human health and on the environment as a whole. The film seeks to uncover the truth about conditions for animals in these Concentrated Animal Feeding Operations, and uses interviews with experts in the public health and environmental fields to identify the far-reaching societal consequences of factory farming. You can stream Indigestible on Facebook.
Fat, Sick, & Nearly Dead (2010): Joe Cross, an affable Australian, decides he’s had enough of ill health and obesity and endeavors to transform his life. This documentary (which is streaming on Netflix) chronicles his journey as he undertakes a 60-day fruit and vegetable juice fast and travels across the United States, interviewing ordinary people along the way. Two of the people he meets are inspired by his efforts to change their own lives. At the end of his fast, Cross has lost 100 pounds and has no signs of the autoimmune disease that had plagued him. He presents his story as a cautionary tale for Americans plagued by obesity and poor diets.
Cowspiracy: The Sustainability Secret (2014): A close look at how industrialized farming is wrecking environment, this film features experts like Michael Pollan and Howard Lyman who argue that factory farming of animals is contributing to climate change, loss of forests, huge amounts of water pollution, and other environmental problems. Directors/producers Kip Andersen and Keegan Kuhn show that many organizations that supposedly want to help protect the climate, like Greenpeace, NRDC and Surfrider, seem to be ignoring the huge role that animal agriculture plays in messing up the environment. There’s a lot of food for thought in this one, and it’s online in full at Disclose.tv.
Cock Fight (2015): Produced by Fusion, a media company launched as a joint venture between Univision Communications and Disney/ABC, this six-part documentary tells the story of Craig Watts, a chicken farmer turned whistleblower. The picture it paints of the chicken industry is disturbing. Four companies control 54 percent of the chicken production in the United States, and they own and control almost every aspect of the production process. That leaves the farmers themselves little better than sharecroppers; most are “contractors” who don’t even own the chickens they raise and who spend much of their time killing undersized or deformed birds. Poverty, debt, and the fear of retaliation for speaking up against an unjust system are the lot of most chicken farmers today. Check this out on one of Fusion’s local channels.
Food, Inc. (2008): This PBS documentary by Robert Kenner presents a comprehensive and scathing picture of the highly mechanized global food industry which values efficiency and profit over health and well-being. The result, Kenner argues, is sick animals, environmental degradation, unhealthy food, obesity, diabetes, and other health issues, and a system in which a few giant producers hold all the power. With footage of production sites and meat packing operations, interviews with farmers, food workers, consumer advocates, and experts like Michael Pollan and Eric Schlosser, Kenner marshals a vast array of evidence to make his case against the industrialization of food. Food Inc. is streaming and on DVD from Netflix.
Each of these films offers a different take on issues related to factory farming and the global mechanized food industry, but all provide important information and insights into the dangers of the current system for human health and for the health of the planet. The first step in changing any of this is becoming aware of it, so do yourself a favor and lift the veil hiding the realities of the food industry!
Anonymous radio host know as Lorax aka Adam Bennett Anon was arrested (full article).
Everybody who has known Adam ‘Lorax’ Bennett aka Adam Bennett Anon knows he’s an awesome anon. Furthermore, the article now let us know he was also involved in his local community as an experienced life saver and a fundraising manager for Cancer Support. This kind of person doesn’t belong in jail! He belong to it’s people. The people he give each day of is life to protect.
If you’ve know Lorax, or Adam John Bennett, now is the time to get involved and help!
The lifesaving Lorax’s tale took an interesting turn the last few nights, as the internets and ircs were ablaze with controversy, flame wars, and a little good-ole-fashioned ‘he-said she-said.’ What was already looking like a classic tale of governmental overreach and the suppression of Adam John Bennett’s Civil-Rights is turning into a dark tale of deception, duplicity, and police-led treachery. While there was much argument among the anons present, one thing was very clear, the Australian government had tricked and deceived a minor in an unsuccessful attempt to lure the Lorax into a hacking scheme. Having failed in that they have continued to attempt to argue that the research work that he did at his job for a Cancer fighting charity that showed a clear problem with the same security protocol that the Australian Government was proposing using with it’s upcoming, Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014, plan for telecoms to keep their customer’s e-mail and phone metadata for two years.
Soon after Bennett began criticizing the plan there was an alleged hack into AATP (third-largest telecom in Australia) and the Indonesian government, Anonymous was blamed. The Government initially charged the Lorax and two hackers with the breach. After nearly a year of delays and continuations, the court announced that all of the charges for hacking by Bennett would be dropped, but replaced with obscure sounding charges like, “aiding and harassment.” It has become ever more clear that there wasn’t ever much of a case and the government is using Bennett’s bail restrictions to keep his LoraxLive show off of the air.
This dark tale really begins in 2011, even before the government started suggesting an ill-conceived data retention scheme, before anyone hacked AATP and the Indonesian government. Back in the heyday of lulzsec a 15 year-old hacker who we’ll call Hacker-Z (not his real hacker handle) was caught up in the glamour and prestige of the lulzsec-style direct-action hacking. Hacker-Z was like almost nearly ever teenage boy he wanted to listen to loud music and raise a little hell. That sounds anti-social perhaps, but when you see that the things that young hacktivists want to break are things like evil autocratic governments like Libya or Tunisia, or on-line bullying groups, that anti-social streak can begin to turn an odd shade of heroic on a young person. Apparently, according to general consent, it wasn’t hard for the same sort of Five Eyes investigators–who were at that same time acting as the nefarious Sabu’s puppet masters, in a separate scheme to entrap Anons–to get a hold of this inspired, if naive teenager.
Having entrapped the would-be activist with an illegal hacking scheme, they first terrified the lad and his mother with the prospect of nearly life in prison for his unsuccessful attempt, while being directed by undercover government agents, to hack government and military websites; according to some in the chatroom. Having scared his mother as best they could it was easy for the police to convince her to give consent for them to use their son as a mole to keep an eye on on-line hacktivists. Any mother if, confronted with the prospect of sending her only child to prison, for probably, the rest of his life would almost surely make the same decision. Having Hacker-Z as a mole worked well for the police apparently, he was generally reported to be a friendly, helpful, and affable young man. No one on this side of things is sure how much information he really got in his few years, probably, working for the police, but needless to say when he was arrested with the Lorax, many a hard drive was wiped, just in case.
It seems the feds kept Hacker-Z on ice until the day they needed him. That day came, apparently, during the summer of 2012, when the Australian Government first proposed the current anti-privacy legislation that they are quietly pushing through the legislature right now. When The Lorax caught wind of the Government’s plan he immediately saw the obvious problems with warehousing the entire Australian population’s personal web data. Even if the government could show an actual need for all of this personal, which they can’t, Bennett honed in on the first and most obvious problem, security. Eventually Bennett showed, at his workplace, while testing their server, that recent flaws found in OpenSSL, the so called “Heartbleed Bug” could eventually lead to losses of citizen’s personal data to criminals or terrorists, if the government continued with their data retention plan.
Seeing the problem the Lorax did what the Lorax does when the community is in danger; he warned people through his popular show, Lorax Live, whose archives, that haven’t been seized by the government, can be heard here and here. Obviously, the leaders and politicians backed by corporatism and fully vested in the telecom industry, couldn’t afford to have a lot people aware of or critical of their massive transfer of both citizen’s data and the nation’s wealth, in the form of fees paid by taxes, to the nation’s telecoms. No, classically, power becomes annoyed when confronted by truth, this story is no different.
By the Winter of 2012, as far as the Australian government and the Australian Federal Police were concerned; the Lorax had to be silenced. Later when they learned that, while at his job testing his employer’s server’s security, Bennett had discovered a way that the “Heartbleed Bug” might be used to access encrypted files on a server, the very sort of thing that privacy advocates had been screaming about ever since the government first suggested the data retention program, government agents hatched a plan to silence the Lorax.
The police knew that they would never convince a reputable, white-hat security researcher like Adam John Bennett to participate in a criminal attack on the internet’s infrastructure. It is rumored that the police devised a plan to implicate the Lorax without needing him to take part in any illegal activity. To do this, they gathered up their friendly young, unfortunate mole, Hacker-Z and sent him into an irc chat with the Lorax and had him plead with Bennett to give him, Hacker-Z, Bennett’s note’s from his research work on OpenSSL. The authorities, it seems, hoped that by obtaining information on how one might be able to attack encryption from the researcher they could implicate him in a crime and, at least, keep his radio show off the Internet until they got their data retention plans passed into law.
Perhaps more despicable than the government’s attempt frame and implicate a man are its motives, of depriving a citizen of his civil-rights, and its methods of abusing the criminal justice system through the attempted entrapment of an innocent man, and misuse of a citizen’s right to bail in order to silence a benign, but vocal critic of governmental corruption and malfeasance. This is not Syria or Zimbabwe where a critic can simply be tossed in a hole or executed by despots, in “free” societies, like Australia, you must design administrative and judicial straps with which to bind their tongues and hands to things like restrictive bail requirements or plea agreements, to trumped up or false charges. The critic is silenced, the powers-that-be have no blood on their hands, the media calls the former hero-of-the-people a villain, and whatever danger the critic was fighting against is forgotten. It’s all very civilized.
If the police were unaware of who they were dealing with or simply unfamiliar with the world of white-hats is unclear. Bennett did not give their mole any help or information, and not because he believed he was a mole. (As a white-hat researcher Bennett was well aware of cyber-crime and the need for enforcement in the field, it can assuredly be assumed then that he supports law-enforcement and legitimate undercover operations, but any thinking adult would have to wonder about the wisdom of using children as moles to bait and entrap adult criminals.) No, it is rumored that Bennett refused to help the boy, not because he believed he was working with police, rather he believed that the youth might be an impassioned young hacktivist who could possibly do something unwise or damaging with the information, something that might hurt others as well as get the lad in trouble with the law. Most likely, in Bennett’s mind, the young Hacker-Z would be better off waiting until the bugs in OpenSSL were fixed to get a look at the Lorax’s research notes.
Blown off course, but not sunk by the Adam John Bennett’s integrity, the Australian Government tried a new, indirect tack to get their entrapment scheme back on course. They would have Hacker-Z engage an intermediary, another White Hat researcher, someone the Lorax would trust. They found him in a passionate young researcher we’ll call Hacker-X. Hacker-X was known as a knowledgeable and helpful security expert. He had long been very helpful getting newbloods on the right track on-line and helping others secure their computer systems. Like a lot of hacker culture Hacker-X believes in education and the open-sharing of information, not to cause damage but to protect from damage.
Imagine you bought a lock for your front door, it’s a common lock, and there are many like it in your neighborhood. If there was a flaw in that lock that could allow criminals to enter your home then you would like to know about it, wouldn’t you? Of course you would, and it would be good for you to know so you could find a way to fix it or replace it, so the burglars can’t come in. Certainly, you wouldn’t want burglars to know about the flaw, but luckily the vast majority of humans aren’t burglars, likewise very few people interested in computer security are criminals. So, for a researcher such as Hacker-X to want to share something that could easily be used to help secure a network, is understandable and legal. It’s not clear if he already had possession of the notes from Lorax’s research into OpenSSL, or if he actually obtained them on behalf of Hacker-Z, regardless, sharing information about a weakness in an encryption protocol is not illegal, as the Australian Government’s delays and recent charge droppings indicate.
Whether the police were directly involved in or only supervising the alleged hacks on AATP and the Indonesian government isn’t clear, but it has become very clear that they never had any evidence against Adam John Bennett, the Lorax. In an extraordinary judicial move they have dropped all of the charges against Bennett, but have come up with ten new charges that, they claim they will commit to at his next hearing in June. While on one hand it is great to think that the Lorax may end up getting the justice he deserves in a dismissal of all charges at his next hearing, what is maddening is the obvious and bald faced way in which the Australian Government is misusing the criminal justice system to keep him Bennett on the restrictive bail terms that prevent him from broadcasting his show, LoraxLive and his protest about the government’s data retention plan.
The case of Matt DeHart, a former U.S. drone pilot turned hacktivist, is as strange as it is disturbing. The 29-year-old was recently denied asylum in Canada, having fled there with his family after — he claims — he was drugged and tortured by agents of the FBI, who accused him of espionage and child pornography.
Prosecutors have shown they’re willing to say anything to convict a hacktivist, even if it means lying
Last week the Canadian Border Services Agency said he will be deported to the U.S. to stand trial “in very short order,” after a Canadian Immigration and Refugee Board ruling earlier this month denying his request for refugee status. He is being denied access to two thumb drives that he says contain evidence of illegal acts perpetrated by a U.S. government agency. Now after three unsuccessful attempts to gain political asylum, he fears that he and the files will be delivered to the very government he sought to escape.
“I cannot imagine any life in a country which has already tortured me,” Matt DeHart told reporter Adrian Humphreys, whose astonishing five-part series in Canada’s National Postdocuments the bizarre case. “Am I now to be given into the hands of my torturers?”
It’s tempting to dismiss DeHart’s claims based on their sheer outlandishness and his equally outlandish attempts to defect to Russia and Venezuela, which he now says he regrets. But given President Barack Obama’s administration’s penchant for punishing hacktivists and whistleblowers, a disturbing decades-long trend of prosecutorial misconduct and the now established fact that the U.S. has, as Obama put it, “tortured some folks,” it’s clear that the U.S. government’s claims in this case warrant even more skepticism.
Matt DeHart
According to government documents, Matt DeHart admitted during an interrogation to becoming involved with a spy ring during his time as a drone pilot, agreeing to broker the sale of military secrets for up to $100,000 per month through a Russian agent in Canada. But he claims he was being drugged and tortured and simply made the story up.
“I would have told them anything,” he told The National Post of his encounter with the FBI agents, during which he was denied a lawyer. “Information that is derived from torture — to use it against somebody is ridiculous. It’s garbage. I already said it’s not true.”
He testified that the agents admitted the child porn charges were fabricated — a ruse to enable investigation into his involvement with the nebulous hacktivist collective Anonymous. He says the investigation stems from a file he uploaded twice to a hidden website, hosted on the anonymous Tor network from a server in his parents’ house. DeHart claims it contained evidence of government wrongdoing, “an FBI investigation into the [CIA’s] practices.” Screen shots of the WikiLeaks website found on his computer suggest he intended to send the file to the whistleblowing organization.
After the asylum ruling earlier this month, three courts — two in the U.S. and one in Canada — have expressed strong doubts about the child pornography charges that triggered a search warrant onMatt DeHart’s parents’ home in the U.S. Those accusations date to 2008 and stemmed from his association with two teenagers while playing the online game “World of Warcraft,” one of whom was also involved with Anonymous; the charges were ultimately not proved.
After DeHart was arrested while crossing from Canada to the U.S. in 2010, a judge in Bangor, Maine, found it odd that prosecutors were suddenly citing the two-year-old porn accusations and that police hadn’t analyzed Matt DeHart computers for illicit files seven months after they were seized. A judge in Tennessee, where Matt DeHart ‘s family lived before moving to Canada, admitted that “the weight of the evidence is not as firm as I thought it was.” And most recently, the Canadian Immigration and Refugee Board concluded there was “no credible or trustworthy evidence” that DeHart had solicited child porn.
Prosecutorial misconduct helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.
To be sure, Matt DeHart strange behavior throughout this ordeal doesn’t place him in a particularly flattering light. But it’s worth noting that these kinds of serious accusations are often made in cases against hacktivists and whistleblowers, helping place them in the government’s crosshairs and paint them as nefarious even when the accusations are easily disproved.
Barrett Brown, a journalist who investigated links between the U.S. government and private intelligence contractors, had all manner of ridiculous false accusations thrown at him before being sentenced last month to five and a half years in prison. He was initially charged for the innocuous act of copying and pasting a hyperlink to a public file stolen by Anonymous from one chat room into another. The charge was dropped, but the linking was still used to increase the length of his sentence, despite the fact that prosecutors had no evidence Brown had looked at the file or even known what was in it.
At one point, prosecutors claimed that Brown conspired with members of Anonymous to overthrow the U.S. government. They also accused him of participating in “SWATting,” the practice of making fake 911 calls to harass people in their homes, and even of plotting with another journalist to hack the Bahraini government. Not one of these claims was supported by the voluminous collection of chat logs that the government provided as evidence. Nor did additional logs obtained by The Daily Dot, which the prosecution had withheld under seal.
Brown was not entirely without fault in the case, having obstructed a search warrant and posted a YouTube video threatening an FBI agent in response to the seizure of his laptops. But in retrospect, it seems clear the impetus for the case was that the government saw Brown’s investigations as a threat and would say anything to guarantee his conviction, even if that meant knowingly making false statements. As Brown put it during his allocution, “This is not the rule of law … It is the rule of law enforcement.”
Close scrutiny
What can we expect from the Matt DeHart case if this is the prosecutorial legacy it follows?
As The New York Times editorial board recently noted, defendants have no recourse when police and prosecutors lie, cheat and conceal evidence in the courtroom, leading to what one federal judge has described (PDF) as a national epidemic of prosecutorial misconduct. Sometimes it leads to wrongful convictions. Other times, as in Brown’s case, it helps the government railroad journalists, whistleblowers, hacktivists and any who dare to speak truth to power.
Remember Aaron Swartz, an information activist who prosecutors pursued vigorously for the act of downloading too many academic articles from an MIT library? Much like in Brown’s case, prosecutors were accused of withholding evidence and coercing Swartz into taking a guilty plea. Swartz committed suicide in 2013 amid mounting legal costs and the possibility of up to 35 years in prison, triggering the DeHarts’ decision to flee the country.
