How Israel’s “Smart” Weapons Killed a Disabled Gaza Teen

How Israel’s “Smart” Weapons Killed a Disabled Gaza Teen

Israel’s “Smart” Weapons Kill Sabah Abu Jayab, known to her family and friends as Um Ahmad, walked through her home pointing out everything that had to be replaced after Israel’s 2014 assault on the besieged Gaza Strip.

“This is all new,” Um Ahmad, a pharmacist, told The Electronic Intifada. She motioned to a balcony equipped with freshly painted walls and new windowsills. Moving to the living room, she said: “These couches, the chairs over there — all of it is new. We had to replace everything.”

Her home, where she lived with her husband and eight children, was hit by four missiles fired by an Israeli drone during the first week of the Israeli attack. “Only two of them exploded,” she said. “If the others had blown up, we’d have all died.”

Not everyone survived. Her eighteen-year-old daughter Amal, who was disabled and unable to walk, died on 17 July, four days after their house was struck.

“She wasn’t hit by the rocket or debris,” Um Ahmad explained, “but she inhaled a lot of smoke and dust.”

Amal was one of an estimated 2,257 Palestinians killed — including 563 children and 306 women — during Israel’s seven-week attack, according to the United Nations monitoring group OCHA.

“They were all scared”

On 13 July, as missiles pounded their neighbors’ homes during an intensified attack on the Deir al-Balah area in central Gaza, Um Ahmad moved all the children into one room in the back of their house.

“It was hard to explain to them what was happening and they were all scared,” she said, explaining that Amal’s three sisters are also disabled and unable to walk due to genetic birth defects.

“There had been no electricity or water for days, and the little ones would jump every time they heard an explosion,” she said.

Um Ahmad explained that they tried to stay in their home because they had nowhere else to go. “It was hard on the little ones,” she said. “We knew at any minute we could be hit [by an Israeli strike] like our neighbors.”

Muhammad Abu Jayab, 11, stands on the roof of his home. His neighbor’s destroyed house is in the background.

(Patrick O. Strickland)

Um Ahmad had to go to her pharmacy to provide medicine for local residents with chronic illnesses and others who had been injured by Israel’s assault. “There was no way I could not show up to work,” she explained. “People with diabetes needed insulin even during times of war [and] others who were hurt needed antibiotics and other medicine.”

The Abu Jayab family home was hit on 13 July. “We had to carry the four children who don’t walk,” she said. “We took Amal to the hospital because she was in shock and having trouble breathing. They put her on oxygen, but her vital signs seemed fine and she didn’t have any external bodily injuries.” Israel’s “Smart” Weapons Kill

Targeting the ill

Amal was unable to eat or speak after the attack and Um Ahmad spent the last four days of her daughter’s life going back and forth between the hospital and the pharmacy where she works. “I showed up that last day and she was dead,” she recounted as she fought back tears.

Israel targeted a medical facility for the disabled on 12 July, the day before the Abu Jayab home was struck. At least four persons were killed and dozens injured when bombs crushed the Mabaret Palestine Society, a center for people with disabilities, in Beit Lahiya, a town in northern Gaza.

On 21 July, Israeli tanks shelled the al-Aqsa hospital in Deir al-Balah, killing three people and injuring forty more, the human rights group Al-Haq reported.

Israel bombed the al-Wafa hospital in the Shujaiya neighborhood of Gaza Citytwo days later, on 23 July.

Doctors were forced to evacuate at least fourteen patients who were paralyzed or in a coma at the time, Ma’an News Agency reported.

The Israeli army claimed that Palestinian armed groups used the hospital as a base. However it was revealed that Israel used fabricated satellite imagesto “justify” its bombing of al-Wafa.

Ashraf al-Qidra, a spokesperson for Gaza’s health ministry, said that Israel targeted medical facilities and health workers alike. In addition to the hospitals and clinics, three dozen ambulances were destroyed, he told The Electronic Intifada.

“Israel turned medical centers into unprotected zones, although they are supposed to be protected by international law,” al-Qidra said. “Patients and workers had to always worry whether Israel would target the buildings they were in.”

Al-Qidra added that the medical centers were destroyed or damaged by warplanes, drone strikes and tank shelling alike.

Back in her home, Um Ahmad said, “What are we supposed to do now? We just want to live like everyone else. We need food, water and electricity — and we need to keep our children safe. We cannot do that here.”

Patrick O. Strickland is an independent journalist and regular contributor at The Electronic Intifada. Visit his website: www.postrickland.com. Follow him on Twitter: @P_Strickland_

NSA Spy Program So Secret Judge Can’t Explain Why It Can’t Be Challenged

NSA Spy Program So Secret Judge Can’t Explain Why It Can’t Be Challenged

NSA Spy Program A federal judge ruled in favor of the National Security Agency NSA Spy Program in a key surveillance case on Tuesday, dismissing a challenge which claimed the government’s spying operations were groundless and unconstitutional.

Filed in 2008 by the Electronic Frontier Foundation, the lawsuit, Jewel v. NSA, aimed to end the agency’s unwarranted surveillance of U.S. citizens, which the consumer advocacy group said violated the 4th Amendment.

The lawsuit also implicated AT&T in the operations, alleging that the phone company “routed copies of Internet traffic to a secret room in San Francisco controlled by the NSA.” That charge was based off of a 2006 document leak by former AT&T technician and whistleblower Mark Klein, who disclosed a collection program between the company and the NSA that sent AT&T user metadata to the intelligence agency.

US District Judge Jeffrey White on Tuesday denied a partial summary judgment motion to the EFF and granted a cross-motion to the government, dismissing the case without a trial. In his order, White said the plaintiff, Carolyn Jewel, an AT&T customer, was unable to prove she was being targeted for surveillance—and that if she could, “any possible defenses would require impermissible disclosure of state secret information.” NSA Spy Program

Offering his interpretation of the decision, EFF senior staff attorney David Greene explained in a blog post:

Agreeing with the government, the court found that the plaintiffs lacked “standing” to challenge the constitutionality of the program because they could not prove that the surveillance occurred as plaintiffs’ alleged. Despite the judge’s finding that he could not adjudicate the standing issue without  “risking exceptionally grave damage to national security,” he expressed frustration that he could not fully explain his analysis and reasoning because of the state secrets issue.

The EFF later Tweeted:

Calling the ruling “frustrating,” Greene said the EFF “disagree[s] with the court’s decision and it will not be the last word on the constitutionality of the government’s mass surveillance of the communications of ordinary Americans.”Jewel v. NSA is the EFF’s longest-running case. Despite the decision, the EFF said it would not back down from its pursuit of justice and was careful to note that the ruling did not mean that the NSA’s operations were legal.

“Judge White’s ruling does not end our case. The judge’s ruling only concerned Upstream Internet surveillance, not the telephone records collection nor other mass surveillance processes that are also at issue in Jewel,” said Kurt Opsahl, deputy legal council at EFF. “We will continue to fight to end NSA mass surveillance.”

The issue is similar to the 2013 Supreme Court decision in Clapper v. Amnesty International, which found that plaintiffs who had reason to believe they were being spied on could not provide substantial proof of surveillance, and thus could not bring their case. NSA Spy Program

Jewel v. NSA stems from the EFF’s 2006 case, Hepting v. AT&T, which was dismissed in 2009 after Congress, including then-Senator Barack Obama, voted to give telecommunications companies immunity from such lawsuits.

“It would be a travesty of justice if our clients are denied their day in court over the ‘secrecy’ of a program that has been front-page news for nearly a decade,” Opsahl added.

via MintPressNews

Charlie Hebdo Police Investigator Turns Up Dead, ‘Suicided’

Charlie Hebdo Police Investigator Turns Up Dead, ‘Suicided’

BREAKING: INFORMANT? Paris Terror Suspect on US Watch List Met With French President Sarkozy in 2009

21st Century Wire says…

Charlie Hebdo As the dust settles from this week’s terror extravaganza in France, more loose ends are turning up (or being tied up), with this latest bizarre bombshell which is already fueling speculation as to the covert nature of theCharlie Hebdo false flag affair.

A police commissioner from Limoges, France, Helric Fredou, aged 45 (photo, below), turned up dead from a gun shot to the head on Thursday amid the Charlie Hebdo affair. A high-ranking official within the French law enforcement command-and-control structure, Fredou was also a former deputy director of the regional police service.

According France 3, his body was “found by a colleague” at approximately 1am Thursday – only hours after the initial Paris attack.

At the time of his death, police claim to have not known the reason for his alleged suicide. This was reflected in their official statements to the media: “It is unknown at this time the reasons for his actions”. However, a back story appears to have been inserted simultaneously, most likely from the very same police media liaisons, who then told the press that Fredou was ‘depressed and overworked’. For any law enforcement officer in France, it would seem rather odd that anyone would want to miss the biggest single terror event in the century, or history in the making, as it were.

Here is a link to the original report in the French media, which confirms that Commissioner Fredou was indeed working on the Charlie Hebdo case:

The Fredou Commissioner, like all agents SRPJ, worked yesterday on the case of the massacre at the headquarters of Charlie Hebdo. In particular, he was investigating the family of one of the victims. He killed himself before completing its report. A psychologicalcell’ was set up in the police station.”

Helric-Fredou-3
EDITOR’S NOTE: It is not yet known to 21WIRE exactly how the fatal gun shot occurred, but if any other past political and high-profile ‘suicided’ cases are anything to go by, authorities will claim that this victim either shot himself in the back of the head,  with his non-shooting hand. In addition, if that were the case, there would also be a lack of gun powder burns on the hands according to the autopsy.

UK-based investigative reporter Morris108, interviews ‘Phil in France’ regarding this new development:

Even more bizarrely, an almost identical event took place just over one year earlier, November 2013 in Limoges, when the number 3 ranked SRPJ officer had killed himself in similar circumstances, with his weapon in the police hotel. Allegedly, his colleague discovered his body. The prosecution ruled that case was a suicide too, and the police officer had left a suicide note to his family in which he expressed “personal reasons” for his surprising action.

Stay tuned for more updates on this story at 21WIRE.

Sputnik News

Police commissioner, who had been investigating the attack on the Charlie Hebdo magazine committed suicide with his service gun on Thursday night.

Police commissioner Helric Fredou, who had been investigating the attack on the French weekly satirical magazine Charlie Hebdo, committed suicide in his office. The incident occurred in Limoges, the administrative capital of the Limousin region in west-central France, on Thursday night, local media France 3 reports.
Helric Fredou, 45, suffered from ‘depression’ and experienced ‘burn out’ [according to the official statement]. Shortly before committing suicide, he met with the family of a victim of the Charlie Hebdo attack and killed himself preparing the report.

Fredou began his career in 1997 as a police officer at the regional office of the judicial police of Versailles. Later he returned to Limoges, his hometown. Since 2012 he had been the deputy director of the regional police service.

“We are all shocked. Nobody was ready for such developments”, a representative of the local police union told reporters.

On January 7, 2015, two gunmen burst into the editorial office of Charlie Hebdo magazine, known for issuing cartoons, ridiculing Islam. The [suspected] attackers, later identified as brothers Said and Cherif Kouachi, killed 12 people and injured 11, and escaped from the scene. Following two days of nationwide manhunt, the suspects were killed on Friday by French police some 20 miles northeast of Paris.

READ MORE PARIS SHOOTING NEWS AT: 21st Century Wire Paris Shooting Files

via 21stCenturyWire

Isreal is Getting Away with Murder of UN Peacekeepers & Humanitarians

Isreal is Getting Away with Murder of UN Peacekeepers & Humanitarians

Isreal is Getting Away with Murder  On January 28th a barrage of Israeli artillery fire struck near the South Lebanese village of Ghajar, killing United Nations peacekeeper Francisco Javier Soria. Soria, 36, was a Spanish citizen deployed with the United Nations Interim Force in Lebanon, a peacekeeping mission tasked with maintaining the ceasefire between Israel and Lebanon in the occupied Golan Heights.

His death came in the midst of a recent flare-up of violence between Israel and Hezbollah, and Spain’s ambassador to the United Nations placed blame for the incident upon the Israeli Defence Forces, citing an “escalation of violence [which] came from the Israeli side.” The exact circumstances which led to Soria’s death are still under investigation; Israeli officials expressed condolences for  his death and said their forces were responding to fire in the area.

What is clear however is that Israeli forces have been killing an alarming number of United Nations personnel in the course of their recent military operations — and that UN officials have vociferously criticized the attacks, sometimes saying they appeared deliberate.

This past summer in the Gaza Strip, Israel forces attacked seven different schools run by the United Nations Relief and Works Agency, schools that had been serving as temporary shelters for the displaced population of the territory. Despite repeated warnings, condemnations and entreaties, United Nations targets were hit again and again by Israeli airstrikes and shelling during the conflict.

As many of 46 civilians are believed to have been killed in these attacks, as well as eleven UNRWA staff members. One particularly lethal strike on a UN-administered elementary school in Beit Hanoun killed 15 civilians and wounded 200 others. That attack reportedly sent shrapnel flying into crowds of families who had been awaiting transportation in the school’s playground.

In the wake of these and other bombings, UNRWA chief Chris Gunness broke down in tears during a live television interview while decrying the “[wholesale] denial” of Palestinian rights by Israeli forces during the operation.

Instead of offering contrition for these deadly incidents, Israeli officials continued to justify them with unsubstantiated, and vigorously denied allegations that UNRWA schools were near sources of rocket fire and were thus simply caught in the crossfire. An investigation by Human Rights Watch looking at several of Israel’s attacks on these schools said that they, “did not appear to target a military objective or were otherwise unlawfully indiscriminate.”

Indeed, the idea that Israel’s repeated bombing of these schools may have simply been “mistakes” is difficult to countenance.

In one shelling incident which targeted a school in Rafah, United Nations personnel notified the IDF on 33 separate occasions that the facility was being used as a shelter for civilians. United Nations Secretary General Ban Ki-Moon publicly denounced the attack as a “moral outrage and a criminal act”, adding that “nothing is more shameful than attacking sleeping children”.

Even the United States, normally Israel’s most uncritical defender on the world stage, was moved to state that it was was “appalled” by what it described as a “disgraceful” attack on the school.

As egregious as these incidents were however, they are far from the first time in recent years in which Israel has targeted United Nations operations for shelling and airstrikes.

During the 2008-2009 Gaza War, Israeli forces targeted not only UNRWA schools (one of them pictured above) but even the compound housing the headquarters of the agency in the Gaza Strip. That attack, which involved the use of illegal white phosphorus munitions, destroyed tons of vital food aid and medical supplies which the large refugee population of the territory relied upon for basic sustenance.

Isreal is Getting Away with Murder At the time, Israeli officials claimed that they had been responding to rocket fire which had emanated from the compound, a claim which UN officials described as “total nonsense”.

In another notorious incident from Israel’s 2006 war with Lebanon, Israeli aircraft and artillery bombed a single United Nations outpost for upwards of six hours, despite receiving repeated pleas during this time from UN officials to cease fire. Four peacekeepers were killed in what then UN Secretary General Kofi Annan described as an “apparently deliberate” act.

Israel has long had a contentious relationship with United Nations agencies operating in the Middle East. Israeli officials have in past accused UN personnel of offering shelter to militants (a charge the organization strenuously denies), and has also more broadly suggested that the organization is responsible for prolonging the Israel-Palestine conflict due to its provision of refugee status and services to displaced Palestinians and their descendants.

In the wake of the most recent Gaza conflict, some Israeli political figures even called for UNRWA to formally be recognized as a “hostile organization”, an outrageous suggestion which nevertheless provides some insight into the hostility with which the UN is often viewed today in official circles.

Israel’s repeated bombing and shelling of United Nations positions in the region comes against this backdrop, with Soria’s death being only the latest incident in which Israeli forces have been responsible for killing UN personnel. To date, no one has been held legally responsible for any of these attacks.

By way of contrast, imagine the response if Hamas or Hezbollah had repeatedly and unrepentantly killed United Nations officials in the course of their conflict with Israel. Imagine if United Nations schools housing thousands of displaced civilians been struck time and again by militant groups, who in the wake of the bloodshed either denied responsibility outright or sought to justify their actions.

Furthermore, imagine if these attacks inflicted widespread civilian casualties and came despite repeated pleas and entreaties from UN officials to cease fire.

The outcry would rightly be deafening, yet this is exactly what Israel has done again and again in its conflicts in Lebanon and the Gaza Strip without consequence. As a result of this burgeoning culture of impunity, partly enabled by the unprecedented diplomatic protection offered to Israeli officials by the United States, UN personnel and facilities have increasingly been subject to deadly violence from the Israeli military.

As Pierre Krähenbühl, commissioner-general of UNRWA, stated in the aftermath of a deadly bombing against a UN-administered school in Gaza this past summer, “this [attack] is an affront to all of us, a source of universal shame. Today, the world stands disgraced.”

 

via TheIntercept

How to identify CIA ‘Limited Hangout Op’? The Snowden Example

How to identify CIA ‘Limited Hangout Op’? The Snowden Example

How to identify CIA  The operations of secret intelligence agencies aiming at the manipulation of public opinion generally involve a combination of cynical deception with the pathetic gullibility of the targeted populations. There is ample reason to believe that the case of Edward Joseph Snowden fits into this pattern. We are likely dealing here with a limited hangout operation, in which carefully selected and falsified documents and other materials are deliberately revealed by an insider who pretends to be a fugitive rebelling against the excesses of some oppressive or dangerous government agency. But the revelations turn out to have been prepared with a view to shaping the public consciousness in a way which is advantageous to the intelligence agency involved. At the same time, gullible young people can be duped into supporting a personality cult of the leaker, more commonly referred to as a “whistleblower.”

A further variation on the theme can be the attempt of the sponsoring intelligence agency to introduce their chosen conduit, now posing as a defector, into the intelligence apparatus of a targeted foreign government. In this case, the leaker or whistleblower attains the status of a triple agent. Any attempt to educate public opinion about the dynamics of limited hangout operations inevitably collides with the residue left in the minds of millions by recent successful examples of this technique. It will be hard for many to understand Snowden, precisely because they will insist on seeing him as the latest courageous example in a line of development which includes Daniel Ellsberg and Julian Assange, both still viewed by large swaths of naïve opinion as authentic challengers of oppressive government. This is because the landmark limited hangout operation at the beginning of the current post-Cold War era was that of Daniel Ellsberg and the Pentagon papers, which laid the groundwork for the CIA’s Watergate attack on the Nixon administration, and more broadly, on the office of the presidency itself. More recently, we have had the case of Assange and Wikileaks.

Using these two cases primarily, we can develop a simple typology of the limited hangout operation which can be of significant value to those striving to avoid the role of useful idiots amidst the current cascade of whistleblowers and limited hangout artists. In this analysis, we should also recall that limited hangouts have been around for a very long time. In 1620 Fra Paolo Sarpi, the dominant figure of the Venetian intelligence establishment of his time, advised the Venetian senate that the best way to defeat anti-Venetian propaganda was indirectly. He recommended the method of saying something good about a person or institution while pretending to say something bad. An example might be criticizing a bloody dictator for beating his dog – the real dimensions of his crimes are thus totally underplayed.

