Germans & Russians Used Fluoride to Make Prisoners ‘Stupid & Docile’

Germans & Russians Used Fluoride to Make Prisoners ‘Stupid & Docile’

“To whom it may concern: I, Oliver Kenneth Goff, was a member of the Communist Party and the Young Communist League from May 2, 1936 to October 9, 1939. During this period of time, I operated under the alias of John Keats and the number 18-B-2. My testimony before the Government is incorporated in Volume 9 of the Un-American Activities Report for the year 1939.
“While a member of the Communist Party, I attended Communist underground training schools outside the City of New York in the Bues Hall and 113 East Wells Street, Milwaukee, Wisconsin. The East Wells Street School operated under the name of the Eugene Debs School. Here, under the tutoring of Eugene Dennis, M. Sparks, Morris Chyilds, Jack Kling and others, we were schooled in the art of revolutionary overthrow of the established Government.

“We discussed quite thoroughly the fluoridation of water supplies and how we were using it in Russia as a tranquilizer in the prison camps. The leaders of our school felt that if it could be induced into the American water supply, it would bring about a spirit of lethargy in the nation; where it would keep the general public docile during a steady encroachment of Communism. We also discussed the fact that keeping a store of deadly fluoride near the water reservoir would be advantageous during the time of the revolution, as it would give us opportunity to dump this poison into the water supply and either kill off the populace or threaten them with liquidation, so that they would surrender to obtain fresh water.

“We discussed in these schools, the complete art of revolution: the seizure of the main utilities, such as light, power, gas and water, but it was felt by the leadership that if a program of fluoridating the water could be carried out in the nation, it would go a long way toward the advancement of the revolution.” Oliver Kenneth Goff, 1957

Matrix III – Volume Two – Use of Sodium Fluoride for Population Behaviour Control

“It is a matter of record that sodium fluoride has been used for behavior control of populations. In an “Address in reply to the Governor’s Speech to Parliament,” [Victorian Hanstard, August 12, 1987, Nexus, Aug/Sept 1995], Mr. Harley Rivers Dickinson, Liberal Party Member of the Victorian Parliament for South Barwon, Australia, made a statement on the historical use of fluorides for behaviour control.

“Mr. Dickinson reveals that, “At the end of the Second World War, the United States Government sent Charles Elliot Perkins, a research worker in chemistry, biochemistry, physiology and pathology, to take charge of the vast Farven chemical plants in Germany. While there, he was told by German chemists of a scheme which had been worked out by them during the war and adopted by the German General Staff. This scheme was to control the population in any given area through mass medication of drinking water. In this scheme, sodium fluoride will in time reduce an individual’s power to resist domination by slowly poisoning and narcotising a certain area of the brain, and will thus make him submissive to the will of those who wish to govern him. Both the Germans and the Russians added fluoride to the drinking water of prisoners of war to make them stupid and docile.”

“According to Chemical Engineering News in 1988, each year in the United States, 80,000 tons of hydrofluosilicic acid, 60,000 tons of sodium silicofluoride and 3,000 tons of sodium fluorides are put into public water supplies (Chemical Engineering News, Vol 66, August 1, 1988, pg. 39). In view of all known research, it would be safe and accurate to rephrase the previous sentence and say that each year the United States Government allows 143,000 tons of fluoride products to be added to public water supplies in order to numb, disempower, and render docile a large percentage of the population. Present estimates in 1995 run about 200,000 tons annually. Now, why on earth would any oligarchic group (a small group) want to do this to tens of millions of people, deliberately and knowingly?

“All of these fluoride chemicals are byproducts of the aluminum and chemical fertilization industries that are considered to be hazardous wastes by the EPA, says the scientific assessment of the health risks of fluorides in 1985 “omits 90% of the literature which suggests fluoride is a mutagen – causes cellular and genetic mutation.” (Water Fluoridation: A Case of Truth Decay). Several scientists in the United States and other countries have done research or written reports questioning the benefits of water fluoridation or suggesting health risks, were discouraged by their employers from actually publishing their findings.”

Anyone who questions the use of fluoride in the drinking water is labeled a nut case. Fluoride helps prevent tooth decay! I have been drinking bottled water for 30 years. In 1991, I woke up and besides researching the “Federal” Reserve, the IRS, the UN and other one world government mechanisms, I also began looking at the fluoride issue. In 1993, I had all the metal fillings removed from my teeth and my daughter’s. These metal fillings were replaced with gold; a very expensive undertaking. We also stopped using any products with fluoride, i.e. toothpaste, mouthwash and any application from our dentist. The difference in our dental health changed dramatically.

My mother, her brother and my grandparents (from Sicily) never used toothpaste in their lifetime, they used baking soda. Same as my father’s side of the family who came over from Munich. Both sets of grandparents died with all their teeth and never had gum disease. My mom and my uncle both have their own teeth, no bridges, no root canals, no gum disease. To this day, they use baking soda. They live in areas where the water has never been fluoridated. My four brothers and sisters have all had gum disease to some degree and huge problems with their teeth. They all use products with fluoride, all have metal fillings and two of them still drink tap water. I find these differences interesting.

Some may think it’s just a bunch of conspiracy fodder, but having read thousands of pages from hundreds of documents, both historical and from research, there’s no doubt in my mind that fluoride is deadly and explains much about why Americans are so apathetic and lethargic about the very real dangers crushing our Republic. The American people simply have no will to resist and you can see it all across this country. Fluoride was introduced into the drinking water in this country around 1954. Think about it. Add into the mix the millions of gallons of diet soda pop consumed by Americans every day, ingesting deadly aspartame, also contained in more than 5,000 food products being eaten everyday, along with Splenda to “sweeten” and what you have is a population loading their bodies with deadly poisons. See the video ‘Sweet Misery’

While I haven’t drank more than a half dozen cans of soda in my entire life, I did use toothpaste and mouthwash which contains fluoride until 1993 when I made major changes. Everyday I thank God for my good health, but I also have worked very hard at staying healthy and keeping my weight within seven pounds from the day I graduated from high school. It’s not easy, but it all boils down to will power, self control and a desire not to be a burden to myself or my family in my later years.

Education is everything. Research means giving up your fun times to thoroughly explore an issue. I have taken the time to scan several documents which contain thoroughly researched documentation and data on fluoride. Dentists all across this country will tell you that fluoride is good for your teeth and gums. City fathers will continue to tell you fluoridating the drinking water is good for you. Most of them refuse to even look at all the scientific research that’s available. Thousands of cities across this country fluoridate their water. Conversely, hundreds of of cities in the U.S. refuse to fluoridate their water and dozens of countries refuse to poison their citizenry by fluoridating their water supply.

For the sake of your health and your family, I urge you to take the time to read all this important, fully documented research. You will see the major players and recognize names and companies (like Alcoa) who have been involved in this fluoride scam for decades. Americans deserve the truth and they deserve accurate information so they can make informed choices. Also, read the book The Fluoride Deception.

Click here to my Reading Room and you will see the section on fluoride. Read on-line or print out the 73 pages and share it with others. Friendly advice: keep your body free of toxic poisons – no matter how “good” you think it tastes. In my humble opinion, if the FDA says it’s okay, that’s the product to keep out of your body. Go natural!

http://www.westonaprice.org/envtoxins/fluoridationfraud.html

http://www.newswithviews.com/Devvy/kidd102.htm
© 2005 Devvy Kidd – All Rights Reserved

NASA Scientists And Astronauts Tell The World Aliens Do Exist (Video)

NASA Scientists And Astronauts Tell The World Aliens Do Exist (Video)

Recently, I published an article titled Proof Aliens Do Exist, Two Leaked Videos, following up on this topic, I have compiled a few videos in this post that show staff from NASA who say they will testify in front of congress that they personally saw pictures of UFOs and an extraterrestrial base on the moon, and Astronauts saying aliens and UFO are real.

http://www.youtube.com/watch?v=x2qaZFC2PtM

This second one is Buzz him self explaining his personal experience with a UFO in space during one of the Apollo missions.

The third one is one some might not know of Edgar Mitchell who actually explains that the aliens he saw were the stereotypical “Grey” aliens

http://www.youtube.com/watch?v=mVV6u-Y2XZU

To me it is pretty hard to give an argument against them given the circumstances revolving around who these people are. They are not your average Joe from the farm down the street who says he saw a UFO. I think lots of times these are dismissed because these videos are scattered around the web. There isn’t many places on the web that has a compilation of high profile people saying that UFOs and aliens are real, let alone found else where in society. Most of the ones I found on the web have some obvious fake stuff mixed in which then gets people confused about the real ones.

My goal is to really start compiling more of these things that really seem like to be the real thing. When things are spelled out for people, it is a lot easier to connect the dots. But then again, if all the dots were already connected, what would then be the point of discovering something new?

Here is one last video about the moon. Some people believe it to be constructed by aliens. Maybe on the next post I will dive deeper into this interesting theory. There is one fact I did find interesting though on a website called pureinsight.org, there is a paragraph that says:

“The average distance between the earth and the moon is 380,000 km, and between the sun and the earth is about 150,000,000 km. The latter is about 395 times further than the former. The diameter of the sun is about 1,380,000 km, while that of the moon is 3,400 km; the ratio of the two is again 395 times greater. Both ratios are 395. Could it be a coincidence? What does it mean?”

Very interesting fact. I didn’t know that. I checked this with this website www.physicsforums.com and it confirms it.

Very interesting stuff to say the least. Anyway I will that will leave that one for next time.

Apollo Belenus is the Paranormal editor for Before its News,

Follow on Twitter: @B4INparanormal

 

NSA: Security Conguration Recommendations for Apple iOS 5 Devices

NSA: Security Con guration Recommendations for Apple iOS 5 Devices

>>>>    NSA_Apple_IOS_5_Security_Protocols  <<<<

 

Purpose. This document provides security-related usage and con guration recommendations for Apple
iOS devices such as the iPhone, iPad, and iPod touch. This document does not constitute Department
of Defense (DoD) or United States Government (USG) policy, nor is it an endorsement of any particular
platform; its purpose is solely to provide security recommendations. This guide may outline procedures
required to implement or secure certain features, but it is also not a general-purpose con guration manual.
The guidance provides recommendations for general-purpose business use of iOS devices for processing data
that is UNCLASSIFIED, and possibly Sensitive But Unclassi ed. Such data may carry various designations
such as For Ocial Use Only, Law Enforcement Sensitive, or Security Sensitive Information. Approval for
processing such Sensitive But Unclassi ed data is dependent upon risk decisions by Designated Approving
Authorities (or their analogs in non-DoD entities).
 
Audience. This guide is primarily intended for network/system administrators deploying Apple’s iOS
devices or supporting their integration into enterprise networks. Some information relevant to IT decision
makers and users of the devices is also included. Readers are assumed to possess basic network and system
administration skills for Mac OS X or Microsoft Windows systems, and they should have some familiarity
with Apple’s documentation and user interface conventions.
 
Scope. Apple’s mobile devices, including the iPhone and iPad, are prominent examples of a new generation
of mobile devices that combine into a single device the capabilities of a cellular phone, laptop computer,
portable music player, camera, audio recorder, GPS receiver and other electronics. The capabilities of such
devices are considerable but, as with any information system, also pose some security risks. Design features
can seriously mitigate some risks, but others must be considered as part of a careful, holistic risk decision that
also respects the capabilities enabled by such devices. Major risks, and available mitigations, are discussed
in Section 1.3.
 
Security guidance for mobile devices must cut across many previously discrete boundaries between tech-
nologies. For example, scrupulous deployment of an iPhone includes consideration not just the settings on
the device itself, but those of the Wi-Fi networks to which it will connect, the VPNs through which it will
tunnel, and the servers from which it will receive its con guration. This guide provides recommendations for
the settings on an iOS device itself, as well as closely-related information for the network and con guration
resources upon which deployment of iOS devices depends.

LEAKED: Monsanto Internal Study/Fact Sheet On Pesticide Use

LEAKED: Monsanto Internal Study/Fact Sheet On Pesticide Use

Reference No.: 2 Monsanto
April 1998

CONFIDENTIAL — OFFICIAL USE ONLY

Internal Study/Fact Sheet On Pesticide Use

*    Of all insecticides used globally each year, the amount used on cotton: 25%.
*    Number of pesticides presently on the market that were registered before being tested to determine if they caused cancer, birth defects or wildlife toxicity: 400.
*    Amount of time it takes to ban a pesticide in the U.S. using present procedures: 10 years.
*    Number of active ingredients in pesticides found to cause cancer in animals or humans: 107.
*    Of those active ingredients, the number still in use today: 83.
*    Number of pesticides that are reproductive toxins according to the California E.P.A.: 15.
*    Number of pesticides found to cause reproductive problems in animals: 14.
*    Most serious cause of groundwater pollution confirmed in California: agricultural chemicals.
*    Number of pesticides found in drinking wells of California since 1982: 68.
*    Number of California wells affected: 957.
*    Number of farming communities affected: 36.
*    % of the total U.S. population supplied with drinking water from groundwater: 50%.
*    Number of different pesticides documented by the E.P.A. to be present in groundwater in 1988: 74.
*    Number of states affected: 32.
*    Most acutely toxic pesticide registered by the E.P.A.: aldicarb (used frequently on cotton).
*    In California between 1970 and 1994 amount of total aldicarb used on cotton: 85 to 95%.
*    Number of states in which aldicarb has been detected in the groundwater: 16.
*    Percentage of all U.S. counties containing groundwater susceptible to contamination from agricultural pesticides and fertilizers: 46%.
*    Number of people in the U.S. routinely drinking water contaminated with carcinogenic herbicides: 14 million.
*    Percentage of municipal water treatment facilities lacking equipment to remove these chemicals from the drinking water: 90%.
*    Estimated total costs for U.S. groundwater monitoring: US$900 million to 2.2 billion.
*    Estimated costs for U.S. groundwater carbon filtration cleanup: up to $25 million per site.
*    Percentage of all food samples tested by the FDA in 1980 which contained pesticide residues: 38%.
*    Of the 496 pesticides identified as likely to leave residues in food, the percentage which FDA tests can routinely detect: 40%.
*    Average number of serious pesticide-related accidents between World War II and 1980: 1 every 5 years.
*    Average number of serious pesticide-related accidents between 1980 and the present: 2 every year.
*    Increase in cancer rates between 1950 and 1986: 37%.
*    Number of Americans who will learn they have cancer this year: 1 million.
*    Number who will die from it: 500,000.
*    Cost to U.S. of cancer in terms of lost production, income, medical expenses and research resources: US$ 39 billion each year.
*    Highest rate of chemical-related illness of any occupational group in the U.S.A.: farm workers.
*    Pesticide-related illnesses among monsanto farm workers in U.S.A. each year: Approximately 300,000.
*    Number of people in the U.S. who die each year from cancer related to pesticides: 10,400.

 

SOURCE: http://pastebin.com/mGAKqV4d

US Space Command: The Proof is in the Patches

US Space Command: The Proof is in the Patches

Written by David Wilcock

As you may already know, I have been fortunate enough to interact with multiple witnesses who have worked in various levels of the UFO cover-up — some at levels significantly above the need-to-know basis of the President of the United States.

When you speak with the top-level insiders in the black-ops community, you often hear them mention THE RULES.

These projects are so compartmentalized that only the high-level people are even aware that THE RULES exist — or of how far-reaching they are.

It has taken me years of interviews to explore and unravel this strange subject — particularly because of the potential for confusion.

Sometimes, when insiders talk about THE RULES, they are talking about guidelines their own group insists they follow — such as secrets they must keep, disinformation they are expected to pass along, who gets to know how much, what mistakes are bad enough to get you killed, et cetera.

However, over the course of many conversations, I increasingly realized there was another level of THE RULES — a level they have absolutely no control over.


WHAT ARE “THE RULES”?

In this greater cosmic sense, THE RULES are a set of principles that the insider black-ops community has felt, for at least the past century, were as fixed and unchangeable as the Universe itself.

They also believed THE RULES would continue, unaltered, for millions of years. Apparently they have time-viewing technology that led them to believe this was the case.

The idea that this was a manipulated timeline, and not necessarily the real future, was far too mind-blowing for them to ever consider — particularly since you have people living within these timelines, and you can go and visit them and live there yourself.

Nonetheless, all ETs visiting the Earth must operate within THE RULES. It is impossible for them not to.


WHO MAKES “THE RULES?”

One day, only a few weeks ago, I finally got smart enough to bluntly ask one of my main contacts, “Who makes THE RULES?”

The reply was: “Who makes gravity? Who makes the sun rise and set? Who makes the Galaxy spin?

“We don’t know who makes THE RULES, David, but we have no choice but to follow them. There is no workaround. There is no other way. That’s why they’re THE RULES.”

This is a strange subject, and will undoubtedly lead to some folks laughing and thinking I’m crazy… but this is what you hear about when you talk to these insiders yourself.

At the highest levels of the UFO cover-up, it is well-understood that events on Earth, and indeed throughout the inhabited galaxy, are being managed and controlled — by unseen forces.

Some things are allowed to happen… and others are not.

 

THE ‘QUARANTINE’

As one key example of THE RULES, our Earth is under a ‘Quarantine’ that prevents most ETs from being able to enter our airspace in a way that would be visible to the naked eye — except in rare, unpredictable and brief bursts of time.

This is the main reason why we don’t see more visible UFOs — particularly in the case of negatively-oriented ETs. In fact, without this Quarantine, negative ETs would have invaded and taken over this planet eons ago.

This Quarantine also appears to allow those planetary controllers here on Earth to do whatever they want. Or so they thought.

The Quarantine is maintained by a vast network of super-advanced, indestructible satellites surrounding the Earth — built by very high-level ETs. These satellites keep humanity locked in — and everyone else locked out.

The insiders do not know who built these satellites, nor precisely why they are there. It’s simply another part of THE RULES.

When you view the patches of US Space Command or Navy Space Command, they picture the Earth surrounded by two circles, similar to the typical depiction of electron orbitals around an atom.

This symbolizes the Quarantine — which protects us from the bad guys.

 

LET’S SEE SOME PATCHES

On this official military website, you can find a patch commemorating the 25th anniversary of Air Force Space Command — from 1982 to 2007. You can see the two rings around the Earth clearly depicted, as well as a stylized image of a back-engineered ET spacecraft in flight:

air-force-space-command-25th-anniversary

 

From what I’ve heard, these triangular craft are enormous in size — taking quite some time to walk from one end to the other — and are already in operation throughout the galaxy. The shape you see in these emblems is almost exactly what they look like.

There is an official website you can visit for the Naval Space Command and the US Space Command. There is also a Wikipedia page for the US Space Command, linked from an even more detailed Unified Combatant Command page.

UNITED STATES SPACE COMMAND

If you read this US Space Command page, you will find very specific information about who was in charge, when they were in charge, and what they allegedly were up to… and it includes the following emblem, featuring the rings I’m talking about:

united_states_space_command_emblem

Notice the crosses on each of the rings. We’ll get back to that in a minute.

You can also read about US Space Command in this article on Space.com — in an interview with Gene McCall, chief scientist for the Air Force Space Command. Naturally, the article attempts to put a mundane spin on the story and does not include any real ‘juice’ of Disclosure.

AIR FORCE SPACE COMMAND

You again see the rings around the Earth in the Air Force Space Command patch. This was originally featured on the official Air Force Space Command website, which has since been taken down.

However, at this website, there is a comprehensive series of mirrored links to what was originally on these official websites — along with the now-defunct links. I suggest saving your own copy in case it gets taken down.

When you go to this mirror site and sort through the images and text, this triangular metallic flying machine image appears over and over again on various badges and emblems — along with the two “quarantine rings”:

airforce_spacecommand

 

Also, again notice the two crosses on either side of the delta-shaped spacecraft — crosses that directly contact the rings.

These, I believe, are meant to be Knights Templar crosses.

 

THE “KNIGHTS TEMPORAL”

In a Project Camelot interview, Gordon Novel revealed that these insiders like to refer to themselves as the Knights Temporal:

http://www.projectcamelot.org/lang/en/gordon_novel_interview_transcript_en.html

K: When you say “we,” who’s we?

The Knights Temporal

G: Well, I have a group of folks that I call the Knights Temporal.

The most prominent aerospace engineers and physicists in the world today are all part of a team we call the RAM group. We call ourselves the Knights Temporal.

We took a page out of the idea of the Templars, who basically blackmailed the Pope to give them the fiefdoms over Europe. They created the banking orders we have today.

Since we believe the technology is rooted in time, we call ourselves the Knights Temporal. The alien technology, the UFO, is basically a flying time machine. That’s what we believe, and it’s all we know about it.

What Novel does not say here is that these international bankers did not merely “take a page out of the idea of the Templars.” These groups are the direct descendants of the Knight Templars — and have still kept all their secrets.

 

NAVAL SPACE COMMAND

The same two “quarantine rings” appear in the emblem for the Naval Space Command, also mirrored at the above site:

naval_spacecommand

 

“TOP HAND” AT VANDENBURG AFB

This next patch can be found on the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see a cross on one of the Earth’s protective rings. The sword, as we shall see, appears to be a Knight Templar blade.

With the line “Strengthen the Shield,” there is a clear implication here that the two rings around the Earth could be some sort of ‘shield’ that we want to make sure stays strong.

Further, there is the suggestion that this shield may be at least partially enforced by that same weird delta-shaped craft:

top-hand-sharpen-the-sword-strengthen-the-shield

 

AFSST 76TH SPACE OPS

Also check out this “AFSST 76th Space Ops” patch from the same site — the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see one of the “quarantine rings” as well as the same flying metallic triangle — this time with wings around it just in case you didn’t get the point that it flies.

Two smaller delta-shaped craft also flank the AFSST acronym at the bottom:

afsst-mission-complete

Here’s a shot of the original Strategic Air Command page in case it disappears. Notice the Knight Templar glove holding lightning bolts in the insignia at the top left:

strategic-air-command-patches

JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE

The “quarantine rings” and flying metallic triangles show up again in the emblem for the Joint Functional Component Command for Space, which has its own official Wikipedia page here:

uss-stratcom-jffcc-space

As it says on the Wikipedia page, according to Lieutenant General William L. Shelton, “Our prime mission directive in JFCC SPACE is to ensure our freedom of action in space, while preventing adversary use of space against us.”