“Aaron Swartz had very similar psychological makeup, similar age, same circumstances as Matt DeHart,” DeHart’s father, Paul DeHart, a retired U.S. Air Force major, told The National Post. “I do not want to wake up one day and find my son hanging from a rope in the garage of our house. And I have noplace to go to bring this to anyone’s attention.”
With Matt DeHart’s attempted defections and other erratic behavior, it’s admittedly difficult to determine where his true intentions lie. But the government’s actions against him have been just as sketchy, if not more so. His claims must be taken seriously, and his case should be closely scrutinized, lest another potential whistleblower fall prey to the state’s merciless war on leaks.
by Joshua Kopstein, a cyberculture journalist and researcher from New York City. His work focuses on Internet law and disorder, surveillance and government secrecy.
Aaron Swartz was a computer programmer and Internet activist who is often referred to as the third founder of Reddit.
Early Years
Aaron Swartz was born on November 8, 1986, in Chicago. Precocious from the start, Swartz taught himself to read when he was only three, and when he was 12, Swartz created Info Network, a user-generated encyclopedia, which Swartz later likened to an early version of Wikipedia.
Info Network landed Swartz in the finals for the ArsDigita Prize, and he also was invited to join the RDF Core Working Group of W3C (World Wide Web Consortium), a group assembled to help the Web evolve.
RSS & Creative Commons
Swartz’s next steps were co-authoring news aggregator RSS 1.0 (which went on to become the industry standard) and moving to San Francisco to write code for Creative Commons, a public domain watchdog group. He then headed to California to study sociology at Stanford University. At Stanford, he downloaded law review articles from the Westlaw database and used the data to write an important paper about the connection between research funders and biased results. However, he left academia after only a year, taking a leave of absence to join Y Combinator, an incubator for up-and-coming Internet talent.
Also around this time, Swartz’s new project, Infogami, merged with Reddit.com, making Swartz a co-founder of the resulting company. Reddit had millions of visitors per month when Condé Nast bought it a year later (2006).
In 2008 Swartz wrote “Guerilla Open Access Manifesto,” which was an argument against information being hoarded and controlled by any particular group. The document ended with a demand that information be freely available and grabbed forcibly, if need be: “We need to take information, wherever it is stored, [and] make our copies and share them with the world.”
Felony Charges
That fall, Swartz decided to take on PACER, a system that charged users to download court documents. Through an algorithm he wrote, Swartz downloaded 19,865,160 pages of text from the database. By the spring of 2009, FBI agents were at Swartz’s door, questioning him about the downloads. The investigation was dropped, but a year later Swartz began downloading academic articles from the JSTOR archive at MIT, ending up with around 5 million documents. Swartz’s motivation for downloading the articles was never fully determined, however, friends and colleagues believe his intention was either to upload them to the Internet to share them with the public or analyze them to uncover corruption in the funding of climate change research.
After launching activist group Progressive Change Campaign Committee and later Demand Progress, in January 2011, Swartz was detained in Cambridge, Mass. by police and Secret Service agents. Since his activities in PACER, the government had been watching, and by July 2011, Swartz was facing multiple counts of computer and wire fraud, charges that could have resulted in 35 years in federal prison.
Suspicious Death – Murdered?
When Aaron Swartz refused to deal with the devil, did the government “suicide” him?
“You could eat a sandwich in the time it takes to suffocate from hanging. If he really was as depressed as media says, he could have easily gotten a prescription for Xanex, put on some nice music, light some candles and gone to sleep and never wake up. Why hanging? “
Aaron Swartz was found hung in his Brooklyn apartment. The coroner and Media say he killed himself.
Swartz was no Occupy Wall Street hippie. At 27, he’d already reached the top of his field. He was a software genius and Internet champion. He co-authored the “RSS 1.0” a widely-used syndication format. he also co-founded Reddit which was sold to Conde Naste. He founded Open Library, an internet database dedicated to obtaining public domain documents that had been appropriated by private interests. He ‘hacked’ the Library of Congress database and uploaded it to Open Library making it available for free.
The “social media” industry has virtually taken over every aspect of human communication. This industry increasingly is synonymous with erosion of privacy and commercialism. The movie, ‘The Social Network’ glorified Facebook’s CEO Mark Zuckerberg, as a ‘genius’ at betrayal of friends and classmates in order to get sex, money, and power.
Aaron Swartz wasn’t as famous as Mark Zuckerberg – but he was an effective advocate for freedom of information. He wasn’t billionaire, or even a millionaire, though he could have been. Harvard law professor Lawrence Lessig said, “He never did anything for the money”.
LEGAL PROBLEMS
In 2010, Swartz downloaded the entire JSTOR archives because the organization pays the publishers of scholarly articles, not the authors.
On July 19th, 2011, the Attorney General of Massachusetts threw the book at him. He was charged under the 1986 Computer Fraud and Abuse Act, otherwise known as “hacking”. But this broad, fuzzy law wasn’t a good fit for downloading uncopyrighted articles with intent to redistribute.
At the moment, that’s not a crime yet. Making such a thing a crime is what the PIPA / SOPA bills meant to do. Undaunted by the warning from Federal muscle to “chill”, last year Swartz was a significant organizer against the SOPA bill that threatened freedom of information access on the internet.
Lawrence Lessig, said, “The government was not gonna stop until he admitted he was a felon. In a world where the architects of the financial crisis regularly dine at the White House, it’s ridiculous to think Aaron Swartz was a felon.”
Lessig knew Aaron for twelve years. He was Swartz’ advisor on intellectual property law for Creative Commons and Open Library.
WAS HE MURDERED?
The mainstream media has been doing a snow job to make us believe that Aaron Swartz committed suicide by tying a rope around his neck and hanging himself.
Personally, I think he would have been creative enough to think of a less horrible way to die. You could eat a sandwich in the time it takes to suffocate from hanging. If he really was as depressed as media says, he could have easily gotten a prescription for Xanex, put on some nice music, light some candles and gone to sleep and never wake up. Why hanging?
Hanging is a horrible way to die. The sentence of hanging was intended to send a message to other offenders “this could happen to you”. I think that’s why Aaron Swartz died by hanging. It’s a message to other activists — probably those he knew who worked with him.
Swartz’s father is an intellectual property consultant to MIT’s computer lab. At Aaron’s funeral, he said his son was killed by the government.
Media has since spun Swartz’ father’s remark as if it he was speaking figuratively. Don’t you believe it. I don’t like the way mainstream media writers frame Swartz’s hanging as a reaction to ‘bullying’. It implies Swartz was afraid of the government, that he was a coward, or mentally ill.
That’s not it. Swartz’s career shows the familiar pattern of attempts to assimilate him into the system – scholarship to Stanford, lucrative job under auspices of WIRED, a fellowship from Harvard’s institution on ethics. All these perks failed to control him, so they switched to Federal muscle tactics.
Each attempt to control him drove him further beyond the pale. But I think his death warrant wasn’t issued till last year when he became an effective leader of a million people and stopped the PIPA and SOPA bills. Effective leaders aren’t allowed.
Bertrand Russell wrote frankly that geniuses would be carefully offered a place with the elite, but those that persisted in bucking the system would be exterminated. From “The Scientific Outlook”, 1931, Russell wrote;
“On those rare occasions, when a boy or girl who has passed the age at which it is usual to determine social status shows such marked ability as to seem the intellectual equal of the rulers, a difficult situation will arise, requiring serious consideration. If the youth is content to abandon his previous associates and to throw in his lot whole-heartedly with the rulers, he may, after suitable tests, be promoted, but if he shows any regrettable solidarity with his previous associates, the rulers will reluctantly conclude that there is nothing to be done with him except to send him to the lethal chamber before his ill-disciplined intelligence has had time to spread revolt. This will be a painful duty to the rulers, but I think they will not shrink from performing it.”
Lessig said “Aaron Swartz is now an icon, an ideal. He is what we will be fighting for, all of us, for the rest of our lives.”
An unnamed scientific researcher walks out to her mailbox, shuffles through some bills and advertisements, and pulls out an envelope containing a CD of pictures from a recent scientific conference the researcher had attended in Houston. Excited – though maybe a bit nervous – to see the candid photos of herself and her colleagues snapped by an excitable event photographer, the researcher walks inside, casually drops the unopened bills on the kitchen table, opens up her laptop, and slides in the CD. Windows asks if she’d like to open the pictures to view them. She accepts, and the pictures pop up in the photo viewer. One by one she clicks through them, viewing the photos from the event. She reminisces fondly, wincing only at that one photo where she looks either drunk or high, making mental note of the pictures to print out for her lab desk.
What the researcher doesn’t see, however, is a malicious payload – a virus, one of the most sophisticated known to man – secretly installing itself in the background of her computer. This virus would give a certain secret group of individuals complete access to her system, a group which had hijacked the package mid-transit in the mail, replaced the original CD with a copy that included the virus, taped everything back up without evidence of tampering, and sent the package on its way to her. The virus was practically untraceable and completely irremovable; it could map out networks, jump to computers not connected via the Internet, and even selectively target and destroy specific computers much like a bioengineered nano-virus – all at the direction of a secret shadow organization that was covertly infiltrating the world’s most secure computer systems.
The Equation Group
What may sound like the start to a Tom Clancy novel, or an episode of 24, is, in fact, completely real, the likes of which actually happened to one or more researchers back in 2009. In fact, surreptitious, interdiction-based cyberattacks like this one have apparently been happening since at least the early 2000s and may date back to 1996.
Last Monday, Moscow-based Kaspersky Lab released a cybersecurity report uncovering details about the most sophisticated, covert, and pervasive hacker groups known to man and possibly ever imagined. The organization, dubbed the Equation Group due to the group’s affinity towards sophisticated encryption methods, had operated practically undetected for over a decade, silently infecting computers across the globe and delivering attack payloads still unknown.
“There is nowhere I can’t go. There is nowhere I won’t find you.” – Bane, The Matrix Revolutions
Kaspersky Lab, a cybersecurity firm known primarily for its antivirus software, is no stranger to hackers. The company tracks and documents security breaches of all shapes and sizes.
For years, most high-profile computer hacks had been primarily the work of individuals or small groups motivated by curiosity or, more recently, financial interest – gray-collar criminals who would infiltrate computer systems for credit card numbers to sell on the black market. Usually these attacks are relatively unsophisticated, relying on bad operational cybersecurity practices (dubbed “opsec”) from corporations to create exploitable security holes like those seen in the recent Target and Home Depot security breaches. Only upon the discovery of the Stuxnet virus in June 2010 that sabotaged Iran’s Natanz uranium enrichment facilities have cybersecurity researchers and the public at large turned an eye towards advanced persistent threats (APTs) which use advanced hacking techniques capable of bypassing strong opsec protocols.
What make Equation Group so impressive are their “almost superhuman” technical feats, which include never-before-seen levels of ingenuity in hacking, engineering, and encryption. Those feats include:
using virtual file systems like those found in the Regin (a.k.a. WarriorPride) malware attack used by the NSA to infect overseas computers;
the ability to infect and surveil sensitive air-gapped (i.e. non-Internet connected) networks by piggybacking on USB flash drives, much like the Stuxnet virus;
encrypting malicious files and storing them in multiple branches of the Windows registry, making it immune to detect with antivirus software;
using over 300 Internet domains and 100 servers to command and control malware infrastructure; and
hijacking URL requests on iPhones to spoofed Mac servers, which indicates that Equation Group has compromised the iOS and OSX operating systems.
Hollywood good
Perhaps most impressive is an Equation Group malware platform that rewrites the firmware of infected hard drives, allowing the virus to survive even low-level reformatting that is used to securely wipe a hard drive. All major hard drive manufacturers have drive models that have been compromised, including Western Digital, Seagate, Maxtor, Samsung, IBM, Toshiba, and Micron. Once the drive has been infected, the malware is completely impossible to detect or remove; the drive is compromised forever.
Forensics software displays, in Matrix-like fashion, some of the hard drives Equation Group was able to successfully hijack. (Credit: Kaspersky)
The difference in sophistication between your average Internet hacker and Equation Group cannot be understated. Your run-of-the-mill hacker is more or less equivalent to your run-of-the-mill burglar, who might break into a place with all of the sophistication of opening an unlocked door or busting out a window with a crowbar. APTs are more like museum thieves who might dress up like a guard or clone a keycard to snatch a valuable diamond or painting. Equation Group is an APT well beyond its peers, using super-spy tactics with analogical laser grids, vent shafts, and harnesses to swap a diamond with a perfect replica, remaining entirely undetected. It’s the stuff of Hollywood’s Mission: Impossible, only without the gratuitous explosions and Tom Cruise (…at least as far as anyone knows). And like Mission: Impossible, Equation Group is more than likely a clandestine operation of the U.S. government. via RedOrbit
“Discoveries and inventions are not terminals; they are fresh starting points from which we can climb to new knowledge.” – Dr. Willis R. Whitney, founder of General Electric Laboratories
After so many years of watching airplanes produce the lines in the sky, largely without knowing of what this Project consists or why, we have recently gained an understanding. Evidence suggests that today’s chemtrail spraying operations consist of airplanes saturating our atmosphere with nano-sized particles influenced by electromagnetic energy for the purpose of weather modification.
U.S. patent #4,686,605 “Method and Apparatus for Altering a Region in the Earth’s Atmosphere, Ionosphere and/or Magnetosphere” shows how stratospheric and tropospheric aerosols can be manipulated using electromagnetic energy in order to modify the weather. The ground-based antennas (known as ionospheric heaters) needed to produce the appropriate electromagnetic energy exist. For a detailed discussion, please see the author’s previous article “Smoking Gun: The HAARP and Chemtrails Connection.”
The 1996 U.S. military document “Weather as a Force Multiplier: Owning the Weather in 2025” outlines a program using aerosols sprayed from airplanes which are then manipulated with electromagnetic energy in order to modify the weather. This document will be discussed shortly.
The common thread here is weather modification; or as the Library of Congress calls it, “weather control.” Lots of other evidence supporting this assertion exists as well, but these two documents are the most salient.
Motives are plenty. Most notably, significant direct benefits can be gained by playing financial markets which rise and fall with the weather such as the weather derivatives and catastrophe reinsurance markets; not to mention agricultural and energy commodities. Enron pioneered the markets. With foreknowledge of the weather, so many scams could be concocted that it boggles the mind. Weather routinely changes the course of Human history. It determines what we do every day. It determines the outcomes of wars and influences elections. Control of the weather is God-like power. Money and power junkies want it.
Controlling Earth’s weather would necessarily require a gigantic scientific effort. Oddly enough, when one looks for a National effort in weather modification, one finds a lot. Specifically, if one looks, one can find a history of weather control programs involving electromagnetic energy and atmospheric particles; all in a coherent chronological order.
This paper is the result of thousands of dollars and countless hours spent researching many thousands of pages of source, organizational and Government documents related to weather modification and the atmospheric sciences. This article serves as the foundation for a series of shortly forthcoming articles detailing the history and current state of this Project. May this work help end the spraying. For the fact that these environmental modifications have been done without our informed consent, may this work contribute to the largest class-action lawsuit in history.
This paper examines the origins and development of this; the first planetary level scientific endeavor. Now is our opportunity to gain a deeper understanding of the New Manhattan Project.
The Origins of Weather Modification
People have been attempting to modify the weather for ever. Most commonly, man has gone about making it rain; especially in times of drought. The earliest recorded efforts were those of mystics. Local shaman would be called upon to ingest a certain concoction in order to communicate with the weather gods and ask for help. In some cases, the sacrifice of certain animals in certain fashions may have been the thing to do. Sometimes a good old rain dance may have done the trick.
Some early Western efforts to stop destructive weather are outlined in professor James Fleming’s book Fixing the Sky. On page 78 he writes, “In ancient Greece, the official ‘hail wardens’ of Cleonae were appointed at public expense to watch for hail and then signal the farmers to offer blood sacrifices to protect their fields: a lamb, a chicken, or even a poor man drawing blood from his finger was deemed sufficient.”
A little later professor Fleming writes, “In Austria, it was traditional to ring ‘thunder bells’ or blow on huge ‘weather horns’ while herdsmen set up a terrific howl and women rattled chains and beat milk pails to scare away the destructive spirit of the storm.”
Much of the early Western attempts at weather modification involved the detonation of explosive charges in the lower atmosphere. It was hypothesized that atmospheric explosions cause precipitation.
Early American Involvement
Although there has been much international participation, this article focuses on America’s participation in the New Manhattan Project. Throughout the development of the New Manhattan Project, America was the world’s technological leader; especially in the area of military technology. America led the way and developed most of this Project. America continues to lead the Project today. Therefore the early history of weather modification in America is relevant.
James Pollard Espy (1785-1860) also known as “The Storm King” was the first meteorologist in U.S. government service. Although he never received Federal funding for it, he suggested that forest fires can produce rainfall and that experiments in this area should be carried out. His magnum opus was a book called The Philosophy of Storms. This book contains a long section entitled “Artificial Rains.”
The first Federally funded weather modification field effort took place in Texas in 1891, with funds appropriated by the Congress in the amount of nine thousand dollars through the Department of Agriculture. The experiment involved weather modifier Robert St. George Dyrenforth (1844-1910) attacking the atmosphere with balloons, kites, dynamite, mortars, smoke bombs and fireworks. The results were inconclusive, but you can bet that the atmosphere was absolutely terrified!