Limited hangout artists are instant media darlings

The most obvious characteristic of the limited hangout operative is that he or she immediately becomes the darling of the controlled corporate media. In the case of Daniel Ellsberg, his doctored set of Pentagon papers were published by the New York Times, the Washington Post, the Boston Globe, and eventually by a consortium totaling seventeen corporate newspapers. These press organs successfully argued the case for publication all the way to the United States Supreme Court, where they prevailed against the Nixon administration. Needless to say, surviving critics of the Warren Commission, and more recent veterans of the 9/11 truth movement, and know very well that this is emphatically not the treatment reserved for messengers whose revelations are genuinely unwelcome to the Wall Street centered US ruling class. These latter are more likely to be slandered, vilified and dragged through the mud, or, even more likely, passed over in complete silence and blacked out. In extreme cases, they can be kidnapped, renditioned or liquidated.

Cass Sunstein present at the creation of Wikileaks

As for Assange and Wikileaks, the autumn 2010 document dump was farmed out in advance to five of the most prestigious press organs in the world, including the New York Times, the London Guardian, El Pais of Madrid, Der Spiegel of Hamburg, and Le Monde of Paris. This was the Assange media cartel, made up of papers previously specialized in discrediting 9/11 critics and doubters. But even before the document dumps had begun, Wikileaks had received a preemptive endorsement from none other than the notorious totalitarian Cass Sunstein, later an official of the Obama White House, and today married to Samantha Power, the author of the military coup that overthrew Mubarak and currently Obama’s pick for US ambassador to the United Nations. Sunstein is infamous for his thesis that government agencies should conduct covert operations using pseudo-independent agents of influence for the “cognitive infiltration of extremist groups” – meaning of those who reject in the establishment view of history and reality.Sunstein’s article entitled “Brave New WikiWorld” was published in the Washington Post of February 24, 2007, and touted the capabilities of Wikileaks for the destabilization of China.

Perhaps the point of Ed Snowden’s presence in Hong Kong is to begin re-targeting these capabilities back towards the original anti-Chinese plan. Snowden has already become a media celebrity of the first magnitude. His career was launched by the US left liberal Glenn Greenwald, now writing for the London Guardian, which expresses the viewpoints of the left wing of the British intelligence community. Thus, the current scandal is very much Made in England, and may benefit from inputs from the British GCHQ of Cheltenham, the Siamese twin of the NSA at Fort Meade, Maryland. During the days of his media debut, it was not uncommon to see a controlled press organ like CNN dedicating one third of every broadcast hour of air time to the birth, life, and miracles of Ed Snowden.

Another suspicious and tell-tale endorsement for Snowden comes from the former State Department public diplomacy asset Norman Solomon. Interviewed on RT, Solomon warmly embraced the Snowden Project and assured his viewers that the NSA material dished up by the Hong Kong defector used reliable and authentic. Solomon was notorious ten years ago as a determined enemy of 9/11 truth, acting as a border guard in favor of the Bush administration/neocon theory of terrorism.

Limited hangouts contain little that is new

Another important feature of the limited hangout operation if that the revelations often contain nothing new, but rather repackage old wine in new bottles. In the case of Ellsberg’s Pentagon Papers, very little was revealed which was not already well known to a reader of Le Monde or the dispatches of Agence France Presse. Only those whose understanding of world affairs had been filtered through the Associated Press, CBS News, the New York Times, and the Washington Post found any of Ellsberg’s material a surprise. Of course, there was method in Ellsberg’s madness. The Pentagon papers allegedly derived from an internal review of the decision-making processes leading to the Vietnam War, conducted after 1967-68 under the supervision of Morton Halperin and Leslie Gelb. Ellsberg, then a young RAND Corporation analyst and militant warmonger, was associated with this work.

Upon examination, we find that the Pentagon papers tend to cover up such CIA crimes as the mass murder mandated under Operation Phoenix, and the massive CIA drug running associated with the proprietary airline Air America. Rather, when atrocities are in question, the US Army generally receives the blame. Politicians in general, and President John F. Kennedy in particular, are portrayed in a sinister light – one might say demonized. No insights whatever into the Kennedy assassination are offered. This was a smelly concoction, and it was not altogether excluded that the radicalized elements of the Vietnam era might have carried the day in denouncing the entire package as a rather obvious fabrication. But a clique around Noam Chomsky and Howard Zinn loudly intervened to praise the quality of the exposé and to lionize Ellsberg personally as a new culture hero for the Silent Generation. From that moment on, the careers of Chomsky and Zinn soared. Pentagon papers skeptics, like the satirical comedian Mort Sahl, a supporter of the Jim Garrison investigation in New Orleans and a critic of the Warren Commission, faced the marginalization of their careers.

Notice also that the careers of Morton Halperin and Leslie Gelb positively thrived after they entrusted the Pentagon papers to Ellsberg, who revealed them. Ellsberg was put on trial in 1973, but all charges were dismissed after several months because of prosecutorial misconduct. Assange lived like a lord for many months in the palatial country house of an admirer in the East of England, and is now holed up in the Ecuadorian Embassy in London. He spent about 10 days in jail in December 2010.Assange first won credibility for Wikileaks with some chum in the form of a shocking film showing a massacre perpetrated by US forces in Iraq with the aid of drones. The massacre itself and the number of victims were already well known, so Assange was adding only the graphic emotional impact of witnessing the atrocity firsthand.

Limited hangouts reveal nothing about big issues like JFK, 9/11

Over the past century, there are certain large-scale covert operations which cast a long historical shadow, determining to some extent the framework in which subsequent events occur. These include the Sarajevo assassinations of 1914, the assassination of Rasputin in late 1916, Mussolini’s 1922 march on Rome, Hitler’s seizure of power in 1933, the assassination of French Foreign Minister Barthou in 1934, the assassination of President Franklin D. Roosevelt in 1945, in 1963 Kennedy assassination, and 9/11. A common feature of the limited hangout operations is that they offer almost no insights into these landmark events. In the Pentagon Papers, the Kennedy assassination is virtually a nonexistent event about which we learn nothing. As already noted, the principal supporters of Ellsberg were figures like Chomsky, whose hostility to JFK and profound disinterest in critiques of the Warren Commission were well-known.

As for Assange, he rejects any further clarification of 9/11. In July 2010, Assange told Matthew Bell of the Belfast Telegraph: “I’m constantly annoyed that people are distracted by false conspiracies such as 9/11, when all around we provide evidence of real conspiracies, for war or mass financial fraud.” This is on top of Cass Sunstein’s demand for active covert measures to suppress and disrupt inquiries into operations like 9/11. Snowden’s key backers Glenn Greenwald and Norman Solomon have both compiled impressive records of evasion on 9/11 truth, with Greenwald specializing in the blowback theory.

The Damascus road conversions of limited hangout figures

Daniel Ellsberg started his career as a nuclear strategist of the Dr. Strangelove type working for the RAND Corporation. He worked in the Pentagon as an aide to US Secretary of Defense Robert McNamara. He then went to Vietnam, where he served as a State Department civilian assistant to CIA General Edward Lansdale. In 1967, he was back at RAND to begin the preparation of what would come to be known as the Pentagon papers. Ellsberg has claimed that his Damascus Road conversion from warmonger to peace angel occurred when he heard a speech from a prison-bound draft resister at Haverford College in August 1969. After a mental breakdown, Ellsberg began taking his classified documents to the office of Senator Edward Kennedy and ultimately to the New York Times. Persons who believe this fantastic story may be suffering from terminal gullibility.

In the case of Assange, it is harder to identify such a moment of conversion. Assange spent his childhood in the coils of MK Ultra, a complex of Anglo-American covert operations designed to investigate and implement mind control through the use of psychopharmaca and other means. Assange was a denizen of the Ann Hamilton-Byrne cult, in which little children that were subjected to aversive therapy involving LSD and other heavy-duty drugs. Assange spent his formative years as a wandering nomad with his mother incognito because of her involvement in a custody dispute. The deracinated Assange lived in 50 different towns and attended 37 different schools. By the age of 16, the young nihilist was active as a computer hacker using the screen name “Mendax,” meaning quite simply “The Liar.” (Assange’s clone Snowden uses the more marketable codename of “Verax,” the truth teller.) Some of Assange’s first targets were Nortel and US Air Force offices in the Pentagon. Assange’s chief mentor became John Young of Cryptome, who in 2007 denounced Wikileaks as a CIA front.

Snowden’s story, as widely reported, goes like this: he dropped out of high school and also dropped out of a community college, but reportedly was nevertheless later able to command a salary of between $120,000 and $200,000 per year; he claims this is because he is a computer wizard. He enlisted in the US Army in May 2004, and allegedly hoped to join the special forces and contribute to the fight for freedom in Iraq. He then worked as a low-level security guard for the National Security Agency, and then went on to computer security at the CIA, including a posting under diplomatic cover in Switzerland. He moved on to work as a private contractor for the NSA at a US military base in Japan. His last official job was for the NSA at the Kunia Regional SIGINT Operations Center in Hawaii. In May 2013, he is alleged to have been granted medical leave from the NSA in Hawaii to get treatment for epilepsy. He fled to Hong Kong, and made his revelations with the help of Greenwald and a documentary filmmaker Laura Poitras. Snowden voted for the nominally anti-war, ultra-austerity “libertarian” presidential candidate Ron Paul, and gave several hundred dollars to Paul’s campaign.

Snowden, like Ellsberg, thus started off as a warmonger but later became more concerned with the excesses of the Leviathan state. Like Assange, he was psychologically predisposed to the world of computers and cybernetics. The Damascus Road shift from militarist to civil libertarian remains unexplained and highly suspicious. Snowden is also remarkable for the precision of his timing. His first revelations, open secrets though they were, came on June 5, precisely today when the rebel fortress of Qusayr was liberated by the Syrian army and Hezbollah. At this point, the British and French governments were screaming at Obama that it was high time to attack Syria. The appearance of Snowden’s somewhat faded material in the London Guardian was the trigger for a firestorm of criticism against the Obama regime by the feckless US left liberals, who were thus unwittingly greasing the skids for a US slide into a general war in the Middle East.

More recently, Snowden came forward with allegations that the US and the British had eavesdropped on participants in the meeting of the G-20 nations held in Britain four years ago. This obviously put Obama on the defensive just as Cameron and Hollande were twisting his arm to start the Syrian adventure. By attacking the British GCHQ at Cheltenham, Britain’s equivalent to the NSA, perhaps Snowden was also seeking to obfuscate the obvious British sponsorship of his revelations. Stories about Anglo Americans spying on high profile guests are as old as the hills, and have included a British frogman who attempted an underwater investigation of the Soviet cruiser that brought party leader N. S. Khrushchev for a visit in the 1950s. Snowden has also accused the NSA of hacking targets in China — again, surely no surprise to experienced observers, but guaranteed to increase Sino-American tensions. As time passes, Snowden may emerge as more and more of a provocateur between Washington and Beijing.

Limited hangouts prepare large covert operations

Although, as we have seen, limited hangouts rarely illuminate the landmark covert operations which attempt to define an age, limited hangouts themselves do represent the preparation for future covert operations. In the case of the Pentagon papers, this and other leaks during the Indo-Pakistani Tilt crisis were cited by Henry Kissinger in his demand that President Richard Nixon take countermeasures to restore the integrity of state secrets. Nixon foolishly authorized the creation of a White House anti-leak operation known as the Plumbers. The intelligence community made sure that the Plumbers operation was staffed by their own provocateurs, people who never were loyal to Nixon but rather took their orders from Langley. Here we find the already infamous CIA agent Howard Hunt, the CIA communications expert James McCord, and the FBI operative G. Gordon Liddy. These provocateurs took special pains to get arrested during an otherwise pointless break-in at the headquarters of the Democratic National Committee in the summer of 1972. Nixon could easily have disavowed the Plumbers and thrown this gaggle of agent provocateurs to the wolves, but he instead launched a cover up. Bob Woodward of the Washington Post, equipped with a top secret security clearance from the Office of Naval Intelligence, then began publicizing the story. The rest is history, and the lasting heritage has been a permanent weakening of the office of the presidency and the strengthening of the worst oligarchical tendencies.

Assange’s Wikileaks document dump triggered numerous destabilizations and coups d’état across the globe. Not one US, British, or Israeli covert operation or politician was seriously damaged by this material. The list of those impacted instead bears a striking resemblance to the CIA enemies’ list: the largest group of targets were Arab leaders slated for immediate ouster in the wave of “Arab Spring.” Here we find Ben Ali of Tunisia, Qaddafi of Libya, Mubarak of Egypt, Saleh of Yemen, and Assad of Syria. The US wanted to replace Maliki with Allawi as prime minister of Iraq, so the former was targeted, as was the increasingly independent Karzai of Afghanistan.

Perennial targets of the CIA included Rodriguez Kirchner of Argentina, Berlusconi of Italy, and Putin of Russia. Berlusconi soon fell victim to a coup organized through the European Central Bank, while his friend Putin was able to stave off a feeble attempt at color revolution in early 2012. Mildly satiric jabs at figures like Merkel of Germany and Sarkozy of France were included primarily as camouflage. Assange thus had a hand in preparing one of the largest destabilization campaigns mounted by Anglo-American intelligence since 1968, or perhaps even 1848. If the Snowden operation can help coerce the vacillating and reluctant Obama to attack Syria, our new autistic hero may claim credit for starting a general war in the Middle East, and perhaps even more. If Snowden can further poison relations between United States and China, the world historical significance of his provocations will be doubly assured. But none of this can occur unless he finds vast legions of eager dupes ready to fall for his act. We hope he won’t.

WT/HN

 

via PressTV

Deep Underground Military Bases Hidden by Hollywood

Deep Underground Military Bases Hidden by Hollywood

DEEP UNDERGROUND MILITARY BASES  Unknown to most Americans is a dark secret, and it’s right under our noses. It’s the reality of the existence of DEEP UNDERGROUND MILITARY BASES. These Underground bases get prominent play in dark rumors circulating about captured extraterrestrials and alien technology.

In America alone there are over 120 Deep Underground Military Bases situated under most major cities, US AFBs, US Navy Bases and US Army Bases, as well as underneath FEMA Military Training Camps and DHS control centers. There are also many Deep Underground Military Bases under Canada. Almost all of these bases are over 2 miles underground and have diameters ranging from 10 miles up to 30 miles across!

They have been building these bases day and night, unceasingly, since the 1940s. These bases are basically large cities underground connected by high-speed magneto-levity trains that have speeds up to 1500 MPH. Several books have been written about this activity.

Richard Souder, a Ph.D. architect, risked his life by talking about this. He is the author of the book, ‘Underground Bases and Tunnels: What is the Government Trying to Hide’.

He worked with a number of government agencies on deep underground military bases. The average depth of these bases is over a mile, and they again are basically whole cities underground. They have nuclear powered laser drilling machines that can drill a tunnel seven miles long in one day. (Note: The September, 1983 issue of Omni (Pg. 80) has a color drawing of ‘The Subterrene,’ the Los Alamos nuclear-powered tunnel machine that burrows through the rock, deep underground, by heating whatever stone it encounters into molten rock.)

Murdered for Whistleblowing on his involvement in (being tricked into helping design), Deep Underground Military Bases

Demolition & Structural Engineer

DUMBs Whistleblower Phil Schneider died from suicide, ‘officially’.   His own catheter, strangled him, while he was limited to his own wheel chair.  Suspicious?  Anyone with functional brain would probably think so.

 

 

This base is the Geo location ‘Area’ where MH 730 (Malaysian Airliner) went Missing
Coincidence?

Hidden in Plain Sight – Hollywood
Zombie Thriller
RESIDENT EVIL

(2003) If Hollywood is Showing us in the Movies, then they already have it long before they potentially ‘give the enemy ideas’.  Interesting position that puts the secret keepers in..

This is BY FAR the Most Accurate ‘Hollywood‘ Depiction of a very real ‘Deep Underground Military Base’.    DULCE underground Facililty (well documented) has been presented in a similar way.

Massively Popular – Now Cult Classic Video GameHalf Life‘ Plot is Centered around a Secret Underground Government Lab, Where Things Go Awry…

Plot

Physicist Gordon Freeman arrives late for work at the Black Mesa Research Facility. As part of an experiment, he pushes an unusual material into a machine for analysis. The spectrometer explodes, creating a “resonance cascade” that opens a portal to another dimension, Xen. Surviving scientists urge Gordon to head to the surface, where he defends himself against hostile Xen creatures and Marines sent to cover up the incident.

This Topic is Directly Connected
to the Occult / UFO / Secret Technology,

and Especially, the Human Trafficking
of Woman and Children

In America alone there are over 120 Deep Underground Military Bases situated under most major cities, US AFBs, US Navy Bases and US Army Bases, as well as underneath FEMA Military Training Camps and DHS control centers. There are also many Deep Underground Military Bases under Canada. Almost all of these bases are over 2 miles underground and have diameters ranging from 10 miles up to 30 miles across! They have been building these bases day and night, unceasingly, since the 1940s. These bases are basically large cities underground connected by high-speed magneto-levity trains that have speeds up to 1500 MPH. Several books have been written about this activity. Richard Souder, a Ph.D. architect, risked his life by talking about this. He is the author of the book, ‘Underground Bases and Tunnels: What is the Government Trying to Hide’. He worked with a number of government agencies on deep underground military bases. The average depth of these bases is over a mile, and they again are basically whole cities underground. They have nuclear powered laser drilling machines that can drill a tunnel seven miles long in one day. (Note: The September, 1983 issue of Omni (Pg. 80) has a color drawing of ‘The Subterrene,’ the Los Alamos nuclear-powered tunnel machine that burrows through the rock, deep underground, by heating whatever stone it encounters into molten rock.)

The Black Projects sidestep the authority of Congress, which as we know is illegal. There is much hard evidence out there. Many will react with fear, terror and paranoia, but you must snap out of it and wake up from the brainwashing your media pumps into your heads all day long. Are you going to be a rabbit in the headlights, or are you going to stand up and say enough is enough? The US Government through the NSA, DOD, CIA, DIA, ATF, ONI, US Army, US Marine Corp, FEMA and the DHS has spent in excess of 12 trillion dollars building the massive, covert infrastructure for the coming One World Government and New World Religion over the past 40 years.