 

SCHRIEVER AIR FORCE BASE

These badges from Schriever Air Force Base follow the same theme — quarantine rings and peculiar aircraft operating far outside the Earth’s atmosphere.

Notice the difference in size between the small black delta-shaped craft and the larger metallic delta-shaped craft in the first badge below.

That size difference may not be an indication that one is closer than the other — it may acutally be a direct indication of how huge the larger craft is in comparison to the black one:

space-test-experimentation-space-test-squadron

This next badge is particularly interesting because of the emblem that appears at the bottom:

usaf-history-heritage

I have been told this Pegasus “Master of Space” logo is worn by staff who have direct, high-level involvement with extraterrestrial human civilizations — typically those working for Space Command.

The Pegasus legend of the ‘winged horse’, used by the Gods to travel in Greek mythology, may well indicate some sort of extraterrestrial craft.

This follows the same chain of reasoning presented in Episode Two of this season’s Ancient Aliens on History Channel, which I am a repeat participant in.

 

THIRD PAGE OF BADGES FROM SCHRIEVER AFB

There are so many goodies on the third page of badges from the Schriever AFB site — delta craft, Templar swords, Templar gloves, quarantine rings, et cetera — that I had to just post the whole thing:

military-space-patches-1

There are many, many indications of the Knight Templars here — and indeed, many insiders have said the Air Force is much more involved in the UFO cover-up than other organizations.

You probably caught the Masonic compass in the image on the bottom right. There is a Templar glove below it holding a sword of fire.

I was particularly fascinated by the Templar Knight gloves that had a mysterious energetic force coming off of them on the 310th Communications Flight badge — suggesting the mastery of hidden Universal powers:

310_communications_flight

 

FOURTH PAGE OF SCHRIEVER AFB BADGES

The fourth page of badges from the Schriever AFB contains additional enigmas — including a straight-ahead Templar skull and crossbones symbol:

military-space-patches-4


The 50th Contracting Squadron badge at the top left may be a nod to the fact that human beings appear all over the galaxy — hence we see the image of a human body away from the Earth, and the Pegasus logo alongside it.

The 50th Space Communications Squadron badge at the top right has the Templar glove, again with the suggestion of a “Thunderbolt” coming out of it.

According to the second episode of this season’s Ancient Aliens, which I did plenty of research for but didn’t get in fast enough to make the cut, the many ancient ‘Thunderbolt’ legends appear to refer back to a working ET weapon that was used in historic times.

Such a weapon then later became mythologized in such stories as Zeus’ Thunderbolt, Thor’s Hammer, Odin’s Spear, Poseidon’s Trident, Vajra’s Spear, et cetera.

 

THOUGHTFORM ENTITIES AND PROTECTING EARTH

The nasty-looking hooded being on the 23D Space Operations HQ badge, second over from the bottom left, clearly seems to represent the “Thoughtform Entities” I have been told these guardians of Earth are actively defending us against.

Notice the being has at least two faces — one made by the two winglike eyes in the middle, and another in profile view on the left-hand side, where a pointy nose, brow and chin are all clearly visible.

The rear of the head, in profile view, suggests pointy ears. I have indeed heard from an insider, recently, that at least one ET group does in fact have pointy ears — and looks very similar to certain ‘gargoyle’ faces we see on many Templar-designed buildings.

23d-space-operations-squadron-semper-vigilans

Whether you agree with what they’re doing or not, the people I speak to are absolutely convinced that the Earth would be much worse off if they were not doing their jobs.

This desire to protect humanity from outside negative forces is a strong rationale for why they continue to stay involved in these jobs, even though there are many questionable ethics involved.

It is certainly interesting to see a hooded being looming over the Earth on a badge dedicated to “space operations.”

FIFTH PAGE OF BADGES FROM SCHRIEVER AFB

The fifth and final page of badges from Schriever AFB has even more goodies. First, here’s the full view:

military-space-patches-2


Notice the two stylized birds flanking the star on the bottom-center image. They most definitely appear to be depictions of the Phoenix.

What better symbol to choose if you’re describing a journey through a stargate — where you appear to ‘die’ and dematerialize on one end, only to be ‘reborn’ from the other?

As you’ll see in a minute, this was the original Air Force logo!

Now let’s explore some more of these images in detail.

THE STARGATE

First of all, as we see below in its larger form, we have a badge that may very well be showing us a pentagonal Stargate vortex emerging from the Northwest United States:

21st-space-operations-sq-gateway-to-the-stars

More than one insider has told me that the ‘ancient’ stargates look like tunnels lined with individual points of light, in a clear geometric relationship to each other, and which spiral in on themselves as you look more deeply into the wormhole.

The points of light may very well be in a pentagonal relationship to each other along the circumference of the circle, though no one has told me this. I also never thought to ask until now — but it may very well be.

A slight hint of this stargate pattern appears in the movie Minority Report, when you look off to the right in this particular shot:

minority_report_interface

Getting back to this 21st Space Operations badge, it even features the words ‘gate’ and ‘star’ right in the description — Gateway to the Stars.

 

IS THE AIR FORCE LOGO PARTLY INTENDED TO DEPICT A STARGATE?

The five-pointed star with a circle inside of it is a common feature of the basic Air Force badge, which went through two different stages of development. This is apparently another homage to the stargates or ‘portals’ being used at the insider levels.

I already pointed out the original Air Force logo, where the pentagon is flanked with stylized Phoenix birds on either side. This logo then went through an evolution into its current form, as these images depict:

new_af_aaf

aflogo_history

air_force_logo

 

 

WHAT TYPE OF AIR TRAFFIC ARE THEY CONTROLLING?

Check this one out from the Air Force Communicators and Air Traffic Controllers Association.

In the center you have the pentagonal Air Force / stargate logo — flanked with the Phoenix birds of fire.

Then you’ve got a jet on the right and “something else” on the left — our delta-shaped craft once again — protecting a triangular-shaped Earth in the same ‘quarantine loops’ I’ve been showing you:

warfighting-integration-chief-information-officer

The triangle shape appears to indicate the tetrahedral energy signatures that run through the Earth and other planets, as Richard C. Hoagland has been asserting since at least 1993.

The tetrahedral energy appears at the 19.5-degree latitude, north or south, on any given planet.

On solid planets it emerges as volcanoes, such as Hawaii on Earth and the enormous Olympus Mons on Mars.

On gas planets we have the Great Red Spot of Jupiter, the Great Dark Spot of Neptune, cloud bands on Saturn, et cetera — all at the magic 19.5-degree latitude.

 

DEFENDERS OF THE DOMAIN

One of the most compelling pieces from Schriever AFB is this next badge below.

Here, we see a simplified but undeniable diagram of the Global Grid I have written about for so many years.

The real Grid is not made of a square pattern like this, but is otherwise extremely similar — including the spherical ‘nodes’ where the lines cross.

We also see a Knight Templar in full royal regalia:

schriever_defenders-information-assurance

Even the clovers carved into the knight’s mask are obvious, stylized versions of the Templar cross:

information-awareness-close

 

THE NORAD LOGO

The official NORAD logo (NORth American Aerospace Defense command) also contains the ‘quarantine loops’ around the Earth.

This time the loops appear stylized as wings — and we also see the Templar sword with stylized ‘thunderbolts’ coming off of it:

north_american_aerospace_defense_command

 

310TH SPACE WING

More goodies can be found on the official page for the 310th Space Wing:

310-space-wing-division

This next badge from the above website caught my eye in particular.

It is a seemingly earlier version of the same 310th Communications Flight badge I showed you before. Again we see the delta-shaped craft and the Earth with quarantine rings in the middle.

We also prominently see the knights’ gloves with thunderbolts coming off of the fingers.

Again, this badge suggests the Templar Knights may have possessed mystical capabilities to manipulate energy — either by thought alone, or with some form of ‘thunderbolt’ technology, as we see in many ancient myths:

310_communications

310_flight_text

PLENTY OF EVIDENCE

Of course, none of this is absolutely conclusive proof that there is any off-planet work going on within Space Command, nor that they have access to stargate ‘portal’ technology or interstellar delta-shaped craft.

However, I have spoken to several different insiders who have given me various pieces of this puzzle — and they all fit together very well.

When independent witnesses keep telling you the same things, you start paying attention.

It is highly, highly interesting that we see so much redundancy in the symbolism of these various military badges — over and over again. I’ve only given you a brief sample of what you can uncover with your own research.

 


THE QUARANTINE DROPS AFTER 2012

Everyone ‘in the know’ is well aware of THE RULES, and the Quarantine that exists around the Earth.

Apparently you can’t just fly a ship out of Earth’s atmosphere without opening a hole in the Quarantine first. This had to be done for all the Apollo missions, I am told, as otherwise they would have never made it out of here alive.

The ETs that have been working with the US and other governments for the past century apparently possess technology that allows for short-term openings to be made in the Quarantine.

Space Command is very glad we have the Quarantine, as it protects us from outside invading forces. When random holes occur, Space Command uses their own ships to further defend the Earth — as their badges indicate.

Another very interesting point I’ve been told is that Space Command and its affiliates have reason to believe the Quarantine will drop some time after 2012. This is a significant part of the transformation we are now going through.

At this point, the Earth will enter into open contact with its ET neighbors.

There is also the implication or suggestion that the dropping of this Quarantine will also enhance the mystical and psychic abilities of the average person as well.

 

EVERYTHING CAN BE FOUND IN “THE LAW OF ONE”

The ‘Quarantine’ is one of a variety of very specific data points that were revealed in the Law of One series, most of which came through in 1981 to Don Elkins, Carla Rueckert and Jim McCarty of L/L Research.

The best way to introduce yourself to this staggeringly complex body of information — all of which is now free to read online — is to consult the Study Guide I have posted at this site. I highly recommend you explore this research, and feel it is one of the best possible uses of your time.

I have pointed out to several insiders now that everything they’re telling me — all the most significant data points — can be found in this one series from 1981.

I consistently urge that they read it, as they would be shocked to discover how well the material lines up with what they already know.

However, everyone is ‘too busy’ — and the big discovery still remains waiting in the wings.


LAW OF ONE ON THE ‘QUARANTINE’

If you feel you have the time, here’s a full list of all the places where the ‘quarantine’ is discussed in the Law of One series — and it is a fascinating read:

http://lawofone.info/results.php?search_string=quarantine&search_type=any&numeric_order=1&ss=1&sc=0

These two sets of quotes from Sessions Six and Twelve really stand out for me:

6.25 Questioner: Do any of the [positive Confederation ETs] come here at this time in spacecraft? In the past, say, thirty years?

Ra: I am Ra. We must state that this information is unimportant. If you will understand this, we feel that the information may be acceptably offered. The Law of One is what we are here to express. However, we will speak upon this subject.

Each planetary entity which wishes to appear within your third-dimensional space/time distortion requests permission to break quarantine, as you may call it, and appear to your peoples.

The reason and purpose for this appearance is understood, and either accepted or rejected. There have been as many as fifteen of the Confederation entities in your skies at any one time; the others available to you through thought.

At present [1981] there are seven which are operating with craft in your density.

Their purposes are very simple: to allow those entities of your planet to become aware of infinity, which is often best expressed to the uninformed as the mysterious or unknown.

 

12.3 Questioner: Is there any effort on the part of the Confederation to stop the Orion chariots [piloted by negative, “service to self” ETs] from arriving here?

Ra: I am Ra. Every effort is made to quarantine this planet.

However, the network of guardians, much like any other pattern of patrols on whatever level, does not hinder each and every entity from penetrating quarantine — for if a request is made in light/love, the Law of One will be met with acquiescence.

If the request is not made, due to the slipping through the net, then there is penetration of this net.

12.5 Questioner: I don’t understand how the Confederation stops the Orion chariots from coming through the quarantine?

Ra: I am Ra. There is contact at the level of light-form or lightbody-being, depending upon the vibratory level of the guardian.

These guardians sweep reaches of your Earth’s energy fields to be aware of any entities approaching. [DW: The satellites I have heard about from the insiders appear to be the automated detection system that alerts these ‘Guardians’.]

An entity which is approaching is hailed in the name of the One Creator.

Any entity thus hailed is bathed in love/light, and will of free will obey the quarantine due to the power of the Law of One.

12.6 Questioner: What would happen to the entity if he did not obey the quarantine after being hailed?

Ra: I am Ra. To not obey quarantine after being hailed on the level of which we speak would be equivalent to your not stopping upon walking into a solid brick wall.

12.7 Questioner: What would happen to the entity if he did this? What would happen to his chariot?

Ra: I am Ra. The Creator is one being. The vibratory level of those able to breach the quarantine boundaries is such that upon seeing the love/light net it is impossible to break this Law.

Therefore, nothing happens. No attempt is made. There is no confrontation.

The only beings who are able to penetrate the quarantine are those who discover windows or distortions in the space/time continua surrounding your planet’s energy fields.

Through these windows they come. These windows are rare and unpredictable.

 

This is only one of many hundreds of examples where I have found a perfect correspondence between what the top-level insiders tell me and what we find written in the Law of One series.

 

THE ‘QUANTUM LEAP’

I have worked for years to flesh out the Law of One’s cosmology into a scientific thesis — with stunning results, as you can find in my videos, conferences, radio shows, articles and books.

A window of 2011 to 2013 was given in the Law of One series as a time where a ‘quantum leap’ would occur in Earth’s history, propelling us into an amazingly beautiful new Golden Age.

Once this shift fully takes place — which may involve 100 to 700 years for the full transition to complete — the average human being will have all the abilities attributed to Jesus and other ‘Ascended Masters’ — and more.

Even though it may take some time for this transformation to occur, there is no question that the initial ‘quantum leap’ in 2011-2013 is something absolutely remarkable, breathtaking and unprecedented in Earth’s history.


A GALACTIC TRANSFORMATION

This ‘quantum leap’ is the result of our Solar System traversing into a more highly-charged region of the galaxy — wherein the actual physics of matter, energy and consciousness irreversibly shift.

This galactic transformation propels the Earth into an energetic state called ‘Fourth Density’ — as opposed to our current ‘third.’

These same energy states appear in the human body as the seven chakras. They also constitute what most people mistakenly call “dimensional levels”, which apparently exist as planes of existence throughout the entire Universe.

The shift into fourth-density is essentially a graduation from the yellow, self-oriented center to the green, heart-oriented perspective.

No mention of the Mayan Calendar ever occurred in The Law of One, as Dr. Don Elkins knew nothing about it — nor the importance of the 2012 date in many ancient prophecies.

It is highly ironic that the most accurate and comprehensive body of 2012 prophecy information makes no mention of the Mayan Calendar whatsoever… nor any of the other common talking points related to 2012.

 

THE MOST ADVANCED SCIENTIFIC INFORMATION ON EARTH

Obviously, until this shift actually happens, we cannot be certain of what will occur — nor of exactly how it will occur.

Nonetheless, there are hundreds of specific, highly technical scientific data points in the Law of One series that have since been proven correct.

This makes it highly unlikely that the whole model will fall apart when it comes to the Fourth-Density Shift.

I have yet to find a single contradiction or error in the Law of One cosmology. In fact, the more I follow up on the leads we were given, the more advanced and beautifully perfect the model becomes.

I struggled for many years with the frequently-mentioned concept of a parallel universe where time is three-dimensional — but finally this year I solved this greatest of all mysteries, and truly understood how and why it was the key to everything.

My upcoming book The Source Field Investigations — due for release next May — is significantly more evolved than any other presentation I’ve given on this subject.

The CONVERGENCE film script has now been brought fully up to date with these latest breakthroughs as well, and we hope to have a finished draft ready to show directors, actors and investors by early January.

RESEARCH CREDIT:

 

SEE ALSO..

 

Who dumps technology more advanced than NASA on to NASA and thinks nothing of it? This admission of at least this segment of a secretive space program is quite revealing. It will probably slip by mainstream media, but sit up and take notice, this is a serious admission here.

NASA gets two military spy telescopes for astronomy

(Washington Post) The secretive government agency that flies spy satellites has made a stunning gift to NASA: two exquisite telescopes as big and powerful as the Hubble Space Telescope. They’ve never left the ground and are in storage in Rochester, N.Y.

It’s an unusual technology transfer from the military-intelligence space program to the better-known civilian space agency. It could be a boost for NASA’s troubled science program, which is groaning under the budgetary weight of the James Webb Space Telescope, still at least six years from launch.

Or it could be a gift that becomes a burden. NASA isn’t sure it can afford to put even one of the two new telescopes into orbit.

The telescopes were built by private contractors for the National Reconnaissance Office, one of 16 U.S. intelligence agencies. The telescopes have 2.4-meter (7.9-foot) mirrors, just like the Hubble, but they have 100 times the field of view. Their structure is shorter and squatter.

They’re “space qualified,” as NASA puts it, but they’re a long way from being functioning space telescopes. They have no instruments — there are no cameras, for example. More than that, they lack a funded mission and all that entails, such as a scientific program, support staff, data analysis and office space. They will remain in storage while NASA mulls its options.

“It’s great news,” said NASA astrophysics director Paul Hertz. “It’s real hardware, and it’s got really impressive capabilities.”

The announcement Monday raised the obvious question of why the intelligence agency would no longer want, or need, two Hubble-class telescopes. A spokeswoman, Loretta DeSio, provided information sparingly.

“They no longer possessed intelligence-collection uses,” she said of the telescopes.

She confirmed that the hardware represents an upgrade of Hubble’s optical technology.  MORE HERE

Anything fishy here? Two telescopes on mothballs better than Hubble? Are they toying with us? This is just nuts news.

Secret Space Program?

You really think we get the whole story about anything, especially regarding military or technological advancements?

I personally met a man in New Mexico who used to work at the infamous Area 51. You can imagine how I tried to wangle information out of him, but he was tight-lipped. When I came back at him the third time after trying to act indifferent he finally said, “Let’s just put it this way. The stuff I worked on back in the 60′s still hasn’t come out.”

And my impression was he was a low-level tech.

There’s a lot of testimony as well as conjecture about Moon and Mars missions and the like you can read about on line, as well as many other “forbidden” realms of research. That we’re surrounded by technology that far surpasses what has been introduced into the mass mind is a no-brainer, so to speak.

It’s thought that black-op advances are decades if not centuries ahead of “known” technologies.

So What.

These psychos are on a path of self destruction—-hence—psycho-path.  We just don’t want it to be at the expense of the innocent. Nice thing is we can’t be eliminated, we’re multi-dimensional eternal consciousness.

Now THAT has their knickers in a twist!

Be well, be aware. But this tech stuff we do need to keep an eye on to see what these wackos are up to.

Keep on informing, helping others find out who they truly are, and keep the wake up rolling.

Love, Zen

 

Pope’s butler arrested over Vatican documents leak

Pope’s butler arrested over Vatican documents leak

Rome (CNN) — Pope Benedict’s butler has been arrested on suspicion of leaking confidential documents to an Italian journalist, the Vatican said Saturday.

Paolo Gabriele, 46, was arrested Wednesday for illegal possession of confidential documents, found in his apartment in Vatican territory, the Vatican said in a statement issued three days later.

Gabriele, who has worked as the papal butler since 2006, is one of only a handful of people with access to the pontiff’s private desk.

His job included handing out rosaries to dignitaries and riding in the front seat of the “Popemobile,” a vehicle used for public papal appearances, as seen in many photographs showing Gabriele with the pope.

Last month, the Vatican gave Cardinal Julian Herranz a “pontifical mandate” to uncover the source of hundreds of personal letters and confidential documents that have been released to Gianluigi Nuzzi, an Italian journalist and author of “Sua Santita,” a book that translates to “His Holiness” and includes the documents.

Nuzzi would not confirm the identity of his sources, but he told CNN that his primary source — who he referred to as “Maria” in his book — “risked life and limb” if ever found out.

The source worked inside the Vatican, according to Nuzzi, who refused to give other details such as the source’s gender, age and if he or she was clergy or not.

Nuzzi told CNN that he has not been questioned in connection with the arrest. The Vatican called the publication of his book “criminal” when it was released last Saturday in Italian.

Feltrenelli and Mondadori booksellers both rank the book No. 1 in sales within Italy.

Nuzzi’s book highlights an internal power struggle within the Vatican through numerous documents including faxes, personal letters and inter-Vatican memos. He told CNN that he received the documents during a year of private meetings in secret locations.

The documents show that the allegations of corruption and money laundering were a concern for a number of high ranking prelates, including Carlo Maria Vigano, who is now the Papal Nuncio in Washington, DC.

Vigano wrote in a series of letters to the pope that he was concerned about the spread of corruption and that his move to Washington would stir speculation.

“Holy Father, my transfer at this time would provoke much disorientation and discouragement in those who have believed it was possible to clean up so many situations of corruption and abuse of power that have been rooted in the management of so many departments,” according to his letter which was published in the book.

The Vatican has not denied the authenticity of the documents, but instead says the breach of privacy is a criminal act.

The 108-acre city-state has its own judicial system, distinct from the Italian judicial system. CNN senior Vatican analyst John Allen pointed out that its courts normally prosecute the likes of pickpockets, “not alleged moles.”

Thus, the Vatican doesn’t have facilities to incarcerate anyone on a long-term basis and the civil and criminal penalties it typically metes out are limited, Allen said Saturday. He speculated that, for these and other reasons, the Vatican may ask — assuming that it determines there is enough evidence against Gabriele — that any such trial occur within the Italian judicial system.

“The question then would become: Does the Italian government want to pick that (trial) up?” said Allen, a senior correspondent for the National Catholic Reporter. “In addition to being an embarrassing scandal for the Vatican on its own terms, this also has the potential to become … a diplomatic contretemps.”

For now, Gabriele is being held in a special cell within the Vatican City, a walled enclave within Rome, according to Vatican spokesman Federico Lombardi.

Lombardi said the pope was “saddened and shocked” at the arrest.

The Vatican said the first phase of its preliminary investigation, under chief prosecutor Nicola Picardi, had now ended. An investigating judge, Piero Antonio Bonnet, is leading the next stage of the investigation, which could lead to a trial or acquittal.

Gabriele has appointed two lawyers of his choice to act at the Vatican Tribunal, and has had a chance to meet them, the Vatican statement said.