From these early efforts until the beginning of the scientific era in 1946, the realm of weather modification was inhabited largely by a motley collection of pseudo-scientists and con artists similar to Dyrenforth. These people, who referred to themselves as “rainmakers,” traveled around the Country (mostly the West), going where local governments were willing to pay for their services. If a certain region was experiencing a severe drought, people were often desperate for solutions. These rainmakers’ activities often involved the mixing and open air release of dangerous chemicals. Some of these efforts were Federally funded. Since the days of Robert Dyrenforth, the Federal money has not stopped flowing.
Nikola Tesla
In the late 1800s, inventor Nikola Tesla (1856-1943) popularized the use of electromagnetic energy. In his 1905 United States patent number 787,412 “Art of Transmitting Electrical Energy Through the Natural Mediums” Tesla describes how electromagnetic energy may be sent and received through the atmosphere. The Supreme Court found that U.S. patent #645,576 “System of Transmission of Electrical Energy” proves he invented radio; not Marconi. He pioneered radar. He invented wireless signal and power transmission. Yes, power can be transmitted wirelessly; we’ll have more about that later.
Tesla’s musings and scientific discoveries pioneered what are today’s ionospheric heaters which use electromagnetic energy to cause atmospheric perturbations from great distances and play a defining role in the New Manhattan Project. Specifically, he pioneered the use of a certain type of electromagnetic energy called extremely-low frequency (ELF). This is a specific type of energy known to be used in the New Manhattan Project; the other being very-low frequency (VLF) electromagnetic energy.
In her book Tesla: Man Out of Time, Margaret Cheney writes that he did a good deal of theorizing about weather control. She also writes that he theorized that the entire earth might be illuminated by shooting electromagnetic energy 35,000 feet up into the atmosphere. 35,000 feet is about the altitude of today’s offending airplanes.
The Beginning of the Scientific Era
The scientific era of weather modification began famously in 1946 with a trio of scientists from General Electric Laboratories: Irving Langmuir, Vincent Schaefer and Bernard Vonnegut. Leading the group was the world famous Nobel Peace Prize winning scientist Irving Langmuir (1881-1957). This trio popularized the fact that, under certain circumstances, dumping substances from airplanes into clouds causes precipitation. Early experiments used dry ice while later experiments pioneered the use of silver iodide. Also invented were silver iodide generation equipment and many other weather related scientific instruments. Much of this trio’s work here was done in cooperation with the Office of Naval Research and the Air Force. Although others had previously dumped stuff out of airplanes in attempts to modify the weather, the G.E. scientists practiced a sound scientific method previously unseen in the field.
Schaefer, Langmuir & Vonnegut
image source: General Electric Laboratories
Following the famous scientific weather modification efforts of the G.E. Labs trio, the public’s imagination was sparked and a government regulated weather modification industry flourished. To this day, the government-regulated weather modification industry (or “conventional” weather modification industry as we will call it) expels dry ice, lead iodide or silver iodide (usually silver iodide) from airplanes.
However, the conventional weather modification industry is distinct from the New Manhattan Project and therefore is not the focus of this article. The New Manhattan Project employs electromagnetic energy to manipulate dispersed particles while conventional weather modifiers do not. Also, conventional weather modification efforts are conducted on a regional basis while the New Manhattan Project is global.
Not long after the scientific breakthroughs of the G.E. Labs trio, fueled by high level political rhetoric and popular interest, the United States federal government began pouring hundreds of millions of dollars annually into basic atmospheric research. Since then, the United States government is admitted to have spent many tens of billions of dollars on weather modification and the atmospheric sciences. Much of that was expended in 1950s, ’60s and ’70s dollars. If one is to control the weather, one must know how the atmosphere works. Or as geoengineer Dr. Clement J. Todd wrote in 1970, “Our ability to manage precipitation depends upon four factors: (1) understanding the physical processes of the atmosphere, (2) real-time knowledge of the weather we wish to manipulate, (3) devising the optimum treatment material and technique, and (4) delivery of that treatment to the cloud where and when we wish.”
The majority of the vast expanses of literature pertaining to weather modification and the atmospheric sciences is geared towards conventional weather modification. However, both the New Manhattan Project and conventional weather modification are supported by basic atmospheric research. So, buried in this body of literature, one may find glimpses of the New Manhattan Project. The rest of this paper recounts these glimpses.
Bernard Vonnegut
One member of the G.E. Labs trio, Bernard Vonnegut (1914-1997) went on to pioneer weather modification research involving the use of artificial electric charges and atmospheric aerosols. His work in this area was performed under Government contracts outsourced to a research and development firm called Arthur D. Little Inc.
Bernard Vonnegut
image source: Life Magazine
The earliest recorded instances of electricity being intentionally used to modify particles in the atmosphere can be found in the 1884 experiments of Sir Oliver Lodge (1851-1940). The 1918 U.S. patent #1,279,823 “Process and Apparatus for Causing Precipitation by Coalescence of Aqueous Particles Contained in the Atmosphere” by J.G. Balsillie built upon Lodge’s work. Using this knowledge as a basis, Mr. Vonnegut resumed Lodge’s work; this time with massive funding and modernized scientific equipment.
Beginning in 1953, Bernard Vonnegut, Arthur D. Little et al., conducted experiments involving stainless steel wires miles long strung from the tops of telephone poles, connected to a power supply and discharging corona. The coronal discharge’s effect upon ambient aerosols and the clouds above was monitored and analyzed. Through 1961, these experiments were carried out in Massachusetts, New Hampshire, Texas, Illinois and New Mexico. These types of experiments are referred to as “space charge” experiments. The U.S. Signal Corps and the U. S. Coast Guard provided support. Others performed similar experiments.
Space charge experiment
image source: The Massachusetts Institute of Technology
The 1958 “Final Report of the Advisory Committee on Weather Control” contained an article by Bernard Vonnegut, Vincent Schaefer, J. S. Barrows and Paul MacCready titled “The Future.” In it they outline an atmosphere saturated with “chemicals” and “altering” atmospheric electrical variables. It reads:
When the nature of thunderstorm electrification is understood it may prove possible to control this process by the introduction of chemicals into the atmosphere or by altering electrical variables. Such variables might be atmospheric conductivity, field, and space charge, or perhaps the corona giving properties of the earth’s surface.
When we become sufficiently sophisticated concerning the dynamics of the atmosphere it is possible that weather may be controlled by the large scale release of chemical or more probably thermonuclear heat energy.
In 1961, Bernard Vonnegut, Arnold W. Doyle and D. Read Moffett wrote a paper for Arthur D. Little titled “Research in Electrical Phenomena Associated with Aerosols.” This was a report about their experiments of the previous 3 months involving the effects of electromagnetic energy upon a grounded sphere in a small chamber surrounded by gas. Please consider the implications of that. We will revisit this paper much later.
If you are wondering… yes, Bernard Vonnegut was related to the novelist Kurt Vonnegut. They were brothers.
***
In 1958 the chief White House advisor on weather modification, Captain Howard T. Orville, said the U.S. defense department was studying “ways to manipulate the charges of the earth and sky and so affect the weather” by using an electronic beam to ionize or de-ionize the atmosphere over a given area.
***
The Department of Commerce Weather Bureau reported in 1960 that they were conducting a weather modification study in which, “Chemicals are introduced into the cloud which noticeably changes the surface tension of the droplets. Electrification effects are being observed by artificially electrifying the droplets and subjecting them to impressed electric fields.”
***
For better or for worse, this super secret program had a prophet. His name was United States Navy Admiral William Francis Raborn (1905-1990).
William Francis Raborn
image source: United States Navy
In the January 1963 edition of the U.S. Naval Institute Proceedings, Admiral Raborn outlined a program using electromagnetic energy to modify the weather. His article was entitled “New Horizons of Naval Research and Development.” In this paper, underneath the heading of ‘Environmental Warfare’ he wrote:
The possibilities for the military employment of the “weather weapon” may be as diverse as they are numerous. An ability to control the weather could introduce greater changes in warfare than those which occurred in 1945 with the explosion of the first nuclear weapons.
A severe storm or hurricane striking a naval force may well inflict greater damage than could an enemy. The capability to change the direction of destructive storms and guide them toward enemy concentrations may exist in the future arsenal of the naval tactical commander.
Ground, sea, air and amphibious operations might be supported by the dissipation of fog or clouds, or by the production of rain or drought. Conversely, the creation of solid, low overcasts might be used to conceal troop concentrations, movements, and task force deployments. Large-scale weather control techniques might be used to cause extensive flooding in strategic areas or even to bring a new “ice age” upon the enemy. By influencing the ionosphere and atmosphere simultaneously, magnetic, acoustic, and pressure effects might be generated in such a way that ocean-wide sweeping of mines would occur.
Creating or dissipating atmospheric temperature/humidity ducts might modify the refractive index of the atmosphere enough to influence radar or radio transmission. Artificially-induced ionospheric storms might produce a blackout of communications.
Certain electromagnetic waves are unable to pass through an area of precipitation. A cloud seeding generator could be employed under appropriate meteorological conditions to produce precipitation that would interfere with the operation of radio-guided or remotely-controlled devices or vehicles. We already have taken our first steps toward developing an environmental warfare capability. We are using satellite weather data from Tiros II for current, tactical operations and more accurate, long-range weather predictions. Some experiments in fog dissipation have shown promise, and some exploratory research has been conducted on ways to change the heading of major storms.
For these reasons – and because our advances in science make it reasonable – we are now engaged in planning a ten-year, comprehensive study of the atmosphere, a study which we will designate ATMOS. This plan will be co-ordinated with our TENOC oceanographic studies.
About the ATMOS program, the author has failed to find any other significant information. The author has looked over a 1961 report pertaining to the Navy TENOC (Ten Year Program in Oceanography) program. Although it did not contain any specific information pertinent to the New Manhattan Project, it did make mention of another, classified TENOC report.
It is notable that the title of Raborn’s article includes the word “horizon” because the type of electromagnetic energy to which he refers is akin to “over the horizon radar.” This type of radar is called “over the horizon” because it is bounced off the ionosphere and therefore is effective far beyond the range of the forty miles or so (depending on terrain) afforded by previous radar systems. Forty miles is approximately the distance one can see over flat land or sea before the curvature of the Earth obscures points beyond. Over the horizon radar, on the other hand, is effective to thousands of miles. Today’s ionospheric heaters evolved as over the horizon radar.
Also of note is the fact that the United States Navy, of which Mr. Raborn was an admiral, is today one of the managers of the HAARP facility in Alaska. The HAARP facility contains the world’s most powerful ionospheric heater which is documented to be able to modify the weather.
***
In the 1967 National Science Foundation’s ninth annual weather modification report, it reads, “ESSA [Environmental Science Services Administration] is also investigating the effect of cirrus clouds on the radiation budget of the atmosphere by studying aircraft-produced contrails which often spread into cirrus layers covering considerable fractions of the sky. One technique proposed for modifying lower cloud development has been the generation of a high level cirrus deck with jet aircraft. By intercepting solar radiation at high altitude it may be possible to influence larger scale cloud development elsewhere by reducing solar input and reducing convective cloud generation in areas where they are not needed.” This is essentially today’s geoengineering thesis.
A little later in that same report, it reads that their computer atmospheric simulations, or ‘models’ as they call them, might simulate, “…producing high-level cirrus cloud cover over an area by means of jet aircraft, inserting particulate matter into the upper atmosphere to alter the solar radiation balance and the like.”
***
In 1966, the Interdepartmental Committee on Atmospheric Sciences Select Panel on Weather Modification produced a document titled “Present and Future Plans of Federal Agencies in Weather-Climate Modification.” On page 17 of this report, it reads, “It is anticipated that there will be a few large-scale facilities funded for the testing of modification schemes. Typical schemes might be the suspension of a spray nozzle over a valley between two mountain peaks to produce cloud-sized droplets into which electrical charges can be introduced in either polarity, contaminants can be introduced, and the drop size spectrum can be adjusted to any reasonable distribution.” The Interdepartmental Committee on Atmospheric Sciences subsequently agreed to proceed with the development of a National Weather Modification Program along the lines of this report.
The now defunct Interdepartmental Committee for Atmospheric Sciences (ICAS) was created by the Federal Council for Science and Technology in 1959 in order to oversee and coordinate a wide range of basic atmospheric research originating from many previously disparate government offices. Their focus was weather modification. Members of the ICAS included the departments of Agriculture, Commerce, Defense, Interior, Transportation and State as well as the Environmental Protection Agency, the Energy Research and Development Administration, the National Aeronautics and Space Administration and the National Science Foundation. These are the government agencies which have been involved in weather modification all along.
The ICAS produced a series of semi-annual reports between 1960 and 1978. In these reports, ICAS member organizations’ weather related scientific activities and expenditures were recounted. The ICAS reports’ areas of study included: Earth’s natural geomagnetic energy, different ways clouds form and different ways they precipitate, lightning, hurricanes and other extreme weather, inadvertent weather modification, intentional weather modification and extra-planetary atmospheres. The ICAS is duly noted here because so much of the history of the New Manhattan Project is accounted for in the pages of their reports.
In the 1969 ICAS report, under the heading of “Cloud Electricity Modification,” it is written that the National Science Foundation is developing, “Means for injecting significant quantities of charge artificially into clouds…”
Again in this 1969 report, on page 37 it describes the Army’s intentions in the area of weather modification. It reads, “Studies will continue on upper atmospheric structure and dynamics, lasers and other electromagnetic propagation, and acoustic propagation. New approaches to atmospheric modification will be studied.”
On page 42 of the 1971 ICAS special report “A National Program for Accelerating Progress in Weather Modification,” the authors write of fog being cleared by airplanes releasing chemicals and ‘electrical methods’ of fog dissipation.
On page 79 of the 1973 ICAS report, it is written, “There is a great deal to be learned before we can with confidence say what effect can be produced by the injection of chemically active trace gasses and particulates into the lower stratosphere. New emphasis has been given to both dynamical and physical meteorological research relevant to this question.”
***
United States patent #5,003,186 “Stratospheric Welsbach Seeding for Reduction of Global Warming” was filed by the Hughes Aircraft Corporation in 1991. The patent describes a method for dispersing particulates into the upper atmosphere in order to save us from global warming. The author David B. Chang suggests that aluminum oxide be used for this purpose. Lab tests from around the world have shown aluminum to be the number one chemtrail ingredient.
“One proposed solution to the problem of global warming,” it reads, “involves the seeding of the atmosphere with metallic particles. One technique proposed to seed the metallic particles was to add the tiny particles to the fuel of jet airliners, so that the particles would be emitted from the jet engine exhaust while the airliner was at its cruising altitude.”
The first mention of aluminum occurs in this passage, “The method comprises the step of seeding the greenhouse gas layer with a quantity of tiny particles of materials characterized by wavelength-dependent emissivity or reflectivity, in that said materials have high emissivities in the visible and far infrared wavelength region. Such materials can include the class of materials known as Welsbach materials. The oxides of metal, e.g., aluminum oxide, are also suitable for the purpose.”
The second mention of aluminum occurs a little later. It reads, “Another class of materials having the desired property includes the oxides of metals. For example, aluminum oxide (Al2O3) is one metal oxide suitable for the purpose and which is relatively inexpensive.”
The Hughes Aircraft Corporation was acquired by and is now integrated into Raytheon.
***
A 1994 document produced by Stanford Research International called “Multiple Instrument Studies of Chemical Releases and Heating at Arecibo” details three barium releases of 48 kilograms each over Puerto Rico. The barium clouds produced by these rocket-borne explosions were subsequently hit with man-made electromagnetic energy from an ionospheric heater and thus turned into a plasma. Barium has been found to be the number two chemtrail ingredient.
***
In 1996 the Air Force produced a previously mentioned document called “Weather as a Force Multiplier: Owning the Weather in 2025.” The document was produced by the Department of Defense and written as ordered by the chief of staff of the Air Force, Ronald R. Fogleman. “Owning the Weather” was but one in a series of 39 documents speaking to a great overhaul of Air Force operations to be achieved by the year 2025. The larger set of documents is called “Air Force 2025.” “Owning the Weather” describes a system of weather modification combining atmospheric aerosols with electromagnetic energy.
On page 2 the document reads, “Prior to the attack, which is coordinated with forecasted weather conditions, the UAVs begin cloud generation and seeding operations. UAVs [unmanned aerial vehicles] disperse a cirrus shield to deny enemy visual and infrared (IR) surveillance. Simultaneously, microwave heaters create localized scintillation to disrupt active sensing via synthetic aperture radar (SAR) systems such as the commercially available Canadian search and rescue satellite-aided tracking (SARSAT) that will be widely available in 2025. Other cloud seeding operations cause a developing thunderstorm to intensify over the target, severely limiting the enemy’s capability to defend. The WFSE monitors the entire operation in real-time and notes the successful completion of another very important but routine weather-modification mission.”
The document mostly speaks to military combat applications, but there are some very interesting quotes. Here’s one, “In the United States, weather-modification will likely become a part of national security policy with both domestic and international applications.” Let’s hear more about those “domestic applications”
On page 34 the document reads, “The ability to modify the weather may be desirable both for economic and defense reasons.”
Also in 1996, as part of the same series containing “Owning the Weather,” the Air Force produced a document entitled “An Operational Analysis for Air Force 2025” which briefly outlines something they call a “weather analysis and modification system.” This system is described as employing both particulate seeding and microwave energy for the purpose of weather modification.