There is the Deep Underground Military Base underneath Denver International Airport, which is over 22 miles in diameter and goes down over 8 levels. It’s no coincidence that the CIA relocated the headquarters of its domestic division, which is responsible for operations in the United States, from the CIA’s Langley headquarters to Denver. Constructed in 1995, the government and politicians were hell bent on building this airport in spite of it ending up vastly overbudget. Charges of corruption, constant construction company changes, and mass firings of teams once they had built a section of their work was reported so that no “one” group had any idea what the blueprint of the airport was. Not only did locals not want this airport built nor was it needed, but everything was done to make sure it was built despite that. Masonic symbols and bizarre artwork of dead babies, burning cities and women in coffins comprise an extensive mural as well as a time capsule – none of which is featured in the airport’s web site section detailing the unique artwork throughout the building. DIA serves as a cover for the vast underground facilities that were built there. There are reports of electronic/magnetic vibrations which make some people sick and cause headaches in others. There are acres of fenced-in areas which have barbed wire pointing into the area as if to keep things in, and small concrete stacks that resemble mini-cooling towers rise out of the acres of nowhere to apparently vent underground levels. The underground facility is 88.3 square miles deep. Basically this Underground Base is 8 cities on top of each other! The holding capacity of such leviathanic bases is huge. These city-sized bases can hold millions and millions of people, whether they are mind controlled, enslaved NWO World Army Soldiers or innocent and enslaved surface dwellers from the towns and cities of America and Canada.

There is Dulce Base, in New Mexico. Dulce is a small town in northern New Mexico, located above 7,000 feet on the Jicarilla Apache Indian Reservation. There is only one major motel and a few stores. It’s not a resort town and it is not bustling with activity. But Dulce has a deep, dark secret. The secret is harbored deep below the brush of Archuleta Mesa. Function: Research of mind related functions, genetic experiments, mind control training and reprograming. There are over 3000 real-time video cameras throughout the complex at high-security locations (entrances and exits). There are over 100 secret exits near and around Dulce. Many around Archuleta Mesa, others to the south around Dulce Lake and even as far east as Lindrith. Deep sections of the complex connect into natural cavern systems. Level 1 – garage for street maintenance. Level 2 – garage for trains, shuttles, tunnel-boring machines and disc maintenance. Level 3 – everyone is weighed, in the nude, then given a jump suit uniform. The weight of the person is put on a computer I.D. card each day. Change in over three dollars requires a physical exam and X-ray. Level 4 – Human research in ‘paranormal’ areas – mental telepathy, mind control, hypnosis, remote viewing, astral traveling – etc. The technology is apparently here to allow them to know how to manipulate the ‘Bioplasmic Body’ Development of a laser weapon that can remotely cause burns and discomfort on it’s target. They can lower your heartbeat with Deep Sleep ‘Delta Waves,’ induce a static shock, then reprogram, Via a Brain- Computer link. Level 5 -security is severe. Armed guards patrol constantly, and in addition to weight sensitive areas there (are) hand print and eye print stations. Here, is the device that powers the transfer of atoms. Level 6 – Level 6 is privately called ‘Nightmare Hall’. It holds the genetic labs. Experiments done on fish, seals, birds, and mice that are vastly altered from their original forms.

Then there is the Greenbrier Facility, in White Sulfer Springs, West Virginia under the Greenbriar Resort. The Continuity of Government facility intended since 1962 to house the United States Congress, code-named Casper, is located on the grounds of the prestigious Greenbrier resort. The bunker is beneath the West Virginia wing, which includes a complete medical clinic. Construction of the facility, which began in 1959, required 2.5 years and 50,000 tons of concrete. The steel-reinforced concrete walls of the bunker, which is 20 feet below ground, are 2 feet thick. The facility includes separate chambers for the House of Representatives and the Senate, as well as a larger room for joint sessions. These are located in the “Exhibit Hall” of the West Virginia Wing, which includes vehicular and pedestrian entrances which can be quickly sealed by blast doors. They don’t even hide this one, and it’s even a tourist attraction. The Underground vault was built to meet the needs of a Congress-in-hiding – in fact the hotel is a replica of the White House. The underground area has a chamber for the Senate, a chamber for the House and a massive hall for joint sessions. Although the hotel says it gives tours of the 112,000 square area daily, the installation still stands at the ready, its operators still working under cover at the hotel. The secrecy that has surrounded the site has shielded it both from public scrutiny and official reassessment.

Most Americans will not believe that an American Holocaust will happen until they see it happening with their own eyes. Till then, it is just another strange conspiracy theory for them to laugh at. This is no laughing matter. When it happens, it will be to late to stop it. The US Government has been involved covertly in the creation of an army of loyal, brainwashed soldiers of the future. They will have cybernetic and microchip implants and will fight anywhere in the world, without question, with total loyalty and without hesitation or fear. These soldiers were created at Brookhaven National Laboratories BNL, the National Ordinance Laboratories NOL and the Massachussetts Institute of Technology MIT, and covertly transferred under DOD and NSA control and planning. Many of these soldiers are stationed in the Deep Underground Military Bases like the one under Denver International Airport. All of this information has been researched, and it has taken much effort to fit it together properly. There are many mag-lev subterraenean train networks that stretch from the these complexes and go out to other underground bases. All soldiers working in these bases are microchipped and under total Psychotronic Mind Control.
Of the missing “Milk Carton People” that the FBI used to post on milk cartons, some were taken to these underground bases for genetic experimentation, microchipping, psychotronic mind control and cybernetic implantations for future use as brainwashed soldiers of the NWO. Every year in America hundreds of thousands of people go missing. The creation of a total Global Fascist Police State by the Illuminati will happen if we do not all wake up and see what is happening. I find it amazing that so many Americans, Scandanavians and Western Europeans refuse to believe that there are millions of UNISF and UNMNTF Troops in America. Under the Partnerships For Peace Program PFPP set up by President Bill Clinton in early 1993, thousands of troops a month have been coming into America. These Fascist criminals parade as our friends and leaders, while stripping away democratic rights that will be replaced with a Corporatist and Fascist dictatorship, unless people, and especially Americans, wake up now. Here are the locations of some Deep Underground Military Bases in America:

ALASKA 1. Brooks Range, Alaska 2. Delta Junction, Alaska 2a. Fort Greeley, Alaska. In the same Delta Junction area.

ARIZONA 1. Arizona (Mountains) (not on map) Function: Genetic work. Multiple levels 2. Fort Huachuca, Arizona (also reported detainment camp) Function: NSA Facility 2. Luke Air Force Base 3. Page, Arizona Tunnels to: Area 51, Nevada Dulce base, New Mexico 4. Sedona, Arizona (also reported detainment camp) Notes: Located under the Enchantment Resort in Boynton Canyon. There have been many reports by people in recent years of “increased military presence and activity” in the area.5. Wikieup, Arizona Tunnels to: Area 51 6. Yucca (Mtns.), Arizona

CALIFORNIA 1: 29 Palms, California Tunnels to: Chocolate Mts., Fort Irwin, California (possibly one more site due west a few miles) 2: Benicia, California 3. Catalina Island, California Tunnels to: I was told by someone who worked at the Port Hueneme Naval Weapons Division Base in Oxnard that they have heard and it is ‘common rumor’ that there is a tunnel from the base to this Island, and also to Edwards Air Force Base, possibly utilizing old mines. . 4. China Lake Naval Weapons Testing Center 5. Chocolate Mountains, California Tunnels to: Fort Irwin, California 6. Death Valley,California Function: The entrance to the Death Valley Tunnel is in the Panamint Mountains down on the lower edge of the range near Wingate Pass, in the bottom of an abandoned mine shaft. The bottom of the shaft opens into an extensive tunnel system 7. Deep Springs, California Tunnels to: Death Valley, Mercury, NV, Salt Lake City 8. Edwards AFB, California Function: Aircraft Development – antigravity research and vehicle development Levels: Multiple Tunnels to: Catalina Island Fort Irwin, California Vandenburg AFB, California Notes: Delta Hanger – North Base, Edwards AFB, Ca. Haystack Buttte – Edwards, AFB, Ca. 9. Fort Irwin, California (also reported detainment camp) Tunnels to: 29 Palms, California Area 51, Nevada Edwards AFB. California Mt. Shasta, California 10. Helendale, California Function: Special Aircraft Facility Helendale has an extensive railway/shipping system through it from the Union Pacific days which runs in from Salt Lake City, Denver, Omaha, Los Angeles and Chicago 11. Lancaster, California Function: New Aircraft design, anti-gravity engineering, Stealth craft and testing Levels: 42 Tunnels To: Edwards A.F.B., Palmdale 12. Lawrence-Livermore International Labs, California The lab has a Human Genome Mapping project on chromosome #19 and a newly built $1.2 billion laser facility 13. Moreno Valley, California Function unknown 14. Mt. Lassen, California Tunnels to: Probably connects to the Mt. Shasta main tunnel. 15. Mt. Shasta. Function: Genetic experiments, magnetic advance, space and beam weaponry. Levels: 5 Tunnels to: Ft. Irwin, California North 16. Napa, California Functions: Direct Satellite Communications, Laser Communications. Continuation of Government site. Levels: Multi-level Tunnels to: Unknown Notes: Located on Oakville Grade, Napa County, Ca. 87 Acres 17. Needles, California Function unknown 18. Palmdale, California Function: New Aircraft Design, anit-gravity research 19. Tehachapi Facility (Northrop, California – Tejon Ranch Function: Levels: 42 Tunnels to: Edwards, Llona and other local areas Notes: 25 miles NW of Lancaster California, in the Tehachapi mountains. 20. Ukiah, California Function unknown

COLORADO 1. Near Boulder, Co. in the mountains Function unknown 2. Cheyenne Mountain -Norad -Colorado Springs, Colorado Function: Early Warning systems – missile defense systems – Space tracking Levels: Multiple Tunnels to: Colorado Springs, Function: Early warning systems, military strategy, satellite operations Levels: Multiple NORAD is a massive self-sustaining ‘city’ built inside the mountain Tunnels to: Creede, Denver, Dulce Base, Kinsley. 3. Creede, Colorado Function unknown Tunnels to: Colorado Springs, Colorado – Delta, Colorado – Dulce Base, New Mexico 4. Delta, Colorado Function unknown Tunnels to: Creede Salt Lake, Utah 5. Denver International Airport (also a detainment camp) Function: Military research, construction, detainment camp facilities Levels: 7 reported Tunnels to: Denver proper, Colorado and Rocky Mountain “safehousing”, Colorado Springs, Colorado (Cheyenne Mtn.)

6. Falcon Air Force Base, Falcon, Colorado Function: SDI, Satellite Control Levels: Multiple Tunnels to: Colorado Springs, possibly more. 7. Fort Collins, Colorado Function: Suspect high precision equipment manufacturing for space. 8. Grand Mesa, Colorado Function unknown 9. Gore Range Near Lake, west of Denver, Co. Function: Library and Central Data Bank 10. San Juan Valley, Colorado Hidden beneath and in an operating Buffalo Ranch Function unknown 11. Telluride, Colorado Function unknown 12. University of Denver, Co (Boulder area) Function: Genetics, geology/mining as related to tunneling and underground construction. 13. Warden Valley West of Fort Collins, CO Function Unknown Tunnels to: Montana

GEORGIA Dobbins Air Force Base, Marrietta GA Function: test site for plasma and antigravity air craft, experimental crafts and weapons

INDIANA Kokomo, Indiana Function Unknown Notes: for years people in that area have reported a “hum” that has been so constant that some have been forced to move and it has made many others sick. It seems to come from underground, and “research” has turned up nothing although it was suggested by someone that massive underground tunneling and excavating is going on, using naturally occurring caverns, to make an underground containment and storage facility.

KANSAS 1. Hutchinson, Kansas Function unknown Tunnels to: Kinsley, Nebraska. Note: I recieved this report concerning this base: “I can vouch for the underground base in Hutchinson, Ks. The entrance to the tunnel is underneath Hutchinson Hospital and is huge. I was walking down that tunnel when I was a kid and at the end of this tunnel is a rock face wall with a 90 degree turn to the right. I stopped and refused to go any further down the tunnel, my instincts told me to stop. I distinctly remember hearing screams coming from there. These were not just cries for help, but more like blood curtailing horrifying screams like someone had just been murdered. I really want to know what was and probably still is going on down there. You are free to report the story, but please keep my name anonymous.” 2. Kansas City, Kansas Function unknown Notes: Entrance near Worlds of Fun 3. Kinsley, Kansas Function unknown Tunnels to: Colorado Springs, Colorado; Hutchinson, Kansas; Tulsa Kokoweef Peak, SW California Notes: Gold stored in huge cavern, blasted shut. Known as the “midway city” because it’s located halfway between New York and San Francisco.

MARYLAND Edgewood Arsenal, Maryland (from Don) Martins AFB, Aberdeen Proving Ground, Maryland

MASSACHUSETTS Maynard MA, FEMA regional center. Wackenhut is here too.

MONTANA Bozeman, Mont. Function: Genetics

NEVADA Area 51 – Groom Lake – Dreamland – Nellis Air Force Base Area 51 was said to exist only in our imaginations until Russian satellite photos were leaked to US sources and it’s amazing how you can get photos all over of it now, even posters. They’ve been busy little bees building this base up. Function: Stealth and cloaking Aircraft research & development. ‘Dreamland (Data Repository Establishment and Maintenance Land) Elmint (Electromagnetic Intelligence), Biological weapons research and genetic manipulation/warfare storage, Cold Empire, EVA, Program HIS (Hybrid Intelligence System),BW/CW; IRIS (Infrared Intruder Systems), Security: Above ground cameras, underground pressure sensors, ground and air patrol 2. Blue Diamond, Nevada Function unknown 3. Fallon Air Force Base area (the flats, near Reno) “American City” restricted military sites southwest of Fallon 4. Mercury, Nevada Function unknown 5. Tonopah, Nevada Function unknown 69: San Gabriel (mountains) On Western side of Mojave Desert Function unknown Notes: Heavy vibrations coming from under the forest floor which sounds like geared machinery. These vibrations and sounds are the same as heard in Kokomo, Indiana and are suspected underground building/tunneling operations.

NEW MEXICO 1. Albuquerque, New Mexico (AFB) Function unknown Levels: Multiple Tunnels to: Carlsbad, New Mexico Los Alamos, New Mexico Possible connections to Datil, and other points. 2. Carlsbad, New Mexico Functions: Underground Nuclear Testing Tunnels to: Fort Stockton, Texas. Roswell 3. Cordova, New Mexico Function unknown 4. Datil, New Mexico Function unknown Tunnels to: Dulce Base

5: Dulce Base, New Mexico. Tunnels to: Colorado Springs, Colorado Creed, Colorado Datil, N.M. Los Alamos. Page, Arizona Sandia Base Taos, NM

6. Los Alamos, New Mexico Functions: Psychotronic Research, Psychotronic Weapons Levels: Multiple Tunnels to: ALB AFB, New Mexico Dulce, New Mexico Connections to Datil,Taos 7. Sandia Base, New Mexico Functions: Research in Electrical/magnetic Phenomena Levels: Multiple Tunnels to: Dulce Base Notes: Related Projects are studied at Sandia Base by ‘The Jason Group’ (of 55 Scientists). They have secretly harnessed the ‘Dark Side of Technology’ and hidden the beneficial technology from the public. 8. Sunspot, NM Function unknown 9. Taos, New Mexico Function unknown Tunnels to: Dulce, New Mexico; Cog, Colorado Notes: Several other sidelines to area where Uranium is mined or processed. 10. White Sands, NM Function: Missile testing/design Levels: Seven known

NEW HAMPSHIRE There may be as many as three underground installations in New Hampshire’s hills, according to reports.

NEW YORK New York, New York Function unknown Tunnels to: Capitol Building, D.C.

OHIO Wright-Patterson Air Force Base – Dayton, Ohio Function: Air Force Repository. Rumored to house stealth technology and prototype craft

OREGON 1. Cave Junction, Oregon Function: Suspected Underground UFO Base Levels: At least one Notes: Suspected location is in or near Hope Mountain. Near Applegate Lake, Oregon, just over into California. Multiple shafts, access areas to over 1500 feet depth. Built using abandoned mine with over 36 known miles of tunnels, shafts. 2. Crater Lake, Oregon Tunnels: possible to Cave Junction 3. Klamath Falls, Oregon 4. Wimer, Oregon (Ashland Mt. area) Function: Underground Chemical Storage Levels: At least one

PENNSYLVANIA Raven Rock, Pa (near Ligonier) Function: working back up underground Pentagon – sister site of Mt. Weather Notes: 650′ below summit, 4 entrances.

TEXAS 1. Calvert, Texas Function unknown 2. Fort Hood, Texas (also reported detainment camp) Levels: Multiple 3. Fort Stockton, Texas Function: Unknown Tunnels to: Carlsbad, New Mexico UTAH 1. Dugway, Utah Function: Chemical Storage, Radiation storage. 2. Salt Lake City Mormon Caverns Function: Religions archives storage. Levels: Multiple Tunnels to: Delta, Colorado & Riverton, Wyoming

VIRGINIA Mount Poney – Near Culpepper, Virginia Function unknown

WASHINGTON 1. Mt. Rainier, Washington Function unknown. Levels: Multiple Tunnels to: Unknown Yakima Indian Reservation Function unknown Notes: Southeast of Tacoma Washington, on the Reservation, in an area 40 by 70 miles. Unusual sounds from underground (Toppenish Ridge). Low flying Silver Cigar shaped craft seen to disappear into the Middle fork area of Toppenish creek.

Washington DC: The Function: Part of a massive underground relocation system to house select government and military personnel in the event of cataclysmic event. Tunnels to: New York City; Mt. Weather.

WEST VIRGINIA: Greenbrier Facility, White Sulfer Springs, West Virginia under the Greenbriar Resort.

WYOMING: Riverton, Wyoming Function unknown Tunnels to: Salt Lake, Utah Denver, Colorado.

Alberto Behar

Alberto Behar

Robotics expert, NASA at the JPL.

Alberto Behar Mr Behar died instantly when his single-engine plane nosedived shortly after takeoff Friday from Van Nuys Airport He worked on two Mars missions and spent years researching how robots work in harsh environments like volcanoes and underwater As part of the NASA team exploring Mars with the Curiosity rover, Behar was responsible for a device that detected hydrogen on the planet’s surface as the rover moved.

47-year old NASA Scientist Alberto Behar helped to prove that there had once been water on Mars according to the sad Daily Mail story published to announce his recent death in a plane crash that happened on Friday in LA, California. While plane crashes do happen and scientists do die, Behar’s name has now been added to a very long list of scientists and astronomers who have met their untimely ends prematurely, leading us to ask, did Behar know something that ‘they’ don’t want the rest of society to find out?

Robotics expert, NASA at the JPL.

Alberto Behar Mr Behar died instantly when his single-engine plane nosedived shortly after takeoff Friday from Van Nuys Airport He worked on two Mars missions and spent years researching how robots work in harsh environments like volcanoes and underwater As part of the NASA team exploring Mars with the Curiosity rover, Behar was responsible for a device that detected hydrogen on the planet’s surface as the rover moved.