“He enjoys all the legal guarantees provided by the criminal code and criminal procedure in force in the State of Vatican City,” it added.

Zombies Leak: Camelot Insider Leaks Chemtrail Connection to Zombie Outbreaks

Zombies Leak: Camelot Insider Leaks Chemtrail Connection to Zombie Outbreaks

I received the following input from an undisclosed source… with regard to the truth of what is going on with chem trails and what may be contributing to this growing proclivity for zombi-izm in America if not the rest of the world.  Suffice to say that this information came to this person from channels within EUCOM.  Food (!) for thought.

Chemtrails have been employed for numerous desired effects. These include ‘sickening’ the general populous and lowering the soul vibration/hindering the consciousness of the populous. This is coupled with contamination of the water/food supply to achieve the same things. 

People know this is happening, they only have to look into the sky to see it.

In recent years we are now seeing, what I call the second phase. The introduction of designer drugs that contain chemical compounds that either ‘activate’ or act as a catalyst for the chemicals dispersed over us in the form of chemtrails. 

The active chemicals or molecular structures in these so called ‘Bath salts’ or whatever other synonym you know them by, could also be implemented in regular pharmaceuticals. Drugs, lotions, moisturisers, make up etc. 

Nevertheless, no matter how you receive the ‘active agent’, the outcome will be the same. Psychosis, insanity, mental breakdowns. Whatever. The behaviour that has been experienced in Florida recently, I fear is going to become commonplace as the frequency and intensity of both ingredients increase. 

This is how I feel they are trying to cause mass hysteria and panic, all within a comfortable time frame of the 2012 Olympics and the upcoming December events (whatever they may be.)

My reply which should at least ease the minds of some… was as follows:

I agree that it certainly looks very plausible that whatever is in the chemtrails contains a number of actionable agents that could increase receptivity to outside electromagnetic or other affects and also lowering immunity etc.

The good news is that if you raise your frequency they can’t get at you in any case.  Of course that doesn’t help that those around you may be vulnerable and losing their minds or whatever the case may be.

-Kerry Cassidy, Project Camelot

 

SOURCE

Is Anonymous The Internet’s Most Powerful Mirage?

Is Anonymous The Internet’s Most Powerful Mirage?

You may have noticed it last week. Anonymous claimed the scalp of yet another a major government agency.

Supporters of the the online movement of activists and internet trolls said they’d stolen 1.7 GB of data from an agency within the Department of Justice that aggregates crime data. They claimed to have nabbed “lots of shiny things such as internal emails and the entire database dump.” They branded the heist as “Monday Mail Mayhem,” said it could help people “know the corruption in their government.” They posted it on Pirate Bay as a torrent, for anyone to see — and 1.7 GB was just the size of the zipped file.

Not many people bothered to check what was actually in the huge file.

Step in Identity Finder, a software security firm.  Privacy officer Aaron Titus downloaded the payload last week and sifted through it all, checking out the veracity of the claims by Anonymous.

Turned out they were overhyped.

The zipped file contained 6.5 GB of web server files and “does not appear to contain any sensitive personal information, internal documents, or internal emails,” according to Titus. A folder named “Mail” was mostly empty, though it contained two administrative email addresses. There were also no personal details (social security numbers or credit card numbers), and the worst the breach had done was reveal the site’s web server file, which could be leveraged by other hackers for future attacks.

It looked like the breach had done more to grab attention from the media and the Department of Justice than do any real damage.

Surprised? You shouldn’t be. This was another illustration of the power of Anonymous as a continuing online insurgency: not in hacking per se, but its constant ability to grab eyeballs, project power, and give followers a voice and sense of purpose unlike any they’ve experienced before. What’s important for companies and policy makers (the typical targets) to note is that it’s oftentimes more a tease than anything else.

Other examples:

1) Earlier this month Fox News reported that an online group called TheWikiBoat, aligned with Anonymous, planned to bring down the websites of 46 major companies on Friday May 25. TheWikiBoat said in a public statement that it had “no motives other then [sic] doing it for the lulz,” (ie. for shits and giggles). The FBI’s Cyber Division was concerned enough to send an email to the likes of Apple Computer, McDonald’s and ExxonMobile warning them of a potential attack — which didn’t happen.

2) Around this time last year, a single supporter of Anonymous managed to grab global headlines when he tweeted that he had a cache of bank of America emails. What he eventually released was an e-mail exchange between himself and a BofA ex-staffer who made (what admittedly looked like valid) complaints about the bank’s management. But it did nothing to the bank’s stock price, and the news agenda quickly moved on.

3) In December 2010 Anonymous claimed responsibility for taking down the websites of PayPal, MasterCard and Visa after these firms nixed online donations to WikiLeaks. How? Supporters implied it was thanks to thousands of volunteers who had become part of an cyber army by downloading a software tool called LOIC. What really happened: a couple of supporters with botnets temporarily took the sites down — but the notion that Anonymous was an international “army” of hacktivists was left floating around the Internet.

Time and again, online supporters have laid claim to the brand power of Anonymous, invoking its name, imagery such as the Guy Fawkes logo and headless, suited man surrounded by olive leaves, along with the tag line, “We are Anonymous… Expect us.” The result: news outlets and policy makers sit up and listen, more so than they would if those supporters used their real names, or were literally anonymous. The power of Anonymous is propagated by the continued use of a name wrapped in hype and disinformation, more than the occasional real hacks.

The Anonymous “brand” gets street cred from cyber attacks carried out by a minority of hackers who know how to use SQL injection techniques or who know people who control botnets. The additional hype comes from the impassioned, sometimes-threatening rhetoric of less-skilled-but-enthusiastic followers on Twitter or the imageboard 4chan.

Why do these supporters join in? Everyone has their own reasons — something to do, the engaging community of people to talk to, the thrill of being part of a secret crowd. Sources in Anonymous that I have spoken to over the last year often speak to a sense of purpose they get from Anonymous, and sometimes the justification to do the subversive, often-illegal things online that they would not otherwise do. It’s mob mentality with a twist — the activist element of protest, twinned with the culture of trolling and exaggeration that runs through image boards like 4chan.

For law enforcement, who happen to chase anarchists with particular zeal in the United States, there isn’t so much a criminal organization to rope in as the mirage of one. No system with leaders and rules, but a culture and etiquette that is changing all the time. Many of the figureheads who organized the Anonymous attacks against Scientology in 2008 have left the community to focus on college or full-time jobs, many happy to break away from the frenetic pace of operations and the constant paranoia about getting doxxed. Those who’ve been arrested are upheld as martyrs within the network, and there are many more who are joining, and who think they can do a better job of hiding from the police.

Anonymous will continue to exist for some time, taking new followers, changing tactics, and often staying one spontaneously-placed step ahead of the police. They’ll fight for the right to their anonymity, to expose other people’s information, or anything they want, and they’ll come and go from the headlines. But these chaotic actors will stick around, and their greatest power will continue to be not their skills or abilities, but the very name that they can invoke.

For more details on how Anonymous works and the real, human stories behind it, check out my forthcoming book, “We Are Anonymous: Inside the Hacker World Of LulzSec, Anonymous and the Global Cyber Insurgency.”

Or follow me on Twitter: @parmy

SOURCE: http://www.forbes.com/sites/parmyolson/2012/05/30/is-anonymous-the-internets-most-powerful-mirage/

Iran Decodes US Drone Intel

Iran Decodes US Drone Intel

TEHRAN (FNA)- Senior Iranian military officials announced that the country’s experts have decoded the intelligence gathering system and memory hard discs of the United States’ highly advanced RQ-170 Sentinel stealth aircraft that was downed by Iran in December after violating the country’s airspace.

Speaking to FNA, Commander of the Islamic Revolution Guards Corps (IRGC) Aerospace Forces Brigadier General Amir Ali Hajizadeh revealed some data taken from the aircraft’s intelligence system to discourage his counterparts in Pentagon who had alleged that Iranians would not succeed in decoding the spy drone’s memory and intelligence devices.

“This plane is seen as a national capital for us and our words should not disclose all the information that we have very easily.”

“Yet, I provide four cues in here to let the Americans know how deep we could penetrate into (the intelligence systems and devices of) this drone,” he added.

Hajizadeh stated that the drone parts had been transferred to California for technical works in October 2010, adding that the drone was later transferred to Kandahar, Afghanistan in November 2010 and had a flight in there.

The commander said that the drone had experienced some technical flaws in its Kandahar flight in November, but the US experts failed resolve the problems at the time.

Hajizadeh added that the RQ-170 was then sent back to an airfield near Los Angeles in December 2010 for tests on its censors and parts, adding that the drone had a number of test flights in there.

As a forth cue to prove Iran’s access to the drone’s hidden memory, the commander mentioned that the spy drone’s memory device has revealed that it had flown over Al-Qaeda Leader Osama bin Laden’s hideout in Pakistan two weeks before his death.

“Had we not accessed the plane’s soft wares and hard discs, we wouldn’t have been able to achieve these facts,” Hajizadeh said, reiterating that Iran’s military experts are in full command of the drone intel and hold a good knowledge of the drone parts and programs.

The unmanned surveillance plane lost by the United States in Iran was a stealth aircraft being used for secret missions by the CIA.

The aircraft is among the highly sensitive surveillance platform in the CIA’s fleet that was shaped and designed to evade enemy defenses.

The drone is the first such loss by the US.

The RQ-170 has special coatings and a batwing shape designed to help it penetrate other nations’ air defenses undetected. The existence of the aircraft, which is made by Lockheed Martin, has been known since 2009, when a model was photographed at the main US airfield in Kandahar, Afghanistan.

The revelation came after Russia and China asked Tehran to provide them with information on the capture US drone.

Ahmad Karimpour, an adviser to Iran’s defense minister, said on Friday that Tehran has received requests from many countries for information on the RQ-170 Sentinel, but Moscow and Beijing have been most aggressive in their pursuit of details on the drone.

Source: http://english.farsnews.com/newstext.php?nn=8101300601

FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers

FBI “Communities Against Terrorism” Suspicious Activity Reporting Flyers

The following collection of 25 flyers produced by the FBI and the Department of Justice are distributed to local businesses in a variety of industries to promote suspicious activity reporting. The flyers are not released publicly, though several have been published in the past by news media and various law enforcement agencies around the country.  We have compiled this collection from a number of online sources.

To view the documents, click on a threat area in the menu to the left and the PDF will appear on the right side of the page. You can also download the complete collection of files (ZIP Archive, 6.27 MB).

 

SOURCE:
http://publicintelligence.net/fbi-suspicious-activity-reporting-flyers/

FlashBack: Belgian SuperCop Exposes Elite Sex Orgies

FlashBack: Belgian SuperCop Exposes Elite Sex Orgies

Punch-drunk Belgium is reeling from a new shock after a senior police officer confirmed last week what has long been rumoured: that some of the country’s leaders indulge in sex parties, known ironically as “ballets roses”.

Amusing and appalling in turn, the testimony of Georges Marnette, a senior Brussels policemen, might appear to make a welcome change from the horrors of recent months. But this is not mere entertainment: the stories may provide an important insight into the mores of a ruling class that has outraged ordinary people.

At times, Belgium has been in the throes of a near-revolution, with hundreds of thousands on the streets demanding an end to the political patronage that, they believed, had helped – by omission if not commission – a paedophile ring to murder children and escape arrest. It has not been a time of many laughs for anyone.

All the same, it was with a mixture of knowing winks and barely suppressed laughter that a parliamentary commission investigating another of the country’s most mysterious scandals heard the evidence of M Marnette. Belgian newspapers usually refer to the portly M Marnette as “un superflic”, and mean it. In fact, his evidence was more reminiscent of Inspector Clouseau.

“Yes, we used to go the bars, the gay and lesbian clubs and the sex parties,” he said, his bushy moustaches bristling at the memory of his past achievements. Infiltrating such establishments was no easy matter; it was not a job to be done wearing “jeans and a leather jacket”.

As for M Marnette, he was clearly a master of disguise. “I wasn’t going to hang round wearing my holster while everyone else was either naked or in dressing-gowns. But if I was in a dressing gown, that didn’t mean that I was doing any sexual acrobatics myself.”

The vision of leading politicians, judges and policemen indulging in orgies may tickle the Belgian taste for the absurd. But the light relief provided by tales of lax morals in high places is wearing off. For the “ballet rose” is also the perfect metaphor for the corruption, freemasonry and the vulnerability to blackmail of the country’s political élite.

The public will be learning more about the “ballets roses”, and the identities of dignitaries who attended them, from the evidence of other policemen who “infiltrated” this exotic demi-monde. It is a world of outwardly respectable private clubs in discreet suburbs of Brussels, Antwerp and Liège, but where, on arrival, members remove not just their coats, but their tops, bottoms and underwear as well.

For the moment, it looks increasingly unlikely that the two inquiries obsessing Belgians will yield new insights into how those in power exploit their positions, let alone name the guilty men or bring improvements. But M Marnette’s testimony, and his naming in camera of two senior establishment figures who performed at the “ballets roses”, caused a minor sensation.

Georges Marnette

Many had dismissed the “ballets roses” as Belgium’s Loch Ness monster – much talked about, rarely seen and its existence never proved. But now it emerges that they were not the only exotic entertainment enjoyed by the ruling classes.

The “ballet rose” itself implies the presence of young, but not necessarily under-age, girls. To cater for other tastes, there are also “ballets bleus” (young men), “partouzes” (run-of-the-mill orgies) and even “ballets de confiture” (apparently extreme Right-wingers like to strip and smear themselves with jam).

The parliamentary inquiry truly gripping the nation is the one examining the case of Marc Dutroux, who has confessed to murdering four young girls, and the way it was handled by the authorities.

The second inquiry has caused less of a furore, but the crimes it is reviewing, dating back 10 years, were even bloodier and more traumatic than the paedophile murders. These were the spectacular series of hold-ups, known as the Brabant killings, that terrorised Belgium in the early 1980s and claimed the lives of 28 people. They remain unsolved.

The usual explanation is that the killings were an attempt by the far Right, in league with the security services, to destabilise the country. But the suspicion has long persisted that some of the victims were not gunned down at random, but targeted because of their links to “ballets roses”.

Hugo Coveliers, a Belgian senator, argues that the “ballets roses” are not independent of one another, but part of a system “which operates to this day and is used to blackmail the highly placed people who take part”.

To many who hoped that rage at last year’s paedophile scandal could be channelled into political reform, the “ballets roses” are at best a digression, at worst an attempt by the authorities to throw the two inquiries off the scent of the real villains. The very existence of the two commissions of inquiry has signalled a desire for change. The public may take further encouragement from the fact that, for the first time since the armed robberies began in 1982, police last month released identikit photos of possible suspects.

 

RELEASE: Anonymous Hands Over Stratfor Emails to Wikileaks

RELEASE: Anonymous Hands Over Stratfor Emails to Wikileaks

   LONDON–Today WikiLeaks began publishing The Global Intelligence Files – more than five million emails from the Texas-headquartered “global intelligence” company Stratfor. The emails date from between July 2004 and late December 2011. They reveal the inner workings of a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal’s Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon and government agencies, including the US Department of Homeland Security, the US Marines and the US Defense Intelligence Agency. The emails show Stratfor’s web of informers, pay-off structure, payment-laundering techniques and psychological methods, for example:

“[Y]ou have to take control of him. Control means financial, sexual or psychological control… This is intended to start our conversation on your next phase” – CEO George Friedman to Stratfor analyst Reva Bhalla on 6 December 2011, on how to exploit an Israeli intelligence informant providing information on the medical condition of the President of Venezuala, Hugo Chavez.

The material contains privileged information about the US government’s attacks against Julian Assange and WikiLeaks and Stratfor’s own attempts to subvert WikiLeaks. There are more than 4,000 emails mentioning WikiLeaks or Julian Assange. The emails also expose the revolving door that operates in private intelligence companies in the United States. Government and diplomatic sources from around the world give Stratfor advance knowledge of global politics and events in exchange for money. The Global Intelligence Files exposes how Stratfor has recruited a global network of informants who are paid via Swiss banks accounts and pre-paid credit cards. Stratfor has a mix of covert and overt informants, which includes government employees, embassy staff and journalists around the world.

The material shows how a private intelligence agency works, and how they target individuals for their corporate and government clients. For example, Stratfor monitored and analysed the online activities of Bhopal activists, including the “Yes Men”, for the US chemical giant Dow Chemical. The activists seek redress for the 1984 Dow Chemical/Union Carbide gas disaster in Bhopal, India. The disaster led to thousands of deaths, injuries in more than half a million people, and lasting environmental damage.

Stratfor has realised that its routine use of secret cash bribes to get information from insiders is risky. In August 2011, Stratfor CEO George Friedman confidentially told his employees: “We are retaining a law firm to create a policy for Stratfor on the Foreign Corrupt Practices Act. I don’t plan to do the perp walk and I don’t want anyone here doing it either.”

Stratfor’s use of insiders for intelligence soon turned into a money-making scheme of questionable legality. The emails show that in 2009 then-Goldman Sachs Managing Director Shea Morenz and  Stratfor CEO George Friedman hatched an idea to “utilise the intelligence” it was pulling in from its insider network to start up a captive strategic investment fund. CEO George Friedman explained in a confidential August 2011 document, marked DO NOT SHARE OR DISCUSS: “What StratCap will do is use our Stratfor’s intelligence and analysis to trade in a range of geopolitical  instruments, particularly government bonds, currencies and the like”.  The emails show that in 2011 Goldman Sach’s Morenz invested “substantially” more than $4million and joined Stratfor’s board of directors. Throughout 2011, a complex offshore share structure extending as far as South Africa was erected, designed to make StratCap appear to be legally independent. But, confidentially, Friedman told StratFor staff: “Do not think of StratCap as an outside organisation. It will be integral… It will be useful to you if, for the sake of convenience, you think of it as another aspect of Stratfor and Shea as another executive in Stratfor… we are already working on mock portfolios and trades”. StratCap is due to launch in 2012.

The Stratfor emails reveal a company that cultivates close ties with US government agencies and employs former US government staff. It is preparing the 3-year Forecast for the Commandant of the US Marine Corps, and it trains US marines and “other government intelligence agencies” in “becoming government Stratfors”. Stratfor’s Vice-President for Intelligence, Fred Burton, was formerly a special agent with the US State Department’s Diplomatic Security Service and was their Deputy Chief of the counterterrorism division. Despite the governmental ties, Stratfor and similar companies operate in complete secrecy with no political oversight or accountability.  Stratfor claims that it operates “without ideology, agenda or national bias”, yet the emails reveal private intelligence staff who align themselves closely with US government policies and channel tips to the Mossad – including through an information mule in the Israeli newspaper Haaretz, Yossi Melman, who conspired with Guardian journalist David Leigh to secretly, and in violation of WikiLeaks’ contract with the Guardian, move WikiLeaks US diplomatic cables to Israel.

Ironically, considering the present circumstances, Stratfor was trying to get into what it called the leak-focused “gravy train” that sprung up after WikiLeaks’ Afghanistan disclosures:

“[Is it] possible for us to get some of that ‘leak-focused’ gravy train? This is an obvious fear sale, so that’s a good thing. And we have something to offer that the IT security companies don’t, mainly our focus on counter-intelligence and surveillance that Fred and Stick know better than anyone on the planet… Could we develop some ideas and procedures on the idea of ´leak-focused’ network security that focuses on preventing one’s own employees from leaking sensitive information…  In fact, I’m not so sure this is an IT problem that requires an IT solution.”

Like WikiLeaks’ diplomatic cables, much of the significance of the emails will be revealed over the coming weeks, as our coalition and the public search through them and discover connections. Readers will find that whereas large numbers of Stratfor’s subscribers and clients work in the US military and intelligence agencies, Stratfor gave a complimentary membership to the controversial Pakistan general Hamid Gul, former head of Pakistan’s ISI intelligence service, who, according to US diplomatic cables, planned an IED attack on international forces in Afghanistan in 2006. Readers will discover Stratfor’s internal email classification system that codes correspondence according to categories such as ‘alpha’, ‘tactical’ and ‘secure’. The correspondence also contains code names for people of particular interest such as ‘Izzies’ (members of Hezbollah), or ‘Adogg’ (Mahmoud Ahmedinejad).

Stratfor did secret deals with dozens of media organisations and journalists – from Reuters to the Kiev Post. The list of Stratfor’s “Confederation Partners”, whom Stratfor internally referred to as its “Confed Fuck House” are included in the release. While it is acceptable for journalists to swap information or be paid by other media  organisations, because Stratfor is a private intelligence organisation that services governments and  private clients these relationships are corrupt or corrupting.

WikiLeaks has also obtained Stratfor’s list of informants and, in many cases, records of its payoffs, including $1,200 a month paid to the informant  “Geronimo” , handled by Stratfor’s Former State Department agent Fred  Burton.

WikiLeaks has built an investigative partnership with more than 25 media organisations and activists to inform the public about this huge body of documents. The organisations were provided access to a sophisticated investigative database developed by WikiLeaks and together with WikiLeaks are conducting journalistic evaluations of these emails. Important revelations discovered using this system will appear in the media in the coming weeks, together with the gradual release of the source documents.

Public partners in the investigation:

More than 25 media partners (others will be disclosed after their first publication):

Al Akhbar – Lebanon – http://english.al-akhbar.com
Al Masry Al Youm – Egypt – http://www.almasry-alyoum.com
Bivol – Bulgaria – http://bivol.bg
CIPER – Chile – http://ciperchile.cl
Dawn Media – Pakistan – http://www.dawn.com
L’Espresso – Italy – http://espresso.repubblica.it
La Repubblica – Italy – http://www.repubblica.it
La Jornada – Mexico – www.jornada.unam.mx/
La Nacion – Costa Rica – http://www.nacion.com
Malaysia Today – Malaysia – www.malaysia-today.net
McClatchy – United States – http://www.mcclatchy.com
Nawaat – Tunisia – http://nawaat.org
NDR/ARD – Germany – http://www.ard.de
Owni – France – http://owni.fr
Pagina 12 – Argentina – www.pagina12.com.ar
Plaza Publica – Guatemala – http://plazapublica.com.gt
Publico.es – Spain – www.publico.es
Rolling Stone – United States – http://www.rollingstone.com
Russia Reporter – Russia – http://rusrep.ru
Ta Nea – Greece –- http://www.tanea.gr
Taraf – Turkey – http://www.taraf.com.tr
The Hindu – India – www.thehindu.com
The Yes Men – Bhopal Activists – Global http://theyesmen.org
Nicky Hager for NZ Herald – New Zealand – http://www.nzherald.co.nz

Christopher Soghoian: Online Privacy Ninja

Christopher Soghoian: Online Privacy Ninja

Christopher Soghoian

[email protected]
PGP key
blog   twitter
biography   publications
consulting   financial disclosure

Christopher Soghoian is a Washington, DC based Open Society Fellow, supported by the Open Society Foundations.