Under the heading of “Weather Analysis and Modification System,” the document reads, “A global network of sensors provides ‘weather warriors’ with the means to monitor and accurately predict weather activities and their effects on military operations. A diverse set of weather modification tools allows manipulation of small-to-medium scale weather phenomena to enhance friendly force capabilities and degrade those of the adversary.”
***
In the mid-nineties, Lawrence Livermore Laboratories scientists Edward Teller, Lowell Wood and Roderick Hyde wrote a series of papers calling for the spraying of megatons of aluminum to save us from global warming. The mid-nineties was when reports of chemtrail spraying in American skies began pouring in. If you will recall, aluminum has been found to be the number one chemtrail ingredient.
In their 1997 paper “Global Warming and Ice Ages,” the Livermore Labs trio wrote, “It has been suggested that alumina injected into the stratosphere by the exhaust of solid-rocket motors might scatter non-negligible amounts of sunlight. We expect that introduction of scattering-optimized alumina particles into the stratosphere may well be overall competitive with use of sulfur oxides; alumina particles offer a distinctly different environmental impact profile.”
They continue to espouse the virtues of stratospheric alumina in the footnotes writing, “Alumina, like sulfate, is ubiquitous in the terrestrial biosphere, and its stratospheric injection seemingly poses no significant environment issues.”
In conclusion
So there you have an evolutionary history of a project employing sprayed particles and the electrification of clouds for the purpose of weather modification. Is this a coincidence? Are all these examples simply isolated, one-off events not a part of a larger overall plan? What are the odds of these data points evolving in a chronological order such as they have without being part of a coordinated effort? One may be looking at something like a quadrillion to one; and that is conservative.
For five days only, from Thursday, February 19 through Monday, February 23, my ebook Chemtrails Exposed will be available for free from Amazon.
Stay tuned. God willing, this article is only the first of many coming in this year; 2015. The heavy lifting (studying the history of weather modification) is complete. The next papers will come much easier because they involve smaller topics and half or more of the work on each is already done. Although the topic will remain secret until publication, you can expect the next article in a couple of months, possibly sooner. Until then, keep firing in the information war. Thank you.
U.S. patent #4,686,605 “Method and Apparatus for Altering a Region in the Earth’s Atmosphere, Ionosphere and/or Magnetosphere,” 1987
“Weather as a Force Multiplier: Owning the Weather in 2025” by Col. Tamzy J. House, Lt. Col. James B. Near, Jr., LTC William B. Shields (USA), Maj. Ronald J. Celentano, Maj. David M. Husband, Maj. Ann E. Mercer and Maj. James E. Pugh, published by the United States Air Force, 1996
Early History of Cloud Seeding by Barrington S. Havens, published by the Langmuir Laboratory at the New Mexico Institute of Mining and Technology, the Atmospheric Sciences Research Center at the State University of New York at Albany and the Research and Development Center of the General Electric Company, 1978
Interdepartmental Committee for Atmospheric Sciences reports 1960-1978, published by the Federal Council for Science and Technology
“Department of the Interior Program in Precipitation Management for 1970” by Dr. Clement J. Todd as it appeared in the “Proceedings of the Twelfth Interagency Conference on Weather Modification” 1970
U.S. patent #1,279,823 “Process and Apparatus for Causing Precipitation by Coalescence of Aqueous Particles Contained in the Atmosphere”
“Technique for Introducing Low-Density Space Charge into the Atmosphere” by B. Vonnegut, K. Maynard, W.G. Sykes and C.B. Moore, published by Arthur D. Little and the Journal of Geophysical Research, volume 66, number 3, March, 1961
“The Future” by Bernard Vonnegut, Vincent Schaefer, J. S. Barrows and Paul MacCready, published in the Final Report of the Advisory Committee on Weather Control, p201, 1958
1st National Science Foundation annual weather modification report, p14, 1960
“New Horizons of Naval Research and Development” by William Francis Raborn, published in U.S.Naval Institute Proceedings, January, 1963
“Ten Year Program in Oceanography: TENOC” by the U.S. Navy, March 13, 1961
9th National Science Foundation annual weather modification report, 1967
“Present and Future Plans of Federal Agencies in Weather-Climate Modification” by the Interdepartmental Committee on Atmospheric Sciences Select Panel on Weather Modification, 1966
Interdepartmental Committee on Atmospheric Sciences memorandum to Homer E. Newell dated June 21, 1966, as it appeared in the appendix to “Present and Future Plans of Federal Agencies in Weather-Climate Modification” by the Interdepartmental Committee on Atmospheric Sciences Select Panel on Weather Modification, 1966
“The Interdepartmental Committee on Atmospheric Sciences: A Case History” by Robert E. Morrison
U.S. patent #5,003,186 “Stratospheric Welsbach Seeding for Reduction of Global Warming,” 1991
“Multiple Instrument Studies of Chemical Releases and Heating at Arecibo” by Stanford Research International, published by Stanford Research International, 1994
“Air Force 2025” by the U.S. Air Force, published by the U.S. Air Force, 1996
“An Operational Analysis for Air Force 2025” by the U.S. Air Force, published by the U.S. Air Force as part of “Air Force 2025” by the U.S. Air Force, published by the U.S. Air Force, 1996
Global Warming and Ice Ages by Edward Teller, Lowell Wood and Roderick Hyde, published by the Lawrence Livermore National Laboratory, 1997
AMERICAN AND BRITISH Leaked: NSA Spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.
The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.
In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”
With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
As part of the covert operations against Gemalto, spies from GCHQ — with support from the NSA — mined the private communications of unwitting engineers and other company employees in multiple countries.
Gemalto was totally oblivious to the penetration of its systems — and the spying on its employees. “I’m disturbed, quite concerned that this has happened,” Paul Beverly, a Gemalto executive vice president, told The Intercept. “The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesn’t happen again, and also to make sure that there’s no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers.” He added that “the most important thing for us now is to understand the degree” of the breach.
Leading privacy advocates and security experts say that the theft of encryption keys from major wireless network providers is tantamount to a thief obtaining the master ring of a building superintendent who holds the keys to every apartment. “Once you have the keys, decrypting traffic is trivial,” says Christopher Soghoian, the principal technologist for the American Civil Liberties Union. “The news of this key theft will send a shock wave through the security community.”
THE MASSIVE KEY THEFT IS “BAD NEWS FOR PHONE SECURITY. REALLY BAD NEWS.”
Beverly said that after being contacted by The Intercept, Gemalto’s internal security team began on Wednesday to investigate how their system was penetrated and could find no trace of the hacks. When asked if the NSA or GCHQ had ever requested access to Gemalto-manufactured encryption keys, Beverly said, “I am totally unaware. To the best of my knowledge, no.”
According to one secret GCHQ slide, the British intelligence agency penetrated Gemalto’s internal networks, planting malware on several computers, giving GCHQ secret access. We “believe we have their entire network,” the slide’s author boasted about the operation against Gemalto.
Additionally, the spy agency targeted unnamed cellular companies’ core networks, giving it access to “sales staff machines for customer information and network engineers machines for network maps.” GCHQ also claimed the ability to manipulate the billing servers of cell companies to “suppress” charges in an effort to conceal the spy agency’s secret actions against an individual’s phone. Most significantly, GCHQ also penetrated “authentication servers,” allowing it to decrypt data and voice communications between a targeted individual’s phone and his or her telecom provider’s network. A note accompanying the slide asserted that the spy agency was “very happy with the data so far and [was] working through the vast quantity of product.”
The Mobile Handset Exploitation Team (MHET), whose existence has never before been disclosed, was formed in April 2010 to target vulnerabilities in cellphones. One of its main missions was to covertly penetrate computer networks of corporations that manufacture SIM cards, as well as those of wireless network providers. The team included operatives from both GCHQ and the NSA.
While the FBI and other U.S. agencies can obtain court orders compelling U.S.-based telecom companies to allow them to wiretap or intercept the communications of their customers, on the international front this type of data collection is much more challenging. Unless a foreign telecom or foreign government grants access to their citizens’ data to a U.S. intelligence agency, the NSA or CIA would have to hack into the network or specifically target the user’s device for a more risky “active” form of surveillance that could be detected by sophisticated targets. Moreover, foreign intelligence agencies would not allow U.S. or U.K. spy agencies access to the mobile communications of their heads of state or other government officials.
“It’s unbelievable. Unbelievable,” said Gerard Schouw, a member of the Dutch Parliament, when told of the spy agencies’ actions. Schouw, the intelligence spokesperson for D66, the largest opposition party in the Netherlands, told The Intercept, “We don’t want to have the secret services from other countries doing things like this.” Schouw added that he and other lawmakers will ask the Dutch government to provide an official explanation and to clarify whether the country’s intelligence services were aware of the targeting of Gemalto, whose official headquarters is in Amsterdam.
Last November, the Dutch government proposed an amendment to its constitution to include explicit protection for the privacy of digital communications, including those made on mobile devices. “We have, in the Netherlands, a law on the [activities] of secret services. And hacking is not allowed,” Schouw said. Under Dutch law, the interior minister would have to sign off on such operations by foreign governments’ intelligence agencies. “I don’t believe that he has given his permission for these kind of actions.”
The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted. “Gaining access to a database of keys is pretty much game over for cellular encryption,” says Matthew Green, a cryptography specialist at the Johns Hopkins Information Security Institute. The massive key theft is “bad news for phone security. Really bad news.”
Author and lecturer Stuart Wilde is one of the real characters of the self-help, human potential movement. His style is humorous, controversial, poignant and transformational. He has written over a dozen books, including those that make up the very successful Taos Quintet, which are considered classics in their genre. They are: Affirmations, The Force, Miracles, The Quickening and The Trick to Money Is Having Some. Stuart’s books have been translated into 12 languages.
In Stuart’s Own Words – from “Affirmations”
“I was born when I was very young, in Farnham, England. Conditions at birth were very crowded. My twin sister appeared in the physical plane about twenty minutes ahead of me. I like to think that I allowed her pole position, being the proper little gent that I was, but if truth be known I was asleep in the wings and missed the curtain call.”
“My father was an officer in the British navy. At the time of my birth in 1946, he was seconded to the Foreign Office and served as a diplomat. My mother was Sicilian. They met during the Allied invasion of Sicily and were married in three weeks. She was very bright, a professor of languages and the only person that I have ever known who could speak Latin fluently.”
“At age ten, disaster struck. I was shipped from a carefree existence on the beaches of Africa to a British boarding school, a mausoleum of a place that was founded in the year dot. Its philosophies were archaic and bizarre to say the least. Much of it could be traced back to some obscure little man who sat on a sand dune in pre-history, developing ways to manipulate and harass people.”
“I remember my father standing on the tarmac of Accra airport prior to my departure for England, and ceremoniously presenting me with a five pound note ($7.50 at today’s exchange rate.) At the tender age of ten that seemed to me an untold fortune. However, once at school I discovered the sweet shop and through that, along with the ravages of inflation, I experienced my first cash flow crunch about a week-and-a-half into my scholastic career.”
“Cigarettes, it seemed, were a prized form of contraband. As ten-year-old boys were not allowed off the grounds, shortages existed. Demand having been established, I now set about the problem of supply. One morning the gods smiled on me and I met an older student whose function it was to go to the village on his bike each day to collect my master’s newspapers. I pinned him to the wall, and in my best Sicilian accent asked him if he would like to go into business. He said, ‘No.’ Whereupon I punched him in the nose and we became lifelong friends and partners.”
“I remember the tennis coach coming up to me on the last day at that school and asking me why I looked so miserable. From within my tears I mumbled, ‘the business, the business.’ Graduating from school was my first taste of unemployment.”
“I mucked around for a few years and wound up as a stage hand with the prestigious English Stage Company at Sloan Square in London. I had the idea of going into theater management. My twin sister was by now forging ahead with a showbiz career and was appearing weekly on British TV. However, once I found out that the stage manager earned just forty pounds for a seventy hour work week, the roar of the grease paint and the smell of the crowd lost its allure.”
“The swinging sixties were hotting up and the British rock bands were all the rage. On one of my travels I discovered a textile mill in Lancashire that made a kind of a T-shirt vest that miners wore. To my amazement the first boutique I offered them to snapped them up. The problem was one of logistics. I could tye-dye hundreds of T-shirts each day, but drying them was a problem. Luckily, they were greatly in demand and in my customer’s search for sartorial splendor, they failed to notice that the T-shirt hung limply off the hangers still wet.”
“By the age of twenty, I was earning a little over the equivalent of $20,000 per week…. I then signed up for a seven year course at the University of Burn-out, cruising London with a group of exotic characters whose names seemed culled from the cockney hall of fame. My chauffeurs were called Billy the Kid and Slick Vic, and I employed a fellow named Richard the Minder to get me home at night.”
“At the ripe old age of twenty eight I was exhausted. There were hardly any human experiences left to me. Literally, I had been there, done that, and gotten the T-shirt.”
“One morning, nursing a terrible hangover, I decided to discover the meaning of life. I signed up to train as a spirit medium at the College of Psychic Studies. I seemed to have a fair talent for it and not long after I was regularly contacting the spirits of the departed in hopes that they might answer my questions as to life’s wondrous mysteries.”
“During those years of searching, I struggled both spiritually and in the worldly sense. If I had known then what I know now, I could have saved myself much pain and anguish…. I continued to travel and study endlessly… Bit my bit I was able to sift the chaff from the wheat as I worked on myself, my own perceptions began to open up. I developed the ability to enter into deep states of mind and not fall asleep. After five years of training I found that I could hold concentration at the theta brain level (which is 4 – 6 cycles of brain rhythm second) almost indefinitely.
That was the turning point in my quest.”
Stuart rarely appears in public anymore, choosing instead to teach advanced metaphysics to small groups via his Transcendental Tours ™. Stuart is often described as a mystical man with a mysterious, powerful persona. Those who train with Stuart however quickly realize that at heart, Stuart is an enormously loving, generous and caring teacher, whose primary mission is to help seekers recognize their own truth. With that in mind, Stuart is destined to leave a lasting legacy for all those commited to discovering their higher purpose.
The groundbreaking new book “The Sixth Sense” is an amazing inner discovery of your SIXTH SENSE which he defines as sacred energy that taps you into the state of all-knowing. The subtle body (the etheric), Stuart reveals, is a key component in understanding the sixth sense, and he helps you to unlock its mysteries here. Once you open to the power and omniscience of the sixth sense, you can perceive life in all its subtlety and vastness.
Expert Consultant, Museum Curator, Investigator, UFOlogist
Richard C. Hoagland is a former museum space science Curator; a former NASA Consultant; and, during the historic Apollo Missions to the Moon, was science advisor to Walter Cronkite and CBS News. In the mid-1960’s, at the age of 19 (possibly “the youngest museum curator in the country at the time”), Hoagland created his first elaborate commemorative event — around NASA’s first historic unmanned fly-by of the planet Mars, Mariner 4. A simultaneous all-night, transcontinental radio program the evening of the Encounter (linking the museum in Springfield, Mass., and NASA’s JPL control center, in Pasadena, Ca.), co-produced by Hoagland and WTIC-Radio, in Hartford, Ct., was subsequently nominated for a Peabody Award, one of journalism’s most prestigious.
In the early 1970’s, Hoagland proposed to Carl Sagan (along with Eric Burgess) the placement of a “message to Mankind” aboard Pioneer 10 — humanity’s “first unmanned probe of Jupiter“; subsequent to its 1973 Jovian Encounter, celestial mechanics resulted in Pioneer 10 becoming the first artifact to successfully escape the solar system into the vast Galaxy beyond — carrying “the Plaque” — whose origins were officially acknowledged by Sagan in the prestigious journal, SCIENCE (175 [1972], 881).
In the early 1980’s, based on NASA data from the more sophisticated unmanned Voyager fly-bys of the outer planets, Hoagland became the first to propose (in a widely-quoted series of UPI and AP stories on his startling paper, published in 1980 in Star & Sky magazine) the possible existence of “deep ocean life” under the global ice shield perpetually surrounding the enigmatic moon of Jupiter, Europa. At the time, most (though not all) NASA scientists instantly derided this idea; two outstanding dissenters from the unfortunately then-common NASA view were Director of the Goddard Institute for Space Studies, Dr. Robert Jastrow, and well-known science writer and visionary, Arthur C. Clarke. In the sequel to his outstanding epic “2001” (“2010: Odyssey Two”), built entirely around this extraordinary concept of “eon-old life in the ice-covered oceans of Europa,” Clarke wrote:
“The fascinating idea that there might be life on Europa . . . was first proposed by Richard C. Hoagland [in a 30-page article] in the magazine Star & Sky… This quite brilliant concept has been taken seriously by a number of astronomers (notably NASA’s Institute for Space Studies, Dr. Robert Jastrow), and may provide one of the best motives for the projected GALILEO Mission.”