47-year old NASA Scientist Alberto Behar helped to prove that there had once been water on Mars according to the sad Daily Mail story published to announce his recent death in a plane crash that happened on Friday in LA, California. While plane crashes do happen and scientists do die, Behar’s name has now been added to a very long list of scientists and astronomers who have met their untimely ends prematurely, leading us to ask, did Behar know something that ‘they’ don’t want the rest of society to find out?

Pat Tillman – Military, Activist

Pat Tillman – Military, Activist

Pat-TillmanPatrick Daniel “Pat” Tillman was an American football player who left his professional career and enlisted in the United States Army in June 2002 in the aftermath of the September 11 attacks.  During his stay in Afghanistan, he quickly realized there was deception behind USA’s going to war and that it seemed to be more about ‘theft of resources’.

Due to tight media control & manipulation of the facts, few Americans were aware that Tillman, just recently before his death, had become vocal of his anti ‘war-for-oil’ sentiments within the ranks. He was also concerned with the USA’s disregard for heavy civilian casualties, and treatment of the population.

Independent investigators have pointed out that Tillman was scheduled to meet & greet (whistle-blow) with Noam Chomsky in public, upon his return from Military service. Pat Tillman was well respected and highly influential during a critical ramp-up to what would become an even larger ‘war’. It is reasonable to suspect that he became a potential threat to the military-industrial-complex agenda.

Highly Suspicious Death & Cover-Up:
The official version of events (after a long and shady cover-up) were announced to be that Tillman’s death was due to an accidental ‘friendly fire’ incident.  However the *leaked autopsy report showed that he was killed at very close range ‘assassination style’ with a triple tap shot to the forehead, which would be quite impossible if indeed a friendly fire ‘accident’.

 

The Media Is Focusing On the WRONG Senate Torture Report

The Media Is Focusing On the WRONG Senate Torture Report

The Big Story Torture Everyone Is Missing Senate Torture Report

While the torture report released by the Senate Intelligence Committee is very important, it doesn’t address the big scoop regarding torture.

Instead, it is the Senate Armed Services Committee’s report that dropped the big bombshell regarding the U.S.  torture program.

Senator Levin, commenting on a Armed Services Committee’s report on torture in 2009, explained:

The techniques are based on tactics used by Chinese Communists against American soldiers during the Korean War for the purpose of eliciting FALSE confessions for propaganda purposes. Techniques used in SERE training include stripping trainees of their clothing, placing them in stress positions, putting hoods over their heads, subjecting them to face and body slaps, depriving them of sleep, throwing them up against a wall, confining them in a small box, treating them like animals, subjecting them to loud music and flashing lights, and exposing them to extreme temperatures [and] waterboarding.

McClatchy filled in important details:

Former senior U.S. intelligence official familiar with the interrogation issue said that Cheney and former Defense Secretary Donald H. Rumsfeld demanded that the interrogators find evidence of al Qaida-Iraq collaboration

For most of 2002 and into 2003, Cheney and Rumsfeld, especially, were also demanding proof of the links between al Qaida and Iraq that (former Iraqi exile leader Ahmed) Chalabi and others had told them were there.”

It was during this period that CIA interrogators waterboarded two alleged top al Qaida detainees repeatedly — Abu Zubaydah at least 83 times in August 2002 and Khalid Sheik Muhammed 183 times in March 2003 — according to a newly released Justice Department document…

When people kept coming up empty, they were told by Cheney’s and Rumsfeld’s people to push harder,” he continued.”  Cheney’s and Rumsfeld’s people were told repeatedly, by CIA . . . and by others, that there wasn’t any reliable intelligence that pointed to operational ties between bin Laden and Saddam . . .

A former U.S. Army psychiatrist, Maj. Charles Burney, told Army investigators in 2006 thatinterrogators at the Guantanamo Bay, Cuba, detention facility were under “pressure” to produce evidence of ties between al Qaida and Iraq.

“While we were there a large part of the time we were focused on trying to establish a link between al Qaida and Iraq and we were not successful in establishing a link between al Qaida and Iraq,” Burney told staff of the Army Inspector General. “The more frustrated people got in not being able to establish that link . . . there was more and more pressure to resort to measures that might produce more immediate results.”

“I think it’s obvious that the administration was scrambling then to try to find a connection, a link (between al Qaida and Iraq),” [Senator] Levin said in a conference call with reporters. “They made out links where they didn’t exist.”

Levin recalled Cheney’s assertions that a senior Iraqi intelligence officer had met Mohammad Atta, the leader of the 9/11 hijackers, in the Czech Republic capital of Prague just months before the attacks on the World Trade Center and the Pentagon.

The FBI and CIA found that no such meeting occurred.

The Washington Post reported the same year:

Despite what you’ve seen on TV, torture is really only good at one thing: eliciting false confessions. Indeed, Bush-era torture techniques, we now know, were cold-bloodedly modeled after methods used by Chinese Communists to extract confessions from captured U.S. servicemen that they could then use for propaganda during the Korean War.

So as shocking as the latest revelation in a new Senate Armed Services Committee report may be, it actually makes sense — in a nauseating way. The White House started pushing the use of torture not when faced with a “ticking time bomb” scenario from terrorists, but when officials in 2002 were desperately casting about for ways to tie Iraq to the 9/11 attacks — in order to strengthen their public case for invading a country that had nothing to do with 9/11 at all.

***

Gordon Trowbridge writes for the Detroit News: “Senior Bush administration officials pushed for the use of abusive interrogations of terrorism detainees in part to seek evidence to justify the invasion of Iraq, according to newly declassified information discovered in a congressional probe.

Colin Powell’s former chief of staff (Colonel Larry Wilkerson) wrote in 2009 that the Bush administration’s “principal priority for intelligence was not aimed at pre-empting another terrorist attack on the U.S. but discovering a smoking gun linking Iraq and al-Qaeda.”

Indeed, one of the two senior instructors from the Air Force team which taught U.S. servicemen how to resist torture by foreign governments when used to extract false confessions has blown the whistle on the true purpose behind the U.S. torture program.

As Truthout reported:

[Torture architect] Jessen’s notes were provided to Truthout by retired Air Force Capt. Michael Kearns, a “master” SERE instructor and decorated veteran who has previously held high-ranking positions within the Air Force Headquarters Staff and Department of Defense (DoD).

***

The Jessen notes clearly state the totality of what was being reverse-engineered – not just ‘enhanced interrogation techniques,’ but an entire program of exploitation of prisoners using torture as a central pillar,” he said. “What I think is important to note, as an ex-SERE Resistance to Interrogation instructor, is the focus of Jessen’s instruction. It is EXPLOITATION, not specifically interrogation. And this is not a picayune issue, because if one were to ‘reverse-engineer’ a course on resistance to exploitation then what one would get is a plan to exploit prisoners, not interrogate them. The CIA/DoD torture program appears to have the same goals as the terrorist organizations or enemy governments for which SV-91 and other SERE courses were created to defend against: the full exploitation of the prisoner in his intelligence, propaganda, or other needs held by the detaining power, such as the recruitment of informers and double agents. Those aspects of the US detainee program have not generally been discussed as part of the torture story in the American press.”

In a subsequent report, Truthout notes:

Air Force Col. Steven Kleinman, a career military intelligence officer recognized as one of the DOD’s most effective interrogators as well a former SERE instructor and director of intelligence for JPRA’s teaching academy, said ….  “This is the guidebook to getting false confessions, a system drawn specifically from the communist interrogation model that was used to generate propaganda rather than intelligence”  …. “If your goal is to obtain useful and reliable information this is not the source book you should be using.”

Interrogators also forced detainees to take drugs … which further impaired their ability to tell the truth.

And one of the two main architects of the torture program admitted this week on camera:

You can get people to say anything to stop harsh interrogations if you apply them in a way that does that.

And false confessions were, in fact, extracted.

For example:

And the 9/11 Commission Report was largely based on a third-hand account of what tortured detainees said, with two of the three parties in the communication being government employees. And the government went to great lengths to obstruct justice and hide unflattering facts from the Commission.

According to NBC News:

  • Much of the 9/11 Commission Report was based upon the testimony of people who were tortured
  • At least four of the people whose interrogation figured in the 9/11 Commission Report have claimed that they told interrogators information as a way to stop being “tortured.”
  • The 9/11 Commission itself doubted the accuracy of the torture confessions, and yet kept their doubts to themselves

Details here.

Today, Raymond McGovern – a 27-year CIA veteran, who chaired National Intelligence Estimates and personally delivered intelligence briefings to Presidents Ronald Reagan and George H.W. Bush, their Vice Presidents, Secretaries of State, the Joint Chiefs of Staff, and many other senior government officials –provides details about one torture victim (Al-Libi) at former Newsweek and AP reporter Robert Parry’s website:

But if it’s bad intelligence you’re after, torture works like a charm. If, for example, you wish to “prove,” post 9/11, that “evil dictator” Saddam Hussein was in league with al-Qaeda and might arm the terrorists with WMD, bring on the torturers.

It is a highly cynical and extremely sad story, but many Bush administration policymakers wanted to invade Iraq before 9/11 and thus were determined to connect Saddam Hussein to those attacks. The PR push began in September 2002 – or as Bush’s chief of staff Andrew Card put it, “From a marketing point of view, you don’t introduce new products in August.”

By March 2003 – after months of relentless “marketing” – almost 70 percent of Americans had been persuaded that Saddam Hussein was involved in some way with the attacks of 9/11.

The case of Ibn al-Sheikh al-Libi, a low-level al-Qaeda operative, is illustrative of how this process worked. Born in Libya in 1963, al-Libi ran an al-Qaeda training camp in Afghanistan from 1995 to 2000. He was detained in Pakistan on Nov. 11, 2001, and then sent to a U.S. detention facility in Kandahar, Afghanistan. He was deemed a prize catch, since it was thought he would know of any Iraqi training of al-Qaeda.

The CIA successfully fought off the FBI for first rights to interrogate al-Libi. FBI’s Dan Coleman, who “lost” al-Libi to the CIA (at whose orders, I wonder?), said, “Administration officials were always pushing us to come up with links” between Iraq and al-Qaeda.

CIA interrogators elicited some “cooperation” from al-Libi through a combination of rough treatment and threats that he would be turned over to Egyptian intelligence with even greater experience in the torture business.

By June 2002, al-Libi had told the CIA that Iraq had “provided” unspecified chemical and biological weapons training for two al-Qaeda operatives, an allegation that soon found its way into other U.S. intelligence reports. Al-Libi’s treatment improved as he expanded on his tales about collaboration between al-Qaeda and Iraq, adding that three al-Qaeda operatives had gone to Iraq “to learn about nuclear weapons.”

Al-Libi’s claim was well received at the White House even though the Defense Intelligence Agency was suspicious.

“He lacks specific details” about the supposed training, the DIA observed. “It is possible he does not know any further details; it is more likely this individual is intentionally misleading the debriefers. Ibn al-Shaykh has been undergoing debriefs for several weeks and may be describing scenarios to the debriefers that he knows will retain their interest.”

Meanwhile, at the Guantanamo Bay prison in Cuba, Maj. Paul Burney, a psychiatrist sent there in summer 2002, told the Senate, “A large part of the time we were focused on trying to establish a link between al-Qaeda and Iraq and we were not successful. The more frustrated people got in not being able to establish that link … there was more and more pressure to resort to measures that might produce more immediate results.”

***

President Bush relied on al-Libi’s false Iraq allegation for a major speech in Cincinnati on Oct. 7, 2002, just a few days before Congress voted on the Iraq War resolution. Bush declared, “We’ve learned that Iraq has trained al-Qaeda members in bomb making and poisons and deadly gases.”

And Colin Powell relied on it for his famous speech to the United Nations on Feb. 5, 2003, declaring: “I can trace the story of a senior terrorist operative telling how Iraq provided training in these [chemical and biological] weapons to al-Qaeda. Fortunately, this operative is now detained, and he has told his story.”

Al-Libi’s “evidence” helped Powell as he sought support for what he ended up calling a “sinister nexus” between Iraq and al-Qaeda, in the general effort to justify invading Iraq.

For a while, al-Libi was practically the poster boy for the success of the Cheney/Bush torture regime; that is, until he publicly recanted and explained that he only told his interrogators what he thought would stop the torture.

You see, despite his cooperation, al-Libi was still shipped to Egypt where he underwent more abuse, according to a declassified CIA cable from early 2004 when al-Libi recanted his earlier statements. The cable reported that al-Libi said Egyptian interrogators wanted information about al-Qaeda’s connections with Iraq, a subject “about which [al-Libi] said he knew nothing and had difficulty even coming up with a story.”

According to the CIA cable, al-Libi said his interrogators did not like his responses and “placed him in a small box” for about 17 hours. After he was let out of the box, al-Libi was given a last chance to “tell the truth.” When his answers still did not satisfy, al-Libi says he “was knocked over with an arm thrust across his chest and fell on his back” and then was “punched for 15 minutes.”

After Al-Libi recanted, the CIA recalled all intelligence reports based on his statements, a fact recorded in a footnote to the report issued by the 9/11 Commission. By then, however, the Bush administration had gotten its way regarding the invasion of Iraq and the disastrous U.S. occupation was well underway.

***

Intensive investigations into these allegations – after the U.S. military had conquered Iraq – failed to turn up any credible evidence to corroborate these allegations. What we do know is that Saddam Hussein and Osama bin Laden were bitter enemies, with al-Qaeda considering the secular Hussein an apostate to Islam.

Al-Libi, who ended up in prison in Libya, reportedly committed suicide shortly after he was discovered there by a human rights organization. Thus, the world never got to hear his own account of the torture that he experienced and the story that he presented and then recanted.

Hafed al-Ghwell, a Libyan-American and a prominent critic of Muammar Gaddafi’s regime at the time of al-Libi’s death, explained to Newsweek, “This idea of committing suicide in your prison cell is an old story in Libya.”

Paul Krugman eloquently summarized the truth about the torture used:

Let’s say this slowly: the Bush administration wanted to use 9/11 as a pretext to invade Iraq, even though Iraq had nothing to do with 9/11. So it tortured people to make them confess to the nonexistent link.

There’s a word for this: it’s evil.

Torture Program Was Part of a Con Job

As discussed above, in order to “justify” the Iraq war, top Bush administration officials pushed and insisted that interrogators use special torture methods aimed at extracting false confessions to attempt to create a false linkage between between Al Qaida and Iraq. And see this and this.

But this effort started earlier …

5 hours after the 9/11 attacks, Donald Rumsfeld said “my interest is to hit Saddam”.

He also said “Go massive . . . Sweep it all up. Things related and not.”

And at 2:40 p.m. on September 11th, in a memorandum of discussions between top administration officials, several lines below the statement “judge whether good enough [to] hit S.H. [that is, Saddam Hussein] at same time”, is the statement “Hard to get a good case.” In other words, top officials knew that there wasn’t a good case that Hussein was behind 9/11, but they wanted to use the 9/11 attacks as an excuse to justify war with Iraq anyway.

Moreover, “Ten days after the September 11, 2001, terrorist attacks on the World Trade Center and the Pentagon, President Bush was told in a highly classified briefing that the U.S. intelligence community had no evidence linking the Iraqi regime of Saddam Hussein to the [9/11] attacks and that there was scant credible evidence that Iraq had any significant collaborative ties with Al Qaeda”.

And a Defense Intelligence Terrorism Summary issued in February 2002 by the United States Defense Intelligence Agency cast significant doubt on the possibility of a Saddam Hussein-al-Qaeda conspiracy.

And yet Bush, Cheney and other top administration officials claimed repeatedly for years that Saddam was behind 9/11. See this analysis. Indeed, Bush administration officials apparently swore in a lawsuitthat Saddam was behind 9/11.

Moreover, President Bush’s March 18, 2003 letter to Congress authorizing the use of force against Iraq, includes the following paragraph:

(2) acting pursuant to the Constitution and Public Law 107-243 is consistent with the United States and other countries continuing to take the necessary actions against international terrorists and terrorist organizations, including those nations, organizations, or persons who planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001.

Therefore, the Bush administration expressly justified the Iraq war to Congress by representing that Iraq planned, authorized, committed, or aided the 9/11 attacks.

Indeed, Pulitzer prize-winning journalist Ron Suskind reports that the White House ordered the CIA to forge and backdate a document falsely linking Iraq with Muslim terrorists and 9/11 … and that theCIA complied with those instructions and in fact created the forgery, which was then used to justify war against Iraq. And see this.

Suskind also revealed that “Bush administration had information from a top Iraqi intelligence official ‘that there were no weapons of mass destruction in Iraq – intelligence they received in plenty of time to stop an invasion.’ ”

Cheney made the false linkage between Iraq and 9/11 on many occasions.

For example, according to Raw Story, Cheney was still alleging a connection between Iraq and the alleged lead 9/11 hijacker in September 2003 – a year after it had been widely debunked. When NBC’s Tim Russert asked him about a poll showing that 69% of Americans believed Saddam Hussein had been involved in 9/11, Cheney replied:

It’s not surprising that people make that connection.

And even after the 9/11 Commission debunked any connection, Cheney said that the evidence is “overwhelming” that al Qaeda had a relationship with Saddam Hussein’s regime , that Cheney “probably” had information unavailable to the Commission, and that the media was not ‘doing their homework’ in reporting such ties.

Again, the Bush administration expressly justified the Iraq war by representing that Iraq planned, authorized, committed, or aided the 9/11 attacks. See this, this, this.

Even then-CIA director George Tenet said that the White House wanted to invade Iraq long before 9/11, and inserted “crap” in its justifications for invading Iraq.

Former Treasury Secretary Paul O’Neill – who sat on the National Security Council – also says that Bush planned the Iraq war before 9/11.

Top British officials say that the U.S. discussed Iraq regime change even before Bush took office.

And in 2000, Cheney said a Bush administration might “have to take military action to forcibly remove Saddam from power.” And see this.

The administration’s false claims about Saddam and 9/11 helped convince a large portion of the American public to support the invasion of Iraq. While the focus now may be on false WMD claims, it is important to remember that, at the time, the alleged link between Iraq and 9/11 was at least as important in many people’s mind as a reason to invade Iraq.

So the torture program was really all about “justifying” the ultimate war crime:  launching an unnecessary war of aggression based upon false pretenses.

Postscript:   It is beyond any real dispute that torture does not work to produce any useful, truthfulintelligence.  Today, the following question made it to the front page of Reddit:

Why would the CIA torture if torture “doesn’t work”? Wouldn’t they want the most effective tool to gather intelligence?

The Senate Armed Services Committee report gave the answer.

via WashgintonsBlog.

CIA Torture Pseudonyms

CIA Torture Pseudonyms

cia-rendition-black-site-torture

via Cryptome.org 11 December 2014

CIA Torture Pseudonyms


Paulmd199 sends:

CIA Torture Pseudonyms Update: The “Associates” of “Company Y” are now known, as is “CIA officer 2.” Additional people and details have become known.

The press has been hard at work uncovering the pseudonyms used and nailing down the true identities of the site. I compile them here.