He is also a Graduate Fellow at the Center for Applied Cybersecurity Research, and a Ph.D. Candidate in the School of Informatics and Computing at Indiana University.

His research is generally focused on the topic of online privacy. This includes both consumer issues (such as online tracking) as well as government surveillance. His Ph.D dissertation is focused on the role that companies play in either resisting or facilitating surveillance of their customers.

He has used the Freedom of Information Act and several other investigative techniques to shed light on the scale of and the methods by which the US government spies on Internet communications and mobile telephones. This work has been cited by (pdf) the 9th Circuit Court of Appeals, and featured on the Colbert Report.

He was the first ever in-house technologist at the Federal Trade Commission (FTC)’s Division of Privacy and Identity Protection. Prior to his year in government, he created a privacy enhancing browser add-on that was downloaded more than 700,000 times in its first year before he sold it to Abine, Inc.

He has worked at or interned with the Berkman Center for Internet & Society at Harvard University, the American Civil Liberties Union (ACLU) of Northern California, NTT DoCoMo Euro Labs, Google, Apple and IBM Research Zurich.

Publications

http://www.dubfire.net/

Thomas Drake – The Secret Sharer

Thomas Drake – The Secret Sharer

Is Thomas Drake an enemy of the state?
by Jane Mayer May 23, 2011

Drake, a former senior executive at the National Security Agency, faces some of the gravest charges that can be brought against an American citizen. Photograph by Martin Schoeller.

 

On June 13th, a fifty-four-year-old former government employee named Thomas Drake is scheduled to appear in a courtroom in Baltimore, where he will face some of the gravest charges that can be brought against an American citizen. A former senior executive at the National Security Agency, the government’s electronic-espionage service, he is accused, in essence, of being an enemy of the state. According to a ten-count indictment delivered against him in April, 2010, Drake violated the Espionage Act—the 1917 statute that was used to convict Aldrich Ames, the C.I.A. officer who, in the eighties and nineties, sold U.S. intelligence to the K.G.B., enabling the Kremlin to assassinate informants. In 2007, the indictment says, Drake willfully retained top-secret defense documents that he had sworn an oath to protect, sneaking them out of the intelligence agency’s headquarters, at Fort Meade, Maryland, and taking them home, for the purpose of “unauthorized disclosure.” The aim of this scheme, the indictment says, was to leak government secrets to an unnamed newspaper reporter, who is identifiable as Siobhan Gorman, of the Baltimore Sun. Gorman wrote a prize-winning series of articles for the Sun about financial waste, bureaucratic dysfunction, and dubious legal practices in N.S.A. counterterrorism programs. Drake is also charged with obstructing justice and lying to federal law-enforcement agents. If he is convicted on all counts, he could receive a prison term of thirty-five years.

The government argues that Drake recklessly endangered the lives of American servicemen. “This is not an issue of benign documents,” William M. Welch II, the senior litigation counsel who is prosecuting the case, argued at a hearing in March, 2010. The N.S.A., he went on, collects “intelligence for the soldier in the field. So when individuals go out and they harm that ability, our intelligence goes dark and our soldier in the field gets harmed.”

Top officials at the Justice Department describe such leak prosecutions as almost obligatory. Lanny Breuer, the Assistant Attorney General who supervises the department’s criminal division, told me, “You don’t get to break the law and disclose classified information just because you want to.” He added, “Politics should play no role in it whatsoever.”

When President Barack Obama took office, in 2009, he championed the cause of government transparency, and spoke admiringly of whistle-blowers, whom he described as “often the best source of information about waste, fraud, and abuse in government.” But the Obama Administration has pursued leak prosecutions with a surprising relentlessness. Including the Drake case, it has been using the Espionage Act to press criminal charges in five alleged instances of national-security leaks—more such prosecutions than have occurred in all previous Administrations combined. The Drake case is one of two that Obama’s Justice Department has carried over from the Bush years.

Gabriel Schoenfeld, a conservative political scientist at the Hudson Institute, who, in his book “Necessary Secrets” (2010), argues for more stringent protection of classified information, says, “Ironically, Obama has presided over the most draconian crackdown on leaks in our history—even more so than Nixon.”

One afternoon in January, Drake met with me, giving his first public interview about this case. He is tall, with thinning sandy hair framing a domed forehead, and he has the erect bearing of a member of the Air Force, where he served before joining the N.S.A., in 2001. Obsessive, dramatic, and emotional, he has an unwavering belief in his own rectitude. Sitting at a Formica table at the Tastee Diner, in Bethesda, Drake—who is a registered Republican—groaned and thrust his head into his hands. “I actually had hopes for Obama,” he said. He had not only expected the President to roll back the prosecutions launched by the Bush Administration; he had thought that Bush Administration officials would be investigated for overstepping the law in the “war on terror.”

“But power is incredibly destructive,” Drake said. “It’s a weird, pathological thing. I also think the intelligence community coöpted Obama, because he’s rather naïve about national security. He’s accepted the fear and secrecy. We’re in a scary space in this country.”

The Justice Department’s indictment narrows the frame around Drake’s actions, focussing almost exclusively on his handling of what it claims are five classified documents. But Drake sees his story as a larger tale of political reprisal, one that he fears the government will never allow him to air fully in court. “I’m a target,” he said. “I’ve got a bull’s-eye on my back.” He continued, “I did not tell secrets. I am facing prison for having raised an alarm, period. I went to a reporter with a few key things: fraud, waste, and abuse, and the fact that there were legal alternatives to the Bush Administration’s ‘dark side’ ”—in particular, warrantless domestic spying by the N.S.A.

The indictment portrays him not as a hero but as a treacherous man who violated “the government trust.” Drake said of the prosecutors, “They can say what they want. But the F.B.I. can find something on anyone.”

Steven Aftergood, the director of the Project on Government Secrecy at the Federation of American Scientists, says of the Drake case, “The government wants this to be about unlawfully retained information. The defense, meanwhile, is painting a picture of a public-interested whistle-blower who struggled to bring attention to what he saw as multibillion-dollar mismanagement.” Because Drake is not a spy, Aftergood says, the case will “test whether intelligence officers can be convicted of violating the Espionage Act even if their intent is pure.” He believes that the trial may also test whether the nation’s expanding secret intelligence bureaucracy is beyond meaningful accountability. “It’s a much larger debate than whether a piece of paper was at a certain place at a certain time,” he says.

Jack Balkin, a liberal law professor at Yale, agrees that the increase in leak prosecutions is part of a larger transformation. “We are witnessing the bipartisan normalization and legitimization of a national-surveillance state,” he says. In his view, zealous leak prosecutions are consonant with other political shifts since 9/11: the emergence of a vast new security bureaucracy, in which at least two and a half million people hold confidential, secret, or top-secret clearances; huge expenditures on electronic monitoring, along with a reinterpretation of the law in order to sanction it; and corporate partnerships with the government that have transformed the counterterrorism industry into a powerful lobbying force. Obama, Balkin says, has “systematically adopted policies consistent with the second term of the Bush Administration.”

On March 28th, Obama held a meeting in the White House with five advocates for greater transparency in government. During the discussion, the President drew a sharp distinction between whistle-blowers who exclusively reveal wrongdoing and those who jeopardize national security. The importance of maintaining secrecy about the impending raid on Osama bin Laden’s compound was likely on Obama’s mind. The White House has been particularly bedevilled by the ongoing release of classified documents by WikiLeaks, the group led by Julian Assange. Last year, WikiLeaks began releasing a vast trove of sensitive government documents allegedly leaked by a U.S. soldier, Bradley Manning; the documents included references to a courier for bin Laden who had moved his family to Abbottabad—the town where bin Laden was hiding out. Manning has been charged with “aiding the enemy.”

Danielle Brian, the executive director of the Project on Government Oversight, attended the meeting, and said that Obama’s tone was generally supportive of transparency. But when the subject of national-security leaks came up, Brian said, “the President shifted in his seat and leaned forward. He said this may be where we have some differences. He said he doesn’t want to protect the people who leak to the media war plans that could impact the troops.” Though Brian was impressed with Obama’s over-all stance on transparency, she felt that he might be misinformed about some of the current leak cases. She warned Obama that prosecuting whistle-blowers would undermine his legacy. Brian had been told by the White House to avoid any “ask”s on specific issues, but she told the President that, according to his own logic, Drake was exactly the kind of whistle-blower who deserved protection.

As Drake tells it, his problems began on September 11, 2001. “The next seven weeks were crucial,” he said. “It’s foundational to why I am a criminal defendant today.”

The morning that Al Qaeda attacked the U.S. was, coincidentally, Drake’s first full day of work as a civilian employee at the N.S.A.—an agency that James Bamford, the author of “The Shadow Factory” (2008), calls “the largest, most costly, and most technologically sophisticated spy organization the world has ever known.” Drake, a linguist and a computer expert with a background in military crypto-electronics, had worked for twelve years as an outside contractor at the N.S.A. Under a program code-named Jackpot, he focussed on finding and fixing weaknesses in the agency’s software programs. But, after going through interviews and background checks, he began working full time for Maureen Baginski, the chief of the Signals Intelligence Directorate at the N.S.A., and the agency’s third-highest-ranking official.

Even in an age in which computerized feats are commonplace, the N.S.A.’s capabilities are breathtaking. The agency reportedly has the capacity to intercept and download, every six hours, electronic communications equivalent to the contents of the Library of Congress. Three times the size of the C.I.A., and with a third of the U.S.’s entire intelligence budget, the N.S.A. has a five-thousand-acre campus at Fort Meade protected by iris scanners and facial-recognition devices. The electric bill there is said to surpass seventy million dollars a year.

Nevertheless, when Drake took up his post the agency was undergoing an identity crisis. With the Cold War over, the agency’s mission was no longer clear. As Drake puts it, “Without the Soviet Union, it didn’t know what to do.” Moreover, its technology had failed to keep pace with the shift in communications to cellular phones, fibre-optic cable, and the Internet. Two assessments commissioned by General Michael Hayden, who took over the agency in 1999, had drawn devastating conclusions. One described the N.S.A. as “an agency mired in bureaucratic conflict” and “suffering from poor leadership.” In January, 2000, the agency’s computer system crashed for three and a half days, causing a virtual intelligence blackout.

Agency leaders decided to “stir up the gene pool,” Drake says. Although his hiring was meant to signal fresh thinking, he was given a clumsy bureaucratic title: Senior Change Leader/Chief, Change Leadership & Communications Office, Signals Intelligence Directorate.

The 9/11 attacks caught the U.S.’s national-security apparatus by surprise. N.S.A. officials were humiliated to learn that the Al Qaeda hijackers had spent their final days, undetected, in a motel in Laurel, Maryland—a few miles outside the N.S.A.’s fortified gates. They had bought a folding knife at a Target on Fort Meade Road. Only after the attacks did agency officials notice that, on September 10th, their surveillance systems had intercepted conversations in Afghanistan and Saudi Arabia warning that “the match begins tomorrow” and “tomorrow is Zero Hour.”

Drake, hoping to help fight back against Al Qaeda, immediately thought of a tantalizing secret project he had come across while working on Jackpot. Code-named ThinThread, it had been developed by technological wizards in a kind of Skunk Works on the N.S.A. campus. Formally, the project was supervised by the agency’s Signals Intelligence Automation Research Center, or SARC.

While most of the N.S.A. was reeling on September 11th, inside SARC the horror unfolded “almost like an ‘I-told-you-so’ moment,” according to J. Kirk Wiebe, an intelligence analyst who worked there. “We knew we weren’t keeping up.” SARC was led by a crypto-mathematician named Bill Binney, whom Wiebe describes as “one of the best analysts in history.” Binney and a team of some twenty others believed that they had pinpointed the N.S.A.’s biggest problem—data overload—and then solved it. But the agency’s management hadn’t agreed.

Binney, who is six feet three, is a bespectacled sixty-seven-year-old man with wisps of dark hair; he has the quiet, tense air of a preoccupied intellectual. Now retired and suffering gravely from diabetes, which has already claimed his left leg, he agreed recently to speak publicly for the first time about the Drake case. When we met, at a restaurant near N.S.A. headquarters, he leaned crutches against an extra chair. “This is too serious not to talk about,” he said.

Binney expressed terrible remorse over the way some of his algorithms were used after 9/11. ThinThread, the “little program” that he invented to track enemies outside the U.S., “got twisted,” and was used for both foreign and domestic spying: “I should apologize to the American people. It’s violated everyone’s rights. It can be used to eavesdrop on the whole world.” According to Binney, Drake took his side against the N.S.A.’s management and, as a result, became a political target within the agency.

Binney spent most of his career at the agency. In 1997, he became the technical director of the World Geopolitical and Military Analysis Reporting Group, a division of six thousand employees which focusses on analyzing signals intelligence. By the late nineties, the N.S.A. had become overwhelmed by the amount of digital data it was collecting. Binney and his team began developing codes aimed at streamlining the process, allowing the agency to isolate useful intelligence. This was the beginning of ThinThread.

In the late nineties, Binney estimated that there were some two and a half billion phones in the world and one and a half billion I.P. addresses. Approximately twenty terabytes of unique information passed around the world every minute. Binney started assembling a system that could trap and map all of it. “I wanted to graph the world,” Binney said. “People said, ‘You can’t do this—the possibilities are infinite.’ ” But he argued that “at any given point in time the number of atoms in the universe is big, but it’s finite.”

As Binney imagined it, ThinThread would correlate data from financial transactions, travel records, Web searches, G.P.S. equipment, and any other “attributes” that an analyst might find useful in pinpointing “the bad guys.” By 2000, Binney, using fibre optics, had set up a computer network that could chart relationships among people in real time. It also turned the N.S.A.’s data-collection paradigm upside down. Instead of vacuuming up information around the world and then sending it all back to headquarters for analysis, ThinThread processed information as it was collected—discarding useless information on the spot and avoiding the overload problem that plagued centralized systems. Binney says, “The beauty of it is that it was open-ended, so it could keep expanding.”

Pilot tests of ThinThread proved almost too successful, according to a former intelligence expert who analyzed it. “It was nearly perfect,” the official says. “But it processed such a large amount of data that it picked up more Americans than the other systems.” Though ThinThread was intended to intercept foreign communications, it continued documenting signals when a trail crossed into the U.S. This was a big problem: federal law forbade the monitoring of domestic communications without a court warrant. And a warrant couldn’t be issued without probable cause and a known suspect. In order to comply with the law, Binney installed privacy controls and added an “anonymizing feature,” so that all American communications would be encrypted until a warrant was issued. The system would indicate when a pattern looked suspicious enough to justify a warrant.

But this was before 9/11, and the N.S.A.’s lawyers deemed ThinThread too invasive of Americans’ privacy. In addition, concerns were raised about whether the system would function on a huge scale, although preliminary tests had suggested that it would. In the fall of 2000, Hayden decided not to use ThinThread, largely because of his legal advisers’ concerns. Instead, he funded a rival approach, called Trailblazer, and he turned to private defense contractors to build it. Matthew Aid, the author of a heralded 2009 history of the agency, “The Secret Sentry,” says, “The resistance to ThinThread was just standard bureaucratic politics. ThinThread was small, cost-effective, easy to understand, and protected the identity of Americans. But it wasn’t what the higher-ups wanted. They wanted a big machine that could make Martinis, too.”

The N.S.A.’s failure to stop the 9/11 plot infuriated Binney: he believed that ThinThread had been ready to deploy nine months earlier. Working with N.S.A. counterterrorism experts, he had planned to set up his system at sites where foreign terrorism was prevalent, including Afghanistan and Pakistan. “Those bits of conversations they found too late?” Binney said. “That would have never happened. I had it managed in a way that would send out automatic alerts. It would have been, Bang!”

Meanwhile, there was nothing to show for Trailblazer, other than mounting bills. As the system stalled at the level of schematic drawings, top executives kept shuttling between jobs at the agency and jobs with the high-paying contractors. For a time, both Hayden’s deputy director and his chief of signals-intelligence programs worked at SAIC, a company that won several hundred million dollars in Trailblazer contracts. In 2006, Trailblazer was abandoned as a $1.2-billion flop.

Soon after 9/11, Drake says, he prepared a short, classified summary explaining how ThinThread “could be put into the fight,” and gave it to Baginski, his boss. But he says that she “wouldn’t respond electronically. She just wrote in a black felt marker, ‘They’ve found a different solution.’ ” When he asked her what it was, she responded, “I can’t tell you.” Baginski, who now works for a private defense contractor, recalls her interactions with Drake differently, but she declined to comment specifically.

In the weeks after the attacks, rumors began circulating inside the N.S.A. that the agency, with the approval of the Bush White House, was violating the Foreign Intelligence Surveillance Act—the 1978 law, known as FISA, that bars domestic surveillance without a warrant. Years later, the rumors were proved correct. In nearly total secrecy, and under pressure from the White House, Hayden sanctioned warrantless domestic surveillance. The new policy, which lawyers in the Justice Department justified by citing President Bush’s executive authority as Commander-in-Chief, contravened a century of constitutional case law. Yet, on October 4, 2001, Bush authorized the policy, and it became operational by October 6th. Bamford, in “The Shadow Factory,” suggests that Hayden, having been overcautious about privacy before 9/11, swung to the opposite extreme after the attacks. Hayden, who now works for a security-consulting firm, declined to respond to detailed questions about the surveillance program.

When Binney heard the rumors, he was convinced that the new domestic-surveillance program employed components of ThinThread: a bastardized version, stripped of privacy controls. “It was my brainchild,” he said. “But they removed the protections, the anonymization process. When you remove that, you can target anyone.” He said that although he was not “read in” to the new secret surveillance program, “my people were brought in, and they told me, ‘Can you believe they’re doing this? They’re getting billing records on U.S. citizens! They’re putting pen registers’ ”—logs of dialled phone numbers—“ ‘on everyone in the country!’ ”

Drake recalled that, after the October 4th directive, “strange things were happening. Equipment was being moved. People were coming to me and saying, ‘We’re now targeting our own country!’ ” Drake says that N.S.A. officials who helped the agency obtain FISA warrants were suddenly reassigned, a tipoff that the conventional process was being circumvented. He added, “I was concerned that it was illegal, and none of it was necessary.” In his view, domestic data mining “could have been done legally” if the N.S.A. had maintained privacy protections. “But they didn’t want an accountable system.”

Aid, the author of the N.S.A. history, suggests that ThinThread’s privacy protections interfered with top officials’ secret objective—to pick American targets by name. “They wanted selection, not just collection,” he says.

A former N.S.A. official expressed skepticism that Drake cared deeply about the constitutional privacy issues raised by the agency’s surveillance policies. The official characterizes him as a bureaucrat driven by resentment of a rival project—Trailblazer—and calls his story “revisionist history.” But Drake says that, in the fall of 2001, he told Baginski he feared that the agency was breaking the law. He says that to some extent she shared his views, and later told him she feared that the agency would be “haunted” by the surveillance program. In 2003, she left the agency for the F.B.I., in part because of her discomfort with the surveillance program. Drake says that, at one point, Baginski told him that if he had concerns he should talk to the N.S.A.’s general counsel. Drake claims that he did, and that the agency’s top lawyer, Vito Potenza, told him, “Don’t worry about it. We’re the executive agent for the White House. It’s all been scrubbed. It’s legal.” When he pressed further, Potenza told him, “It’s none of your business.” (Potenza, who is now retired, declined to comment.)

Drake says, “I feared for the future. If Pandora’s box was opened, what would the government become?” He was not about to drop the matter. Matthew Aid, who describes Drake as “brilliant,” says that “he has sort of a Jesus complex—only he can see the way things are. Everyone else is mentally deficient, or in someone’s pocket.” Drake’s history of whistle-blowing stretches back to high school, in Manchester, Vermont, where his father, a retired Air Force officer, taught. When drugs infested the school, Drake became a police informant. And Watergate, which occurred while he was a student, taught him “that no one is above the law.”

Drake says that in the Air Force, where he learned to capture electronic signals, the FISA law “was drilled into us.” He recalls, “If you accidentally intercepted U.S. persons, there were special procedures to expunge it.” The procedures had been devised to prevent the recurrence of past abuses, such as Nixon’s use of the N.S.A. to spy on his political enemies.

Drake didn’t know the precise details, but he sensed that domestic spying “was now being done on a vast level.” He was dismayed to hear from N.S.A. colleagues that “arrangements” were being made with telecom and credit-card companies. He added, “The mantra was ‘Get the data!’ ” The transformation of the N.S.A., he says, was so radical that “it wasn’t just that the brakes came off after 9/11—we were in a whole different vehicle.”

Few people have a precise knowledge of the size or scope of the N.S.A.’s domestic-surveillance powers. An agency spokesman declined to comment on how the agency “performs its mission,” but said that its activities are constitutional and subject to “comprehensive and rigorous” oversight. But Susan Landau, a former engineer at Sun Microsystems, and the author of a new book, “Surveillance or Security?,” notes that, in 2003, the government placed equipment capable of copying electronic communications at locations across America. These installations were made, she says, at “switching offices” that not only connect foreign and domestic communications but also handle purely domestic traffic. As a result, she surmises, the U.S. now has the capability to monitor domestic traffic on a huge scale. “Why was it done this way?” she asks. “One can come up with all sorts of nefarious reasons, but one doesn’t want to think that way about our government.”