Remarkably, before recent NASA press conferences and television documentaries, celebrating the successfully GALILEO probe of Jupiter’s atmosphere, December 7, 1995, NASA scientists’ “belated” acceptance of the startling possibility of “life in Europa’s oceans” has been widely presented and discussed. As is GALILEO’s potential acquisition of new data from its upcoming Europa fly-bys which could lead to actual confirmation (!) of the “Hoagland model.” Curiously, despite clearly prior publication and detailed elaboration of the concept, Hoagland’s name is not being mentioned anywhere by NASA, or by current GALILEO scientists, in connection with “Europa”…
In the early 1990’s Mr. Hoagland led a team of volunteers and consultants in the creation of a pioneering “space-age” inner-city educational effort at Dunbar Senior High, just off Capitol Hill, in Washington D.C. The experiment was built around the concept of “student involvement in real time’ mission planning and data acquisition” during various NASA planetary exploration missions, such as “Hubble” and the ill-fated “Mars Observer.” Starting as an after school extracurricular activity, and using donated state-of-the-art computer imaging equipment and enhancement algorithms, “The Enterprise Mission” and “becoming a crew member of the ‘U.S.S. Dunbar'” eventually became an accredited course in the Dunbar school curriculum. Over the years, scores of senior NASA Headquarters and Goddard Space Flight Center personnel have enthusiastically participated in the project, including installation of a student satellite data link direct to NASA and on-site briefing of students on many current NASA projects. Education advocate, then First Lady Barbara Bush, personally came to Dunbar early in the project, for a personal briefing by the students; this — the original “ENTERPRISE Mission” — was ultimately nominated for a White House “Point of Light” award.
For the last 13 years, since 1983, Hoagland has been leading an outside scientific Team in a critically acclaimed independent analysis of possible intelligently-designed artifacts on NASA (and other) data sets — beginning with the unmanned NASA VIKING mission to Mars in 1976, and its provocative images of a region called “Cydonia.” Hoagland and his Team have been invited at least four times to various NASA Centers since 1988, to brief thousands of NASA scientists and engineers on the results of their on-going “Cydonia investigation.” In 1989, Hoagland and his colleagues briefed then-Chairman of the House Committee on Space Science and Applications, Representative Robert Roe, on the status of their “Mars Investigation.” Chairman Roe, before his sudden and unexplained resignation from the Congress, directed NASA to acquire better images from Mars during its then-upcoming “Mars Observer mission”; Mars Observer’s equally sudden and tragic disappearance in 1993 precluded any new data relating to “Cydonia.” In 1993, Hoagland was awarded the International Angstrom Medal for Excellence in Science by the Angstrom Foundation, in Stockholm, Sweden, for that continuing research. In the last 4 years, he and his Team’s investigations have been quietly extended to include over 30 years of previously hidden data from NASA, Soviet, and Pentagon missions to the Moon — with startling results.
Oliver Stone, byname of William Oliver Stone (born September 15, 1946, New York, New York, U.S.), American film director, screenwriter, and producer known for his ambitious and often controversial movies.
Stone, the son of a wealthy stockbroker, was raised in New York City. He briefly studied at Yale University before dropping out to teach English in South Vietnam. Upon his return, Stone lived in Mexico for a year and again attended Yale for a short period. In 1967, during the Vietnam War, he enlisted in the U.S. Army. He distinguished himself in combat, earning two Purple Hearts and a Bronze Star. Stone then enrolled in film school at New York University (B.A., 1971), studying under director Martin Scorsese.
Stone was deeply affected by his war experiences, and his student films, such asLast Year in Viet Nam (1971), dealt directly with the consequences of the Vietnam conflict. After graduating, he directed the horror movies Seizure! (1974) and The Hand (1981), the latter of which starred Michael Caine. Stone also began experimenting with screenwriting, and he won an Academy Award for best adapted screenplay for Midnight Express (1978), which was based on the true story of a man brutally abused while imprisoned for drug smuggling in Turkey.
Stone devoted much of the early 1980s to writing screenplays, including Conan the Barbarian (1982), Scarface (1983), which was directed by Brian De Palma and starred Al Pacino, and Year of the Dragon (1985). He returned to directing withSalvador (1986), which he also wrote. In the film, a journalist (played by James Woods) documents the atrocities committed during the El Salvador uprisings of 1980–81. Stone again drew on the trauma of the Vietnam War in Platoon (1986), for which he won another Academy Award, this time for directing. The film navigates the perils of war from the perspective of a new recruit who quickly realizes that the idealism that motivated his decision to enlist was misguided. Stone drew upon personal experience once more for Wall Street (1987), using memories of his father’s career as a stockbroker to conjure an indictment of the greed and deceit governing the financial world. In 1988 he adapted Eric Bogosian’s Off-Broadway play Talk Radio to film.
Stone emphasized the continuing ramifications of the Vietnam War with Born on the Fourth of July (1989). The film, based on the autobiography of Vietnam veteran Ron Kovic, chronicles the evolution of a young man, played by Tom Cruise, from patriotic soldier to paraplegic antiwar activist. Stone won an Academy Award for directing that movie and received a fourth career nomination for his writing. The year 1991 saw the release of both JFK, a polarizing investigation of the circumstances surrounding the assassination of Pres. John F. Kennedy, and The Doors, a stylish account of the rise and fall of the titular American rock band. InHeaven and Earth (1993), Stone approached the Vietnam War and its aftermath from the perspective of a young Vietnamese woman.
Stone again courted controversy with Natural Born Killers (1994), a film, written byQuentin Tarantino, about the savagely violent exploits of a married couple, played by Woody Harrelson and Juliette Lewis. While Stone claimed that the film was meant to be critical of sensationalized violence, some critics found it guilty of exactly what it purported to condemn. Stone then cast Anthony Hopkins in the title role of Nixon (1995), a measured take on the life of the U.S. president. He also developed the screenplay for Evita (1996), an adaptation of the Andrew Lloyd Webber musical about Argentine politician Eva Perón (played by Madonna).
Stone revisited some of his favoured motifs, power and violence, in Any Given Sunday (1999), about professional football, and in Alexander (2004), a poorly received biography of Alexander the Great. World Trade Center (2006), a retelling of the events of September 11, 2001, from the viewpoint of two police officers, returned Stone to the centre of public debate. While the film was critically acclaimed, some questioned the propriety of making the film so soon after the tragedy. W. (2008), his biopic of Pres. George W. Bush, drew ire from both extremes of the political spectrum for its refusal to pass definitive judgment, positive or negative, on its subject. Stone later directed Wall Street: Money Never Sleeps(2010), a sequel to the 1987 film that was set amid the global financial crisis of 2008, and Savages (2012), an ensemble thriller about marijuana trafficking that, in its depiction of seedy mayhem, was reminiscent of his earlier U Turn (1997).
In addition to directing and writing, Stone produced many of his own movies. Besides narrative films, he made two documentaries about Latin American politics: Comandante (2003), about Cuban dictator Fidel Castro, and South of the Border (2009), which focused on several other left-wing leaders, notably Venezuelan Pres. Hugo Chávez. With Peter Kuznick, he also created Oliver Stone’s Untold History of the United States (2012), a 10-part television documentary (and accompanying book) that took an unorthodox look at the preceding century of American political history. In 1997 Stone published a semiautobiographical novel,A Child’s Night Dream.
Sean Stone, son of controversial filmmaker Oliver Stone has acted in his father’s films such as Wall Street, The Doors, JFK, Natural Born Killers and many more. He has starred and directed in his own feature film Greystone Park. Sean joined the team of investigators for the Tru TV hit Conspiracy Theory with Jesse Ventura. Sean currently hosts an alternative media show ‘Buzzsaw’ featuring interviews with whistleblowers, styling itself as the ‘real X files’ looking into the hidden agendas behind the news.
Philip Schneider was born April 23, 1947 and died (many assume murdered) in January 1996. Now Philip Schneider claimed to be an ex-government geologist and structural engineer who was involved in building underground military bases around the United States (possessing a level 3 security clearance, “Rhyolite 38”).
Not only that, but Philip Schneider also claimed he was one of only three people to have survived a deadly battle in which 66 American and NATO “Delta Force” soldiers were killed. This battle allegedly occurred in 1979 between Grey aliens and U.S. military and NATO forces at an underground base at Dulce , New Mexico.
The following is taken from a letter from the ex-wife of Philip Schneider (Cynthia Drayer) after learning of his death.
“Philip’s background was as a Structural Engineer. He was an expert on explosives and their effects on geologic structures. He worked under two social security numbers. Most of his early work in underground mountain bases with Morrison-Knudsen was done using the wrong social security number.
I was later able to prove that he had two numbers through the social security office when I applied for his daughter’s death benefits.
He worked for the Army Corps of Engineers and U.S. Navy with the same wrong number. Only after he obtained SSI in 1981 did his “real” number come into play. He always told me that he had a Rhyolitic Clearance and that his father had a Cosmic Clearance from his work with NATO. And that is the second reason why Philip began lecturing.”
For the last two years of his life, Schneider gave over 30 lectures to a variety of audiences across the globe, concerning conspiracy theories in which he claimed to be leaking information exposing them. However, Schneider was never able or willing to prove his allegations (e.g. showing the entrance to Dulce Base). His claims received little mainstream notice, but caused quite a buzz in UFO enthusiast circles.
Schneider was found dead in his Wilsonville, Oregon apartment on January 17, 1996. He had apparently been dead for several days (perhaps up to a week), and reportedly had a rubber hose wrapped three times around his neck. Tim Swartz writes that “Clackamas County Coroner’s office initially attributed Philip Schneider’s death to a stroke or heart attack.” Some suggest Schneider was murdered; supposedly because he was leaking information to the public, unveiling conspiracies. He in fact claimed to have avoided 13 murder attempts taken on his life during the time in which he was lecturing on conspiracy theories. He suffered multiple physical illnesses (osteoporosis, cancer, injuries). Officially, suicide is now stated as the cause of death.
The medical examiner took blood and urine samples at the autopsy but refused to analyze them, saying that the county would not “waste their money on a suicide”. Although samples would be kept for 12 months, when asked for these samples to be sent to an independent lab 11 months later they were “missing” and presumed “destroyed”. Schneider had missing fingers on his left hand, and limited motion in his shoulders. It may have been physically impossible for him to have held the rubber hose in his left hand with missing fingers and then wrap the hose three times with shoulders that had limited motion. In order to end up where his body was, he had to sit on the edge of his bed, wrap the hose around his neck, slowly and painfully strangle to death, and fallen head first into a wheel chair. Philip was an expert in chemicals and his own medical needs. He had multiple pills at hand that could have ended his life quickly and painlessly. He also had a 9mm handgun that he had borrowed to protect himself.
Born Michael Luther King, Jr., but later had his name changed to Martin Luther King Jr. His grandfather began the family’s long tenure as pastors of the Ebenezer Baptist Church in Atlanta, serving from 1914 to 1931; his father has served from then until the present, and from 1960 until his death Martin Luther acted as co-pastor. Martin Luther attended segregated public schools in Georgia, graduating from high school at the age of fifteen; he received the B. A. degree in 1948 from Morehouse College, a distinguished Negro institution of Atlanta from which both his father and grandfather had graduated. After three years of theological study at Crozer Theological Seminary in Pennsylvania where he was elected president of a predominantly white senior class, he was awarded the B.D. in 1951. With a fellowship won at Crozer, he enrolled in graduate studies at Boston University, completing his residence for the doctorate in 1953 and receiving the degree in 1955. In Boston he met and married Coretta Scott, a young woman of uncommon intellectual and artistic attainments. Two sons and two daughters were born into the family.
In 1954, Martin Luther King became pastor of the Dexter Avenue Baptist Church in Montgomery, Alabama. Always a strong worker for civil rights for members of his race, King was, by this time, a member of the executive committee of the National Association for the Advancement of Colored People, the leading organization of its kind in the nation. He was ready, then, early in December, 1955, to accept the leadership of the first great Negro nonviolent demonstration of contemporary times in the United States, the bus boycott described by Gunnar Jahn in his presentation speech in honor of the laureate. The boycott lasted 382 days. On December 21, 1956, after the Supreme Court of the United States had declared unconstitutional the laws requiring segregation on buses, Negroes and whites rode the buses as equals. During these days of boycott, King was arrested, his home was bombed, he was subjected to personal abuse, but at the same time he emerged as a Negro leader of the first rank.
In 1957 he was elected president of the Southern Christian Leadership Conference, an organization formed to provide new leadership for the now burgeoning civil rights movement. The ideals for this organization he took from Christianity; its operational techniques from Gandhi. In the eleven-year period between 1957 and 1968, King traveled over six million miles and spoke over twenty-five hundred times, appearing wherever there was injustice, protest, and action; and meanwhile he wrote five books as well as numerous articles. In these years, he led a massive protest in Birmingham, Alabama, that caught the attention of the entire world, providing what he called a coalition of conscience. and inspiring his “Letter from a Birmingham Jail”, a manifesto of the Negro revolution; he planned the drives in Alabama for the registration of Negroes as voters; he directed the peaceful march on Washington, D.C., of 250,000 people to whom he delivered his address, “l Have a Dream”, he conferred with President John F. Kennedy and campaigned for President Lyndon B. Johnson; he was arrested upwards of twenty times and assaulted at least four times; he was awarded five honorary degrees; was named Man of the Year by Time magazine in 1963; and became not only the symbolic leader of American blacks but also a world figure.
At the age of thirty-five, Martin Luther King, Jr., was the youngest man to have received the Nobel Peace Prize. When notified of his selection, he announced that he would turn over the prize money of $54,123 to the furtherance of the civil rights movement.
On the evening of April 4, 1968, while standing on the balcony of his motel room in Memphis, Tennessee, where he was to lead a protest march in sympathy with striking garbage workers of that city, he was assassinated.
Murder Conspiracy
After four weeks of testimony and over 70 witnesses in a civil trial in Memphis, Tennessee, twelve jurors reached a unanimous verdict on December 8, 1999 after about an hour of deliberations that Dr. Martin Luther King, Jr. was assassinated as a result of a conspiracy.In a press statement held the following day in Atlanta, Mrs. Coretta Scott King welcomed the verdict, saying ,
“There is abundant evidence of a major high level conspiracy in the assassination of my husband, Martin Luther King, Jr. And the civil court’s unanimous verdict has validated our belief. I wholeheartedly applaud the verdict of the jury and I feel that justice has been well served in their deliberations. This verdict is not only a great victory for my family, but also a great victory for America. It is a great victory for truth itself. It is important to know that this was a SWIFT verdict, delivered after about an hour of jury deliberation. The jury was clearly convinced by the extensive evidence that was presented during the trial that, in addition to Mr. Jowers, the conspiracy of the Mafia, local, state and federal government agencies, were deeply involved in the assassination of my husband. The jury also affirmed overwhelming evidence that identified someone else, not James Earl Ray, as the shooter, and that Mr. Ray was set up to take the blame. I want to make it clear that my family has no interest in retribution. Instead, our sole concern has been that the full truth of the assassination has been revealed and adjudicated in a court of law… My husband once said, “The moral arc of the universe is long, but it bends toward justice.” To-day, almost 32 years after my husband and the father of my four children was assassinated, I feel that the jury’s verdict clearly affirms this principle. With this faith, we can begin the 21st century and the new millennium with a new spirit of hope and healing.”
KING FAMILY STATEMENT ON MEDIA REQUESTS REGARDING THE MEMPHIS VERDICT
The King family stands firmly behind the civil trial verdict reached by twelve jurors in the Memphis, Tennessee courtroom on December 8, 1999.
An excerpt from remarks made by Mr. Dexter Scott King, Chairman, President, and CEO of The King Center, during the December 9, 1999 press conference regarding the verdict that may be used in support of this family decision:
“We can say that because of the evidence and information obtained in Memphis we believe that this case is over. This is a period in the chapter. We constantly hear reports, which trouble me, that this verdict creates more questions than answers. That is totally false. Anyone who sat in on almost four weeks of testimony, with over seventy witnesses, credible witnesses I might add, from several judges to other very credible witnesses, would know that the truth is here.”
“The question now is, “What will you do with that?” We as a family have done our part. We have carried this mantle for as long as we can carry it. We know what happened. It is on public record. The transcripts will be available; we will make them available on the Web at some point. Any serious researcher who wants to know what happened can find out.”
The King family feels that the jury’s verdict, the transcripts of the conspiracy trial, and the transcripts of the King family’s press conference following the trial — all of which can be found on The King Center’s website — include everything that that family members have to say about the assassination.
Therefore, the King family shares the conviction that there is nothing more to add to their comments on record and will respectfully decline all further requests for comment.
Attorney affiliated with the Center for Constitutional Rights
Has represented many radicals, revolutionaries, and Islamic extremists
“If I don’t support the politics of political clients, I don’t take the case.”
Views the United States as an intractably racist nation whose criminal-justice system routinely denies fair treatment to racial, ethnic, and religious minorities
Characterizes Israel as a “terrorist state”
BACKGROUND
Born in 1953 to parents whom he has described as “hardworking F.D.R. Democrats,” Stanley Lewis Cohen was raised in Portchester, New York. Though he attended Hebrew school and was bar mitzvahed, he has long considered himself non-religious. Cohen’s current ties to the Jewish faith are based largely on his view that it can serve as a vehicle for redistributive social justice rather than as a conduit to the divine. “I’m proud to be a Jew—very proud of it,” he says. “Not the Judaism of Ariel Sharon. Not the Judaism of the generals of the Israel Defense Forces. But the Judaism that stands with the oppressed, the disadvantaged and the disaffected.”
Cohen became active in the left-wing anti-war movement during his high-school years in the late Sixties and then attended Long Island University. After graduating from LIU, he worked as a volunteer for VISTA, an anti-poverty program initiated by President Lyndon Johnson in the mid-1960s. Cohen’s VISTA work took place on the Winnebago, Omaha, and Santee Sioux reservations (in Nebraska), where he helped establish a legal-services project.