The most important outstanding questions: who are Detainees “R” & “S,” and where is detention site “red?” While I feel pretty strongly about redacting the names of low-level personnel from the NSA slides, which are technical in nature, I have zero interest in protecting torturers. The public has a right to know where these black sites were, and the detainees deserve a name and a fair trial.

Detention sites:

BLACK – RomaniaBLUE – “Quartz” – Stare Kiejkuty, Poland

BROWN – Afghanistan

COBALT – “Salt Pit” – Afghanistan

GRAY – Afghanistan

GREEN – Thailand

INDIGO – Guantanamo

MAROON – Guantanamo

ORANGE – Afghanistan

VIOLET – Lithuania

RED – This could be an additional site in one of the above countries, or someplace entirely different. It is mentioned only once in the report, on page 140 of 499, and the entry is almost entirely redacted.

Companies:

Company Y – Mitchell, Jessen & Associates, based in Spokane, Washington.The “Associates” are David Ayers, Randall Spivey, James Sporleder, Joseph Matarazzo, and Roger Aldrich.

It should be noted that there is no “Company X” in this report, I found this peculiar. It seems that there should be one, and as it happens there are several shady “Companies’ known: “Premier Executive Transport Services” Incorporated in Dedham Massachusetts, is known to have been part of the CIA rendition program. The names of its officers include “Coleen Bornt,” “Brian Dice” and “Tyler Edward Tate.” These are fictitious people.

Other companies suspected of involvement in rendition include: “Stevens Express Leasing” “Richmor Aviation” “Rapid AirTrans” “Path Corporation”

Businesses:

Business Q – Associated with Zubair, associated with Hambali

Torture Doctors:

“Grayson Swigert” – James Mitchell”Hammond Dunbar” – Bruce Jessen

CIA Officers:

CIA Officer 1 – COBALT Site manager – Matthew Zirbel. Zirbel’s corrupt CIA boss (Convicted) Kyle “Dusty” Dustin Foggo overruled the 10 day suspension Zirbel received in the murder of Gul Rahman (innocent).CIA Officer 2 – Torturer at COBALT and BLUE – Albert El Gamil – retired from CIA in 2004.

[Redacted] – Ron Czarnetsky, CIA Chief of Station on Warsaw, Poland from 2002 to 2005. This would make him responsible for site BLUE.

[no mention] Alfreda Frances Bikowsky – Made herself involved in Waterboarding in Poland (BLUE) in March of 2003. Took trip unassigned and on own dime. Was “scolded” and told it “wasn’t supposed to be entertainment.” Would have been there at the same time as Mitchell and Jessen.

Assets:

Asset X – Directly involved in the capture of KSM.Asset Y – Reports on Janat Gul

Persons:

Person 1 – al-Ghuraba group member, with an interest in airplanes and aviation. “intelligence indicates the interest was unrelated to terrorist activity.”

Detainees:

Detainee R – Held by foreign government, rendered to CIA custodyDetainee S – Held by foreign government

Sources:

http://www.businessinsider.com/the-company-behind-cia-torture-2014-12http://www.washingtonpost.com/blogs/worldviews/wp/2014/12/09/decoding-the-secret-black-sites-on-the-senates-report-on-the-cia-interrogation-program/

http://www.reuters.com/article/2014/12/10/us-usa-cia-torture-lithuania-idUSKBN0JO18M20141210

http://www.nytimes.com/2014/12/11/world/cia-torture-report-draws-world-reaction.html?smid=tw-share&_r=0

http://www.historycommons.org/entity.jsp?entity=zirbel_1

https://news.vice.com/video/the-architect?utm_source=vicenewsfb

http://www.wbrz.com/news/psychologist-defends-harsh-cia-interrogations/

http://www.nbcnews.com/storyline/cia-torture-report/cia-paid-torture-teachers-more-80-million-n264756

https://www.youtube.com/watch?v=SDxue3jGAug#t=541

https://firstlook.org/theintercept/2014/12/15/charmed-life-cia-torturer/

http://www.propublica.org/article/disgraced-senior-cia-official-heads-to-prison-still-claiming-hes-a-patriot

http://cryptocomb.org/?p=421

https://www.youtube.com/watch?v=ih1GgxOoSZ8

Princess Diana – Free Thinker, Cultural Icon

Princess Diana – Free Thinker, Cultural Icon

 

Princess Diana Diana, Princess of Wales, was the first wife of Charles, Prince of Wales, who is the eldest child and heir apparent of Queen Elizabeth II.

Widely unknown, is that Diana, a true humanitarian, was an outcast of the Royal Family. There are many indicators that she had extensive ‘dirt’ on the family and wasn’t shy about using her influence to eventually expose their true colors.  Also, the family was not pleased with her joining bloodlines with Dodi Fayed, son of a wealthy Egyption billionaire..  Rumor is that she was with child at the time of her death, and this was handed down as her punishment.  In her journal was found an entry that proves she already considered an attempt on her life:

“..i think they are planning some kind of accident with my vehicle…”

Many independent researchers and investigators have determined that she was killed in ‘ritual’ fashion, surrounded by deep, intentional, occult symbolism.  The method & time of death, striking the 13th pillar in the tunnel, and the above-ground location all have connections to ancient Babylon, with what some even say includes a ‘fulfillment of divine purpose’.

Top experts in this complex assassination where the Family takes down one of its own using MK-Ultra connected driver Henry Paul are David Icke, Chris Everard, and Jordan Maxwell, among others.

 

Danny Casolaro – Journalist

Danny Casolaro – Journalist

dannycosalaroDanny Casolaro Journalist, Freelance Writer

Danny Casolaro Shortly before his death, Casolaro told people that he was nearly ready to reveal a wide-ranging conspiracy spanning the Inslaw case, Iran-Contra, the alleged October Surprise conspiracy, and the closure of BCCI.[7] David Corn writes in The Nation that the papers Casolaro left behind reveal few clues, except that he was in over his head, but was tenacious.[8]

His papers included old clippings, handwritten notes that were hard to read, and the names of former CIA officers and arms dealers. Corn writes that the notes show Casolaro was influenced by the Christic Institute and that he had pursued material fed to him by a reporter who worked for Lyndon LaRouche.[8] Richard Fricker writes in Wired that Casolaro had been led into a “Bermuda Triangle of spooks, guns, drugs and organized crime.”[9]

dannycosalaroDanny Casolaro Journalist, Freelance Writer

Danny Casolaro Shortly before his death, Casolaro told people that he was nearly ready to reveal a wide-ranging conspiracy spanning the Inslaw case, Iran-Contra, the alleged October Surprise conspiracy, and the closure of BCCI.[7] David Corn writes in The Nation that the papers Casolaro left behind reveal few clues, except that he was in over his head, but was tenacious.[8]

His papers included old clippings, handwritten notes that were hard to read, and the names of former CIA officers and arms dealers. Corn writes that the notes show Casolaro was influenced by the Christic Institute and that he had pursued material fed to him by a reporter who worked for Lyndon LaRouche.[8] Richard Fricker writes in Wired that Casolaro had been led into a “Bermuda Triangle of spooks, guns, drugs and organized crime.”[9]

dannycosalaroDanny Casolaro Journalist, Freelance Writer

Danny Casolaro Shortly before his death, Casolaro told people that he was nearly ready to reveal a wide-ranging conspiracy spanning the Inslaw case, Iran-Contra, the alleged October Surprise conspiracy, and the closure of BCCI.[7] David Corn writes in The Nation that the papers Casolaro left behind reveal few clues, except that he was in over his head, but was tenacious.[8]

His papers included old clippings, handwritten notes that were hard to read, and the names of former CIA officers and arms dealers. Corn writes that the notes show Casolaro was influenced by the Christic Institute and that he had pursued material fed to him by a reporter who worked for Lyndon LaRouche.[8] Richard Fricker writes in Wired that Casolaro had been led into a “Bermuda Triangle of spooks, guns, drugs and organized crime.”[9]

 

Crisis Actors

Crisis Actors

“Crisis actors” are professional actors ostensibly deployed by government agencies and/or the mainstream media to delude the public with portrayals of trauma and suffering: specifically, to act as victims or witnesses in staged school shootings or hoax terrorist attacks.

What ABC 20/20 Could Learn from All The President’s Men: The Devolution of Modern Journalism, Beginning With Watergate

What ABC 20/20 Could Learn from All The President’s Men: The Devolution of Modern Journalism, Beginning With Watergate

nixon-resignsThe “purity” of journalism, and its willingness to act as a “fourth estate” of political influence has fluctuated over the course of American history. In the historic role the press created for itself, as an institution designed to act on the behalf of the people, it is beholden to certain ethical obligations. Viewing journalism as an essential component of a free society requires the existence of reporters who will fairly and truthfully cover events that impact our lives. But today, many would argue that the implied contract between the public and their news media is being infringed upon. In an effort to supply American citizens with compelling, round-the-clock news stories, the pillars of ethical journalism are often brushed aside in favor of expedience. Journalism that proliferates sensationalism and celebrity “news”, while presenting speculation as fact runs rampant.

It has been widely publicized that almost all media in America today comes from just six enormous media conglomerates. With giant corporations dominating the landscape after years of mergers and acquisitions, a dangerous media machine is now in place. Real investigative journalism is disappearing, as editors “push” stories in an unnatural direction to serve a corporate agenda. Editorial integrity is now something that can largely be purchased. Readers, listeners, and viewers of the “news” are left to question if what they’re consuming is even anything close to the truth, often turning to alternative sources for reliable media content. If they’ve been tuning in to Brian Ross, a man who holds the illustrious title of “America’s Wrongest Reporter”, it’s not hard to see why it makes sense to change the channel.

We can trace the evolution of contemporary journalism back to an event that occurred over forty years ago: The Watergate Scandal, and its coverage in the The Washington Post by two scrappy young reporters, Bob Woodward and Carl Bernstein. Both saw their role as journalists to be responsible for pursuing stories that service the interests of democracy, using whatever means necessary. As investigative journalists, truth was ultimately at the heart of their mission to remove Nixon from his throne. The pair’s meticulous adherence to journalism’s best practices and protocols – truth, empiricism, verification, impartiality, and clarity – proved their case in a way the public could understand, and their tenacity was rewarded with Nixon’s resignation.

Benjamin Bradlee, the editor of The Washington Post during Watergate, thanked Nixon for giving a boost to journalism in his 1995 memoir. “It is wonderfully ironical [sic] that a man who so disliked – and never understood – the press did so much to further the reputation of the press, and particularly The Washington Post,” he wrote. “In his darkest hour, he gave the press its finest hour.” Woodward and Bernstein, as they scrambled to “follow the money” and covertly meet with Deep Throat source W. Mark Felt, and conduct an impressive inquiry under the nose of government investigators. And they did it while telling the truth the entire time.

The Watergate era, a time not so long ago, precluded today’s bitter partisan politics. As a country we have regressed considerably since; our political system is broken and our media channels are clogged with the same junk that’s obstructing half the nation’s arteries. If the press is designed to provide a public forum for a debate of our current laws and policies, it has some serious cleaning up to do.

But if there are going to be fingers pointed, we can again return to the Watergate Scandal as a turning point in the development of new journalistic practices. The events that took place from 1972-74 opened the door to a new model of journalism – one that, while an admirable coup against Nixon’s regime, also served to plant many of the seeds of distrust we still have against the government, as well as institutionalize the practice of unscrupulous dirt-digging by both reporters and large media entities. When Woodward and Bernstein revealed that Watergate was not just a mere burglary, but an illegal, all-out assault against the legions of people on Nixon’s “enemies list”, Americans were shocked. Their unwavering faith in the White House already shaken by the events in Vietnam, Watergate permanently changed how people – especially young people –  looked at their government. At the time, it seemed astonishing that the President of the United States could commit such crimes.

Today, another Watergate-esque scandal seems imminent. Most Americans, if asked, would not say that they trust their government or their politicians to act responsibly. They would also likely add that they do not trust the media to report on any important event in an impartial manner. Since Watergate, mass media has devolved to the point that (returning to Brian Ross, ABC anchor extraordinaire) it not only refuses to do it’s own fact checking or reporting, but demands credit for work in which it had no part. Take for example, when ABC demanded a Pulitzer for work they essentially lifted from Chris Hamby, journalist at the nonprofit Center for Public Integrity. Or even more recently, when many of the nation’s media outlets were crammed with images of Kim Kardashian’s  most recent photoshoot. We have come to expect entertainment over significance, shameful reportage that makes E! News look like PBS.

40 years after Watergate, we are still reeling from the effects it had on both modern media and the American political machine. From the events of Watergate to recent exposures of the NSA’s surveillance activities, it’s clear that we need a powerful press to act as a watchdog over the government’s actions. If journalism can save itself, perhaps there’s hope that it can save us too.

The FBI Can Bypass Encryption: Cyber Security Is a Magic Act

The FBI Can Bypass Encryption: Cyber Security Is a Magic Act

fbi-encryption

Encryption has gained the attention of actors on both sides of the mass surveillance debate. For example in a speech at the Brookings Institution FBI Director James Comey complained that strong encryption was causing U.S. security services to “go dark.” Comey described encrypted data as follows:

“It’s the equivalent of a closet that can’t be opened, a safe deposit box that can’t be opened, a safe that can’t ever be cracked.”

Got that? Comey essentially says that encryption is a sure bet. Likewise during an interview with James Bamford whistleblower Ed Snowden confidently announced that:

“We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes… By basically adopting changes like making encryption a universal standard—where all communications are encrypted bydefault—we can end mass surveillance not just in the United States but around the world.”

If you glanced over the above excerpts and took them at face value you’d probably come away thinking that all you needed to protect your civil liberties is the latest encryption widget. Right? Wow, let me get my check book out! Paging Mr. Omidyar…

Not so fast bucko. There’s an important caveat, some fine print that Ed himself spelled out when he initially contacted film director Laura Poitras. In particular Snowden qualified that:

“If the device you store the private key and enter your passphrase on has been hacked, it is trivial to decrypt our communications.”

This corollary underscores the reality that, despite the high profile sales pitch that’s being repeated endlessly, strong encryption alone isn’t enough. Hi-techsubversion is a trump card as the Heartbleed bug graphically illustrated. In light of the NSA’s mass subversion programs it would be naïve to think that there aren’t other critical bugs like Heartbleed, subtle intentional flaws, out in the wild being leveraged by spies.

The FBI’s Tell

James Comey’s performance at Brookings was an impressive public relations stunt. Yet recent history is chock full of instances where the FBI employed malware like Magic Lantern and CIPAV to foil encryption and identify people using encryption-based anonymity software like Tor. If it’s expedient the FBI will go so far as to impersonate a media outlet to fool suspects into infecting their own machines. It would seem that crooks aren’t the only attackers who wield social engineering techniques.

In fact the FBI has gotten so adept at hacking computers, utilizing what are referred to internally as Network Investigative Techniques, that the FBI wants to change the law to reflect this. The Guardian reports on how the FBI is asking the U.S. Advisory Committee on Rules and Criminal Procedure to move the legal goal posts, so to speak:

“The amendment [proposed by the FBI] inserts a clause that would allow a judge to issue warrants to gain ‘remote access’ to computers ‘located within or outside that district’ (emphasis added) in cases in which the ‘district where the media or information is located has been concealed through technological means’. The expanded powers to stray across district boundaries would apply to any criminal investigation, not just to terrorist cases as at present.”

In other words the FBI wants to be able to hack into a computer when its exact location is shrouded by anonymity software. Once they compromise the targeted machine it’s pretty straightforward to install a software implant (i.e. malware) and exfiltrate whatever user data they want, including encryption passwords.

If encryption is really the impediment that director Comey makes it out to be then why is the FBI so keen to amend the rules in a manner which implies that they can sidestep it? In the parlance of poker this is a “tell.”

Denouncement

As a developer who has built malicious software designed to undermine security tools I can attest that there is a whole burgeoning industry which prays on naïve illusions of security. Companies like Hacking Team have found a lucrative niche offering products to the highest bidder that compromise security and… a drumroll please… defeat encryption.

There’s a moral to this story. Cryptome’s own curmudgeon, John Young, prudently observes:

“Protections of promises of encryption, proxy use, Tor-likeanonymity and ‘military- grade’ comsec technology are magic acts –ELINT, SIGINT and COMINT always prevail over comsec. The most widely trusted and promoted systems are the most likely to be penetrated, exploited, spied upon, successfully attacked, covertly compromised with faults hidden by promoters, operators, competitors, compromisers and attackers all of whom warn against the others while mutually benefiting from continuous alarms about security and privacy.”

When someone promises you turnkey anonymity and failsafe protection from spies, make like that guy on The Walking Dead and reach for your crossbow. Mass surveillance is a vivid expression of raw power and control. Hence what ails society is fundamentally a political problem with economic and technical facets, such that safeguarding civil liberties on the Internet will take a lot more than just the right app.

by Bill Blunden via Cryptompe.org

October 31, 2014

Bill Blunden is an independent investigator whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including The Rootkit Arsenal and Behold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex. Bill is the lead investigator at Below Gotham Labs.

Machiavellian Statecraft and Conspiracies

Machiavellian Statecraft and Conspiracies

the-art-of-war-machiavelli-niccoloThe popular views attributed to Niccolo Machiavelli are not actually his own.  Having not actually read him, the assumption by many is that he is known for advocating the notion that the ends justify any means, while rulers of state must have no scruples in achieving their ends.  While Machiavelli was a pragmatist in many respects, his positions place him firmly within the classical Western tradition of statecraft.  As a Renaissance thinker, the desire to revive classical Greek and Roman learning was in fashion, and it is within that milieu that we must situate him.  He does not advocate tyranny and abuse, and his insights on intrigue, subterfuge and conspiracy illuminate and rebuke many of the errors of our degenerate, effeminate gaggle of so-called leaders. Machiavelli’s The Prince is well-known, but few are familiar with his Art of War and The Discourses, which contain a wealth of knowledge about the workings of the state and strategic designs, and it is to all of these we must look to gain deeper insight.

In The Discourses, Machiavelli describes the cycle through which most civil states go, from oligarchy to revolution to democracy to anarchy.  Revolutionaries should take note, as the “revolution” they often seek to inflame often ends up bringing an even worse tyranny to follow.  Revolutionaries, unfortunately, are not historically known for a keen understanding of human nature, allowing their ideals to override the real, and  as a result, the Marxist state for example, finds itself frustrated and collapsing from within. Add to this the fact that most historical revolutionaries have been the tools of foreign and economic interests, and one begins to see why the pattern persists.  We can also see something akin to the future ideas of Oswald Spengler, where patterns and cycles are crucial, timeless phenomenon for historical analysis.