Binney, for his part, believes that the agency now stores copies of all e-mails transmitted in America, in case the government wants to retrieve the details later. In the past few years, the N.S.A. has built enormous electronic-storage facilities in Texas and Utah. Binney says that an N.S.A. e-mail database can be searched with “dictionary selection,” in the manner of Google. After 9/11, he says, “General Hayden reassured everyone that the N.S.A. didn’t put out dragnets, and that was true. It had no need—it was getting every fish in the sea.”

Binney considers himself a conservative, and, as an opponent of big government, he worries that the N.S.A.’s data-mining program is so extensive that it could help “create an Orwellian state.” Whereas wiretap surveillance requires trained human operators, data mining is automated, meaning that the entire country can be watched. Conceivably, U.S. officials could “monitor the Tea Party, or reporters, whatever group or organization you want to target,” he says. “It’s exactly what the Founding Fathers never wanted.”

On October 31, 2001, soon after Binney concluded that the N.S.A. was headed in an unethical direction, he retired. He had served for thirty-six years. His wife worked there, too. Wiebe, the analyst, and Ed Loomis, a computer scientist at SARC, also left. Binney said of his decision, “I couldn’t be an accessory to subverting the Constitution.”

Not long after Binney quit the N.S.A., he says, he confided his concerns about the secret surveillance program to Diane Roark, a staff member on the House Permanent Select Committee on Intelligence, which oversees the agency. Roark, who has flowing gray hair and large, wide-set eyes, looks like a waifish poet. But in her intelligence-committee job, which she held for seventeen years, she modelled herself on Machiavelli’s maxim that it is better to be feared than loved. Within the N.S.A.’s upper ranks she was widely resented. A former top N.S.A. official says of her, “In meetings, she would just say, ‘You’re lying.’ ”

Roark agrees that she distrusted the N.S.A.’s managers. “I asked very tough questions, because they were trying to hide stuff,” she says. “For instance, I wasn’t supposed to know about the warrantless surveillance. They were all determined that no one else was going to tell them what to do.”

Like Drake and Binney, Roark was a registered Republican, skeptical about bureaucracy but strong on national defense. She had a knack for recruiting sources at the N.S.A. One of them was Drake, who introduced himself to her in 2000, after she visited N.S.A. headquarters and gave a stinging talk on the agency’s failings; she also established relationships with Binney and Wiebe. Hayden was furious about this back channel. After learning that Binney had attended a meeting with Roark at which N.S.A. employees complained about Trailblazer, Hayden dressed down the critics. He then sent out an agency-wide memo, in which he warned that several “individuals, in a session with our congressional overseers, took a position in direct opposition to one that we had corporately decided to follow. . . . Actions contrary to our decisions will have a serious adverse effect on our efforts to transform N.S.A., and I cannot tolerate them.” Roark says of the memo, “Hayden brooked no opposition to his favorite people and programs.”

Roark, who had substantial influence over N.S.A. budget appropriations, was an early champion of Binney’s ThinThread project. She was dismayed, she says, to hear that it had evolved into a means of domestic surveillance, and felt personally responsible. Her oversight committee had been created after Watergate specifically to curb such abuses. “It was my duty to oppose it,” she told me. “That is why oversight existed, so that these things didn’t happen again. I’m not an attorney, but I thought that there was no way it was constitutional.” Roark recalls thinking that, if N.S.A. officials were breaking the law, she was “going to fry them.”

She soon learned that she was practically alone in her outrage. Very few congressional leaders had been briefed on the program, and some were apparently going along with it, even if they had reservations. Starting in February, 2002, Roark says, she wrote a series of memos warning of potential illegalities and privacy breaches and handed them to the staffers for Porter Goss, the chairman of her committee, and Nancy Pelosi, its ranking Democrat. But nothing changed. (Pelosi’s spokesman denied that she received such memos, and pointed out that a year earlier Pelosi had written to Hayden and expressed grave concerns about the N.S.A.’s electronic surveillance.)

Roark, feeling powerless, retired. Before leaving Washington, though, she learned that Hayden, who knew of her strong opposition to the surveillance program, wanted to talk to her. They met at N.S.A. headquarters on July 15, 2002. According to notes that she made after the meeting, Hayden pleaded with her to stop agitating against the program. He conceded that the policy would leak at some point, and told her that when it did she could “yell and scream” as much as she wished. Meanwhile, he wanted to give the program more time. She asked Hayden why the N.S.A. had chosen not to include privacy protections for Americans. She says that he “kept not answering. Finally, he mumbled, and looked down, and said, ‘We didn’t need them. We had the power.’ He didn’t even look me in the eye. I was flabbergasted.” She asked him directly if the government was getting warrants for domestic surveillance, and he admitted that it was not.

In an e-mail, Hayden confirmed that the meeting took place, but said that he recalled only its “broad outlines.” He noted that Roark was not “cleared to know about the expanded surveillance program, so I did not go into great detail.” He added, “I assured her that I firmly believed that what N.S.A. was doing was effective, appropriate, and lawful. I also reminded her that the program’s success depended on it remaining secret, that it was appropriately classified, and that any public discussion of it would have to await a later day.”

During the meeting, Roark says, she warned Hayden that no court would uphold the program. Curiously, Hayden responded that he had already been assured by unspecified individuals that he could count on a majority of “the nine votes”—an apparent reference to the Supreme Court. According to Roark’s notes, Hayden told her that such a vote might even be 7–2 in his favor.

Roark couldn’t believe that the Supreme Court had been adequately informed of the N.S.A.’s transgressions, and she decided to alert Chief Justice William H. Rehnquist, sending a message through a family friend. Once again, there was no response. She also tried to contact a judge on the FISA court, in Washington, which adjudicates requests for warrants sanctioning domestic surveillance of suspected foreign agents. But the judge had her assistant refer the call to the Department of Justice, which had approved the secret program in the first place. Roark says that she even tried to reach David Addington, the legal counsel to Vice-President Dick Cheney, who had once been her congressional colleague. He never called back, and Addington was eventually revealed to be one of the prime advocates for the surveillance program.

“This was such a Catch-22,” Roark says. “There was no one to go to.” In October, 2003, feeling “profoundly depressed,” she left Washington and moved to a small town in Oregon.

Drake was still working at the N.S.A., but he was secretly informing on the agency to Congress. In addition to briefing Roark, he had become an anonymous source for the congressional committees investigating intelligence failures related to 9/11. He provided Congress with top-secret documents chronicling the N.S.A.’s shortcomings. Drake believed that the agency had failed to feed other intelligence agencies critical information that it had collected before the attacks. Congressional investigators corroborated these criticisms, though they found greater lapses at the C.I.A. and the F.B.I.

Around this time, Drake recalls, Baginski warned him, “Be careful, Tom—they’re looking for leakers.” He found this extraordinary, and asked himself, “Telling the truth to congressional oversight committees is leaking?” But the N.S.A. has a rule requiring employees to clear any contact with Congress, and in the spring of 2002 Baginski told Drake, “It’s time for you to find another job.” He soon switched to a less sensitive post at the agency, the first of several.

As for Binney, he remained frustrated even in retirement about what he considered the misuse of ThinThread. In September, 2002, he, Wiebe, Loomis, and Roark filed what they thought was a confidential complaint with the Pentagon’s Inspector General, extolling the virtues of the original ThinThread project and accusing the N.S.A. of wasting money on Trailblazer. Drake did not put his name on the complaint, because he was still an N.S.A. employee. But he soon became involved in helping the others, who had become friends. He obtained documents aimed at proving waste, fraud, and abuse in the Trailblazer program.

The Inspector General’s report, which was completed in 2005, was classified as secret, so only a few insiders could read what Drake describes as a scathing document. Possibly the only impact of the probe was to hasten the end of Trailblazer, whose budget overruns had become indisputably staggering. Though Hayden acknowledged to a Senate committee that the costs of the Trailblazer project “were greater than anticipated, to the tune of, I would say, hundreds of millions,” most of the scandal’s details remained hidden from the public.

In December, 2005, the N.S.A.’s culture of secrecy was breached by a stunning leak. The Times reporters James Risen and Eric Lichtblau revealed that the N.S.A. was running a warrantless wiretapping program inside the United States. The paper’s editors had held onto the scoop for more than a year, weighing the propriety of publishing it. According to Bill Keller, the executive editor of the Times, President Bush pleaded with the paper’s editors to not publish the story; Keller told New York that “the basic message was: You’ll have blood on your hands.” After the paper defied the Administration, Bush called the leak “a shameful act.” At his command, federal agents launched a criminal investigation to identify the paper’s source.

The Times story shocked the country. Democrats, including then Senator Obama, denounced the program as illegal and demanded congressional hearings. A FISA court judge resigned in protest. In March, 2006, Mark Klein, a retired A.T. & T. employee, gave a sworn statement to the Electronic Frontier Foundation, which was filing a lawsuit against the company, describing a secret room in San Francisco where powerful Narus computers appeared to be sorting and copying all of the telecom’s Internet traffic—both foreign and domestic. A high-capacity fibre-optic cable seemed to be forwarding this data to a centralized location, which, Klein surmised, was N.S.A. headquarters. Soon, USA Today reported that A.T. & T., Verizon, and BellSouth had secretly opened their electronic records to the government, in violation of communications laws. Legal experts said that each instance of spying without a warrant was a serious crime, and that there appeared to be hundreds of thousands of infractions.

President Bush and Administration officials assured the American public that the surveillance program was legal, although new legislation was eventually required to bring it more in line with the law. They insisted that the traditional method of getting warrants was too slow for the urgent threats posed by international terrorism. And they implied that the only domestic surveillance taking place involved tapping phone calls in which one speaker was outside the U.S.

Drake says of Bush Administration officials, “They were lying through their teeth. They had chosen to go an illegal route, and it wasn’t because they had no other choice.” He also believed that the Administration was covering up the full extent of the program. “The phone calls were the tip of the iceberg. The really sensitive stuff was the data mining.” He says, “I was faced with a crisis of conscience. What do I do—remain silent, and complicit, or go to the press?”

Drake has a wife and five sons, the youngest of whom has serious health problems, and so he agonized over the decision. He researched the relevant legal statutes and concluded that if he spoke to a reporter about unclassified matters the only risk he ran was losing his job. N.S.A. policy forbids initiating contact with the press. “I get that it’s grounds for ‘We have to let you go,’ ” he says. But he decided that he was willing to lose his job. “This was a violation of everything I knew and believed as an American. We were making the Nixon Administration look like pikers.”

Drake got in touch with Gorman, who covered the N.S.A. for the Baltimore Sun. He had admired an article of hers and knew that Roark had spoken to her previously, though not about anything classified. He got Gorman’s contact information from Roark, who warned him to be careful. She knew that in the past the N.S.A. had dealt harshly with people who embarrassed it.

Drake set up a secure Hushmail e-mail account and began sending Gorman anonymous tips. Half in jest, he chose the pseudonym The Shadow Knows. He says that he insisted on three ground rules with Gorman: neither he nor she would reveal his identity; he wouldn’t be the sole source for any story; he would not supply her with classified information. But a year into the arrangement, in February, 2007, Drake decided to blow his cover, surprising Gorman by showing up at the newspaper and introducing himself as The Shadow Knows. He ended up meeting with Gorman half a dozen times. But, he says, “I never gave her anything classified.” Gorman has not been charged with wrongdoing, and declined, through her lawyer, Laura Handman, to comment, citing the pending trial.

Starting on January 29, 2006, Gorman, who now works at the Wall Street Journal, published a series of articles about problems at the N.S.A., including a story describing Trailblazer as an expensive fiasco. On May 18, 2006, the day that Hayden faced Senate confirmation hearings for a new post—the head of the C.I.A.—the Sun published Gorman’s exposé on ThinThread, which accused the N.S.A. of rejecting an approach that protected Americans’ privacy. Hayden, evidently peeved, testified that intelligence officers deserved “not to have every action analyzed, second-guessed, and criticized on the front pages of the newspapers.”

At the time, the government did not complain that the Sun had crossed a legal line. It did not contact the paper’s editors or try to restrain the paper from publishing Gorman’s work. A former N.S.A. colleague of Drake’s says he believes that the Sun stories revealed government secrets. Others disagree. Steven Aftergood, the secrecy expert, says that the articles “did not damage national security.”

Matthew Aid argues that the material Drake provided to the Sun should not have been highly classified—if it was—and in any case only highlighted that “the N.S.A. was a management nightmare, which wasn’t a secret in Washington.” In his view, Drake “was just saying, ‘We’re not doing our job, and it’s having a deleterious effect on mission performance.’ He was right, by the way.” The Sun series, Aid says, was “embarrassing to N.S.A. management, but embarrassment to the U.S. government is not a criminal offense in this country.” (Aid has a stake in this debate. In 1984, when he was in the Air Force, he spent several months in the stockade for having stored classified documents in a private locker. The experience, he says, sensitized him to issues of government secrecy.)

While the Sun was publishing its series, twenty-five federal agents and five prosecutors were struggling to identify the Times’ source. The team had targeted some two hundred possible suspects, but had found no culprits. The Sun series attracted the attention of the investigators, who theorized that its source might also have talked to the Times. This turned out not to be true. Nevertheless, the investigators quickly homed in on the Trailblazer critics. “It’s sad,” an intelligence expert says. “I think they were aiming at the Times leak and found this instead.”

Roark was an obvious suspect for the Times leak. Everyone from Hayden on down knew that she had opposed the surveillance program. After the article appeared, she says, “I was waiting for the shoe to drop.” The F.B.I. eventually contacted her, and in February, 2007, she and her attorney met with the prosecutor then in charge, Steven Tyrrell, who was the head of the fraud section at the Justice Department. Roark signed an affidavit saying that she was not a source for the Times story or for “State of War,” a related book that James Risen wrote. She also swore that she had no idea who the source was. She says of the experience, “It was an interrogation, not an interview. They treated me like a target.”

Roark recalls that the F.B.I. agents tried to force her to divulge the identity of her old N.S.A. informants. They already seemed to know about Drake, Binney, and Wiebe—perhaps from the Inspector General’s report. She refused to coöperate, arguing that it was improper for agents of the executive branch to threaten a congressional overseer about her sources. “I had the sense that N.S.A. was egging the F.B.I. on,” she says. “I’d gotten the N.S.A. so many times—they were going to get me. The N.S.A. hated me.” (The N.S.A. and the Justice Department declined to comment on the investigations.)

In the months that followed, Roark heard nothing. Finally, her lawyer placed the case in her “dead file.”

On July 26, 2007, at 9 A.M. Eastern Standard Time, armed federal agents simultaneously raided the houses of Binney, Wiebe, and Roark. (At Roark’s house, in Oregon, it was six o’clock.) Binney was in the shower when agents arrived, and recalls, “They went right upstairs to the bathroom and held guns on me and my wife, right between the eyes.” The agents took computer equipment, a copy of the Inspector General complaint and a copy of a commercial pitch that Binney had written with Wiebe, Loomis, and Roark. In 2001, the N.S.A. indicated to Binney that he could pursue commercial projects based on ThinThread. He and the others thought that aspects of the software could be used to help detect Medicare fraud.

Binney professed his innocence, and he says that the agents told him, “We think you’re lying. You need to implicate someone. ” He believed that they were trying to get him to name Roark as the Times’ source. He suggested that if they were looking for criminal conspirators they should focus on Bush and Hayden for allowing warrantless surveillance. Binney recalls an agent responding that such brazen spying didn’t happen in America. Looking over the rims of his owlish glasses, Binney replied, “Oh, really?”

Roark was sleeping when the agents arrived, and didn’t hear them until “it sounded as if they were going to pull the house down, they were rattling it so badly.” They took computers and a copy of the same commercial pitch. Her son had been interested in collaborating on the venture, and he, too, became a potential target. “They believed everybody was conspiring,” Roark says. “For years, I couldn’t talk to my own son without worrying that they’d say I was trying to influence his testimony.” Although she has been fighting cancer, she has spoken with him only sparingly since the raid.

The agents seemed to think that the commercial pitch contained classified information. Roark was shaken: she and the others thought they had edited it scrupulously to insure that it did not. Agents also informed her that a few scattered papers in her old office files were classified. After the raid, she called her lawyer and asked, “If there’s a disagreement on classification, does intent mean anything?” The question goes to the heart of the Drake case.

Roark, who always considered herself “a law-and-order person,” said of the raid, “This changed my faith.” Eventually, the prosecution offered her a plea bargain, under which she would plead guilty to perjury, for ostensibly lying to the F.B.I. about press leaks. The prosecutors also wanted her to testify against Drake. Roark refused. “I’m not going to plead guilty to deliberately doing anything wrong,” she told them. “And I can’t testify against Tom because I don’t know that he did anything wrong. Whatever Tom revealed, I am sure that he did not think it was classified.” She says, “I didn’t think the system was perfect, but I thought they’d play fair with me. They didn’t. I felt it was retribution.”

Wiebe, the retired analyst, was the most surprised by the raid—he had not yet been contacted in connection with the investigation. He recalls that agents locked his two Pembroke Welsh corgis in a bathroom and commanded his daughter and his mother-in-law, who was in her bathrobe, to stay on a couch while they searched his house. He says, “I feel I’m living in the very country I worked for years to defeat: the Soviet Union. We’re turning into a police state.” Like Roark, he says of the raid, “It was retribution for our filing the Inspector General complaint.”

Under the law, such complaints are confidential, and employees who file them are supposed to be protected from retaliation. It’s unclear if the Trailblazer complaint tipped off authorities, but all four people who signed it became targets. Jesselyn Radack, of the Government Accountability Project, a whistle-blower advocacy group that has provided legal support to Drake, says of his case, “It’s the most severe form of whistle-blower retaliation I have ever seen.”

A few days after the raid, Drake met Binney and Wiebe for lunch, at a tavern in Glenelg, Maryland. “I had a pretty good idea I was next,” Drake says. But it wasn’t until the morning of November 28, 2007, that he saw armed agents streaming across his lawn. Though Drake was informed of his right to remain silent, he viewed the raid as a fresh opportunity to blow the whistle. He spent the day at his kitchen table, without a lawyer, talking. He brought up Trailblazer, but found that the investigators weren’t interested in the details of a defunct computer system, or in cost overruns, or in the constitutional conflicts posed by warrantless surveillance. Their focus was on the Times leak. He assured them that he wasn’t the source, but he confirmed his contact with the Sun, insisting that he had not relayed any classified information. He also disclosed his computer password. The agents bagged documents, computers, and books, and removed eight or ten boxes of office files from his basement. “I felt incredibly violated,” he says.

For four months, Drake continued coöperating. He admitted that he had given Gorman information that he had cut and pasted from secret documents, but stressed that he had not included anything classified. He acknowledged sending Gorman hundreds of e-mails. Then, in April, 2008, the F.B.I. told him that someone important wanted to meet with him, at a secure building in Calverton, Maryland. Drake agreed to the appointment. Soon after he showed up, he says, Steven Tyrrell, the prosecutor, walked in and told him, “You’re screwed, Mr. Drake. We have enough evidence to put you away for most of the rest of your natural life.”

Prosecutors informed Drake that they had found classified documents in the boxes in his basement—the indictment cites three—and discovered two more in his e-mail archive. They also accused him of shredding other documents, and of deleting e-mails in the months before he was raided, in an attempt to obstruct justice. Further, they said that he had lied when he told federal agents that he hadn’t given Gorman classified information.

“They had made me into an enemy of the state just by saying I was,” Drake says. The boxes in his basement contained copies of some of the less sensitive material that he had procured for the Inspector General’s Trailblazer investigation. The Inspector General’s Web site directs complainants to keep copies. Drake says that if the boxes did, in fact, contain classified documents he didn’t realize it. (The indictment emphasizes that he “willfully” retained documents.) The two documents that the government says it extracted from his e-mail archive were even less sensitive, Drake says. Both pertained to a successor to Trailblazer, code-named Turbulence. One document listed a schedule of meetings about Turbulence. It was marked “unclassified/for official use only” and posted on the N.S.A.’s internal Web site. The government has since argued that the schedule should have been classified, and that Drake should have known this. The other document, which touted the success of Turbulence, was officially declassified in July, 2010, three months after Drake was indicted. “After charging him with having this ostensibly serious classified document, the government waved a wand and decided it wasn’t so classified after all,” Radack says.

Clearly, the intelligence community hopes that the Drake case will send a message about the gravity of exposing government secrets. But Drake’s lawyer, a federal public defender named James Wyda, argued in court last spring that “there have never been two documents so benign that are the subject of this kind of prosecution against a client whose motives are as salutary as Tom’s.”

Drake insists, too, that the only computer files he destroyed were routine trash: “I held then, and I hold now, I had nothing to destroy.” Drake, who left the N.S.A. in 2008, and now works at an Apple Store outside Washington, asks, “Why didn’t I erase everything on my computer, then? I know how to do it. They found what they found.”

Not everyone familiar with Drake’s case is moved by his plight. A former federal official knowledgeable about the case says, “To his credit, he tried to raise these issues, and, to an extent, they were dealt with. But who died and left him in charge?”

In May, 2009, Tyrrell proposed a plea bargain: if Drake pleaded guilty to one count of conspiring to violate the Espionage Act and agreed to coöperate against the others, he would get a maximum of five years in prison. “They wanted me to reveal a conspiracy that didn’t exist,” Drake says. “It was all about the Times, but I had no knowledge of the leak.” Drake says that he told prosecutors, “I refuse to plea-bargain with the truth.”

That June, Drake learned that Tyrrell was leaving the government. Tyrrell was a Republican, and Drake was hopeful that a prosecutor appointed by the Obama Administration would have a different approach. But Drake was dismayed to learn that Tyrrell’s replacement, William Welch, had just been transferred from the top spot in the Justice Department’s public-integrity section, after an overzealous prosecution of Ted Stevens, the Alaska senator. A judge had thrown out Stevens’s conviction, and, at one point, had held Welch in contempt of court. (Welch declined to comment.)

In April, 2010, Welch indicted Drake, shattering his hope for a reprieve from the Obama Administration. But the prosecution’s case had shrunk dramatically from the grand conspiracy initially laid out by Tyrrell. (Welch accidentally sent the defense team an early draft of the indictment, revealing how the case had changed.) Drake was no longer charged with leaking classified documents, or with being part of a conspiracy. He is still charged with violating the Espionage Act, but now merely because of unauthorized “willful retention” of the five documents. Drake says that when he learned that, even with the reduced charges, he still faced up to thirty-five years in prison, he “was completely aghast.”