Following his tenure with VISTA, Cohen worked as a community organizerin New York City, headed a drug program for homeless teens in Westchester County, New York, and administered a federally funded anti-poverty agency. Eventually he enrolled at Pace University Law School, where he earned a J.D. degree in 1983.
COHEN’S EARLY LEGAL CAREER
In the early 1980s, when he was still a law student, Cohen teamed upwith attorney Lynne Stewart to defend a number of far-left radicals against state prosecution in New York. In one of their more high-profile cases, the pair together represented Kathy Boudin—a Weather Underground and May 19 Communist Organization member who had participated in the deadly 1981 Brinks robbery, a heist whose purpose was to acquire the funds needed to finance a war against “Amerikka” and establish a “Republic of Black Afrika” in the United States. Cohen and Stewart would thereafter maintain an enduring, close relationship—both personally and professionally—as evidenced by Stewart’s characterization of Cohen in a 2001 interview as her “dear friend.”
After completing his legal studies, Cohen spent seven years working with the Legal Aid Society in the Bronx, where he defended a multitude of robbers, rapists, and killers. “I loved the people I represented,”says Cohen. “Poor people, people of color. People that the system was designed to beat to death.”
Also in the 1980s, Cohen became a protégé of the self-described “radical attorney” William Kunstler, with whom he jointly represented Larry Davis—a longtime violent felon suspected in the killings of several drug dealers—who had recently shot six New York City policemen. Cohen concocted a defense which maintained that Davis, an African American, had shot the officers—who were allegedly part of a rogue-cop drug operation—in self-defense. Though the claim was entirely without substance, a Bronx jury acquitted Davis in 1986.[1]
LONG CLIENT LIST OF RADICALS, REVOLUTIONARIES, & ISLAMISTS
Soon after the Davis trial, Cohen left the Legal Aid Society and went intoprivate practice where he began to compile a client list that included all manner of radicals and revolutionaries. Among these was a group of heavily armed Mohawk Indian separatists who shot a National Guardhelicopter in 1990. Cohen also:
represented the Mohawk Warrior Society during a three-month, armed stand-off with law-enforcement authorities in Quebec—and was himself charged by Canadian authorities, as a result of his participation in that standoff, with seditious conspiracy;
represented the Mohawk Warrior Society during a lengthy, armed, and ultimately deadly jurisdictional battle against state and federal law enforcement in Akwesasne, a territory that straddles the U.S. and Canadian borders;
defended several dozen Mohawk Warrior Society members who were criminally prosecuted for closing down a state highway during a protracted standoff with police; and
assisted in the case of Mohawk students who sued the Salmon River School District (in northernmost New York State) for having removed the Thanksgiving Address, a traditional Mohawk blessing, from events held at a school with a significant population of Mohawk youth.
Patrick Moloney, a Dublin-born priest and avowed Irish nationalist who conspired to hide some of the $7.4 million that was stolen in the January 5, 1993 Brink’s armored-car robbery;
Jose Ortiz, a Puerto Rican street-gang member accused of shooting a New York City police captain as “revenge” for the 1994 police killing of a Puerto Rican youth named Anthony Baez in the South Bronx; and
members of the Peru-based Maoist terror group, The Shining Path.
But it is Cohen’s so-called “Islamic practice,” through which he has defended a host of Muslim terrorists and terrorism-affiliated operatives, that has gained him more notoriety than any other aspect of his legal work.
From 1995-97, Cohen represented Moussa Mohammed Abu Marzook, a senior Hamas political leader who co-founded the Islamic Association for Palestine and the Holy Land Foundation for Relief and Development (both terror-related organizations). Specifically, Cohen worked to thwart Israel’s effort to extradite Marzook out of the U.S. and try him for the role that he and Hamas had played in a number of bombings. As the Marzook case dragged on for some 22 months, Cohen visited his incarcerated client in jail almost nightly throughout that entire period. Ultimately, Cohen was successful in helping Marzook win his freedom, evade the Israeli justice system, and resettle in Syria. Articulating his high regard for Marzook, Cohen would later refer to him as “my dear friend” and “the Gerry Adamsof Hamas.”
Other noteworthy Islamists whom Cohen has defended include the following:
a contingent of Albanian Muslim mercenaries bound for Kosovoin the 1990s
Mazin Assi, a Palestinian who tried to firebomb a Riverdale, New York synagogue on the eve of Yom Kippur in 2000
the al-Qaeda-affiliated Texas Imam, Moataz Al-Hallak
the Oregon-based Imam and terror suspect Mohamed Kariye,arrested for possessing trace explosives while boarding a plane at Portland International Airport
a Palestinian-American who was jailed for refusing to provide grand jury testimony about Hamas
Amina Farah Ali, a Minnesota Muslim woman convicted of conspiring to provide material support to the al Qaeda-affiliated, Somali terrorist organization al-Shabaab
Mohamed Aleesa (a.k.a. Mohamed Alessa), who in 2011 pledguilty to charges that he had tried to join the al Qaeda-affiliated organization al-Shabaab
Mohamed Hammoud, a North Carolina-based Hezbollah operativeconvicted in 2002 of sending $3,500 to that organization
an Iranian-American international charity and relief organizeraccused of violating Office of Foreign Assets Control sanctions against Iran
The Communist publication Revolutionary Worker has lauded Cohen as “a longtime people’s lawyer beloved by many for his uncompromising willingness to provide legal defense for the unpopular … and those [whom] U.S. imperialism may feel should be ‘tried’ with no defense at all.” Joel Blumenfeld, a New York State Supreme Court Justice who formerly worked with Cohen, once said of the latter: “[I]f this were 1941-42, he would be representing the Japanese people who were being detained.”
Notably, Cohen has explained the rationale underlying his choice of clients. “If I don’t support the politics of political clients, I don’t take the case.” “Most of my clients [are] involved with struggle, many of them armed struggle,” he notes, proudly.
Cohen’s sympathy for Islamic terrorists was further reflected in his reaction to the events of 9/11. In the immediate aftermath of the attacks, he told the Village Voice: “If Osama bin Laden arrived in the United States today and asked me to represent him, sure I’d represent him.” In fact, Cohen was reluctant even to believe that al Qaeda was responsible for the attacks, as he articulted on September 22, 2001: “I don’t think this was an Osama bin Laden job at all. But I think for a lot of reasons the government would prefer it be Osama bin Laden. Because then there’s an identifiable bogeyman.” That same day, Cohen speculated: “I fear the government is going to use this [9/11] as a pretense … to go after those people who have stood up to Israeli interests and the pro-Israel lobby in this country.” Moreover, he said he was “absolutely” certain that “this operation was assisted by ex-CIA, ex-Mossad [Israeli intelligence agency] officers.”
Cohen was also sympathetic to the plight of the so-called “American Taliban,” John Walker Lindh, who was captured as an enemy combatant in Afghanistan later in 2001. By Cohen’s reckoning, Lindh, who confessed to having taken up arms against the United States, “deserves the presumption of innocence.”
In October 2001, Cohen addressed a Muslim gathering at a Paterson, New Jersey mosque and advised those in attendance not to cooperate with FBI investigators who, in the course of 9/11-related probes, might question them regarding their activities or affiliations. “Just say no,” Cohen stated. “It’s the safest way.” When a Texas resident subsequently called Cohen and told him that it was his [Cohen’s] duty, as an American, to convince his clients to cooperate with law-enforcement, Cohen replied: “First of all, I’m not an American. Right now, I’m a lawyer’ …. The World Trade Centers, they don’t belong to the United States; they don’t belong to George Bush. They belong to New York City. I live in the country of New York City.”
Throughout his adult life, Cohen has regarded the United States as an intractably racist nation whose criminal-justice system routinely denies fair treatment to racial, ethnic, and religious minorities. Consistent with this perspective, he portrayed the U.S. government’s post-9/11 war-on-terror as little more than a pretext for depriving Muslims of their civil liberties—analogous, he said, to America’s internment of Japanese civilians during World War II: “The Germans weren’t locked up. The Italians weren’t locked up. Only the Japanese were. This tells you that ‘civil liberties’ in this country are a matter of race.”
In 2004 Cohen served as a consultant to the Lebanon-based, Hezbollah-dominated al-Manar television network, helping the latter develop a litigation strategy for challenging the U.S. government’s decision todesignate it as a terrorist entity—and thus to block and criminalize its broadcast signal. Complaining that “the U.S. has now succeeded in completely convincing Americans that Hezbollah is a terrorist organization,” Cohen cited the organization’s broad popularity in Lebanon and declared: “It is another intimidation by the U.S. administration targeting groups that are independent from Washington’s influence.”
In 2007 Cohen provided consultation to the government of Yemen vis à vis United States v. al Moyaad et. al., a case where a Yemeni tribal leader was convicted of fundraising activities on behalf of Hamas.
CONTEMPT FOR ISRAEL
Cohen’s clear affinity for Islamists finds an alternative expression in the attorney’s harsh rebukes of Israel, which he has long characterized as a “terrorist state.” Asserting that “what Israel does is far more morally repugnant than what Hamas does,” Cohen affirms the Palestinians’ “right” and “obligation” to “resist occupation … by any means necessary.” “To much of the world,” he elaborates, “Hamas is not viewed as a terrorist organization but rather a national liberation movement involved in low-intensity, asymmetric warfare.”
In July 2002 Cohen filed a federal lawsuit demanding that the U.S. government stop giving financial support to Israel’s “program of killing, torture, terror and outright theft” targeting the Palestinians. The suit named President George W. Bush, Secretary of State Colin Powell, Israeli Prime Minister Ariel Sharon, various Israeli military officials, and a number of U.S. arms manufacturers, accusing them all of “genocide.” Cohen also sought damages on behalf of Palestinian Americans who had been victimized by Israeli “war crimes” (allegedly carried out with U.S.-made weapons) in Gaza and the West Bank. Joining Cohen in a news conference announcing the lawsuit were American Muslim Council founderAbdurahman Alamoudi and Palestinian Islamic Jihad leader Sami Al-Arian.
In a related effort, Cohen was a founding member of an international group of lawyers who, on behalf of Palestinians, have filed suits against Israel in such far-flung locations as Morocco, Belgium, France, Spain, and the United Kingdom, as well as before the International Criminal Court. These suits have charged the Jewish state with war crimes, crimes against humanity, and Geneva Convention violations.
Characterizing himself as “among the few Jews in the United States capable of bridging the gap between the West and the militant politics of the Middle East,” Cohen boasts that he once “had lunch with the alleged mastermind of the Achille Lauro ship hijacking,” a 1985 incident where Palestinian terrorists stormed a cruise ship and threw an elderly, wheelchair-bound American man overboard to his death; that he once “spent a day with [Yasser] Arafat in Ramallah on the West Bank” and wastreated “like a head of state”; and that he was given a number of audiences with the late Sheik Ahmed Yassin, former spiritual leader of Hamas. According to a 2002 news report, Cohen’s office decor at that time featured a picture of himself seated alongside Yassin, as well as aphoto of Lenin and a wall poster stating, “History cannot be written with a pen. It must be written with a gun.”
RECENT CASES
Cohen represented Mercedes Haeffer, one of 14 activists affiliated with the computer-hacker group Anonymous who were prosecuted by the U.S. government for allegedly participating in a December 2010 “digital sit-in” on PayPal’s website.
Cohen also represented an activist who was charged with assaulting a police officer during an Occupy Wall Street demonstration in 2011.
In late 2012, Cohen came to the legal defense of the internationally known journalist Mona Eltahawy, an Egyptian American who (in September 2012) used a can of pink spray paint to deface a poster in a New York City subway station that she claimed bore a message offensive to Muslims. Produced by Pamela Geller’s and Robert Spencer’s American Freedom Defense Initiative, that poster read: “In any war between the civilized man and the savage, support the civilized man. Support Israel. Defeat Jihad.” While Eltahawy was busy spray painting over those words, freelance journalist Pamela Hall tried unsuccessfully to stop her. During the confrontation, Eltahawy spray-painted Ms. Hall and ruined the latter’s reading glasses, camera, and clothing. She was arrested at the scene, and Hall pressed charges. According to Cohen, Eltahawy’s act of vandalism was an exercise in free speech. For a more complete complete synopsis of this case, click here.
SCANDAL
In June 2012 a federal grand jury in Syracuse, New York indicted Cohen for failing to file individual and corporate income tax returns from 2005 through 2010, and for attempting to evade IRS detection of large cash payments he had received from two of his clients in 2008 and 2010.According to the Syracuse Post-Standard:
“The indictment against Cohen says he failed to file a report with the IRS showing his law practice had received cash from two clients for more than $10,000 each. One payment was from a client with the initials TJF for $20,000 in August 2008, and the other was from client JS for $15,000 in the summer of 2010…. Cohen made regular deposits of cash into his personal bank accounts in amounts less than $10,000 to avoid having to file a report with the IRS for deposits of that amount or higher…. Cohen also received non-money payments in exchange for legal services and failed to maintain records of those payments as income, the indictment said.”
In December 2013 a Manhattan federal court similarly indicted Cohen for wire fraud and five counts of failure to file income-tax returns (on more than $3 million in earnings) for the 2006-2010 tax years. An NBC News report stated:
“The government alleged that Cohen was paid at least $500,000 in fees each of those years but hid the money by having clients pay in cash or telling them to wire payments directly to American Express to pay his card bills.”
If convicted, Cohen could be sentenced to as much as 20 years in prison.
Military Intelligence Officer, ET Contactee, Author, UFOlogist
Bob Dean Robert O. Dean has been engaged in the field of UFO research for the last 40 years. He began this research on active duty in the US ARMY where he served for 27 years. He retired as Command Sergeant Major from the Army in 1976 as a highly decorated combat veteran after having served as an Infantry Unit Commander in combat in Korea and Vietnam. He also served in Intelligence Field Operations in Laos, Cambodia and North Vietnam.
Additionally, from 1963 to 1967 he served at Supreme Headquarters Allied Powers Europe (SHAPE), NATO as an intelligence analyst with a Cosmic Top Secret clearance. While on this assignment, he helped move the headquarters to the new site in Belgium. Dean worked in the Operations Division and was a member of the inner Command Staff thereby working with and seeing the SACEUR (Supreme Allied Commander Europe) almost every day.
It was while he was stationed at SHAPE that Robert’s interest in UFOs first started. One night, while on duty, Robert removed a file from SHAPE’s security vault called “The Assessment” – An Evaluation of Possible Military Threat to Allied Forces in Europe”.
This file was given the highest security classification, COSMIC TOP SECRET. It retains that security classification to this day. The contents of this file opened Robert’s eyes to the existence of UFOs and extraterrestrial intelligence. He has, since reading “The Assessment”, dedicated his life to one goal: Bringing to light the true facts surrounding the UFO phenomenon and contact with extraterrestrial intelligence.
To this end, Robert’s current projects are directed toward gaining immunity for ex-military personnel (who may shed some light on the UFO issue), enabling them to testify before a Congressional Hearing without fear of losing their pensions or of prosecution.
A pilot shots a chemical plane from his cockpit: the video shows an aircraft that spread chemtrails over Canada from the nozzles. The footage is the irrefutable proof of a chemical and clandestine operation that a bold pilot offers to the public in order to demonstrate that chemtrails are real. The “smoke” we can see is neither a fuel dumping nor a contrail. The chemtrails, in fact, is iridescent too. Don’t listen to hoaxers who repeat that this document is false or similar lies. The author of this important video writes to Tanker Enemy:
“Nice job tanker enemy… I like the enhancements. Btw, I took the video while we were flying over Canada. Thanks for translating the video so more people will understand what’s going on. I’ll post more as I see them”.A pilot shots a chemical plane from his cockpit: the video shows an aircraft that spread chemtrails over Canada from the nozzles. The footage is the irrefutable proof of a chemical and clandestine operation that a bold pilot offers to the public in order to demonstrate that chemtrails are real. The “smoke” we can see is neither a fuel dumping nor a contrail. The chemtrails, in fact, is iridescent too. Don’t listen to hoaxers who repeat that this document is false or similar lies. The author of this important video writes to Tanker Enemy:
“Nice job tanker enemy… I like the enhancements. Btw, I took the video while we were flying over Canada. Thanks for translating the video so more people will understand what’s going on. I’ll post more as I see them”.A pilot shots a chemical plane from his cockpit: the video shows an aircraft that spread chemtrails over Canada from the nozzles. The footage is the irrefutable proof of a chemical and clandestine operation that a bold pilot offers to the public in order to demonstrate that chemtrails are real. The “smoke” we can see is neither a fuel dumping nor a contrail. The chemtrails, in fact, is iridescent too. Don’t listen to hoaxers who repeat that this document is false or similar lies. The author of this important video writes to Tanker Enemy:
“Nice job tanker enemy… I like the enhancements. Btw, I took the video while we were flying over Canada. Thanks for translating the video so more people will understand what’s going on. I’ll post more as I see them”.A pilot shots a chemical plane from his cockpit: the video shows an aircraft that spread chemtrails over Canada from the nozzles. The footage is the irrefutable proof of a chemical and clandestine operation that a bold pilot offers to the public in order to demonstrate that chemtrails are real. The “smoke” we can see is neither a fuel dumping nor a contrail. The chemtrails, in fact, is iridescent too. Don’t listen to hoaxers who repeat that this document is false or similar lies. The author of this important video writes to Tanker Enemy:
“Nice job tanker enemy… I like the enhancements. Btw, I took the video while we were flying over Canada. Thanks for translating the video so more people will understand what’s going on. I’ll post more as I see them”.