Machiavelli writes of the cycle of the state in The Discourses on Livy, Book I:

“Having proposed to myself to treat of the kind of government established at Rome, and of the events that led to its perfection, I must at the beginning observe that some of the writers on politics distinguished three kinds of government, viz. the monarchical, the aristocratic, and the democratic; and maintain that the legislators of a people must choose from these three the one that seems to them most suitable. Other authors, wiser according to the opinion of many, count six kinds of governments, three of which are very bad, and three good in themselves, but so liable to be corrupted that they become absolutely bad. The three good ones are those which we have just named; the three bad ones result from the degradation of the other three, and each of them resembles its corresponding original, so that the transition from the one to the other is very easy. Thus monarchy becomes tyranny; aristocracy degenerates into oligarchy; and the popular government lapses readily into licentiousness. So that a legislator who gives to a state which he founds, either of these three forms of government, constitutes it but for a brief time; for no precautions can prevent either one of the three that are reputed good, from degenerating into its opposite kind; so great are in these the attractions and resemblances between the good and the evil.”

We see here a realistic perspective inherited from the ancients.  All governments are liable to corruption and tyranny, although some more than others. The pattern for degeneration is monarchy becoming a tyranny, aristocracy becoming and oligarchy, and democracy becoming anarchy.  This pattern also hearkens to Aristotle, who made a similar list in his Politics.  History has seen many states, but all fall into these same basic forms.  While some governments are certainly better in form than others, nothing can halt a corrupt, degenerate elite and populace from collapsing when moral degeneracy and corruption reign.  However, there is an important realist corrective to modernity and progressive thinking here that cannot be passed over, which is that the reason for the collapse of any state is not the form of government itself, but the rise of corruption in men’s hearts.  Modern liberalism, which is still the norm among most, in praxis at least, assumes that the solution to problems arises from changes in law and government.  If we can only change our political leaders and get a new crop in!  If we can only change the law to get proposition 666 passed, why then we would have our freedom and progress!  Nothing could be further from the truth, as the problem ultimately lies not in externals, but in man’s own heart.  Corruption is rooted in, and proceeds from, individuals and their decisions, not from external forms and systems.  Classical liberalism and modern liberalism are rooted in the metaphysical error of attributing the location of evil in some institution, and not in man’s own decisions.

In this regard, Machiavelli is a pessimist with respect to human nature.  While the Renaissance is often lauded for its high view of human nature adopted from the Greeks, Machiavelli does not see the populace as able to govern themselves.  Heavily influenced by St. Augustine, Niccolo’s negative appraisal of human nature places him in a non-democratic tradition of classical republicanism.  While critical of monarchy due to its liability to fall into tyranny through its hereditary descendants, it is certainly not the worst form of government, which is democracy.  Early seeds of the U.S. Constitution can also be seen here, as Machiavelli is one of the most famous proponents of republicanism of the Italian tradition, and Madison and Hamilton had clearly read and been influenced by the Florentine thinker, as The Federalist Papersappear to show. Elucidating the cycle of collapse, Machiavelli comments, with hints of the nascent social contract theory:

“Chance has given birth to these different kinds of governments amongst men; for at the beginning of the world the inhabitants were few in number, and lived for a time dispersed, like beasts. As the human race increased, the necessity for uniting themselves for defence made itself felt; the better to attain this object, they chose the strongest and most courageous from amongst themselves and placed him at their head, promising to obey him. Thence they began to know the good and the honest, and to distinguish them from the bad and vicious; for seeing a man injure his benefactor aroused at once two sentiments in every heart, hatred against the ingrate and love for the benefactor. They blamed the first, and on the contrary honored those the more who showed themselves grateful, for each felt that he in turn might be subject to a like wrong; and to prevent similar evils, they set to work to make laws, and to institute punishments for those who contravened them. Such was the origin of justice. This caused them, when they had afterwards to choose a prince, neither to look to the strongest nor bravest, but to the wisest and most just. But when they began to make sovereignty hereditary and non-elective, the children quickly degenerated from their fathers; and, so far from trying to equal their virtues, they considered that a prince had nothing else to do than to excel all the rest in luxury, indulgence, and every other variety of pleasure. The prince consequently soon drew upon himself the general hatred. An object of hatred, he naturally felt fear; fear in turn dictated to him precautions and wrongs, and thus tyranny quickly developed itself. Such were the beginning and causes of disorders, conspiracies, and plots against the sovereigns, set on foot, not by the feeble and timid, but by those citizens who, surpassing the others in grandeur of soul, in wealth, and in courage, could not submit to the outrages and excesses of their princes.

Under such powerful leaders the masses armed themselves against the tyrant, and, after having rid themselves of him, submitted to these chiefs as their liberators. These, abhorring the very name of prince, constituted themselves a new government; and at first, bearing in mind the past tyranny, they governed in strict accordance with the laws which they had established themselves; preferring public interests to their own, and to administer and protect with greatest care both public and private affairs. The children succeeded their fathers, and ignorant of the changes of fortune, having never experienced its reverses, and indisposed to remain content with this civil equality, they in turn gave themselves up to cupidity, ambition, libertinage, and violence, and soon caused the aristocratic government to degenerate into an oligarchic tyranny, regardless of all civil rights. They soon, however, experienced the same fate as the first tyrant; the people, disgusted with their government, placed themselves at the command of whoever was willing to attack them, and this disposition soon produced an avenger, who was sufficiently well seconded to destroy them.

The memory of the prince and the wrongs committed by him being still fresh in their minds, and having overthrown the oligarchy, the people were not willing to return to the government of a prince. A popular government was therefore resolved upon, and it was so organized that the authority should not again fall into the hands of a prince or a small number of nobles. And as all governments are at first looked up to with some degree of reverence, the popular state also maintained itself for a time, but which was never of long duration, and lasted generally only about as long as the generation that had established it; for it soon ran into that kind of license which inflicts injury upon public as well as private interests. Each individual only consulted his own passions, and a thousand acts of injustice were daily committed, so that, constrained by necessity, or directed by the counsels of some good man, or for the purpose of escaping from this anarchy, they returned anew to the government of a prince, and from this they generally lapsed again into anarchy, step by step, in the same manner and from the same causes as we have indicated.  Such is the circle which all republics are destined to run through.”

The cycle of collapse for the republic is similar to that of other forms of government, but is all the more relevant for our present day.  Since the French Revolution, the majority of the world’s states operate under the auspices of being “republics,” but there is an important distinction to be made that Machiavelli could have never foreseen: global shadow government.  In fact, it is Machiavellian realism that leads one to easily understand that our world is governed by international shadow entities that utilize nation states as fronts.  We are far beyond the era of the outdated nation-state going to war against rival nation-state – ours is the era of global oligarchical cartels in competition, with the Anglo-American establishment currently at the top.  Cartels and empires have always existed, but the world has never seen a global secret technocratic shadow government, and in that respect, we are in a unique situation.  The issues of corruption and degeneracy, are not new, but even more rampant than anything in Machiavelli’s day, precisely because there are newer, more sophisticated means of technological tyranny and evil than in any previous age.  We can see from this classical perspective that conspiracies and espionage are not surprising – they are synonymous with perennial statecraft.

niccolo-machiavelli-quotes-5

On conspiracies, Machiavelli explains in The Prince:

“But concerning his subjects, when affairs outside are disturbed he has only to fear that they will conspire secretly, from which a prince can easily secure himself by avoiding being hated and despised, and by keeping the people satisfied with him, which it is most necessary for him to accomplish, as I said above at length. And one of the most efficacious remedies that a prince can have against conspiracies is not to be hated and despised by the people, for he who conspires against a prince always expects to please them by his removal; but when the conspirator can only look forward to offending them, he will not have the courage to take such a course, for the difficulties that confront a conspirator are infinite. And as experience shows, many have been the conspiracies, but few have been successful; because he who conspires cannot act alone, nor can he take a companion except from those whom he believes to be malcontents, and as soon as you have opened your mind to a malcontent you have given him the material with which to content himself, for by denouncing you he can look for every advantage; so that, seeing the gain from this course to be assured, and seeing the other to be doubtful and full of dangers, he must be a very rare friend, or a thoroughly obstinate enemy of the prince, to keep faith with you.

And, to reduce the matter into a small compass, I say that, on the side of the conspirator, there is nothing but fear, jealousy, prospect of punishment to terrify him; but on the side of the prince there is the majesty of the principality, the laws, the protection of friends and the state to defend him; so that, adding to all these things the popular goodwill, it is impossible that any one should be so rash as to conspire. For whereas in general the conspirator has to fear before the execution of his plot, in this case he has also to fear the sequel to the crime; because on account of it he has the people for an enemy, and thus cannot hope for any escape….

For this reason I consider that a prince ought to reckon conspiracies of little account when his people hold him in esteem; but when it is hostile to him, and bears hatred towards him, he ought to fear everything and everybody. And well-ordered states and wise princes have taken every care not to drive the nobles to desperation, and to keep the people satisfied and contented, for this is one of the most important objects a prince can have.”

Here Niccolo expounds the heart of conspiracy from the perspective of the ruler.  Conspiracy need only be feared when the ruler is hated as a result of his tyranny or sadistic cruelty.  Fear is a crucial key in the arsenal of the state, but fear must be tempered by virtue and security, and the imbalance in either direction leads to sedition from others and conspiracies become successful.  For the ruler, conspiracy the maintenance of goodwill among subjects is obtained through the management of public perception and genuine goodwill by the ruler.  It is not a license for doing anything and everything to maintain power, as many wrongly accuse Machiavelli, but as a balance of mercy and severity, and that power is maintained by fear.  Contrary to popular opinion, Machiavelli firmly rebukes the notion of immorality and devious designs, opting instead for an approach of balance, with the ruler’s reputation standing on its own through virtue.  Any other imbalance leads the ruler to fall prey to his own vices and overthrown by his own self-destructive folly.

Roman Catholicism through St. Augustine and classical virtue ethics also factor into Machiavelli’s tempering of the prince as it did for medieval warfare as a whole.  This comes to the fore in his lesser known Art of War that was the first treatise on modern warfare that would revolutionize the field.  For ancient and medieval leaders, the state, espionage, warfare and its deceptions, and the game of politics were considered “arts” that could only be mastered through study and practice.  Systematizing everything from military camps, music, flags and colors, size and ranks, Machiavelli revolutionized the medieval army to become a hierarchical standard that would be the norm for future Europe.  On another level, it also contains interesting aspects relating to psychological warfare, espionage and deception that are instructive for us in our day that help to grasp the level of deception we live under.  The ancient arts of statecraft and deception are not forgotten, they have been perfected and through a high-tech overlay, are beyond anything Niccolo could have imagined.

He writes:

“Birds or dust have often discovered the enemy, for where the enemy comes to meet you, he will always raise a great dust which will point out his coming to you. Thus often a Captain when he sees in a place whence he ought to pass, pigeons taking off and other birds flying about freely, circling and not setting, has recognized this to be the place of any enemy ambush, and knowing this has sent his forces forward, saving himself and injuring the enemy. As to the second case, being drawn into it ((which our men call being drawn into a trap)) you ought to look out not to believe readily those things that appear to be less reasonable than they should be: as would be (the case) if an enemy places some booty before you, you would believe that it to be (an act of) love, but would conceal deceit inside it.”

Book VI is the best section for these machinations, and in it we see the following perennial tactics:

  • Consult a rising enemy or possible sedition to give the impression of heeding his ideas and win him by feigned interest
  • Send wise men into the enemy’s camp as fake attendants of a fake dignitary to assess the enemy
  • Use false defectors to be spies in the enemy’s camp
  • Conversely, capture the enemy’s commanders to gain intelligence on the opponent
  • If you have suspected spies in your camp, disseminate false information to various parties to see how the enemy reacts to which
  • Sacrifice a town or some pawns as a gambit to give the enemy a false sense of security
  • Utilize religious and superstitious omens as far as your soldiers revere them or invent them
  • Disguise your soldiers as the enemy
  • Give the appearance of retreat to lead the enemy into a trap
  • Leave an open encampment for the enemy with fresh, albeit poisoned, supplies
  • Never cause an enemy to despair, since he will only fight more desperately and possibly defeat you
  • Use a subterfuge of a fake illness in your camp that leads the enemy to think you are weak
  • Communicate among your generals and men with secret ciphers and codes the enemy cannot decode
  • Use propaganda and stories to create a boost of morale among your men

The Art of War.

Many more could be listed, but these are the most interesting and in our day, these tricks are used by the elite, not on foreign powers primarily, but as the bases for mass deception, with a massive surveillance state, poisoned food and water, false media reports, and countless other ruses.  One might think from this list Machiavelli is immoral and devious, but for him, these are necessary facts of war with the enemy, not on the populace itself.  The goal of war is not virtue for him, but simply to win at all costs.  Yet winning at all costs does not mean being sadistic or cruel or a brute, it means learning the art of war to be a just ruler and by so doing, win the admiration of your soldiers and homeland.  Far from corruption, Machiavelli castigated the corrupt leaders of his day and it serves as an apt warning to ours.  Corruption and effeminate degeneracy among the elite does not lead to power, it leads to the loss of power.  As far as one concedes to evil and vice in his own heart, especially the ruler, to that degree does he lose his power and become subservient to the passions.

He concludes:

“But let us turn to the Italians, who, because they have not wise Princes, have not produced any good army; and because they did not have the necessity that the Spaniards had, have not undertaken it by themselves, so that they remain the shame of the world. And the people are not to blame, but their Princes are, who have been castigated, and by their ignorance have received a just punishment, ignominiously losing the State, (and) without any show of virtu….

Our Italian Princes, before they tasted the blows of the ultramontane wars, believed it was enough for them to know what was written, think of a cautious reply, write a beautiful letter, show wit and promptness in his sayings and in his words, know how to weave a deception, ornament himself with gems and gold, sleep and eat with greater splendor than others, keep many lascivious persons around, conduct himself avariciously and haughtily toward his subjects, become rotten with idleness, hand out military ranks at his will, express contempt for anyone who may have demonstrated any praiseworthy manner, want their words should be the responses of oracles; nor were these little men aware that they were preparing themselves to be the prey of anyone who assaulted them.”

via JaysAnalysis.com

The Secret Project to Create Weaponized Ebola in the 1980’s

The Secret Project to Create Weaponized Ebola in the 1980’s

Confronting Doctor Death from Bob Coen on Vimeo.

Following leads on the anthrax trail took us across four continents – filming outside the high security perimeter fences of some of the world’s most secret germ war labs (and inside a couple), tracking down and talking to experts and scientists some of whom were members of the so called “International Bio-Weapons Mafia”. None was more chilling than the face to face we got with the man they call Doctor Death – Wouter Basson, the army scientist who headed apartheid South Africa’s secret germ war program – Project Coast.

Shrouded in mystery and hidden behind front companies that used worldwide intelligence connections, the shocking activities of the program only emerged after the fall of apartheid – revealing a shockingly sophisticated operation that had 200 scientists developing germ war agents to be used against the country’s black population.

This was one of the very few interviews Doctor Death has given and for the first time he talks candidly about the help the received from the West, his relationship with David Kelly and the creation of “the Black Bomb” an agent that could sterilize blacks without their knowledge.

And then there’s his strange relationship with Larry Ford, the Mormon gynecologist to Hollywood stars who was also moonlighting for the South Africans and had CIA connections.

Some experts are wondering whether Doctor Deaths’s program provided a convenient off-shore operation for Western germ war experimentation?

wouter-basson-doctor-deathOperating out of South Africa during the Apartheid era in the early 1980’s, Dr. Wouter Basson launched a secret bioweapons project called Project Coast. The goal of the project was to develop biological and chemical agents that would either kill or sterilize the black population and assassinate political enemies. Among the agents developed were Marburg and Ebola viruses.

Basson is surrounded by cloak and dagger intrigue, as he told Pretoria High court in South Africa that “The local CIA agent in Pretoria threatened me with death on the sidewalk of the American Embassy in Schoeman Street.” According to a 2001 article in The New Yorker magazine, the American Embassy in Pretoria was “terribly concerned” that Basson would reveal deep connections between Project Coast and the United States.

In 2013, Basson was found guilty of “unprofessional conduct” by the South African health council.

Bioweapons expert Jeanne Guillemin writes in her book Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism, “The project‘s growth years were from 1982 to 1987, when it developed a range of biological agents (such as those for anthrax, cholera, and the Marburg and Ebola viruses and for botulinum toxin)…

Basson’s bioweapons program officially ended in 1994, but there has been no independent verification that the pathogens created were ever destroyed. The order to destroy them went directly to Dr. Basson. According to the Wall Street Journal, “The integrity of the process rested solely on Dr. Basson’s honesty.”

Basson claims to have had contact with western agencies that provided “ideological assistance” to Project Coast. Basson stated in an interview shot for the documentary Anthrax War that he met several times with Dr. David Kelly, the infamous UN weapons inspector in Iraq. Kelly was a top bioweapons expert in the United Kingdom. He was found dead near his home in Oxfordshire in 2003. While the official story claims he committed suicide, medical experts highly doubt this story.

In a 2007 article from the Mail Online, it was reported that a week prior to his death, Dr. Kelly was to be interviewed by MI5 about his ties to Dr. Basson.

Dr. Timothy Stamps, Minister of Health of Zimbabwe, suspected that his country was under biological attack during the time that Basson was operating. Stamps told PBS Frontline in 1998 that “The evidence is very clear that these were not natural events. Whether they were caused by some direct or deliberate inoculation or not, is the question we have to answer.”

Stamps specifically named the Ebola and Marburg viruses as suspect. Stamps thinks that his country was being used as a testing ground for weaponized Ebola.

“I’m talking about anthrax and cholera in particular, but also a couple of viruses that are not endemic to Zimbabwe [such as] the Ebola type virus and, we think also, the Marburg virus. We wonder whether in fact these are not associated with biological warfare against this country during the hostilities…Ebola was along the line of the Zambezi [River], and I suspect that this may have been an experiment to see if a new virus could be used to directly infect people.”

The Ghanaian Times reported in early September on the recent Ebola outbreak, noting connections between Basson and bioweapons research. The article points out that, “…there are two types of scientists in the world: those who are so concerned about the pain and death caused to humans by illness that they will even sacrifice their own lives to try and cure deadly diseases, and those who will use their scientific skill to kill humans on the orders of… government…”

Indeed, these ideas are not new. Plato wrote over 2,000 years ago in his work The Republic that a ruling elite should guide society, “…whose aim will be to preserve the average of population.” He further stated, “There are many other things which they will have to consider, such as the effects of wars and diseases and any similar agencies, in order as far as this is possible to prevent the State from becoming either too large or too small.”

As revealed by The Age, Nobel prize winning Australian microbiologist Sir Macfarlane Burnet secretly urged the Australian government in 1947 to develop bio weapons for use against the “overpopulated countries of South-East Asia.” In a 1947 meeting with the New Weapons and Equipment Development Committee, the group recommended that “the possibilities of an attack on the food supplies of S-E Asia and Indonesia using B.W. agents should be considered by a small study group.”

This information gives us an interesting perspective on the recent unprecedented Ebola outbreak. Is it an organic natural phenomenon? Did this strain of Ebola accidentally escape from a bioweapons lab? Or, was it deliberately released?