Morton Halperin, of the Open Society Institute, says that the reduced charges make the prosecution even more outlandish: “If Drake is convicted, it means the Espionage Law is an Official Secrets Act.” Because reporters often retain unauthorized defense documents, Drake’s conviction would establish a legal precedent making it possible to prosecute journalists as spies. “It poses a grave threat to the mechanism by which we learn most of what the government does,” Halperin says.

The Espionage Act has rarely been used to prosecute leakers and whistle-blowers. Drake’s case is only the fourth in which the act has been used to indict someone for mishandling classified material. “It was meant to deal with classic espionage, not publication,” Stephen Vladeck, a law professor at American University who is an expert on the statute, says.

The first attempt to apply the law to leakers was the aborted prosecution, in 1973, of Daniel Ellsberg, a researcher at the RAND Corporation who was charged with disclosing the Pentagon Papers—a damning secret history of the Vietnam War. But the case was dropped, owing, in large part, to prosecutorial misconduct. The second such effort was the case of Samuel L. Morison, a naval intelligence officer who, in 1985, was convicted for providing U.S. photographs of a Soviet ship to Jane’s Defence Weekly. Morison was later pardoned by Bill Clinton. The third case was the prosecution, in 2005, of a Defense Department official, Lawrence Franklin, and two lobbyists for the American-Israel Public Affairs Committee. Franklin pleaded guilty to a lesser charge, and the case against the lobbyists collapsed after the presiding judge insisted that prosecutors establish criminal intent. Unable to prove this, the Justice Department abandoned the case, amid criticism that the government had overreached.

Drake’s case also raises questions about double standards. In recent years, several top officials accused of similar misdeeds have not faced such serious charges. John Deutch, the former C.I.A. director, and Alberto Gonzales, the former Attorney General, both faced much less stringent punishment after taking classified documents home without authorization. In 2003, Sandy Berger, Clinton’s national-security adviser, smuggled classified documents out of a federal building, reportedly by hiding them in his pants. It was treated as a misdemeanor. His defense lawyer was Lanny Breuer—the official overseeing the prosecution of Drake.

Jack Goldsmith, a Harvard law professor who served in the Bush Justice Department, laments the lack of consistency in leak prosecutions. He notes that no investigations have been launched into the sourcing of Bob Woodward’s four most recent books, even though “they are filled with classified information that he could only have received from the top of the government.” Gabriel Schoenfeld, of the Hudson Institute, says, “The selectivity of the prosecutions here is nightmarish. It’s a broken system.”

Mark Feldstein, a professor of media and public affairs at George Washington University, warns that, if whistle-blowers and other dissenters are singled out for prosecution, “this has gigantic repercussions. You choke off the information that the public needs to judge policy.”

Few people are more disturbed about Drake’s prosecution than the others who spoke out against the N.S.A. surveillance program. In 2008, Thomas Tamm, a Justice Department lawyer, revealed that he was one of the people who leaked to the Times. He says of Obama, “It’s so disappointing from someone who was a constitutional-law professor, and who made all those campaign promises.” The Justice Department recently confirmed that it won’t pursue charges against Tamm. Speaking before Congress, Attorney General Holder explained that “there is a balancing that has to be done . . . between what our national-security interests are and what might be gained by prosecuting a particular individual.” The decision provoked strong criticism from Republicans, underscoring the political pressures that the Justice Department faces when it backs off such prosecutions. Still, Tamm questions why the Drake case is proceeding, given that Drake never revealed anything as sensitive as what appeared in the Times. “The program he talked to the Baltimore Sun about was a failure and wasted billions of dollars,” Tamm says. “It’s embarrassing to the N.S.A., but it’s not giving aid and comfort to the enemy.”

Mark Klein, the former A.T. & T. employee who exposed the telecom-company wiretaps, is also dismayed by the Drake case. “I think it’s outrageous,” he says. “The Bush people have been let off. The telecom companies got immunity. The only people Obama has prosecuted are the whistle-blowers.” ♦

http://www.newyorker.com/reporting/2011/05/23/110523fa_fact_mayer?currentPage=all

 

WikiLeaks: Texas Company Helped Pimp Little Boys To Stoned Afghan Cops

WikiLeaks: Texas Company Helped Pimp Little Boys To Stoned Afghan Cops

Another international conflict, another horrific taxpayer-funded sex scandal for DynCorp, the private security contractor tasked with training the Afghan police.

While the company is officially based in the DC area, most of its business is managed on a satellite campus at Alliance Airport north of Fort Worth. And if one of the diplomatic cables from the WikiLeaks archive is to be believed, boy howdy, are their doings in Afghanistan shady.

The Afghanistan cable (dated June 24, 2009) discusses a meeting between Afghan Interior Minister Hanif Atmar and US assistant ambassador Joseph Mussomeli. Prime among Atmar’s concerns was a party partially thrown by DynCorp for Afghan police recruits in Kunduz Province.

Many of DynCorp’s employees are ex-Green Berets and veterans of other elite units, and the company was commissioned by the US government to provide training for the Afghani police. According to most reports, over 95 percent of its $2 billion annual revenue comes from US taxpayers.

And in Kunduz province, according to the leaked cable, that money was flowing to drug dealers and pimps. Pimps of children, to be more precise. (The exact type of drug was never specified.)

Since this is Afghanistan, you probably already knew this wasn’t a kegger. Instead, this DynCorp soiree was a bacha bazi (“boy-play”) party, much like the ones uncovered earlier this year by Frontline.

For those that can’t or won’t click the link, bacha bazi is a pre-Islamic Afghan tradition that was banned by the Taliban. Bacha boys are eight- to 15-years-old. They put on make-up, tie bells to their feet and slip into scanty women’s clothing, and then, to the whine of a harmonium and wailing vocals, they dance seductively to smoky roomfuls of leering older men.

After the show is over, their services are auctioned off to the highest bidder, who will sometimes purchase a boy outright. And by services, we mean anal sex: The State Department has called bacha bazi a “widespread, culturally accepted form of male rape.” (While it may be culturally accepted, it violates both Sharia law and Afghan civil code.)

For Pashtuns in the South of Afghanistan, there is no shame in having a little boy lover; on the contrary, it is a matter of pride. Those who can afford the most attractive boy are the players in their world, the OG’s of places like Kandahar and Khost. On the Frontline video, ridiculously macho warrior guys brag about their young boyfriends utterly without shame.

So perhaps in the evil world of Realpolitik, in which there is apparently no moral compass US private contractors won’t smash to smithereens, it made sense for DynCorp to drug up some Pashtun police recruits and turn them loose on a bunch of little boys. But according to the leaked document, Atmar, the Afghani interior minister, was terrified this story would catch a reporter’s ear.

He urged the US State Department to shut down a reporter he heard was snooping around, and was horrified that a rumored videotape of the party might surface. He predicted that any story about the party would “endanger lives.” He said that his government had arrested two Afghan police and nine Afghan civilians on charges of “purchasing a service from a child” in connection with the party, but that he was worried about the image of their “foreign mentors,” by which he apparently meant DynCorp. American diplomats told him to chill. They apparently had a better handle on our media than Atmar, because when a report of the party finally did emerge, it was neutered to the point of near-falsehood.

The UK Guardian picks up the tale:

US diplomats cautioned against an “overreaction” and said that approaching the journalist involved would only make the story worse.”A widely-anticipated newspaper article on the Kunduz scandal has not appeared but, if there is too much noise that may prompt the journalist to publish,” the cable said.
The strategy appeared to work when an article was published in July by the Washington Post about the incident, which made little of the affair, saying it was an incident of “questionable management oversight” in which foreign DynCorp workers “hired a teenage boy to perform a tribal dance at a company farewell party”.

A tribal dance? Could illegal strip clubs stateside possibly try that one out? “Naw, those are not full-contact lap-dances, Mr. Vice Cop. Krystal and Lexxis are just performing an ancient Cherokee fertility dance. See those buck-skin thongs on and those feathers in their hair?”

As we mentioned, this isn’t DynCorp’s first brush with the sex-slavery game. Back in Bosnia in 1999, US policewoman Kathryn Bolkovac was fired from DynCorp after blowing the whistle on a sex-slave ring operating on one of our bases there. DynCorp’s employees were accused of raping and peddling girls as young as 12 from countries like Ukraine, Moldova and Romania. The company was forced to settle lawsuits against Bolkovac (whose story was recently told in the feature film The Whistleblower) and another man who informed authorities about DynCorp’s sex ring.

There’s your tax dollars at work, Joe Six-Pack. Maybe now you won’t get so worked up about the fact that KPFT gets about ten percent of its funding from the government and uses some of it to air Al-Jazeera.


http://blogs.houstonpress.com/hairballs/2010/12/wikileaks_texas_company_helped.php

Stratfor disputes OBL killing in Abbottabad

Stratfor disputes OBL killing in Abbottabad

ISLAMABAD – Globally recognised intelligence and forecast STRATFOR has rejected the US Central Intelligence Agency claim that the man killed in Abbottabads compound by US Naval SEALs was al-Qaeda chief Osama bin Laden. This was one of the reasons the CIA kept Pakistans premier intelligence agency Inter-Services Intelligence (ISI) in dark.

The STRATFOR says: The possibility that bin Laden was already dead and in terms of his impact on terrorist operations, he effectively was. That does not mean, however, that he was not an important ideological leader or that he was not someone the United States sought to capture or kill for his role in carrying out the most devastating terrorist attack in the US history. In its latest intelligence gathering, the STRATFOR claims that aggressive US intelligence collection efforts have come to fruition, as killing of Osama bin Laden was perhaps the top symbolic goal for the CIA and all those involved in the US covert operations. Indeed, President Obama said during his speech on May 1 that upon entering the office, he had personally instructed CIA Director Leon Panetta that killing the al-Qaeda leader was his top priority. The logistical challenges of catching a single wanted individual with Bin Laden level of resources were substantial and while 10 years, the United States was able to accomplish the objective it set out to do in October 2001.

Because of bin Ladens communications limitations, since October 2001 when he fled Tora Bora after the US invasion of Afghanistan, he has been relegated to a largely symbolic and ideological role in al-Qaeda. Accordingly, he issued audiotapes on a little more than a yearly basis, whereas before 2007 he was able to issue videotapes.

The growing infrequency and decreasing quality of his recorded messages was the most notable when al-Qaeda did not release a message marking the anniversary of 9/11 in September 2010 but later followed up with a tape on January 21, 2011.

The bottom line is that from an operational point of view, the threat posed by al-Qaeda – and the wider jihadist movement – is no different operationally after his death.

The killing of al-Qaeda leader Osama bin Laden represents possibly the biggest clandestine operations success for the United States since the capture of Khalid Sheikh Mohammed in 2003, it claimed.

The confirmation of his death is an emotional victory for the United States and could have wider effects on the geopolitics of the region, but bin Ladens death is irrelevant for al-Qaeda and the wider jihadist movement from an operational perspective.

The operation that led to bin Ladens death at a compound deep in Pakistan is among the most significant operational successes for the US intelligence in the past decade.

An important local source told this scribe: If it was not the case why all the evidences leading to the confirmation of Ladens death were eliminated. His was never subjected to postmortem. Neither the DNA was collected nor it was matched.

Another important source conceded: How come one of the wives of bin Laden, Hamal, who remained in the custody of Iranian Intelligence and hidden mole of US intelligence community made her way to Abbottabad. Hamal never appeared in public.

Hamal has deep US connections. When she traveled from Iran to Pakistan her movements were under watch and the watchers had decided Hamal to end her journey in Abbottabad, the sources added.

Senior intelligence analysts in Islamabad argue: A three trillion worth manhunt concluded very discreetly. Dead body of the ‘man killed by SEALs had no media mention as was done by the US authorities in case of Iraqs President Saddam.

After receiving this vital information, this scribe phoned a senior Pakistani journalist in Washington DC early Thursday. He did not rule out latest findings on this subject saying: Why the CIA was in hurry to remove all possible evidences of the bin Ladens killing who dominated world politics for over a decade?

The Washinton-based journalist termed the crash of US Armys Chinook helicopter and killings of over 36 US Naval SEALs as a part of the effort to finish left over evidence which could lead to facts of May 2 US action in Abbottabad.

The STRATFOR further states the primary threat is now posed by al-Qaeda franchise which can attempt to stage an attack in the United States or elsewhere in retribution for bin Ladens death, but they do not have training or capabilities for high-casualty transnational attacks.

Pakistans former spymaster Lt Gen (r) Hamid Gul told TheNation they never challenged credence of the STRATFOR. I agree with the latest intelligence gathering about May 2 operations follow up. This remains one of the reasons the CIA never informed its Pakistan counterpart ISI when it decided to kill a fake bin Laden, he said.

Revealed: The spy masters at the LSE with links to the Gaddafi regime

Revealed: The spy masters at the LSE with links to the Gaddafi regime

The board of a study centre at the London School of Economics with links to the Gaddafi regime in Libya includes no fewer than four men who have served at the highest levels of the British Intelligence community.

As well as Sir Mark Allen, former head of MI6’s Middle East desk, there are two ex-chairmen and one former member of the Joint Intelligence Committee – the top-secret Cabinet Office body which coordinates all national security assessment for ministers.

Gordon Barrass, visiting professor at the centre – known as LSE Ideas – was a member of the JIC in the last years of the Cold War and is a Soviet expert. Sir Colin Budd was chairman of the JIC in 1996-97. And between 2005 and 2007 Sir Richard Mottram was Cabinet Office permanent secretary for intelligence, security and resilience, and chairman of the JIC.


LSE Ideas is at the centre of a storm over the university’s decision to help Colonel Gaddafi seek international acceptance before the Libyan uprising and to accept enormous amounts of cash from his son Saif. Its chairman, formerly one of Tony Blair’s most senior political aides, sought yesterday to distance himself from the scandal.

Sir David Manning is the ex-ambassador to Washington who was Mr Blair’s confidant throughout the run-up to the Iraq war.

He claimed to have no more than a ‘very small association’ with the LSE, which controversially accepted a £1.5million donation from Saif a year after awarding him a questionable PhD. Asked if the LSE should have taken Saif’s cash, Sir David said: ‘It wasn’t a huge sum of money. It’s a pity probably it happened, but if you were trying to draw Libyans into the mainstream of international life then I suspect that was the motivation.’

Angry students are demanding a full-scale inquiry into the Libyan funding controversy which has heaped embarrassment on the LSE as more links emerge between the Ideas centre, the Blair government, security services and big business.

Formed three years ago, the Ideas centre had an income of just over £2.5million between 2008 and 2010, with 94 per cent coming from ‘external sources’. The LSE claims the centre – whose stated aim is ‘understanding how today’s world came into being and how it may be changed’ – has received no money from Libya.

Aside from Sir David, the Ideas advisory board members include Mr Blair’s ex-chief of staff Jonathan Powell, former Foreign Office Minister Baroness Symons – forced to stand down from Libya’s National Economic Development Board this week – and Sir Mark Allen, a former MI6 spy who played a pivotal role in bringing Blair and Colonel Gaddafi together and lobbied ministers to secure the release of the Lockerbie bomber.

Bush Insider: ‘911 Was An Inside Job’

Bush Insider: ‘911 Was An Inside Job’

Morgan O. Reynolds was a professor emeritus at Texas A&M University and former director of the Criminal Justice Center at the National Center for Policy Analysis headquartered in Dallas, TX.
He served as chief economist for the United States Department of Labor during 2001–2002, George W. Bush’s first term. In 2005, he gained public attention as the first prominent government official to publicly claim that 9/11 was an inside job, and is a member of Scholars for 9/11 Truth.
Glad to see these kind of people speaking out!

Hat tip Ats

 

The Dulce Papers Updated

The Dulce Papers Updated

by lethceb a member of aliens-ufo.com forum.

Thomas Edwin Castello is currently living in exile in a European country that, for obvious reasons cannot be named. He is living under an identity that protects his well-being and allows him to live a ‘normal’ life. I met Thomas a number of years ago and have known him by his alternate identity up until around two weeks ago. Thomas has recently been diagnosed with a terminal cancer related illness and is compiling what he calls a final document detailing his experiences as a Senior Security Technician at the Dulce underground facility in New Mexico.

Now to make it clear I have never had any interest in UFO’s etc. Thomas has filled me in on his story and asked me to post on all the major forums and contact all the key players in the field.

What he has asked me to do is gather a list of questions that people would like answering about his time at the Dulce NM base. He has already fleshed out what is currently available online. He also want to make it clear that he has made preparations for info that he ‘smuggled’ out of the base to be copied and forwarded to major media outlets in time for the start of 2010. All original recipients of the info, or in cases where they have passed away the designated secondary recipients are aware of the situation and are processing the documents as we speak.

Thomas doubts that mainstream media will take the info seriously due to the subject matter but feels its worth a shot. The information is also being compiled into PDF format for distribution on the internet. I will be responsible for the online distribution of this material. As it stands the info will not be posted to forums. It will be hosted on a private and secure server. When available, details on how to view and download the material will be made available. I would like to make it clear that this info will be freely available.

If you would like any more info please post below. Dont forget, please also post any questions for Thomas here. I will compile tem and get them to him ASAP.

Thanks for listening.

—————————————————————————————————————————————————–

Please find below two of the original Dulce base photographs. These two photos have been scanned from the originals which have caption ‘stickers’ on the corners detailing the location of each photo. The photos were then cropped and saved by myself in Photoshop CS4 ready for upload. I have hosted these temporarilly on the ImageShack hosting service but they will more than likely not be on there for long so I suggest you download them to you computers and examine them at your leisure. 

Photo #1 (above) – Caption reads ‘Naturally Formed Hallway (Section-D L3-d)‘ – This photo was taken on the North side of level 3 of the base. The caption says ‘naturally formed’ hallway but some man power went into getting it to the stage it is at in the photo. The general hallway was there originally but for it to become a usable section of level 3 there was some excavation work that took place. The hallway leads from a large storage warehouse to the mobile transportation maintenance area. This maintenance area is where the ‘golf carts’ and other means of getting around the base were serviced and maintained. It is clear to see the lighting setup in the hallway which contrary to belief was extremely primitive. You can see a ‘cattle grid’ on the floor to the right of the photo, underneath here was a large storage area (The cattle grid was actually a metal hatch that opened up to allow access). Being stored underneath the hatch were around 100 large barrels containing fuel and other liquids that powered machinery and vehicles. These storage hatches appeared all over the base. The sign above the hatch reads ‘Flammable Material’. It should be noted that this was not the main access route to the maintenance area.

 

Photo #2 (above) – Caption reads Shuttle System Station Const. (Section-D L4-4)‘ – This particular photo shows construction work on a new station/drop-off point on level 4 of the facility. you can just about see the excavated area where the access platform was to be built. Inside the tunnel you can see the tracks on the right hand side of the wall. the tracks are usually on the floor of the tunnel but when construction work takes place they can be moved up the walls and locked into position to allow easy access for workers and machinery. You may question why there is a standard looking track in the tunnel and not some electro-magnetic system, well, much of the information about the facility is false. It is true that some of the lifts and transportation devices on levels 5, 6, and 7 were powered by an electro-magnetic system but the systems on levels 1, 2, 3, and 4 were more recognisable technology. The reason for this is that there would be important visitors to the facility on a regular basis. These visitors usually had no idea about the nature of the facility and were only shown the first 2 levels. Some visitors did go down as far as level 4. Another reason is that levels 1-4 were simply not big enough to require exotic shuttle/lift systems unlike the deeper levels. That said, the shuttle/lift systems on levels 1-4 were very different to what you would see in the outside world both visually and performance wise. Another feature that you may notice on the photo is a large amount of cabling and iron support material on the right hand side. This was buried behind the tunnel wall but once this section was excavated the wiring and supports became exposed.

I appreciate the above images dont contain the most important aspects of the base but there are more to come. Hopefully they will give you a feel for the atmosphere of the facility.

If you have any questions about the first two images above please post them here.

k

Quote:

How do you enter the underground facility?

There were many ways of entering the underground facility. The most common was to be shuttled in on the underground shuttle system. There are connections to many of the major cities in the US. You simply drive to the designated building in the city as if you are going to work a nomal 9-5 job, once inside you descend below the building via a subtle access way and board the shuttle. This takes you straight into the base and no body will see you. Other ways to access the base are via farms in the local area. Many of the farmers have been paid off and the farms have been taken over by government staff. The farms are then modified to allow access to the base. The farms are still run as farms to cover up any suspicious activity. Any visitors are either personally escorted to the base or asked to meet base commanders at certain locations in discreet vehicles such as battered up 4×4′s etc. People looking for doors in the sides of mountains and grills in the ground spewing out steam are going to be sadly dissapointed. All power at the base is created using an advanced system originally created by German scientists following WW2. The system uses large hexagonal circuits containing magnets and coils to generate energy from what is essentially nothing. If you have ever heard of ‘free energy’ it is being used in many places such as this. Before this system was put in place power was generated by water from the local area.

It should be noted that many people lived in the facility and didnt need to leave for any reason. Part of the contract is that you have to be comfortable spending large (and I mean large) periods of time in the base. This eliminates any traffic going to and from the area at the beginning and end of every day.
———————————————————————————————————————————————-

Quote:

Is the story told by Phil Schneider true(the man who shot a grey) or false?

Phil was at the base between 1977 and 1979 helping out with the extension of levels 1-3. I understand he was there as a geological advisor. He basically helped to create the four caverns that were linked together. While this building work was taking place there would be daily breifings in the many ‘lecture hall’ type rooms dotted around the facility. The altercation you mention happened on level 4 of the facility. There was a breifing for the engineers scheduled in a room on level 3, the room was unavailable on the day of the meeting so they had to use a room on level 4. As the meeting progressed there was a large commotion outsite the room. A small number of Et’s working on level 4 didnt take too kindly to the two guards standing outside the lecture room holding SMG’s. To display weapons on any levels other than 1-3 (Human only levels) was seen as a threat. The guards were unaware of this due to it being need to know info. this altercation led to the death of around 12 engineers and the 2 guards. No ET’s were killed. No Black Beret’s/Delta Force were called in. Phil was in the breifing and was injured. Unfortunately his version of the altercation is false.