There is often times a trade-off between security and convenience. With Home Hacks the more easily you can access your personal data, the easier someone else can too, making anything that you put online a potential target for hackers. A growing source of concern for many people is their home security and home automation systems.
Home automation is just starting to come into its own, with more home appliances having the capability to be networked, monitored, and controlled from your computer, phone, or other device. The collection of networked devices is commonly referred to as “the Internet of things” since we’re able to sync almost anything we’d like to the internet and, thus, each other. While home automation is not a new idea, it is only more recently that it has become mainstream and available to the masses while also having a more affordable price. This means you could be able to control many different aspects of your home from anywhere at any time. You can set your own schedules and preferences for things like lights, temperature, door locks, or a home security system.
However, along with the convenience of having all this control and information at your fingertips, there are vulnerabilities to worry about. Once your data is online, it becomes a potential target for hackers and malware. And now it isn’t just personal data there is also the threat of hackers being able to remotely shut down your home security system, or detect when you are not at home. Forbes recently reported on a series of incidents where Insteon smart home systems were installed with no password protection, allowing anyone to easily gain control of a complete stranger’s home.
Another security flaw with some of these devices, like the Mi Casa Verde MIOS VeraLite, is that once connected to a WiFi network, the device assumes anyone is an authorized user. So potential hackers need only connect to someone’s WiFi network (something even a novice could do) to gain control of the house.
These stories highlight the need to take security more seriously, both on the part of manufacturers developing more robust security features, and users taking advantage of these features. For those questioning the security of your home automation, it is important to make sure that any home automation devices are password protected (with 128-bit encryption if possible), and that your home WiFi network and router are also securely behind strong passwords. There are some companies like ADT that monitor these things for you, but if you’re using a build as you go, DIY type system like Wink, you’ll need to pay special attention to this. Make sure any firmware or software updates are installed promptly when security flaws are found and patched. Never use a default password. In fact, it is good practice to periodically change your passwords. With a bit of care, you can safely enjoy the convenience of an automated home.
Tying into the concept of a hyper-connected home, like Home Hacks, and bring some of the same concerns, is the growing technology behind smart grids and smart meters. The so-called smart meter lets consumers see how much power is being used in their homes on an hourly basis. These meters are connected to the smart grid, which allows power companies to adjust prices based on demand and supply, while the added information lets consumers adjust their consumption habits. But there are privacy concerns about utility companies collecting massive amounts of data about their customers and their habits. Similar to hacking a home automation system, if hackers obtained data from a smart meter they could potentially gather personal information as well, determine things like when the house is empty, or even run up fake charges shut down the power.
In May of 2014, the White House released a report called “Big Data: Seizing Opportunities, Preserving Values” which recognized the dangers of all this data being collected, and the need to protect privacy. Currently, the major federal legislation regarding smart grids is the Energy Independence and Security Act of 2007, which created various committees and councils to establish standards and protocols for upgrading to smart grids. Several states have passed their own laws to encourage smart grid development, including California, Maryland, and Illinois.
While smart meters have been touted as a way for consumers to save money on energy bills while helping the energy system as a whole run more efficiently, the two way communication the smart meters permit, the health risks they present, and the lack of demonstrated savings or efficiency increases for many who are using them, have some commentators speculating that smart meters are more trouble than they’re worth. On top of this there are no laws against keeping the government or utilities companies away from personal data obtained through these devices (not that laws would stop them from doing so anyway), and thus no protection for citizens. Home Hacks.
Since they’re inherently controlled by the utilities, smart meters seem highly unlikely to be a secure solution for the average homeowner. Your best bet to get the most out of a smart home and both understand and reduce your energy costs is to stay away from smart meters altogether, and use a home automation system to help control your energy usage – just make sure that it’s a system that you can harden against outside intrusion.
Israel’s “Smart” Weapons Kill Sabah Abu Jayab, known to her family and friends as Um Ahmad, walked through her home pointing out everything that had to be replaced after Israel’s 2014 assault on the besieged Gaza Strip.
“This is all new,” Um Ahmad, a pharmacist, told The Electronic Intifada. She motioned to a balcony equipped with freshly painted walls and new windowsills. Moving to the living room, she said: “These couches, the chairs over there — all of it is new. We had to replace everything.”
Her home, where she lived with her husband and eight children, was hit by four missiles fired by an Israeli drone during the first week of the Israeli attack. “Only two of them exploded,” she said. “If the others had blown up, we’d have all died.”
Not everyone survived. Her eighteen-year-old daughter Amal, who was disabled and unable to walk, died on 17 July, four days after their house was struck.
“She wasn’t hit by the rocket or debris,” Um Ahmad explained, “but she inhaled a lot of smoke and dust.”
Amal was one of an estimated 2,257 Palestinians killed — including 563 children and 306 women — during Israel’s seven-week attack, according to the United Nations monitoring group OCHA.
“They were all scared”
On 13 July, as missiles pounded their neighbors’ homes during an intensified attack on the Deir al-Balah area in central Gaza, Um Ahmad moved all the children into one room in the back of their house.
“It was hard to explain to them what was happening and they were all scared,” she said, explaining that Amal’s three sisters are also disabled and unable to walk due to genetic birth defects.
“There had been no electricity or water for days, and the little ones would jump every time they heard an explosion,” she said.
Um Ahmad explained that they tried to stay in their home because they had nowhere else to go. “It was hard on the little ones,” she said. “We knew at any minute we could be hit [by an Israeli strike] like our neighbors.”
Muhammad Abu Jayab, 11, stands on the roof of his home. His neighbor’s destroyed house is in the background.
Um Ahmad had to go to her pharmacy to provide medicine for local residents with chronic illnesses and others who had been injured by Israel’s assault. “There was no way I could not show up to work,” she explained. “People with diabetes needed insulin even during times of war [and] others who were hurt needed antibiotics and other medicine.”
The Abu Jayab family home was hit on 13 July. “We had to carry the four children who don’t walk,” she said. “We took Amal to the hospital because she was in shock and having trouble breathing. They put her on oxygen, but her vital signs seemed fine and she didn’t have any external bodily injuries.” Israel’s “Smart” Weapons Kill
Targeting the ill
Amal was unable to eat or speak after the attack and Um Ahmad spent the last four days of her daughter’s life going back and forth between the hospital and the pharmacy where she works. “I showed up that last day and she was dead,” she recounted as she fought back tears.
Israel targeted a medical facility for the disabled on 12 July, the day before the Abu Jayab home was struck. At least four persons were killed and dozens injured when bombs crushed the Mabaret Palestine Society, a center for people with disabilities, in Beit Lahiya, a town in northern Gaza.
On 21 July, Israeli tanks shelled the al-Aqsa hospital in Deir al-Balah, killing three people and injuring forty more, the human rights group Al-Haqreported.
Doctors were forced to evacuate at least fourteen patients who were paralyzed or in a coma at the time, Ma’an News Agency reported.
The Israeli army claimed that Palestinian armed groups used the hospital as a base. However it was revealed that Israel used fabricated satellite imagesto “justify” its bombing of al-Wafa.
Ashraf al-Qidra, a spokesperson for Gaza’s health ministry, said that Israel targeted medical facilities and health workers alike. In addition to the hospitals and clinics, three dozen ambulances were destroyed, he told The Electronic Intifada.
“Israel turned medical centers into unprotected zones, although they are supposed to be protected by international law,” al-Qidra said. “Patients and workers had to always worry whether Israel would target the buildings they were in.”
Al-Qidra added that the medical centers were destroyed or damaged by warplanes, drone strikes and tank shelling alike.
Back in her home, Um Ahmad said, “What are we supposed to do now? We just want to live like everyone else. We need food, water and electricity — and we need to keep our children safe. We cannot do that here.”
Charlie Hebdo As the dust settles from this week’s terror extravaganza in France, more loose ends are turning up (or being tied up), with this latest bizarre bombshell which is already fueling speculation as to the covert nature of theCharlie Hebdo false flag affair.
A police commissioner from Limoges, France, HelricFredou,aged 45 (photo, below), turned up dead from a gun shot to the head on Thursday amid the Charlie Hebdo affair. A high-ranking official within the French law enforcement command-and-control structure, Fredou was also a former deputy directorof the regionalpoliceservice.
According France 3, his body was “found by a colleague” at approximately 1am Thursday – only hours after the initial Paris attack.
At the time of his death, police claim to have not known the reason for his alleged suicide. This was reflected in their official statements to the media: “It is unknownat this timethe reasons forhis actions”. However, a back story appears to have been inserted simultaneously, most likely from the very same police media liaisons, who then told the press that Fredou was ‘depressed and overworked’. For any law enforcement officer in France, it would seem rather odd that anyone would want to miss the biggest single terror event in the century, or history in the making, as it were.
Here is a link to the original report in the French media, which confirms that Commissioner Fredou was indeed working on the Charlie Hebdo case:
“TheFredouCommissioner, like all agentsSRPJ,workedyesterdayon the caseof the massacreat the headquarters ofCharlieHebdo.In particular, hewas investigatingthe family ofone of the victims. He killed himselfbeforecompleting its report. A psychological ‘cell’was set upin thepolice station.”
EDITOR’S NOTE: It is not yet known to 21WIRE exactly how the fatal gun shot occurred, but if any other past political and high-profile ‘suicided’ cases are anything to go by, authorities will claim that this victim either shot himself in the back of the head, with his non-shooting hand. In addition, if that were the case, there would also be a lack of gun powder burns on the hands according to the autopsy.
UK-based investigative reporter Morris108, interviews ‘Phil in France’ regarding this new development:
Even more bizarrely, an almost identical event took place just over one year earlier, November 2013 in Limoges, when the number 3 ranked SRPJ officer had killed himself in similar circumstances, with his weapon in the police hotel. Allegedly, his colleague discovered his body. The prosecution ruled that case was a suicide too, and the police officer had left a suicide note to his family in which he expressed “personal reasons” for his surprising action. Stay tuned for more updates on this story at 21WIRE.
Sputnik News
Police commissioner, who had been investigating the attack on the Charlie Hebdo magazine committed suicide with his service gun on Thursday night.
Police commissioner Helric Fredou, who had been investigating the attack on the French weekly satirical magazine Charlie Hebdo, committed suicide in his office. The incident occurred in Limoges, the administrative capital of the Limousin region in west-central France, on Thursday night, local media France 3 reports.
Helric Fredou, 45, suffered from ‘depression’ and experienced ‘burn out’ [according to the official statement]. Shortly before committing suicide, he met with the family of a victim of the Charlie Hebdo attack and killed himself preparing the report.
Fredou began his career in 1997 as a police officer at the regional office of the judicial police of Versailles. Later he returned to Limoges, his hometown. Since 2012 he had been the deputy director of the regional police service.
“We are all shocked. Nobody was ready for such developments”, a representative of the local police union told reporters.
On January 7, 2015, two gunmen burst into the editorial office of Charlie Hebdo magazine, known for issuing cartoons, ridiculing Islam. The [suspected] attackers, later identified as brothers Said and Cherif Kouachi, killed 12 people and injured 11, and escaped from the scene. Following two days of nationwide manhunt, the suspects were killed on Friday by French police some 20 miles northeast of Paris.
Isreal is Getting Away with Murder On January 28th a barrage of Israeli artillery fire struck near the South Lebanese village of Ghajar, killing United Nations peacekeeper Francisco Javier Soria. Soria, 36, was a Spanish citizen deployed with the United Nations Interim Force in Lebanon, a peacekeeping mission tasked with maintaining the ceasefire between Israel and Lebanon in the occupied Golan Heights.
His death came in the midst of a recent flare-up of violence between Israel and Hezbollah, and Spain’s ambassador to the United Nations placed blame for the incident upon the Israeli Defence Forces, citing an “escalation of violence [which] came from the Israeli side.” The exact circumstances which led to Soria’s death are still under investigation; Israeli officials expressed condolences for his death and said their forces were responding to fire in the area.
What is clear however is that Israeli forces have been killing an alarming number of United Nations personnel in the course of their recent military operations — and that UN officials have vociferously criticized the attacks, sometimes saying they appeared deliberate.
This past summer in the Gaza Strip, Israel forces attacked seven different schools run by the United Nations Relief and Works Agency, schools that had been serving as temporary shelters for the displaced population of the territory. Despite repeated warnings, condemnations and entreaties, United Nations targets were hit again and again by Israeli airstrikes and shelling during the conflict.
As many of 46 civilians are believed to have been killed in these attacks, as well as eleven UNRWA staff members. One particularly lethal strike on a UN-administered elementary school in Beit Hanoun killed 15 civilians and wounded 200 others. That attack reportedly sent shrapnel flying into crowds of families who had been awaiting transportation in the school’s playground.
In the wake of these and other bombings, UNRWA chief Chris Gunness broke down in tears during a live television interview while decrying the “[wholesale] denial” of Palestinian rights by Israeli forces during the operation.
Instead of offering contrition for these deadly incidents, Israeli officials continued to justify them with unsubstantiated, and vigorously deniedallegations that UNRWA schools were near sources of rocket fire and were thus simply caught in the crossfire. An investigation by Human Rights Watch looking at several of Israel’s attacks on these schools said that they, “did not appear to target a military objective or were otherwise unlawfully indiscriminate.”
Indeed, the idea that Israel’s repeated bombing of these schools may have simply been “mistakes” is difficult to countenance.
In one shelling incident which targeted a school in Rafah, United Nations personnel notified the IDF on 33 separate occasions that the facility was being used as a shelter for civilians. United Nations Secretary General Ban Ki-Moon publicly denounced the attack as a “moral outrage and a criminal act”, adding that “nothing is more shameful than attacking sleeping children”.
Even the United States, normally Israel’s most uncritical defender on the world stage, was moved to state that it was was “appalled” by what it described as a “disgraceful” attack on the school.
As egregious as these incidents were however, they are far from the first time in recent years in which Israel has targeted United Nations operations for shelling and airstrikes.
During the 2008-2009 Gaza War, Israeli forces targeted not only UNRWA schools (one of them pictured above) but even the compound housing the headquarters of the agency in the Gaza Strip. That attack, which involved the use of illegal white phosphorus munitions, destroyed tons of vital food aid and medical supplies which the large refugee population of the territory relied upon for basic sustenance.
Isreal is Getting Away with Murder At the time, Israeli officials claimed that they had been responding to rocket fire which had emanated from the compound, a claim which UN officials described as “total nonsense”.
In another notorious incident from Israel’s 2006 war with Lebanon, Israeli aircraft and artillery bombed a single United Nations outpost for upwards of six hours, despite receiving repeated pleas during this time from UN officials to cease fire. Four peacekeepers were killed in what then UN Secretary General Kofi Annan described as an “apparently deliberate” act.
Israel has long had a contentious relationship with United Nations agencies operating in the Middle East. Israeli officials have in past accused UN personnel of offering shelter to militants (a charge the organization strenuously denies), and has also more broadly suggested that the organization is responsible for prolonging the Israel-Palestine conflict due to its provision of refugee status and services to displaced Palestinians and their descendants.
In the wake of the most recent Gaza conflict, some Israeli political figures even called for UNRWA to formally be recognized as a “hostile organization”, an outrageous suggestion which nevertheless provides some insight into the hostility with which the UN is often viewed today in official circles.
Israel’s repeated bombing and shelling of United Nations positions in the region comes against this backdrop, with Soria’s death being only the latest incident in which Israeli forces have been responsible for killing UN personnel. To date, no one has been held legally responsible for any of these attacks.
By way of contrast, imagine the response if Hamas or Hezbollah had repeatedly and unrepentantly killed United Nations officials in the course of their conflict with Israel. Imagine if United Nations schools housing thousands of displaced civilians been struck time and again by militant groups, who in the wake of the bloodshed either denied responsibility outright or sought to justify their actions.
Furthermore, imagine if these attacks inflicted widespread civilian casualties and came despite repeated pleas and entreaties from UN officials to cease fire.
The outcry would rightly be deafening, yet this is exactly what Israel has done again and again in its conflicts in Lebanon and the Gaza Strip without consequence. As a result of this burgeoning culture of impunity, partly enabled by the unprecedented diplomatic protection offered to Israeli officials by the United States, UN personnel and facilities have increasingly been subject to deadly violence from the Israeli military.
As Pierre Krähenbühl, commissioner-general of UNRWA, stated in the aftermath of a deadly bombing against a UN-administered school in Gaza this past summer, “this [attack] is an affront to all of us, a source of universal shame. Today, the world stands disgraced.”
How to identify CIA The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations. There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with a limited hangout operation, in which carefully selected and falsified documents and other materials are deliberately revealed by an insider who pretends to be a fugitive rebelling against the excesses of some oppressive or dangerous government agency. But the revelations turn out to have been prepared with a view to shaping the public consciousness in a way which is advantageous to the intelligence agency involved. At the same time, gullible young people can be duped into supporting a personality cult of the leaker, more commonly referred to as a “whistleblower.”