 

Challenging Notions of Extraterrestrial Life

Challenging Notions of Extraterrestrial Life

starman-orb-ufo-et-hollywoodIn films that present humans alongside alien counterparts, we inevitably learn more about our own humanity than of the alien creature’s new perceptions. When we visit a new country far from home, we make just as many (if not more) discoveries about ourselves as we do about our host nation – as any traveler can attest, looking at our own culture from a distance allows for a better understanding of both its strengths and frailties, and opens it up to a greater dialogue about the world at large.

In 1977, the Voyager 2 probe was sent into space with a recorded message of peace (in 55 different languages) along with an eclectic collection of music and 116 images of life on this planet. John Carpenter, in his 1984 film Starman, explores what might have happened if an alien ship were to encounter this Earthling greeting. Alongside a sweet romance between the two lead characters, there is the story of how American government officials react to the appearance of the “Starman.” A socially-conscious piece of sci-fi, the naive and otherworldly Starman reveals both the government’s uneasiness with extraterrestrials (despite spending trillions on defense yearly) and the public’s split perspectives concerning the existence of real alien beings.

Many UFOlogical scenarios begin with a cataclysmic encounter that destroys the planet. Aliens are often depicted as a race evolutionarily superior to our own, with apocalyptic powers that can be used to levitate objects, save lives, start cars – different remarkable skills for different alien life forms. For years, comics, books, television shows and films have drawn people to the world of UFOs and extraterrestrial activities. In the 1940s and 50s, freakish events – the end of the Second World War, the unforgettable image of the atom bomb’s mushroom cloud and a pervasive storm of anticommunist sentiment – inspired the creation of a slew of sci-fi masterpieces. The Roswell Crash happened in 1947, only two years after the atomic bomb was dropped on Japanese citizens. These early B-movies put the nation’s fears of invasion and destruction on film. The reality of an alien invasion, after the paranoia and chaos of the era, did not seem so outside the realm of possibility.

The “mysterious” nature of aliens, and their continued unconfirmed legitimacy by the U.S. government only adds to their appeal. While many prominent scientists have attested to the likelihood of their existence, the proof of alien abductions and landings has been largely discredited. Carl Sagan, in one of his last interviews, said that extraterrestrial intelligence is a “wonderful prospect, but requires the most severe and rigorous standards of evidence.”

For most UFO enthusiasts, theories about advanced civilizations on other planets are a matter of sheer speculation, with little consideration for standards of scientific conjecture. That said, it is difficult to consider extraterrestrial life in terms of our own. Different types of thinking are needed to properly consider a race of beings capable of journeying among the stars – we need to be mentally flexible, as these beings are truly alien and, in all likelihood, of an appearance that our eyes will be completely untrained to see.

What reasons could there be to hide evidence of aliens? Since the Roswell, New Mexico incident, many believe that there are sweeping security measures and secrecy in place to keep the subject under wraps. But the public is not convinced. According to two National Geographic polls held in 2012, 36 percent of Americans believe UFO’s exist, and 79 percent believe a government coverup is responsible for withholding detailed alien information.

This past summer, microbiologists in California discovered bacteria that survive, not by eating “food” as we commonly think of it, but by feeding on electricity. NASA has theorized that beings in the “dark energy biosphere”, beneath deep sea beds, consume so little energy that their “means of living could theoretically be used by extraterrestrial life living in other areas of the solar system, or universe.” Both of these findings prove that limiting space exploration to “Earth-like” planets will limit our discovery of other living beings. If we are modeling our assumptions as to what an alien life needs on our own, isn’t that missing the entire point? Who knows what kind of conditions another life form needs to thrive? Astronomers from the government-backed SETI (Search for Extraterrestrial Intelligence) have recently conceded that the chance of discovering life on other planets is inevitable and will likely occur within the next 20 years.

If there are beings capable of harnessing pure energy, they may take the form of these electron-feasting bacteria. Certain species are also capable of producing electrons while metabolizing chemicals, leading scientists to believe that they may be an eventual source of natural energy.

Today, with energy prices skyrocketing, the environment in crisis mode, and no clear solution in sight, it could make sense to invest in projects towards this end. While we haven’t yet been visited by other forms of life, by harnessing pure energy we may edge closer to a new kind of sustainability. Canadian science fiction writer Karl Schroeder has posited that “any sufficiently advanced technology is indistinguishable from nature” (borrowing from Arthur C. Clarke’s original, “any sufficiently advanced technology is indistinguishable from magic”). Aliens may blend seamlessly into the galaxy, their artificial systems no different from our natural ones. In Carpenter’s film, after finding the welcome messages from Voyager, the Starman heads to Earth – only to discover the hostility of American military men when he is shot down by the U.S. Air Force. But when Starman was released, we were living in a different time. There are hundreds of millions of galaxies in space, and within them millions and millions of stars. If even 1/100 of them contain “life” in any definition, that is still billions of planets with extraterrestrial beings. It’s time we found comfort, rather than fear, in the fact that we are not alone. And even if there aren’t others out there in space, the principle of coexisting peacefully can be applied equally back here on Earth

Eric Holder Sends Zero Bankers to Jail for the Mortgage Crisis Meltdown

Eric Holder Sends Zero Bankers to Jail for the Mortgage Crisis Meltdown

Eric HolderThe telling sentence in NPR’s report that US attorney general Eric Holder plans to step down once a successor is confirmed came near the end of the story.

“Friends and former colleagues say Holder has made no decisions about his next professional perch,” NPR writes, “but they say it would be no surprise if he returned to the law firm Covington & Burling, where he spent years representing corporate clients.”

A large chunk of Covington & Burling’s corporate clients are mega-banks like JP Morgan Chase, Wells Fargo, Citigroup and Bank of America. Lanny Breuer, who ran the criminal division for Holder’s Justice Department, already returned to work there.

In March, Covington highlighted in marketing materials their award from the trade publication American Lawyer as “Litigation Department of the Year,” touting the law firm’s work in getting clients accused of financial fraud off with slap-on-the-wrist fines.

Covington, American Lawyer says, helps clients “get the best deal they can.”

Holder has a mixed legacy: excellent on civil and voting rights, bad on press freedom and transparency.

But if you want to understand what he did for the perpetrators of a cascade of financial fraud that blew up the nation’s economy in 2008, you only have to read that line from his former employer: he helped them “get the best deal they can.”

As for homeowners, they received a raw deal, in the form of little or no compensation for some of the greatest consumer abuses in American history.

Before Holder became Attorney General, banks fueled the housing bubble with predatory and at times, allegedly fraudulent practices.

As far back as 2004, the FBI warned of an “epidemic” of mortgage fraud, which they said would have “as much impact as the Savings & Loan crisis.”

They were wrong; it was worse.

Moynihan
Brian T Moynihan, chief executive officer of Bank of America Corp, one of the banks accused of extensive mortgage abuses. Very little of the money from its settlements has gone to help homeowners. Photograph: Bloomberg via Getty Images

And banks and lenders carried through that fraud to every level of the mortgage process. They committed origination fraud through faulty appraisals and undisclosed trickery.

They committed servicing fraud through illegal fees and unnecessary foreclosures.

They committed securities fraud by failing to inform investors of the poor underwriting on loans they packaged into securities.

They committed mass document fraud when they failed to follow the steps to create mortgage-backed securities, covering up with fabrications and forgeries to prove the standing to foreclose.

By the time the bubble collapsed, the recession hit and Holder took over the Justice Department, Wall Street was a target-rich environment for any federal prosecutor. Physical evidence to an untold number of crimes was available in court filings and county recording offices.

Financial audits revealed large lapses in underwriting standards as early as 2005. Provisions in the Sarbanes-Oxley Act, passed during the last set of financial scandals in 2002, could hold chief executives criminally responsible for misrepresenting their risk management controls to regulators.

Any prosecutor worth his salt could have gone up the chain of command and implicated top banking executives.

In 2009, Congress passed the Fraud Enforcement and Recovery Act, giving $165m to the Justice Department to staff the investigations necessary to bring those accountable for the financial crisis to justice.

Yet, despite the Justice Department’s claims to the contrary, not one major executive has been sent to jail for their role in the crisis.

The department has put real housewives in jail for mortgage fraud, but not real bankers, saving their firepower for people who manage to defraud banks, not for banks who manage to defraud people.

Most of the “investigations” of financial institutions over the past six years have swiftly moved to cash settlements, often without holding anyone responsible for admitting wrongdoing or providing a detailed description of what they did wrong.

The headline prices of these settlements usually bore no resemblance to the reality of what they cost the banks.

The National Mortgage Settlement, for example, was touted by Holder’s Justice Department as a $25bn deal. In reality, banks were able to pay one-quarter of that penalty with other people’s money, lowering principal balances on loans they didn’t even own.

Other penalties featured similarly inflated numbers that didn’t reflect the true cost. Banks could satisfy their obligations under the settlements through routine business practices (including some, like making loans to low-income homeowners, that make them money).

A recent series of securities fraud settlements with JP Morgan, Bank of America and Citigroup, which DoJ said cost the banks $36.65bn, actually cost them about $11.5bn. And shareholders, not executives, truly bear that cost.

Incidentally, the Wall Street Journal found last week that the Justice Department only collects around 25% of the fines they impose. So the banks may have gotten off even easier.

The Justice Department has reportedly collected only 25% of the fines it has imposed on banks. Photograph: Petros Giannakouris/AP

These settlements have actually perverted the notion of justice, turning accountability into a public relations vehicle. And Holder’s Justice Department has been guilty of cooking the books: they admitted last August to overstating the number of criminal financial fraud charges by over 80%.

The DoJ’s Inspector General criticized this in a March report, and also found that DoJ de-prioritized mortgage fraud, making it the“lowest-ranked criminal threat” from 2009-2011.

As for homeowners, the biggest victims of Wall Street misconduct, they received little relief. Victims who already lost their homes got checks in the National Mortgage Settlement for between $1,500-$2,000, compensating people wrongly foreclosed upon with barely enough money for two month’s rent.

Despite claims that 1m borrowers still in their homes would get principal reductions under the settlement, when the final numbers came in this March, just 83,000 families received such a benefit, an under-delivery of over 90%.

Considering that over five million families experienced foreclosures since the end of the crisis, that relief is a drop in the bucket.

For those still eligible for relief, thanks to the expiration of a law called the Mortgage Forgiveness Debt Relief Act, any principal forgiveness will count as earned income for tax purposes, meaning that homeowners struggling to avoid foreclosure will subsequently get hit with a tax bill they cannot afford.

The Justice Department only recognized this belatedly, creating a fund in a recent Bank of America settlement to “partially” defray tax costs.

For others without that benefit, the help the Justice Department provided will look more like harm.

More important, the settlements didn’t end the misconduct.

Homeowners today continue to lose their homes based on false documents. Because the Justice Department just put a band-aid over the fraud, and didn’t convict any of the ringleaders, the problems went unaddressed, and the root causes never got fixed.

In fact, the entire banking sector’s get-out-of-jail free card gives them confidence that they could commit the same crimes again, with little if any legal implications.
The decision to protect banks instead of homeowners should be laid at the feet of the president and his administration, not one man in the Justice Department. But Holder certainly carried out the policy, even if he didn’t devise it.

We’ll soon find out if Holder merely presided over DoJ in a pause between helping corporate clients at Covington & Burling. But the failure to prosecute during his time in office certainly makes it look like Holder’s sympathies were with those clients even while serving as attorney general.

via TheGuardian

ISIS aka CIA Proxy Freedom Fighters: The Beheading Psy-Ops

ISIS aka CIA Proxy Freedom Fighters: The Beheading Psy-Ops

Western Foreign Policy Based on Sheer Propaganda

By Vivian Lee

With a rash of “beheadings” sweeping the world, a horrified public is asked to see this depraved barbarity as The New Normal.

First we had the August “murder” on video of U.S. journalist James Foley, shown kneeling before a black-robed, masked figure brandishing a knife. Yes, even a rather small knife can do it (just as box-cutters can enable the hijacking of commercial airplanes). The perpetrator is identified as a member of the terrorist group ISIS (or IS or ISIL), which supposedly wants to install a new Islamic caliphate based in the region.

However, the video did not actually show the beheading, but faded to black at the appropriate moment. A subsequent frame purports to show Foley’s head propped up on his headless body. This video was staged, however, as proved by numerous researchers, and even admitted in the British press.[1] According to a report in The Telegraph:

…a study of the four-minute 40-second clip, carried out by an international forensic science company which has worked for police forces across Britain, suggested camera trickery and slick post-production techniques appear to have been used…no blood can be seen, even though the knife is drawn across the neck area at least six times.[2]

Nonetheless, the U.S. media continue to report this “beheading” as a real occurrence, over and over again, followed by another “beheading” of an American journalist, Steven J. Sotloff, in a video released in early September. This was supposedly a “second message to America” from ISIS: “Just as your missiles continue to strike our people, our knife will continue to strike the necks of your people.”[3] This video too is problematic, with no blood in evidence before the scene fades to black.[4]

nyp_savagesBoth Foley and Sotloff have intelligence connections, as does SITE, the media dissemination service behind the release of the videos. SITE [Search for International Terrorist Entities] is an offshoot of Intel Center, both of which have an uncanny ability to produce such material at the most opportune times in support of U.S. foreign policy.[5] A visit to the SITE website is instructive.[6]

The SITE Intelligence Group, founded in 2001 by Rita Katz, is an intelligence gathering operation that monitors jihadists online, often finding terrorist statements and videos as uploads “before they are published,” according to Katz. These are transmitted to U.S. intelligence services, which are curiously beholden to SITE for these sensitive materials, and they are then released to the U.S. media.[7]

All such information obtained by SITE and then broadcast is therefore suspect. Nonetheless, the Foley and Sotloff videos have reportedly gotten the U.S. public on board with the bombing of northern Iraq and Syria in an R-2-P operation (Responsibility To Protect), the real goal being to take out Bashar al-Assad in Syria.

As for the U.K., David Haines was shown in a third “beheading” video released by SITE in mid-September.[8] And the black-robed “killer” has a British accent, which surely indicates that British citizens have gone to Iraq-Syria to join ISIS – and that they could return to wreak havoc in the homeland.

Not to neglect France, which now has its own beheading – of Hervé Gourdel, a mountaineering guide from Nice who was kidnapped in Algeria, shown in a video released by SITE in late September.[9] And certainly Australia should have one as well, but a dastardly ISIS plot in Sydney was reportedly thwarted by the government.[10]

These western countries are instrumental to the U.S.-led coalition to protect the world against ISIS, since the coalition initially included only Middle Eastern client states such as Saudi Arabia, Qatar, Bahrain, United Arab Emirates, and Jordan. As of this writing, France, Australia, Belgium, Denmark, and England have now signed on, with Turkey lining up as well.[11]

Just to drive the point home (as it were) for any “war weary” Americans out there, we now have a home-grown beheading of an employee at isis-cia-proxy-freedom-fightersa food processing plant in Moore, Oklahoma. The perpetrator, a black man named Alton Nolen, is said to have been fired from his job at Vaughan Foods. Nolen “recently started trying to convert some of his co-workers to the Muslim religion,” according to a police spokesperson.[12]

On “a Facebook page that appears to be his,” Nolen posted the following: “This is the last days… AMERICA AND ISRAEL ARE WICKED. WAKE UP MUSLIMS!!!” The FBI is assisting with the investigation after putting out “an alert to local law enforcement officials across the country to be on the watch for so-called lone wolves who might respond violently” in the wake of U.S. bombing in Syria. Now ask yourself: is this scenario credible?[13]

Nonetheless, the “beheadings”are getting major traction in the U.S. press. Magazines feature articles and editorials, television anchors report with great gravity, and radio hosts banter with listeners about these fake events. WAKE UP AMERICANS!!! As this war propaganda multiplies, with gullible members of the public accepting these psy-ops as fact, at stake are the destruction of the Middle East, continued massive “collateral damage” in Iraq and Syria – and the degrading of our own collective mentality.[14]

Notes

[1] “Media Damage Control on James Foley Video: Experts Now Conclude Video Is Fake” (Red Pill Revolution).

[2] “Foley Murder Video ‘May Have Been Staged’.” The Telegraph, August 25, 2014.

[3] “ISIS Video Shows Beheading of American Journalist Steven Sotloff.” CNN World, September 9, 2014.

[4] “James Foley Steven Sotloff ISIS Beheading Absolutely Fake Hoax” (TeamWakeEmUP).

[5] “Staged Foley, Sotloff Beheading Videos ‘Not Evidence,’ U.S. Determined to Wage War of Fear on Its Own People.” 21st Century Wire, September 9, 2014.

[6] http://ent.siteintelgroup.com/

[7] James Tracy, “Who Is Behind the Islamic State (ISIL) Beheadings? Probing the SITE Intelligence Group.” Global Research, September 15, 2014.

[8] “ISIS Video Shows British Hostage Being Beheaded.” New York Times, September 14, 2014.

[9] “French Hostage in Algeria Is Beheaded in Video Released by Militants.” New York Times, September 25, 2014.

[10] http://abcnews.go.com/International/wireStory/australian-leader-warns-planned-random-attack-25585654

[11] “Three More Countries Join the Coalition against ISIS.” Time.com, September 26, 2014.

[12] “Woman Is Beheaded in Attack at Oklahoma Food Plant.” New York Times, September 27, 2014.

[13] “Oklahoma Beheading Hoax Alton Nolen ISIS Lone Wolf” (TeamWakeEmUP).

[14] Michel Chossudovsky, “The Terrorists R Us: The Islamic State Big Lie.” Global Research, September 25, 2014.


 Vivian Lee PhD, is a professor at an East Coast university.

Stanley Kubrick – Filmmaker, Activist

Stanley Kubrick – Filmmaker, Activist

Stanley-KubrickStanley Kubrick. This famed movie director who made films such as 2001: A Space Odyssey, A Clockwork Orange, The Shining and Eyes Wide Shut, placed symbols and hidden anecdotes into his films that tell a far different story than the films appeared to be saying. In Kubrick’s Odyssey, Part I, Kubrick and Apollo, author and filmmaker, Jay Weidner presents compelling evidence of how Stanley Kubrick directed the Apollo moon landings.

He reveals that the film 2001: A Space Odyssey was not only a retelling of Arthur C. Clarke and Stanley Kubrick’s novel, but also a research and development project that assisted Kubrick in the creation of the Apollo moon footage. In light of this revelation, Weidner also explores Kubrick’s film, The Shining and shows that this film is, in actuality, the story of Kubrick’s personal travails as he secretly worked on the Apollo footage for NASA. Called by Wired Magazine an “erudite conspiracy hunter”, Jay Weidner is a renowned author and filmmaker.