Thomas was responsible for the security camera system primarily. This had to be operational throughout the entire base without fail. Thomas also had extensive knowledge of the security message switching and data processing computer system configuration including micro-computers, mini-computers and large main frame computers. The micro and mini computers would be used for interfacing security devices and communication facilities.

At the time Thomas had very good IT knowledge, in this day and age the knowlege of the systems he used to work on is completely redundant although he is capable of operating a modern day PC.

1-Who killed the engineers and guards?

Every death was caused by what Thomas describes as some kind of pulse weapon. The ET’s involved were classed as scientists and were working on technology on level 4 to allow ET’s and humans to communicate more effectively. The ‘box on the chest’ weapon described by the late Phil Schneider is quite a good description of where the blast emanated from. It wasn’t a box as such, more like a belt that straps around the ET’s ‘heart’ area. on the belt is what looks like a raw circuit board. The pulse killed the engineers/guards closest to the ET that used it. The effect was weaker with distance and simply ‘knocked out’ personnel towards the rear of the room.

2-Are these Aliens savages? Are they aggressive?

The ET’s are not savages at all, Thomas mentions that he never saw an aggressive ET either. It is extremely difficult to even perceive their mood as they have literally no emotion and very little movement in their faces. The area around the eye sockets is the only part of the face that he saw move. The event that happened with the pulse weapon was put down to the ET’s feeling threatened.

3-Can they work with the Human Being in a civilized manner?

Living and working with ET’s on a daily basis at first is an extremely strange and surreal experience. Thomas mentions he never got used to walking around the base as coming into regular contact with them. He admitted that it was frightening and nightmares occurred every night. Communication with ‘grays’ is very easy but there is no ‘feeling’ in their words. What people class as greys could never fit into society.

[4-Assuming they killed the engineers and guards can we conclude these Aliens are fast to kill instead of having a civilized meeting of what was happening in the lecture room?

They are very strict and have extremely high expectations of what should take place in the facility. If a rule was broken there was no leniency. When it came to weaponry they did not want to be around guns and signs of aggression.

5-Did they try to mix sexually with the humans? If they succeeded, were any mix children in the base?

They did not try to create hybrids The humans at the base did try to create hybrids. As far as Thomas knows this line of experimentation was a failure. He didn’t see any human/alien hybrids. He did see alien/animal hybrids. There were many issues with this line of research. He regularly spoke openly with scientist with regards their projects and found that combining species is in the very early stages.

6- Did they abduct Human Beings? Took them to the base? What did they do with them?

Abductions did take place, these were all arranged. Thomas didn’t ever see subjects in the base or hear of them being taken to the base. With regards to what was being done to abducted humans, they are essentially monitoring the development of a cross section of society. They were basically doing what we do to them. We experiment on them and attempt to figure out how they came to be the way they are. Much of the testing is virus related.

7 Did they abduct Humans and take them to other worlds? Where? For what?

Thomas did not hear of this happening.

1-What other type of Aliens were in the Base?

There were simply four types of what would be classed as ‘grays’. There were no reptilians or human looking ET’s.

Gray type #1 – 3 feet tall, dark grey, extremely slight with larger than average heads.
Gray type #2 – 6 feet tall, muscular frame, light brown colour, more visual ‘personality’ than the other species.
Gray type #3 – 6 feet tall, slight frame, long features. Pure white skin with lots of boil/wart type marks.
Gray type #4 – 7+ feet tall, Unbelievably slight frame. Difficult to comprehend their look. Dark grey (almost black)

More info can be given on the above descriptions if needed. Grey type #4 looked ‘reptilian’ due to posture and ‘scaly’ skin.

2- Are they still there, and how many species; how many Aliens are in total?

As for as Thomas knows they are still there and the base is still operational. As mentioned above there are four species at the facility. From looking at the operational personnel roster on a weekly basis whilst working at the base the average number of non humans was 1700. It should be noted that this figure only covers ‘operation’ personnel. They were many at the facility that had no role there. They simply lived in caverns surrounding the local area.

3-What kind of powers they have?

Nothing out of the ordinary other than the ability to communicate by way of telepathy. Their technology is what makes them seem so far ahead of us not their physical form and biology.

4-In addition of telepathic communication, did they learn how to talk like humans?

No, they ran a trial using external voice boxes produced at the base but the sounds were unintelligible and the project was deemed a failure. A language of symbols was devised which worked well but telepathic communication was the most efficient.

1-What kind of illnesses they brought?

Various forms of flu. There may be more but Thomas was not aware of any.

2-What kind of things are they afraid of? Are they afraid to our weapons? Afraid to anything else?

They are very nervous and are constantly watching you if you walk into a room. This could be classed as suspicion. They are extremely afraid of our weapons, and feel threatened if they are around them. A non lethal weapon was developed for everyone in the base because of this.

3-Did they take a bath?

Thomas is not aware of any kind of cleaning procedures carried out by the ET’s. What the ET’s did in there living quarters was seen by only a handful of human staff at the facility.

[4-Were they able to reproduce here in Earth? Were female in the base? Were Aliens children in the base? Born in planet Earth?

They could reproduce here although it is a very artificial process along the lines of cloning. The four alien species were neither male or female. Once a ‘clone’ was produced they instantly looked ‘adult’ although they needed a large amount of mental development similar to what a child needs.

5- Any human got any of their illnesses?

The simple answer is yes. Many vaccines in circulation today originate from research into ET viruses.

6- What kind of medications they have?

Thomas does not have any information about any medication used by the ET’s.

7- Describe their body: Usual weight; Strength; Weakness?

Approx weights, same as a small child or young teenager. They have no strength at all. I will put together a more comprehensive description of all four races when I have a little more time.

1-Did they drink water or liquid?

They absorbed a solution once a day that provides them with all the elements they need to survive. This was produced in the base.

2-What type of diet they have? What do they eat or drink? Do they eat human meat, animals…?

Their diet consisted of the solution mentioned above and nothing else. I will go into more detail about the solution when time allows. It will dispel some myths about the ET’s eating humans that can be found around the web currently.

3-Do they sleep?

They rest but it would not be called sleeping, its more like being put into stasis. They can work for a week solid if they have to.

4-Have emotions? Do they cry, laugh, get depress? Do they failed and have practice the known seven sins: “Lust”, “Gluttony”, “Greed”, “Sloth”, “Wrath”, “Envy”, and “Pride”.

They simply have no emotion what so ever. To see a living creature with no expression and emotion is the weirdest experience. Employees at the facility are conditioned to be able to deal with this.

5-What kind of entertainment they engage or practice?

As far as Thomas is aware they do not need entertainment.

6- Do they have a religion? What type?

Their religious beliefs are very similar to human religions in that they believe there is one entity that can be classed as the creator.

1- What kind of tech they use? New technology? Computers, Radios, MP3, I phone?

Their technology is fantastic, I will write a post dealing with this shortly. I will cover technology in general use in today’s society that is based on ET technology.

2. Can they travel back in time? To the future?

Yes, and so can we. The way this works is unbelievably simple. Again this will be covered in the post that I will write covering their technology.

3- Do they need a vehicle to travel?

Yes they use physical vehicles to travel. More detail coming soon.

4- Are all of them have the same type of intelligence or like Humans some more advanced and educated than others?

They all have the same level of intelligence but they all specialise in certain areas similar to humans. Some are scientists, some are specialists in diplomacy, some are military orientated.

Are they good, bad, criminals… or perverse?

They are general good ‘people’. The thing that can make them seem to be bad is their complete lack of emotion and expression.

5- Do they progressively learn? Go to schools?

Yes, they are constantly learning and attend what we would call lectures. I will cover this in more detail when time allows.

6. Do they have access or communication with their planets?

They are in constant communication with their home planets as are some the human personnel at the base. More detail coming soon on this.

7- How is their society divided: Profession (Doctors, Teachers, Lawyers…)? Hierarchy? Type of Government?

Their society is similar to our in many respects in that each of them fills a role in their communities. They abide by a dictatorship government.

8- How you describe the Aliens in the base: the type of soldiers, or doctors, or politicians…or conglomerate?

Could you explain exactly what you mean by this question? Do you want to know what roles the ET’s fill in the facility?

9- What is their Agenda?

Their agenda is simply about learning and bettering their civilization. The way they go about this learning process is sometimes cause for concern. The way they go about some tasks could be considered threatening.

As you can see I was running out of time towards the end of the question so there is much detail missing. If you would like me to go into more detail on some of the questions just let me know.

Good list by the way.

 

 

Grey Alien Filmed By KGB

Grey Alien Filmed By KGB

 

Originaly uploaded by Ivan0135.

THIS VIDEO IS LEAKED FROM THE KGB TOP SECRET ARCHIVE.

Date format: YY/MM/DD Time passed: HH:MM:SS

From the first contact in 1942, a series of diplomatic visits to discuss matters of mutual concern were planned.

Under the treaty 23/04, these meetings would take place in secrecy, a limited number of special agents would escort visitors and they would only meet high ranking officers.

According to the document 072 / E, at the meeting of 1961 there was an incident involving 3 subjects due to the violation of the agreement by the officers at the military base when they discovered that their arrival was been filmed with a hidden device without their consent.

Under the treaty 23/04, the meetings would be confidential and filming or taking photographs would not be allowed.

After the incident, the treaty was revised. …

 

http://www.youtube.com/watch?v=XswfEzKE0UQ&feature=player_embedded#!

ORGANIC: Consumer Archive Articles

ORGANIC: Consumer Archive Articles

 

 

http://www.organicconsumers.org/

Obama Signed Secret Libya Order Authorizing Support For Rebels

Obama Signed Secret Libya Order Authorizing Support For Rebels

First Posted: 3/30/11 05:21 PM ET Updated: 5/30/11 06:12 AM ET

React

share this story

Get World Alerts
Submit this story

WASHINGTON (Reuters) – President Barack Obama has signed a secret order authorizing covert U.S. government support for rebel forces seeking to oust Libyan leader Muammar Gaddafi, government officials told Reuters on Wednesday.

(SCROLL DOWN FOR LIVE UPDATES)

Obama signed the order, known as a presidential “finding”, within the last two or three weeks, according to four U.S. government sources familiar with the matter.

Such findings are a principal form of presidential directive used to authorize secret operations by the Central Intelligence Agency. The CIA and the White House declined immediate comment.

News that Obama had given the authorization surfaced as the President and other U.S. and allied officials spoke openly about the possibility of sending arms supplies to Gaddafi’s opponents, who are fighting better-equipped government forces.

The United States is part of a coalition, with NATO members and some Arab states, which is conducting air strikes on Libyan government forces under a U.N. mandate aimed at protecting civilians opposing Gaddafi.

In interviews with American TV networks on Tuesday, Obama said the objective was for Gaddafi to “ultimately step down” from power. He spoke of applying “steady pressure, not only militarily but also through these other means” to force Gaddafi out.

Obama said the U.S. had not ruled out providing military hardware to rebels. “It’s fair to say that if we wanted to get weapons into Libya, we probably could. We’re looking at all our options at this point,” the President told ABC News anchor Diane Sawyer.

U.S. officials monitoring events in Libya say that at present, neither Gaddafi’s forces nor the rebels, who have asked the West for heavy weapons, appear able to make decisive gains.

While U.S. and allied airstrikes have seriously damaged Gaddafi’s military forces and disrupted his chain of command, officials say, rebel forces remain disorganized and unable to take full advantage of western military support.

SPECIFIC OPERATIONS

People familiar with U.S. intelligence procedures said that Presidential covert action “findings” are normally crafted to provide broad authorization for a range of potential U.S. government actions to support a particular covert objective.

In order for specific operations to be carried out under the provisions of such a broad authorization — for example the delivery of cash or weapons to anti-Gaddafi forces — the White House also would have to give additional “permission” allowing such activities to proceed.

Former officials say these follow-up authorizations are known in the intelligence world as “‘Mother may I’ findings.”
In 2009 Obama gave a similar authorization for the expansion of covert U.S. counter-terrorism actions by the CIA in Yemen. The White House does not normally confirm such orders have been issued.

Because U.S. and allied intelligence agencies still have many questions about the identities and leadership of anti-Gaddafi forces, any covert U.S. activities are likely to proceed cautiously until more information about the rebels can be collected and analyzed, officials said.

“The whole issue on (providing rebels with) training and equipment requires knowing who the rebels are,” said Bruce Riedel, a former senior CIA Middle East expert who has advised the Obama White House.

Riedel said that helping the rebels to organize themselves and training them how use weapons effectively would be more urgent then shipping them arms.

According to an article speculating on possible U.S. covert actions in Libya published early in March on the website of the Voice of America, the U.S. government’s broadcasting service, a covert action is “any U.S. government effort to change the economic, military, or political situation overseas in a hidden way.”

ARMS SUPPLIES

The article, by VOA intelligence correspondent Gary Thomas, said covert action “can encompass many things, including propaganda, covert funding, electoral manipulation, arming and training insurgents, and even encouraging a coup.”

U.S. officials also have said that Saudi Arabia and Qatar, whose leaders despise Gaddafi, have indicated a willingness to supply Libyan rebels with weapons.

Members of Congress have expressed anxiety about U.S. government activates in Libya. Some have recalled that weapons provided by the U.S. and Saudis to mujahedeen fighting Soviet occupation forces in Afghanistan in the 1980s later ended up in the hands of anti-American militants.

There are fears that the same thing could happen in Libya unless the U.S. is sure who it is dealing with. The chairman of the House intelligence committee, Rep. Mike Rogers, said on Wednesday he opposed supplying arms to the Libyan rebels fighting Gaddafi “at this time.”

“We need to understand more about the opposition before I would support passing out guns and advanced weapons to them,” Rogers said in a statement.

(Additional reporting by Susan Cornwell; Editing by David Storey)

Copyright 2011 Thomson Reuters. Click for Restrictions.

live blog

Oldest Newest

8:09 AM – 04/02/2011

Deaths In Misrata

BreakingNews @ BreakingNews : Anti-Gadhafi fighters in Misurata say 28 people had died in the city in the past three days – Al Jazeera http://bit.ly/ecR130
4:10 AM – 04/02/2011

Wife Of Former Foreign Minister Who Defected Reportedly Seized

Gaddafi forces have reportedly captured the wife of Moussa Koussa, the former Foreign Minister who defected while in England. Reports the Telegraph:

The wife of the Libyan foreign minister who defected to Britain earlier this week has been seized by Colonel Gaddafi and is being interrogated by his “internal security” officials, The Daily Telegraph can disclose.She is thought to have been captured amid eyewitness reports of a fierce gunfight at Col Gaddafi’s central Tripoli compound as the regime stepped in to stop further defections.

Yesterday, local residents recalled how the most fierce firefight yet seen in central Tripoli had erupted within hours of the regime confirming that the Foreign Minister had defected.

Read the entire report here.

4:06 AM – 04/02/2011

U.S. Military Combat Missions To End

NBC’s Ann Curry tweets that the U.S. will move to support missions only:

AnnCurry @ AnnCurry : NBCNews: US military will stop flying COMBAT missions over Libya, only SUPPORT missions incl reconnaissance, starting April 2.
3:31 AM – 04/02/2011

Gaddafi Wants Talks To ‘Stop The Killing’

Channel Four correspondent Jonathan Rugman spoke with Libya’s former Prime Minister Abdul Ati al-Obeidi, who said that Gaddafi is trying to set up talks to stop the killing. During the interview, Obeidi told Rugman, “We are trying to talk to the British, the French and the Americans to stop the killing of people. We are trying to find a mutual solution.”

Watch a report from Channel Four on the Libya talks below:

3:21 AM – 04/02/2011

Fact Check: Senate Did Approve No Fly Zone

Despite complaints to the contrary, the U.S. Senate actually did support a no-fly zone over Libya. The AP reports:

Some lawmakers are grousing loudly that President Barack Obama sent the nation’s military to Libya without Congress’ blessing. They’re ignoring a key fact: The Senate a month ago voted to support imposing a no-fly zone to protect civilians from attacks by Col. Moammar Gadhafi’s forces.

With no objections, the Senate on March 1 backed a resolution strongly condemning “the gross and systematic violations of human rights in Libya” and urging the U.N. Security Council to take action, “including the possible imposition of a no-fly zone over Libyan territory.”

There was no recorded vote. It was simply approved by unanimous consent.

1:18 AM – 04/02/2011

Government Rejects Rebels’ Ceasefire

Reuters reports:

Reuters @ Reuters : FLASH: Libyan government rejects rebels’ conditions for ceasefire, says troops will not leave Libyan cities

Reuters adds:

“They are asking us to withdraw from our own cities. …. If this is not mad then I don’t know what this is. We will not leave out cities,” said Mussa Ibrahim, the government spokesman.

Read more here.

0:32 AM – 04/02/2011

‘Don’t Arm The Rebels, Train Them’

Robert Haddick, writing at Foreign Policy, argues that the rebels need combat skills much more than they need heavy artillery. He writes:

On March 30, it was reported that CIA officers were in Libya with the rebels, making an assessment of their situation and possibly directing airstrikes in support of their fighters. We can gather from open sources much of what these intelligence officers are likely to report. As a military force, Libya’s rebels are a disorganized rabble and seem incapable of preparing and holding defensive positions or maneuvering effectively against rudimentary enemy resistance. The rebels need boot camp, fundamental infantry training, and the development of some battlefield leaders, not a new stockpile of weapons.Those Western leaders whose plan currently consists of hoping that Qaddafi will be spontaneously overthrown need to think again. Absent a Western invasion of the country, the rebel force is the only means of removing Qaddafi, and the rebels will need many months or even years of training before they are capable of defeating loyalist ground units and marching all the way to Tripoli.

Read the entire piece here.

0:29 AM – 04/02/2011

Gunfire In Gaddafi’s Compound

Gunfire has been reported in Gaddafi’s compound. Reuters reports:

Sustained gunfire rang out near Libyan leader Muammar Gaddafi’s heavily fortified compound in Tripoli on Friday and residents said they saw snipers on rooftops and pools of blood on the streets.

It was not clear what triggered long bursts of machinegun and automatic gunfire that echoed around the city center for about 20 minutes and stopped before dawn.

Cars were heard speeding along central Tripoli streets, their tires screeching on the asphalt. Distant shouting or chanting also was heard.

9:32 PM – 04/01/2011

Journalist Describes His Ordeal In Libya

A journalist who was picked up by Libyan security details his ordeal. Here’s an excerpt of his story from Reuters:

We sat quietly. I turned to Chris, a London-based Canadian I had worked with in Iraq. I said I thought they would kill us.

A soldier opened the lock and the rear door swung open again. We looked down at the back of a station wagon which had been opened up to reveal some blankets. I thought they would perhaps drive us away. Maybe they were going to free us?

But a closer look showed feet poking under the blankets.

Soldiers then pulled aside the coverings and hauled three handcuffed young men up and in beside us. When we were locked in again, they told us they were Libyan university students.

Later, several soldiers came in. “Who are you?” one asked me. We are Reuters journalists, I said. He is our driver. We have permission. We were invited here by your government.

The soldier shook his head. “Bad time to be a journalist in Libya.” Reporters were part of a foreign conspiracy against Libya, he said. But then he made it clear that if they decided we were not journalists but spies, that would be worse.

“If you tell us the truth, it should be fine, God willing. But if we catch you lying, oh we will show no mercy. None.”

Read the rest here.

9:07 PM – 04/01/2011

Rebels Make Oil Deal With Qatar

Libyan rebels have made a deal to sell oil to Qatar. Reports the AP:

A plan to sell rebel-held oil to buy weapons and other supplies has been reached with Qatar, a rebel official said Friday, in another sign of deepening aid for Libya’s opposition by the wealthy Gulf state after sending warplanes to help confront Moammar Gadhafi’s forces.

It was not immediately clear when the possible oil sales could begin or how the arms would reach the rebel factions, but any potential revenue stream would be a significant lifeline for the militias and military defectors battling Gadhafi’s superior forces.

7:26 PM – 04/01/2011

Gaddafi Forces Attack Homes In Misrata

Gaddafi forces are attacking home in Misrata, according to rebels. Reuters reports:

Forces loyal to Libyan leader Muammar Gaddafi are mounting an intense artillery bombardment of rebel-held Misrata and pro-Gaddafi troops are attacking shops and homes in the city center, a rebel spokesman said.

Misrata is the last big rebel stronghold in western Libya but after weeks of shelling and encirclement, government forces appear to be gradually loosening the rebels’ hold on the city, despite Western air strikes on pro-Gaddafi targets there.

6:22 PM – 04/01/2011

Libyan Opposition Set Conditions For Cease-Fire

The Associated Press reports:

Libya’s rebels will agree to a cease-fire if Moammar Gadhafi pulls his military forces out of cities and allows peaceful protests against his regime, an opposition leader said Friday.Mustafa Abdul-Jalil, head of the opposition’s interim governing council based in Benghazi, said the rebels’ condition for a cease-fire is “that the Gadhafi brigades and forces withdraw from inside and outside Libyan cities to give freedom to the Libyan people to choose and the world will see that they will choose freedom.”

Read more here.

6:11 PM – 04/01/2011

Rebels Move On Oil Town

Libyan rebels moved towards the key oil town of Brega on Friday, as conditions drifted towards a stalemate. Reuters reports:

Libyan rebels moved heavier weaponry toward the oil town of Brega on Friday and sought to marshal rag-tag units into a more disciplined force to regain momentum against Muammar Gaddafi’s regular army.

While military action appeared to drift toward stalemate, coalition diplomatic efforts focused on breaking Gaddafi’s hold on power in Tripoli. London urged Gaddafi loyalists to abandon him, following the defection of Foreign Minister Moussa Koussa.

Rebels said neither side could claim control of Brega, one of a string of oil towns along the Mediterranean coast that have been taken and retaken several times by each side in recent weeks. The insurgents have failed to hold gains, even when helped by Western air strikes.

12:47 PM – 04/01/2011

German Foreign Minister Calls For Libya Cease-Fire

From Al Jazeera:

German Foreign Minister Guido Westerwelle says Libya’s crisis cannot be resolved through military means and all sides must get to work on a political resolution.Westerwelle said on a visit to China that a first step must be a cease-fire that is heeded by Gaddafi.