A further variation on the theme can be the attempt of the sponsoring intelligence agency to introduce their chosen conduit, now posing as a defector, into the intelligence apparatus of a targeted foreign government. In this case, the leaker or whistleblower attains the status of a triple agent. Any attempt to educate public opinion about the dynamics of limited hangout operations inevitably collides with the residue left in the minds of millions by recent successful examples of this technique. It will be hard for many to understand Snowden, precisely because they will insist on seeing him as the latest courageous example in a line of development which includes Daniel Ellsberg and Julian Assange, both still viewed by large swaths of naïve opinion as authentic challengers of oppressive government. This is because the landmark limited hangout operation at the beginning of the current post-Cold War era was that of Daniel Ellsberg and the Pentagon papers, which laid the groundwork for the CIA’s Watergate attack on the Nixon administration, and more broadly, on the office of the presidency itself. More recently, we have had the case of Assange and Wikileaks.
Using these two cases primarily, we can develop a simple typology of the limited hangout operation which can be of significant value to those striving to avoid the role of useful idiots amidst the current cascade of whistleblowers and limited hangout artists. In this analysis, we should also recall that limited hangouts have been around for a very long time. In 1620 Fra Paolo Sarpi, the dominant figure of the Venetian intelligence establishment of his time, advised the Venetian senate that the best way to defeat anti-Venetian propaganda was indirectly. He recommended the method of saying something good about a person or institution while pretending to say something bad. An example might be criticizing a bloody dictator for beating his dog – the real dimensions of his crimes are thus totally underplayed.
Limited hangout artists are instant media darlings
The most obvious characteristic of the limited hangout operative is that he or she immediately becomes the darling of the controlled corporate media. In the case of Daniel Ellsberg, his doctored set of Pentagon papers were published by the New York Times, the Washington Post, the Boston Globe, and eventually by a consortium totaling seventeen corporate newspapers. These press organs successfully argued the case for publication all the way to the United States Supreme Court, where they prevailed against the Nixon administration. Needless to say, surviving critics of the Warren Commission, and more recent veterans of the 9/11 truth movement, and know very well that this is emphatically not the treatment reserved for messengers whose revelations are genuinely unwelcome to the Wall Street centered US ruling class. These latter are more likely to be slandered, vilified and dragged through the mud, or, even more likely, passed over in complete silence and blacked out. In extreme cases, they can be kidnapped, renditioned or liquidated.
Cass Sunstein present at the creation of Wikileaks
As for Assange and Wikileaks, the autumn 2010 document dump was farmed out in advance to five of the most prestigious press organs in the world, including the New York Times, the London Guardian, El Pais of Madrid, Der Spiegel of Hamburg, and Le Monde of Paris. This was the Assange media cartel, made up of papers previously specialized in discrediting 9/11 critics and doubters. But even before the document dumps had begun, Wikileaks had received a preemptive endorsement from none other than the notorious totalitarian Cass Sunstein, later an official of the Obama White House, and today married to Samantha Power, the author of the military coup that overthrew Mubarak and currently Obama’s pick for US ambassador to the United Nations. Sunstein is infamous for his thesis that government agencies should conduct covert operations using pseudo-independent agents of influence for the “cognitive infiltration of extremist groups” – meaning of those who reject in the establishment view of history and reality.Sunstein’s article entitled “Brave New WikiWorld” was published in the Washington Post of February 24, 2007, and touted the capabilities of Wikileaks for the destabilization of China.
Perhaps the point of Ed Snowden’s presence in Hong Kong is to begin re-targeting these capabilities back towards the original anti-Chinese plan. Snowden has already become a media celebrity of the first magnitude. His career was launched by the US left liberal Glenn Greenwald, now writing for the London Guardian, which expresses the viewpoints of the left wing of the British intelligence community. Thus, the current scandal is very much Made in England, and may benefit from inputs from the British GCHQ of Cheltenham, the Siamese twin of the NSA at Fort Meade, Maryland. During the days of his media debut, it was not uncommon to see a controlled press organ like CNN dedicating one third of every broadcast hour of air time to the birth, life, and miracles of Ed Snowden.
Another suspicious and tell-tale endorsement for Snowden comes from the former State Department public diplomacy asset Norman Solomon. Interviewed on RT, Solomon warmly embraced the Snowden Project and assured his viewers that the NSA material dished up by the Hong Kong defector used reliable and authentic. Solomon was notorious ten years ago as a determined enemy of 9/11 truth, acting as a border guard in favor of the Bush administration/neocon theory of terrorism.
Limited hangouts contain little that is new
Another important feature of the limited hangout operation if that the revelations often contain nothing new, but rather repackage old wine in new bottles. In the case of Ellsberg’s Pentagon Papers, very little was revealed which was not already well known to a reader of Le Monde or the dispatches of Agence France Presse. Only those whose understanding of world affairs had been filtered through the Associated Press, CBS News, the New York Times, and the Washington Post found any of Ellsberg’s material a surprise. Of course, there was method in Ellsberg’s madness. The Pentagon papers allegedly derived from an internal review of the decision-making processes leading to the Vietnam War, conducted after 1967-68 under the supervision of Morton Halperin and Leslie Gelb. Ellsberg, then a young RAND Corporation analyst and militant warmonger, was associated with this work.
Upon examination, we find that the Pentagon papers tend to cover up such CIA crimes as the mass murder mandated under Operation Phoenix, and the massive CIA drug running associated with the proprietary airline Air America. Rather, when atrocities are in question, the US Army generally receives the blame. Politicians in general, and President John F. Kennedy in particular, are portrayed in a sinister light – one might say demonized. No insights whatever into the Kennedy assassination are offered. This was a smelly concoction, and it was not altogether excluded that the radicalized elements of the Vietnam era might have carried the day in denouncing the entire package as a rather obvious fabrication. But a clique around Noam Chomsky and Howard Zinn loudly intervened to praise the quality of the exposé and to lionize Ellsberg personally as a new culture hero for the Silent Generation. From that moment on, the careers of Chomsky and Zinn soared. Pentagon papers skeptics, like the satirical comedian Mort Sahl, a supporter of the Jim Garrison investigation in New Orleans and a critic of the Warren Commission, faced the marginalization of their careers.
Notice also that the careers of Morton Halperin and Leslie Gelb positively thrived after they entrusted the Pentagon papers to Ellsberg, who revealed them. Ellsberg was put on trial in 1973, but all charges were dismissed after several months because of prosecutorial misconduct. Assange lived like a lord for many months in the palatial country house of an admirer in the East of England, and is now holed up in the Ecuadorian Embassy in London. He spent about 10 days in jail in December 2010.Assange first won credibility for Wikileaks with some chum in the form of a shocking film showing a massacre perpetrated by US forces in Iraq with the aid of drones. The massacre itself and the number of victims were already well known, so Assange was adding only the graphic emotional impact of witnessing the atrocity firsthand.
Limited hangouts reveal nothing about big issues like JFK, 9/11
Over the past century, there are certain large-scale covert operations which cast a long historical shadow, determining to some extent the framework in which subsequent events occur. These include the Sarajevo assassinations of 1914, the assassination of Rasputin in late 1916, Mussolini’s 1922 march on Rome, Hitler’s seizure of power in 1933, the assassination of French Foreign Minister Barthou in 1934, the assassination of President Franklin D. Roosevelt in 1945, in 1963 Kennedy assassination, and 9/11. A common feature of the limited hangout operations is that they offer almost no insights into these landmark events. In the Pentagon Papers, the Kennedy assassination is virtually a nonexistent event about which we learn nothing. As already noted, the principal supporters of Ellsberg were figures like Chomsky, whose hostility to JFK and profound disinterest in critiques of the Warren Commission were well-known.
As for Assange, he rejects any further clarification of 9/11. In July 2010, Assange told Matthew Bell of the Belfast Telegraph: “I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.” This is on top of Cass Sunstein’s demand for active covert measures to suppress and disrupt inquiries into operations like 9/11. Snowden’s key backers Glenn Greenwald and Norman Solomon have both compiled impressive records of evasion on 9/11 truth, with Greenwald specializing in the blowback theory.
The Damascus road conversions of limited hangout figures
Daniel Ellsberg started his career as a nuclear strategist of the Dr. Strangelove type working for the RAND Corporation. He worked in the Pentagon as an aide to US Secretary of Defense Robert McNamara. He then went to Vietnam, where he served as a State Department civilian assistant to CIA General Edward Lansdale. In 1967, he was back at RAND to begin the preparation of what would come to be known as the Pentagon papers. Ellsberg has claimed that his Damascus Road conversion from warmonger to peace angel occurred when he heard a speech from a prison-bound draft resister at Haverford College in August 1969. After a mental breakdown, Ellsberg began taking his classified documents to the office of Senator Edward Kennedy and ultimately to the New York Times. Persons who believe this fantastic story may be suffering from terminal gullibility.
In the case of Assange, it is harder to identify such a moment of conversion. Assange spent his childhood in the coils of MK Ultra, a complex of Anglo-American covert operations designed to investigate and implement mind control through the use of psychopharmaca and other means. Assange was a denizen of the Ann Hamilton-Byrne cult, in which little children that were subjected to aversive therapy involving LSD and other heavy-duty drugs. Assange spent his formative years as a wandering nomad with his mother incognito because of her involvement in a custody dispute. The deracinated Assange lived in 50 different towns and attended 37 different schools. By the age of 16, the young nihilist was active as a computer hacker using the screen name “Mendax,” meaning quite simply “The Liar.” (Assange’s clone Snowden uses the more marketable codename of “Verax,” the truth teller.) Some of Assange’s first targets were Nortel and US Air Force offices in the Pentagon. Assange’s chief mentor became John Young of Cryptome, who in 2007 denounced Wikileaks as a CIA front.
Snowden’s story, as widely reported, goes like this: he dropped out of high school and also dropped out of a community college, but reportedly was nevertheless later able to command a salary of between $120,000 and $200,000 per year; he claims this is because he is a computer wizard. He enlisted in the US Army in May 2004, and allegedly hoped to join the special forces and contribute to the fight for freedom in Iraq. He then worked as a low-level security guard for the National Security Agency, and then went on to computer security at the CIA, including a posting under diplomatic cover in Switzerland. He moved on to work as a private contractor for the NSA at a US military base in Japan. His last official job was for the NSA at the Kunia Regional SIGINT Operations Center in Hawaii. In May 2013, he is alleged to have been granted medical leave from the NSA in Hawaii to get treatment for epilepsy. He fled to Hong Kong, and made his revelations with the help of Greenwald and a documentary filmmaker Laura Poitras. Snowden voted for the nominally anti-war, ultra-austerity “libertarian” presidential candidate Ron Paul, and gave several hundred dollars to Paul’s campaign.
Snowden, like Ellsberg, thus started off as a warmonger but later became more concerned with the excesses of the Leviathan state. Like Assange, he was psychologically predisposed to the world of computers and cybernetics. The Damascus Road shift from militarist to civil libertarian remains unexplained and highly suspicious. Snowden is also remarkable for the precision of his timing. His first revelations, open secrets though they were, came on June 5, precisely today when the rebel fortress of Qusayr was liberated by the Syrian army and Hezbollah. At this point, the British and French governments were screaming at Obama that it was high time to attack Syria. The appearance of Snowden’s somewhat faded material in the London Guardian was the trigger for a firestorm of criticism against the Obama regime by the feckless US left liberals, who were thus unwittingly greasing the skids for a US slide into a general war in the Middle East.
More recently, Snowden came forward with allegations that the US and the British had eavesdropped on participants in the meeting of the G-20 nations held in Britain four years ago. This obviously put Obama on the defensive just as Cameron and Hollande were twisting his arm to start the Syrian adventure. By attacking the British GCHQ at Cheltenham, Britain’s equivalent to the NSA, perhaps Snowden was also seeking to obfuscate the obvious British sponsorship of his revelations. Stories about Anglo Americans spying on high profile guests are as old as the hills, and have included a British frogman who attempted an underwater investigation of the Soviet cruiser that brought party leader N. S. Khrushchev for a visit in the 1950s. Snowden has also accused the NSA of hacking targets in China — again, surely no surprise to experienced observers, but guaranteed to increase Sino-American tensions. As time passes, Snowden may emerge as more and more of a provocateur between Washington and Beijing.
Limited hangouts prepare large covert operations
Although, as we have seen, limited hangouts rarely illuminate the landmark covert operations which attempt to define an age, limited hangouts themselves do represent the preparation for future covert operations. In the case of the Pentagon papers, this and other leaks during the Indo-Pakistani Tilt crisis were cited by Henry Kissinger in his demand that President Richard Nixon take countermeasures to restore the integrity of state secrets. Nixon foolishly authorized the creation of a White House anti-leak operation known as the Plumbers. The intelligence community made sure that the Plumbers operation was staffed by their own provocateurs, people who never were loyal to Nixon but rather took their orders from Langley. Here we find the already infamous CIA agent Howard Hunt, the CIA communications expert James McCord, and the FBI operative G. Gordon Liddy. These provocateurs took special pains to get arrested during an otherwise pointless break-in at the headquarters of the Democratic National Committee in the summer of 1972. Nixon could easily have disavowed the Plumbers and thrown this gaggle of agent provocateurs to the wolves, but he instead launched a cover up. Bob Woodward of the Washington Post, equipped with a top secret security clearance from the Office of Naval Intelligence, then began publicizing the story. The rest is history, and the lasting heritage has been a permanent weakening of the office of the presidency and the strengthening of the worst oligarchical tendencies.
Assange’s Wikileaks document dump triggered numerous destabilizations and coups d’état across the globe. Not one US, British, or Israeli covert operation or politician was seriously damaged by this material. The list of those impacted instead bears a striking resemblance to the CIA enemies’ list: the largest group of targets were Arab leaders slated for immediate ouster in the wave of “Arab Spring.” Here we find Ben Ali of Tunisia, Qaddafi of Libya, Mubarak of Egypt, Saleh of Yemen, and Assad of Syria. The US wanted to replace Maliki with Allawi as prime minister of Iraq, so the former was targeted, as was the increasingly independent Karzai of Afghanistan.
Perennial targets of the CIA included Rodriguez Kirchner of Argentina, Berlusconi of Italy, and Putin of Russia. Berlusconi soon fell victim to a coup organized through the European Central Bank, while his friend Putin was able to stave off a feeble attempt at color revolution in early 2012. Mildly satiric jabs at figures like Merkel of Germany and Sarkozy of France were included primarily as camouflage. Assange thus had a hand in preparing one of the largest destabilization campaigns mounted by Anglo-American intelligence since 1968, or perhaps even 1848. If the Snowden operation can help coerce the vacillating and reluctant Obama to attack Syria, our new autistic hero may claim credit for starting a general war in the Middle East, and perhaps even more. If Snowden can further poison relations between United States and China, the world historical significance of his provocations will be doubly assured. But none of this can occur unless he finds vast legions of eager dupes ready to fall for his act. We hope he won’t.
Alberto Behar Mr Behar died instantly when his single-engine plane nosedived shortly after takeoff Friday from Van Nuys Airport He worked on two Mars missions and spent years researching how robots work in harsh environments like volcanoes and underwater As part of the NASA team exploring Mars with the Curiosity rover, Behar was responsible for a device that detected hydrogen on the planet’s surface as the rover moved.
47-year old NASA Scientist Alberto Behar helped to prove that there had once been water on Mars according to the sad Daily Mail story published to announce his recent death in a plane crash that happened on Friday in LA, California. While plane crashes do happen and scientists do die, Behar’s name has now been added to a very long list of scientists and astronomers who have met their untimely ends prematurely, leading us to ask, did Behar know something that ‘they’ don’t want the rest of society to find out?
Robotics expert, NASA at the JPL.
Alberto Behar Mr Behar died instantly when his single-engine plane nosedived shortly after takeoff Friday from Van Nuys Airport He worked on two Mars missions and spent years researching how robots work in harsh environments like volcanoes and underwater As part of the NASA team exploring Mars with the Curiosity rover, Behar was responsible for a device that detected hydrogen on the planet’s surface as the rover moved.
47-year old NASA Scientist Alberto Behar helped to prove that there had once been water on Mars according to the sad Daily Mail story published to announce his recent death in a plane crash that happened on Friday in LA, California. While plane crashes do happen and scientists do die, Behar’s name has now been added to a very long list of scientists and astronomers who have met their untimely ends prematurely, leading us to ask, did Behar know something that ‘they’ don’t want the rest of society to find out?
Patrick Daniel “Pat” Tillman was an American football player who left his professional career and enlisted in the United States Army in June 2002 in the aftermath of the September 11 attacks. During his stay in Afghanistan, he quickly realized there was deception behind USA’s going to war and that it seemed to be more about ‘theft of resources’.
Due to tight media control & manipulation of the facts, few Americans were aware that Tillman, just recently before his death, had become vocal of his anti ‘war-for-oil’ sentiments within the ranks. He was also concerned with the USA’s disregard for heavy civilian casualties, and treatment of the population.
Independent investigators have pointed out that Tillman was scheduled to meet & greet (whistle-blow) with Noam Chomsky in public, upon his return from Military service. Pat Tillman was well respected and highly influential during a critical ramp-up to what would become an even larger ‘war’. It is reasonable to suspect that he became a potential threat to the military-industrial-complex agenda.
Highly Suspicious Death & Cover-Up:
The official version of events (after a long and shady cover-up) were announced to be that Tillman’s death was due to an accidental ‘friendly fire’ incident. However the *leaked autopsy report showed that he was killed at very close range ‘assassination style’ with a triple tap shot to the forehead, which would be quite impossible if indeed a friendly fire ‘accident’.