Focus Points for Movies with Hidden Meanings:

Eyes Wide Shut — Secret Societies & Occult Rituals

2001:A Space Odessy  – Aliens, Space Travel, AI, Advanced Tech

Dr. Strangelove – War, Fluoride

A Clockwork Orange – MK-Ultra  & Mind Control

The Shining – Faked Apollo Moon Landings

 

 

FBI Plans to Enlist Local Cops Nationwide in Massive DNA Collection Scheme

FBI Plans to Enlist Local Cops Nationwide in Massive DNA Collection Scheme

dna-microscope

Remember that time the Supreme Court ruled that our DNA is basically just like our fingerprints, and cops can snatch it from us subsequent to arrest? Remember the giant biometrics project the FBI has been spending at least a billion dollars of our money building (with many of the details kept secret), called ‘Next Generation Identification’? With those powers and monies combined, the FBI this week announced its plans “to accelerate the collection of DNA profiles for the government’s massive new biometric identification database.” Like with other biometrics collection schemes, the FBI aims to get local police to do the groundwork.

What could go wrong?

NextGov:

Various FBI divisions “are collaborating to develop and implement foundational efforts to streamline and automate law enforcement’s DNA collection processes” including at arrest, booking and conviction, according to an Aug. 19 notice about the industry briefing. The ongoing groundwork is expected to facilitate the “integration of Rapid DNA Analysis into the FBI’s Combined DNA Index (CODIS) and Next Generation Identification (NGI) systems from the booking environment.”

CODIS is the government’s central DNA database.

Rapid DNA analysis can be performed by cops in less than two hours, rather than by technicians at a scientific lab over several days. The benefit for law enforcement is that an officer can run a cheek swab on the spot or while an arrestee is in temporary custody. If there is a database match, they can then move to lock up the suspect immediately.

While current law requires DNA sent to CODIS to be examined in an accredited lab, FBI officials are looking for a “legislative tweak” to enable local law enforcement to skip that step, and send arrestees’ DNA straight to the FBI’s national database. In 2011, one out of every 25 Americans was arrested.

EFF’s Jennifer Lynch, one of the nation’s foremost experts on FBI biometrics programs, explains why the bureau’s DNA plans pose a serious threat to civil liberties.

“If you leave something behind, let’s say your trash on the sidewalk out in front of your house, then you’ve abandoned any kind of privacy interest in the trash,” she explained. “And so the cops can search through that trash without a warrant. That reasoning has been extended to DNA — if you leave your DNA behind, then the cops could get it without a warrant and test it.”

“If you consider DNA to be a form of ID, and the Supreme Court has already upheld state laws that allow officers to stop someone and ask for their ID, then this is the logical next step,” she added.

codisndismapsept2009Everyone in the United States knows who gets stopped by police the most: young black and brown people. It’s therefore not hard to imagine whose DNA is going to disproportionately fill up this national database, says Lynch.

“If the cops are stopping more African Americans or Latinos and they have the ability to collect their DNA just at a stop, then it means that the DNA database is going to be even more heavily weighted with DNA from immigrant communities and different ethnic minorities,” Lynch told NextGov.

Concerned about your local police department obtaining a rapid DNA device, or sending your DNA to the FBI just because you were arrested at a protest, or for a bench warrant? Take up the matter at the local level. Tell your city government you don’t want your city or town participating in this dragnet DNA sweep.

via PrivacySOS

The Covert Origins of ISIS

The Covert Origins of ISIS

Evidence exposing who put ISIS in power, and how it was done.

The Islamic militant group ISIS, formerly known as Al-Qaeda in Iraq, and recently rebranded as the so called Islamic State, is the stuff of nightmares. They are ruthless, fanatical, killers, on a mission, and that mission is to wipe out anyone and everyone, from any religion or belief system and to impose Shari’ah law. The mass executions, beheadings and even crucifixions that they are committing as they work towards this goal are flaunted like badges of pride, video taped and uploaded for the whole world to see. This is the new face of evil.

iss-money-dollar-symbolism-conspiracyWould it interest you to know who helped these psychopaths rise to power? Would it interest you to know who armed them, funded them and trained them? Would it interest you to know why?

This story makes more sense if we start in the middle, so we’ll begin with the overthrow of Muammar Gaddafi in 2011.

The Libyan revolution was Obama’s first major foreign intervention. It was portrayed as an extension of the Arab Spring, and NATO involvement was framed in humanitarian terms.

The fact that the CIA was actively working to help the Libyan rebels topple Gaddafi was no secret, nor were the airstrikes that Obama ordered against the Libyan government.However, little was said about the identity or the ideological leanings of these Libyan rebels. Not surprising, considering the fact that the leader of the Libyan rebels later admitted that his fighters included Al-Qaeda linked jihadists who fought against allied troops in Iraq.

These jihadist militants from Iraq were part of what national security analysts commonly referred to as Al-Qaeda in Iraq. Remember Al-Qaeda in Iraq was ISIS before it was rebranded.

With the assistance of U.S. and NATO intelligence and air support, the Libyan rebels captured Gaddafi and summarily executed him in the street, all the while enthusiastically chanting “Allah Akbar”. For many of those who had bought the official line about how these rebels were freedom fighters aiming to establish a liberal democracy in Libya, this was the beginning of the end of their illusions.

Prior to the U.S. and NATO backed intervention, Libya had the highest standard of living of any country in Africa. This according to the U.N.’s Human Development Index rankings for 2010.However in the years following the coup, the country descended into chaos, with extremism and violence running rampant. Libya is now widely regarded as failed state (of course those who were naive enough to buy into the propaganda leading up to the war get defensive when this is said).

Now after Gaddafi was overthrown, the Libyan armories were looted, and massive quantities of weapons were sent by the Libyan rebels to Syria. The weapons, which included anti-tank and anti-aircraft missiles were smuggled into Syria through Turkey, a NATO ally. The times of Londonreported on the arrival of the shipment on September 14th, 2012. (Secondary confirmation in this NYT article) This was just three days after Ambassador Chris Stevens was killed by the attack on the U.S. embassy in Benghazi. Chris Stevens had served as the U.S. government’s liaison to the Libyan rebels since April of 2011.

While a great deal media attention has focused on the fact that the State Department did not provide adequate security at the consulate, and was slow to send assistance when the attack started, Pulitzer Prize winning journalist Seymour Hersh released an article in April of 2014 which exposed a classified agreement between the CIA, Turkey and the Syrian rebels to create what was referred to as a “rat line”. The “rat line” was covert network used to channel weapons and ammunition from Libya, through southern turkey and across the Syrian border. Funding was provided by Turkey, Saudi Arabia and Qatar.

With Stevens dead any direct U.S. involvement in that arms shipment was buried, and Washington would continue to claim that they had not sent heavy weaponry into Syria.

It was at this time that jihadist fighters from Libya began flooding into Syria as well. And not just low level militants. Many were experienced commanders who had fought in multiple theaters.

The U.S. and its allies were now fully focused on taking down Assad’s government in Syria. As in Libya this regime change was to be framed in terms of human rights, and now overt support began to supplement the backdoor channels. The growing jihadist presence was swept under the rug and covered up.

However as the rebels gained strength, the reports of war crimes and atrocities that they were committing began to create a bit of a public relations problem for Washington. It then became standard policy to insist that U.S. support was only being given to what they referred to as“moderate” rebel forces.

This distinction, however, had no basis in reality.

In an interview given in April of 2014, FSA commander Jamal Maarouf admitted that his fighters regularly conduct joint operations with Al-Nusra. Al-Nusra is the official Al-Qa’ida branch in Syria. This statement is further validated by an interview given in June of 2013 by Colonel Abdel Basset Al-Tawil, commander of the FSA’s Northern Front. In this interview he openly discusses his ties with Al-Nusra, and expresses his desire to see Syria ruled by sharia law. (You can verify the identities of these two commanders here in this document from The Institute for the Study of War)

Moderate rebels? Well it’s complicated. Not that this should really come as any surprise. Reuters had reported in 2012 that the FSA’s command was dominated by Islamic extremists, and the New York Times had reported that same year that the majority of the weapons that Washington were sending into Syria was ending up in the hands Jihadists. For two years the U.S. government knew that this was happening, but they kept doing it.

And the FSA’s ties to Al-Nusra are just the beginning. In June of 2014 Al-Nusra merged with ISIS at the border between Iraq and Syria.

So to review, the FSA is working with Al-Nusra, Al-Nusra is working with ISIS, and the U.S. has been sending money and weapons to the FSA even though they’ve known since 2012 that most of these weapons were ending up in the hands of extremists. You do the math.

[UPDATE 9.03.14]: Retired Lt. Gen. Tom McInerney admits: “We Helped Build ISIS”:
Note that the first version of this video I uploaded (here) was quickly taken down. To insure that this clip does not disappear we have provided a secondary download link here. So if the video below isn’t playing then use that link and upload it elsewhere.

Syria, we backed I believe, in some cases some of the wrong people and not in the right part of the Free Syrian Army (FSA) that’s a little confusing to people. So I’ve always maintained, and go back quite some time that we were backing the wrong types. I think it’s going to turn out maybe this weekend in a new special that Brett Baer is going to have Friday that’s gonna show some of those weapons from Benghazi ended up in the hands of ISIS. So we helped build ISIS.

In that context, the sarin gas attacks of 2013 which turned out to have been committed by the Syrian rebels, makes a lot more sense doesn’t it? If it wasn’t enough that U.N. investigators,Russian investigators, and Pulitzer prize winning journalist Seymour Hersh all pinned that crime on Washington’s proxies, the rebels themselves threatened the West that they would expose what really happened if they were not given more advanced weaponry within one month.

By the way, this also explains why Washington then decided to target Russia next.

This threat was made on June 10th, 2013. In what can only be described as an amazing coincidence, just nine days later, the rebels received their first official shipment of heavy weapons in Aleppo.

After the second sarin gas fiasco, which was also exposed and therefore failed to garner public support for airstrikes, the U.S. continued to increase its the training and support for the rebels.

In February of 2014, Haaretz reported that the U.S. and its allies in the region, Saudi Arabia, Jordan and Israel, were in the process of helping the Syrian rebels plan and prepare for a massive attack in the south. According to Haaretz Israel had also provided direct assistance in military operations against Assad four months prior (you can access a free cached version of the page here).

Then in May of 2014 PBS ran a report in which they interviewed rebels who were trained by the U.S. in Qatar. According to those rebels they were being trained to finish off soldiers who survived attacks.

“They trained us to ambush regime or enemy vehicles and cut off the road,” said the fighter, who is identified only as “Hussein.” “They also trained us on how to attack a vehicle, raid it, retrieve information or weapons and munitions, and how to finish off soldiers still alive after an ambush.”

This is a blatant violation of the Geneva conventions. It also runs contrary to conventional military strategy. In conventional military strategy soldiers are better off left wounded, because this ends up costing the enemy more resources. Executing captured enemy soldiers is the kind of tactic used when you want to strike terror in the hearts of the enemy. It also just happens to be standard operating procedure for ISIS.

One month after this report, in June of 2014, ISIS made its dramatic entry, crossing over the Syrian border into Iraq, capturing Mosul, Baiji and almost reaching Baghdad. The internet was suddenly flooded with footage of drive by shootings, large scale death marches, and mass graves. And of course any Iraqi soldier that was captured was executed.

Massive quantities of American military equipment were seized during that operation. ISIS took entire truckloads of humvees, they took helicopters, tanks, and artillery. They photographed and video taped themselves and advertised what they were doing on social media, and yet for some reason Washington didn’t even TRY to stop them.

U.S. military doctrine clearly calls for the destruction of military equipment and supplies when friendly forces cannot prevent them from falling into enemy hands, but that didn’t happen here. ISIS was allowed to carry this equipment out of Iraq and into Syria unimpeded. The U.S. military had the means to strike these convoys, but they didn’t lift a finger, even though they had been launching drone strikes in Pakistan that same week.

Why would they do that?

Though Obama plays the role of a weak, indecisive, liberal president, and while pundits from the right have had a lot of fun with that image, this is just a facade. Some presidents, like George W. Bush, rely primarily on overt military aggression. Obama gets the same job done, but he prefers covert means. Not really surprising considering the fact that Zbigniew Brzezinski was his mentor.

Those who know their history will remember that Zbigniew Brzezinski was directly involved in the funding and arming the Islamic extremists in Pakistan and Afghanistan in order to weaken the Soviets.

By the way Osama bin Laden was one of these anti-Soviet “freedom fighters” the U.S. was funding and arming.

This operation is no secret at this point, nor are the unintended side effects.

Officially the U.S. government’s arming and funding of the Mujahideen was a response to the Soviet invasion in December of 1979, however in his memoir entitled “From the Shadows” Robert Gates, director of the CIA under Ronald Reagan and George Bush Senior, and Secretary of Defense under both George W. Bush and Barack Obama, revealed that the U.S. actually began the covert operation 6 months prior, with the express intention of luring the Soviets into a quagmire. (You can preview the relevant text here on google books)

The strategy worked. The Soviets invaded, and the ten years of war that followed are considered by many historians as being one of the primary causes of the fall of the USSR.

This example doesn’t just establish precedent, what we’re seeing happen in Iraq, Afghanistan and Syria right now is actually a continuation of a old story. Al-Nusra and ISIS are ideological and organizational decedents of these extremist elements that the U.S. government made use of thirty years ago.

The U.S. the went on to create a breeding ground for these extremists by invading Iraq in 2003. Had it not been for the vacuum of power left by the removal and execution of Saddam, Al-Qaeda in Iraq, aka ISIS, would not exist. And had it not been for Washington’s attempt at toppling Assad by arming, funding and training shadowy militant groups in Syria, there is no way that ISIS would have been capable of storming into Iraq in June of 2014.

On every level, no matter how you cut it, ISIS is a product of U.S. government’s twisted and decrepit foreign policy.

Now all of this may seem contradictory to you as you watch the drums of war against ISIS begin to beat louder and the air strikes against them are gradually widenedhttp://www.wjla.com/articles/2014/08/president-obama-considers-possible-…). Why would the U.S. help a terrorist organization get established, only to attack them later?

Well why did the CIA put Saddam Hussein in power in 1963?, Why did the U.S. government back Saddam in 1980 when he launched a war of aggression against Iran, even though they knew that he was using chemical weapons? Why did the U.S. fund and arm Islamic extremists in Afghanistan against the Soviets?

There’s a pattern here if you look closely. This is a tried and true geopolitical strategy.

Step 1: Build up a dictator or extremist group which can then be used to wage proxy wars against opponents. During this stage any crimes committed by these proxies are swept under the rug. [Problem]

Step 2: When these nasty characters have outlived their usefulness, that’s when it’s time to pull out all that dirt from under the rug and start publicizing it 24/7. This obviously works best when the public has no idea how these bad guys came to power.[Reaction]

Step 3: Finally, when the public practically begging for the government to do something, a solution is proposed. Usually the solution involves military intervention, the loss of certain liberties, or both. [Solution]

ISIS is extremely useful. They have essentially done Washington dirty work by weakening Assad. In 2014, while the news cycle has focused almost exclusively on Ukraine and Russia, ISIS made major headway in Syria, and as of August they already controlled 35% of the country.

Since ISIS largely based in Syria, this gives the U.S. a pretext to move into Syria. Sooner or later the U.S. will extend the airstrikes into Assad’s backyard, and when they do U.S. officials are already making it clear that both ISIS and the Syrian government will be targeted. That, after all, is the whole point. Washington may allow ISIS to capture a bit more territory first, but the writing is on the wall, and has been for some time now.

The Obama administration has repeatedly insisted that this will never lead to boots on the ground, however, the truth of the matter is that anyone who understands anything about military tactics knows full well that ISIS cannot be defeated by airstrikes alone. In response to airstrikes ISIS will merely disperse and conceal their forces. ISIS isn’t an established state power which can be destroyed by knocking out key government buildings and infrastructure. These are guerrilla fighters who cut their teeth in urban warfare.

To significantly weaken them, the war will have to involve ground troops, but even this is a lost cause. U.S. troops could certainly route ISIS in street to street battles for some time, and they might even succeed in fully occupying Syria and Iraq for a number of years, but eventually they will have to leave, and when they do, it should be obvious what will come next.

The puppets that the U.S. government has installed in the various countries that they have brought down in recent years have without exception proven to be utterly incompetent and corrupt. No one that Washington places in power will be capable of maintaining stability in Syria. Period.

Right now, Assad is the last bastion of stability in the region. He is the last chance they have for a moderate non-sectarian government and he is the only hope of anything even remotely resembling democracy for the foreseeable future. If Assad falls, Islamic extremist will take the helm, they will impose shari’ah law, and they will do everything in their power to continue spreading their ideology as far and wide as they can.

If the world truly wants to stop ISIS, there is only one way to do it:

1. First and foremost, the U.S. government and its allies must be heavily pressured to cut all support to the rebels who are attempting to topple Assad. Even if these rebels that the U.S. is arming and funding were moderate, and they’re not, the fact that they are forcing Assad to fight a war on multiple fronts, only strengthens ISIS. This is lunacy.

2. The Syrian government should be provided with financial support, equipment, training and intelligence to enable them to turn the tide against ISIS. This is their territory, they should be the ones to reclaim it.

Now obviously this support isn’t going to come from the U.S. or any NATO country, but there are a number of nations who have a strategic interest in preventing another regime change and chaotic aftermath. If these countries respond promptly, as in right now, they could preempt a U.S. intervention, and as long this support does not include the presence of foreign troops, doing so will greatly reduce the likelihood of a major confrontation down the road.

3. The U.S. government and its allies should should be aggressively condemned for their failed regime change policies and the individuals behind these decisions should be charged for war crimes. This would have to be done on an nation by nation level since the U.N. has done nothing but enable NATO aggression. While this may not immediately result in these criminals being arrested, it would send a message. This can be done. Malaysia has already proven this by convicting the Bush administration of war crimes in abstentia.

Now you might be thinking: “This all sounds fine and good, but what does this have to do with me? I can’t influence this situation.”

That perspective is quite common, and for most people, it’s paralyzing, but the truth of the matter is that we can influence this. We’ve done it before, and we can do it again.

I’ll be honest with you though, this isn’t going to be easy. To succeed we have to start thinking strategically. Like it or not, this is a chess game. If we really want to rock the boat, we have to start reaching out to people in positions of influence. This can mean talking to broadcasters at your local radio station, news paper, or t.v. station, or it can mean contacting influential bloggers, celebrities, business figures or government officials. Reaching out to current serving military and young people who may be considering joining up is also important. But even if it’s just your neighbor, or your coworker, every single person we can reach brings us closer to critical mass. The most important step is to start trying.

If you are confused about why this is all happening, watch this video we put out on September 11th, 2012

If this message resonates with you then spread it. If you want to see the BIG picture, and trust me we’ve got some very interesting reports coming, subscribe to StormCloudsGathering on Youtube, and follow us on Facebook, twitter and Google plus.

BONUS ARTICLE (an interesting tangent): Were the Libyan rebels being led by a CIA plant?

via StormCloudsGathering