More details here.

4:05 AM – 04/01/2011

Senators Kerry And McCain Draft Legislation Authorizing Use Of Force In Libya

BBC News reports that U.S. senators are drafting legislation that would authorize the use of force in Libya. The senators include John Kerry and John McCain.

The 1973 War Powers Act says US armed forces must start to withdraw after 60 days unless explicitly authorised to fight by Congress. In the case of Libya, that mark would fall on 20 May, Mr Kerry said.

More here.

3:44 AM – 04/01/2011

Is Involvement In Libya A Slippery Slope?

The National Journal reports that the U.S. may be on a slippery slope when it comes to the Libyan mission:

It’s an old question, but we’ve been through enough of these interventions now –from Vietnam to Kosovo to Afghanistan–to insist on asking it once again: Is the United States on a slippery slope in Libya, one that will lead to American military involvement on the ground? The evidence, on balance, is that under President Obama the U.S. presence is going to expand quickly—but covertly.

Read the full article here.

3:36 AM – 04/01/2011

Libyan Oil Official Denies Reports That He Fled The Country

Reuters reports that Libya’s top oil official, Shokri Ghanem, has denied rumors that he left the country.

Al Jazeera television listed Ghanem as one the figures who had left Libya, but Ghanem said in a phone call, “This is not true, I am in my office and I will be on TV in a few minutes.”

More here.

3:17 AM – 04/01/2011

London Mayor: We May Be Inadvertently ‘Entrenching Support For The Mad Colonel’

BBC News reports that London Mayor Boris Johnson, a Conservative, offers his concerns about involvement in Libya:

“I am worried that what we may be doing inadvertently is entrenching support for the mad colonel… I do worry that if we get into a stalemate, if the rebels don’t seem to be making the progress we hope they would make, then we should be brave enough to say to ourselves our policy isn’t working.”

More here.

3:05 AM – 04/01/2011

Second Top Libyan Official Defects, Government Cracks Down To Prevent Officials From Leaving

The New York Times reports that as a second top Libyan official, Ali Abdussalam el-Treki, defects from the Gaddafi government, fears mount within the regime.

The capital of Tripoli was alive with rumored defections on Thursday, with the prime minister and the speaker of Parliament, among other top figures, said at various times to be quitting the country. None of those reports could be verified. But the authorities were taking no chances, assigning guards to senior officials to assure they cannot leave, a former Libyan official said.

More here.

3:00 AM – 04/01/2011

U.S. Admiral Claims Bad Weather Hampered Air Strikes

BBC News reports that, according to U.S. Admiral Mike Mullen, international air strikes have been hampered by bad weather over the past few days.

According to AFP, Mullen says that they have not been able to see through the weather to identify targets. “And that has more than anything else reduced the impact… reduced the effectiveness, and has allowed the regime forces to move back to the east.”

More here.

2:46 AM – 04/01/2011

WATCH: At Least Four Senior Figures Reportedly Plan To Defect From Gaddafi Gov’t

Al Jazeera reporter Anita McNaught discusses the defections in Libya:

“We got word from sources outside of Tripoli that there were at least four senior figures from the Gadaffi administration who were perhaps in Tunisia, or certainly outside the country and not intending to go home. These were, last night as we understood it, the current head of the Intelligence Service, the Oil Minister (and I’ll mark a question mark with that in a minute), the Secretary of the General People’s Congress, and the Deputy Foreign Minister.”

 

2:35 AM – 04/01/2011

Libyan TV: Pro-Gaddafi Protestor Threatens To Become An ‘Explosive Bomb’

BBC News reports on apparent threats in London by a pro-Gaddafi protestor:

Libyan state television has broadcast footage showing a pro-Gaddafi protestor in London yanking open his jacket and vowing to turn himself an “explosive bomb”, a video on YouTube shows. The incident is said to have occurred at the protest near the Foreign Office in Whitehall on 29 March. In the clip, which has been circulated widely on social media, the man refers to anti-Gaddafi protestors as “traitors and rats”, and exhorts Libyans to “return to the Koran.”

More here.

2:29 AM – 04/01/2011

Senior Aide To Gaddafi’s Son Travels To London, Possibly Seeking Exit Strategy

The Guardian reports that Mohammed Ismail, a senior aide to Gaddafi’s son Saif al-Islam, has traveled to London for confidential talks with British officials.

It is suggested that the regime may be looking for an exit strategy. There is speculation that Gaddafi’s sons, namely Saif al-Islam, Saadi and Mutassim, are looking for a way out.

Although he has little public profile in either Libya or internationally, Ismail is recognised by diplomats as being a key fixer and representative for Saif al-Islam.According to cables published by WikiLeaks, Ismail has represented the Libyan government in arms purchase negotiations and acted as an interlocutor on military and political issues.

“The message that was delivered to him is that Gaddafi has to go and that there will be accountability for crimes committed at the international criminal court,” a Foreign Office spokesman told the Guardian , declining to elaborate on what else may have been discussed.

More here.

2:20 AM – 04/01/2011

Nation Of Islam Minister Defends Gaddafi

The Associated Press/Huffington Post report:

Nation of Islam Minister Louis Farrakhan continued his defense of embattled Libyan strongman Moammar Gaddafi during a press conference in Chicago Thursday, and slammed the United States’ decision to get involved in the conflict.

The 78-year-old leader of the Chicago-based organization spoke at Mosque Maryam, the Nation of Islam headquarters, according to the Chicago Tribune.

“It is a terrible thing for me to hear my brother called all these ugly and filthy names when I can’t recognize him as that,” Farrakhan said of Gaddafi, according to the Tribune. “Even though the current tide is moving against him … how can I refuse to raise my voice in his defense? Why would I back down from those who have given so much.”

Farrakhan has publicly defended Gaddafi a number of times since the Libyan uprising began. He reportedly visited the Libyan leader in the 1980s, and told attendees of a Nation of Islam convention in February that the United States should stay out of Libya’s affairs.

Full report here.

1:33 AM – 04/01/2011

More Possible Defections?

Breaking News reports on Twitter that according to the UK Independent, Britain is in talks with ten more Gaddafi officials about possible defection.

0:20 AM – 04/01/2011

Tripoli Witness: Iman al Obeidi ‘Is Not The First Case Of Rape’

BBC News provides the account of a witness in Tripoli.

According to the witness, any anti-government dissidents who spoke out publicly were deemed by officials as mentally ill and thus detained indefinitely. Because of this, the witness is not surprised that Iman al-Obeidi was immediately described as mentally ill last week.

She is not the first case of rape we have heard of here.I have heard of two other cases in recent weeks. One of them was of a Moroccan housekeeper who was left behind by her employers as they fled to a safe house because half their family members had been detained.

The story that circulated through word-of-mouth was that security forces stormed the house she was staying in with the intention of detaining the rest of the family. Finding her alone there instead, they raped her.

Read the full account here.

11:49 PM – 03/31/2011

Libyan Diplomat: Most High-Ranking Officials Are Trying To Defect But Struggle To Leave

AP reports:

A top Libyan diplomat now supporting the opposition says most high-rank Libyan officials are trying to defect but are under tight security and having difficulty leaving the country.

Ibrahim Dabbashi, Libya’s deputy U.N. ambassador, told The Associated Press on Thursday that Libya’s U.N. Mission, which now totally supports the opposition, knew two days in advance that Foreign Minister Moussa Koussa planned to defect.

“This is a big blow to the regime,” Dabbashi said.

He said the mission had been waiting for about 10 days for Ali Abdessalam Treki, a former foreign minister and U.N. General Assembly president named by Moammar Gadhafi to be the new U.N. ambassador, to defect. Treki announced his defection Thursday in Cairo.

More here.

11:35 PM – 03/31/2011

Transitional Council: Fully Committed To Resolutions On Al-Qaeda Sanctions

Libya’s Transitional National Council has released a statement on counter-terrorism. The council says that it condemns and will combat all forms of terrorism.

Regarding al-Qaeda, the council states:

It emphasizes also its full commitment to the implementation of the relevant Security Council resolutions on Counter-Terrorism, including the resolutions on the Sanctions concerning al-Qaeda and Taliban, with the full commitment to all measures and sanctions concerning any individual or entity associated with al-Qaeda and Taliban as determined by the Sanctions Committee.

The council pledges to help the United Nations and cooperate with it’s counter-terrorism task forces.

Read the full statement here.

11:18 PM – 03/31/2011

Why Gaddafi’s Hometown Matters In The Fight For Libya

HuffPost’s Saki Knafo reports:

Earlier this week, rebel forces in Libya fought their way to the outskirts of Sirte, a seafront city about the size of Tallahassee. The day before, pushing westward along the coast from Ajdabiya, they’d recaptured the oil towns of Brega and Ras Lanuf — Sirte, experts said, was the last major obstacle standing in the rebels’ path to the capital city of Tripoli.

Sirte. Before Sunday, few outside Libya had heard of it. Now it’s being portrayed as the key to Libya’s hopes for democracy, the fulcrum on which the nation’s fate would turn. Its importance can be explained partly by location, its proximity to the capital. But it mattered for other reasons, too, reasons that reveal a lot about a conflict with complexities outsiders are only beginning to grasp.

Read the full story here.

11:13 PM – 03/31/2011

Moussa Koussa Was Reportedly Not Offered Immunity, ICC Listed Him Second In Controlling Forces

According to The New York Times, U.K. Foreign Secretary William Hague denies that Moussa Koussa was offered any immunity to lure him to leave Gaddafi’s regime. Hague reports that he is voluntarily speaking with British officials.

The prosecutor of the International Criminal Court, Luis Moreno-Ocampo, said on March 3 that he would investigate “alleged crimes against humanity committed in Libya since 15 February, as peaceful demonstrators were attacked by security forces.” He placed Mr. Koussa second after Colonel Qaddafi on a list of “some individuals with formal or de facto authority, who commanded and had control over the forces that allegedly committed the crimes.”

http://www.huffingtonpost.com/2011/03/30/obama–secret-order-libya-signed-rebel-support_n_842734.html

 

 

Wikileaks : the Magus in deep black

Wikileaks : the Magus in deep black

This recent dialog between Iranian Presidential Advisor Esfandiar Rahim Mashai and Spiegel Online is interesting in that it highlights the nuances behind the release of the cables and how governments use various tactics to spin the fall-out in ways they find advantageous at least on the surface.

Take the following scenario for example. You have a private Bradley Manning, an intelligence analyst, who obtains access to 250,000 cables specifically according to Wikipedia ..”In online discussions with Adrian Lamo, Manning claimed responsibility for leaking the “Collateral Murder” video, a video of the Granai airstrike and approximately 250,000 individual cables, to the whistleblower website Wikileaks.[5][6]”

And then, according to Wikipedia, …”Manning was arrested by agents of the U.S. Army Criminal Investigation Command in May 2010 and held in pre-trial confinement in a military jail at Camp Arifjan in Kuwait.[1][2][3] On July 5, 2010, two misconduct charges were brought against him for “transferring classified data onto his personal computer and adding unauthorized software to a classified computer system” and “communicating, transmitting and delivering national defense information to an unauthorized source”.[2][7] The charges included unauthorized access to Secret Internet Protocol routers network computers, download of more than 150,000 United States Department of State diplomatic cables, download of a classified PowerPoint presentation, and downloading a classified video of a military operation in Baghdad on July 12, 2007. Manning is also charged for forwarding the video and at least one of the cables to an unauthorized person.[15] The maximum jail sentence is 52 years.[1]”] (footnotes can be found in Wikipedia article not here).

Adrian Lamo, is apparently the informant who notified the Army Criminal Investigation Command of Bradley’s admissions. This information was published by Wired Magazine back in June in this article http://www.wired.com/threatlevel/2010/06/leak/

According to the Wired June article ..”Manning was turned in late last month by a former computer hacker with whom he spoke online. In the course of their chats, Manning took credit for leaking a headline-making video of a helicopter attack that Wikileaks posted online in April. The video showed a deadly 2007 U.S. helicopter air strike in Baghdad that claimed the lives of several innocent civilians.”

“He said he also leaked three other items to Wikileaks: a separate video showing the notorious 2009 Garani air strike in Afghanistan that Wikileaks has previously acknowledged is in its possession; a classified Army document evaluating Wikileaks as a security threat, which the site posted in March; and a previously unreported breach consisting of 260,000 classified U.S. diplomatic cables that Manning described as exposing “almost criminal political back dealings.”

So what we have is a “former hacker” turning in his online friend to the Army… The question is, where in this interaction, did the U.S. become aware of what Bradley Manning was doing and whether the convenience of the open admissions with a former hacker would not have been completely surveilled well in advance by Echelon giving the PTB every chance to make sure that this caper on the part of Manning succeeded or failed and just how easily they allowed him access to this material… with perhaps the intention that if leaked… they would be able to make use of this misbehavior to their own ends.

To make this clearer I would urge everyone to again view the recently cancelled TV series “Rubicon” for an interesting correlation whereby you have intelligence analysts who have early access to information… being given free reign by the PTB in order to manipulate them into releasing this info or thinking they were getting away with something only to find that in doing so they were actually conveniently fulfilling the ultimate plans of the very people they attempted to expose.

This is not out of the question. Here, in this situation, you have a heroic young intelligence analyst, Manning. And you have a “former hacker”, Adrian, who befriends him online (it is not clear whether they had met in person). This much is clear. That the hacker would know full well that their dialog and Bradley’s admission of guilt would be being recorded as are all online conversations, written or verbal, by Echelon or whatever surveillance system you prefer by whatever name, and that therefore it is highly possible, in that this former hacker, Adrian, in not warning Bradley that their conversation would be surveilled, was already in the employ of the PTB.

Further, this scenario lends itself to a perfect sting operation. And that in releasing the aforementioned trove of info that a sort of global information firestorm would be unleashed. Wikileaks is only peripheral to this mix. The real objective, may have been quite different. That is, the PTB knowing they have on their hands a rebel analyst, use this to their own ends in allowing him to gain access to damaging material and go so far, because it suits their ultimate purpose.

So what then, one must ask, is their ultimate end here? This is where it becomes more convoluted because the PTB are not a united front. In this case it may be that certain high level interest groups, be they the Joint Chiefs or the Pentagon or the CIA have a vested interest in these releases because overall, the damage done is more slanted one way than another. And the tipping point is that somewhere in these leaks is an agenda that steers the ship of states (that is, countries) more in the preferred direction.

Certain people may lose others may gain, maybe Hilary Clinton, maybe a delicate balance of power concerning China and Taiwan or North Korea or India… Without the release of all of the cables, it’s impossible to judge cui bono (who benefits). But it is entirely possible that some group, maybe a rebel faction of the Joint Chiefs or maybe some element of the Rothschilds vs the Rockefellers…. But it is clear that one side or another will come out of this diplomatic debacle much better off… than another.

So this is what the Iranian presidential advisor is alluding to. However, in his facile statements and lavish assurances of how “forgiving” Iran is of its neighbors and how there is nothing whatsoever to be “afraid of” in regard to their nuclear ambitions, or the supposed lack thereof… This much is obvious, he is playing politics the Middle Eastern way. Soothing ruffled feathers with smooth talk and at the same time noting with the keen eye of a well schooled observer that very little gets by the surveillance of governments these days, unless they allow it to. And this is at the root of the problem.

Because, as Mark Klein, the whistle blower from AT&T, who found out that the government was surveilling all citizens communications 5 years ago and reported this. Listen to his story here: http://thestory.org/archive/the_story_120910_full_show.mp3

All you have to do is extrapolate from this to the massive Cray computers underground in Colorado and you have just the edge of the iceberg that is worldwide in reach. From what our whistleblowers say, very little goes without being recorded… especially when it involves individuals who work for the government, the military or are known hackers or other activists, such as this writer.

With that in mind, one cannot take the Wikileaks as a simple straight-forward release of source to Wikileaks of information. This release has to be mitigated by the goings on that led to the release prior to when it ever landed on the doorstep, metaphorically speaking… of Wikileaks.

Now, is Wikileaks also part of this sting operation? Very likely. But this is all in a days work when you are a website for whistleblowers. As we at Project Camelot know. It is naive to think that anything we receive is not, at some level, allowed to happen. None of this discounts the acts of valor that are at the root of any real release of information that reveals the reality behind the matrix. On the contrary, the individuals who take real action, the Bradley Mannings, Julian Assanges and all the other whistleblowers who risk their lives and the lives of their loved ones to reveal the truth are the heroes out of this scenario.

But those behind the scenes in this surveillance society, the ones who call themselves Magus, who manipulate the effects of the truly courageous actions of the bright stars, diamonds in the rough, under their Control, cannot be ignored. It is necessary that we go deeper into the black, what some would call, above black, to discover the real war being fought. And then, to reveal those manipulators and what is behind their actions. Because only then do we begin to tap into the controllers behind the Controllers. And find out perhaps, who is fighting the good fight for us, or against us. Because there is a hidden side, working above black, for the light. We may not recognize them, they are too hidden, too deep in the black, for us to know just who they are. But they are there. And we can acknowledge them here, at least.
The only way we can find out whether it is they or the truly black-souled group who are the victors in this recent release, remains to be seen. But I caution everyone who is involved in this drama, actor or observer, to watch carefully and at the end of the day, when all the cables are out… ask one question, who benefits?

WikiLeaks Set To Reveal US-UFO War In Southern Ocean

WikiLeaks Set To Reveal US-UFO War In Southern Ocean

Update January 12, 2011: First WikiLeaks’ Cable Mentioning UFOs Released

A new report circulating in the Kremlin today prepared for President Medvedev by Russian Space Forces (VKS) 45th Division of Space Control says that an upcoming WikiLeaks release of secret US cables details that the Americans have been “engaged” since 2004 in a “war” against UFO’s based on or near the Continent of Antarctica, particularly the Southern Ocean.

According to this report, the United States went to its highest alert level on June 10, 2004 after a massive fleet of UFO’s “suddenly emerged” from the Southern Ocean and approached Guadalajara, Mexico barely 1,600 kilometers (1,000 miles) from the American border. Prior to reaching the US border, however, this massive UFO fleet is said in this report to have “dimensionally returned” to their Southern Ocean “home base”.

The fears of the Americans regarding these Southern Ocean UFO’s began, this report says, during the unprecedented events of July 11, 1991 (referred to as 7/11) when during the Solar Eclipse these mysterious aircraft appeared by the hundreds over nearly all of Mexico, even their Capital city. Most notable about the events of 7/11 were that as millions of Mexicans were watching on their televisions the National broadcasts of these UFO’s over Mexico City, the American media refused to allow their people to view it.

Since 2004, this report continues, fleets of Southern Ocean UFO’s have continued to emerge from their bases, with the latest such event being this Friday past when another of their massive fleets was sighted over the South American Nation of Chile.

The “immediate danger” to our World when these massive UFO fleets emerge from the Southern Ocean, this report warns, are the massive waves caused by their sudden eruption from what are believed to be their underwater base, or bases. In the past week alone, the Clelia II, an Antarctic cruise ship with 160 people onboard, was nearly capsized when hit by waves generated by these UFO’s emerging from the Southern Ocean, and just today the Number One Insung has been reported sunk with only 20 of its 42 member crew said saved due to the same cause.

Interesting to note in this report is its confirming our October 14th report US Shuts Down New York City Airspace Over UFO ‘Threat’ that these same Southern Ocean UFO’s were responsible for the closing of the airspace over New York City this past fall (October 13th) when they “appeared” openly and were witnessed by tens of thousands of people, and which, coincidentally, occurred during the same time frame as the mysterious Crystal Skulls of the ancient South American peoples were being exhibited there too.

Even more interesting to note is that the mysterious earthquakes being reported in the Gulf of Aden (where another “extraterrestrial” event is currently ongoing and we had reported on in our December 1st report Mysterious ‘Vortex’ Warned Is Creating Global Weather Catastrophe) are now being reported occurring in the Southern Ocean too.

This report goes on to state that after WikiLeaks founder Julian Assange warned last week that he would begin releasing secret US cables relating to these Southern Ocean UFO’s, and the Americans “war” against them, he was immediately arrested by British Police on trumped up charges issued by the Swedish government which in our December 8th report, Global Rebellion Erupts After “Unprotected Sex Meets Disrobed Governments”, we noted were engineered against him as a “classic” CIA “Honey Trap”.

Note: Since our last report on the EU-US frame-up of Assange it is now being reported that one of his two accusers, Anna Ardin, has fled Sweden and is now in hiding in the Palestinian territories.

To if Assange, or his WikiLeaks website, will survive to see the whole release of these Southern Ocean UFO files it is not to our knowing, nor does this report say.

What is in our knowing, however, and when coupled with the information we reported on in our December 10th report Massive Earthquake Fears Rise After Mysterious Object Moves Nearer To Earth, suggests that the timing of these events, as we near the December 20/21 Total Lunar Eclipse, and as Mercury turns retrograde and joins Mars as it forms a conjunction with Pluto, that the ending of this year, 2010, truly marks the ending of this age as prophesied by the ancients.

In the Sorcha Faal’s seminal work published in 2007, Battle Begins For Throne of This World: The Return of the Einherjar Warriors, she notes that in these “last days” the “guideposts” to what the future will hold for humanity does, indeed, rest hidden to the discerning reader in the words handed down to us by the ancients, none being more important in this case than those of Nostradamus, who in writing of this coming Lunar Eclipse and feared conjunctions warned:

“The arms to fight in the sky a long time,

The tree in the middle of the city fallen:

Sacred bough clipped, steel, in the face of the firebrand,

Then the Monarch of Adria fallen.” Quatrain 3:11

Most ominously for our World today, “the tree in the middle of the city” has, indeed, “fallen” with news from Glastonbury that the 2,000-year-old Holy Thorn Tree, one of Christianities oldest and most revered symbols, has been cut down by vandals. With the great tree now “fallen”, the battle for this Earth now moves to the “sky” until the “Monarch of Adria” (Pope Benedict XVI) has “fallen” too.

http://www.eutimes.net/2010/12/wikileaks-set-to-reveal-us-ufo-war-in-southern-ocean/